• Title/Summary/Keyword: Leakage scenarios

Search Result 83, Processing Time 0.029 seconds

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

An Exploratory Study for Clustering of Technology Leakage Activitie (기술유출행위 군집화를 위한 탐색적 연구)

  • Kim, Jaesoo;Kim, Jawon;Kim, Jeongwook;Choi, Yurim;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.3-9
    • /
    • 2019
  • Most of security countermeasures have been implemented to cope with continuous increase leakage of technology, but almost security countermeasures are focused on securing the boundary between inside and outside. This is effective for detecting and responding to attacks from the outside, but it is vulnerable to internal security incidents. In order to prevent internal leakage effectively, this study identifies activities corresponding to technology leakage activities and designes technology leakage activity detection items. As a design method, we analyzed the existing technology leakage detection methods based on the previous research and analyzed the technology leakage cases from the viewpoint of technology leakage activities. Through the statistical analysis, the items of detection of the technology leakage outcomes were verified to be appropriate, valid and reliable. Based on the results of this study, it is expected that it will be a basis for designing the technology leaking scenarios based on future research and leaking experiences.

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.7
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

Analysis of Risk Assessment Factors for Gas leakage and Dispersion in Underground Power Plant (지하복합발전플랜트 내의 가스 누출 및 확산에 의한 위험성 평가 인자 분석)

  • Choi, Jinwook;Li, Longnan;Park, Jaeyong;Sung, Kunhyuk;Lee, Seonghyuk;Kim, Daejoong
    • Journal of ILASS-Korea
    • /
    • v.20 no.2
    • /
    • pp.101-106
    • /
    • 2015
  • Gas leakage and dispersion in the underground LNG power plant can lead to serious fire and explosion accident. In this study, computational fluid dynamics simulation was applied to model the dynamic process of gas leakage and dispersion phenomena in a closed space. To analyze the risk assessment factor, such as the flammable volume ratio, transient simulations were carried out for different scenarios. The simulation results visualized the gas distribution with time in the closed space. The flammable volume ratio was introduced for quantitative analysis the fire/explosion probability.

DetGas: A Carbon Monoxide Gas Leakage Detector Mobile Application

  • Kamaruddin, Farhan Fikri Mohd;Hadiana, Ana;Lokman, Anitawati Mohd
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.59-66
    • /
    • 2021
  • Many incidents of Carbon Monoxide (CO) poisoning have occurred because of people being unaware of its presence. There are currently available systems on the market, but they are limited to measuring CO in a certain area and lack vital functions. Additionally, little to no evidence-based information on their quality was available. Thus, a mobile application for detecting CO gas leakage in a vehicle and critical features to assist victims was developed. A usability and functionality test were conducted to determine the product's quality utilizing nine usability and six functionality task scenarios (n=5). Then, a System Usability Scale test was performed to obtain system satisfaction, usability, and learnability (n=50). The usability and functionality test shows that all the tasks given for both tests were 100% successful. The overall score obtained for SUS was 71.4, which indicates good acceptance and usability. Around 20% of respondents claimed that they would need the support of a technical person to be able to use the application and that they needed to learn a lot of things before they could use the application, which indicates the overall high learnability of the application. The result provides empirical evidence that the CO gas leakage detection mobile application is successful and receives good usability, functionality, acceptability, learnability, and satisfaction assessments. DetGas could benefit automobile owners and other stakeholders by mitigating the risk and harm associated with gas leaking that exceeds the safe limit.

Numerical Analysis of Behavior of Ground Near LNG Tank Foundation Under Scenario of LNG Leakage (LNG 탱크에서 천연가스 유출시 얕은 기초 주변 지반거동의 수치해석적 분석)

  • Kim, Jeongsoo;Kim, Youngseok;Lee, Kicheol;Kim, Dongwook
    • Journal of the Korean Geosynthetics Society
    • /
    • v.17 no.4
    • /
    • pp.81-92
    • /
    • 2018
  • Recently, the use of natural gas has steadily increased due to its economical advantage and increased demand of clean energy uses. Accordingly, construction of LNG storage tanks is also increased. Secure of the stability of LNG tanks storage requires high technology as natural gas is stored in a liquid state for efficiency of storage. When a cryogenic LNG fluid leaks on ground due to a defect in LNG tank, damage is expected to be significant. Many researchers evaluated the critical and negative effects of LNG leakage, but there is limited research on the effect of cryogenic fluid leakage on the ground supporting LNG tanks. Therefore, in this study, the freezing expansion of the ground during cryogenic LNG fluid leakage was evaluated considering various outflow situations and ground conditions. The LNG leakage scenarios were simulated based on numerical analyses results varying the surcharge load, temperature boundary conditions, and soil types including freeze-sensitive soil. Consequently, short and long term ground temperature variations after LNG leakage were evaluated and the resulting ground behavior including vertical displacement behavior and porosity were analyzed.

Leakage Detection Method in Water Pipe using Tree-based Boosting Algorithm (트리 기반 부스팅 알고리듬을 이용한 상수도관 누수 탐지 방법)

  • Jae-Heung Lee;Yunsung Oh;Junhyeok Min
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.17-23
    • /
    • 2024
  • Losses in domestic water supply due to leaks are very large, such as fractures and defects in pipelines. Therefore, preventive measures to prevent water leakage are necessary. We propose the development of a leakage detection sensor utilizing vibration sensors and present an optimal leakage detection algorithm leveraging artificial intelligence. Vibrational sound data acquired from water pipelines undergo a preprocessing stage using FFT (Fast Fourier Transform), followed by leakage classification using an optimized tree-based boosting algorithm. Applying this method to approximately 260,000 experimental data points from various real-world scenarios resulted in a 97% accuracy, a 4% improvement over existing SVM(Support Vector Machine) methods. The processing speed also increased approximately 80 times, confirming its suitability for edge device applications.

Analysis of Safety by Expansion of Hydrogen Charging Station Facilities (수소충전소 설비 증설에 따른 안전성 해석)

  • Park, Woo-Il;Kang, Seung-Kyu
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.6
    • /
    • pp.83-90
    • /
    • 2020
  • This study conducted a risk assessment using the HyKoRAM program created by international joint research. Risk assessment was conducted based on accident scenarios and worst-case scenarios that could occur in the facility, reflecting design specifications of major facilities and components such as compressors, storage tanks, and hydrogen pipes in the hydrogen charging station, and environmental conditions around the demonstration complex. By identifying potential risks of hydrogen charging stations, we are going to derive the worst leakage, fire, explosion, and accident scenarios that can occur in hydrogen storage tanks, treatment facilities, storage facilities, and analyze the possibility of accidents and the effects of damage on human bodies and surrounding facilities to review safety.

Analyses of Scenarios Based on a Leakage of Highly Compressed Air and Fire Anticipated in CAES (Compressed Air Energy Storage) Facility (압축공기에너지저장 시설에서 발생 가능한 압축공기 유출 및 화재 시나리오 분석)

  • Yoon, Yong-Kyun;Ju, Eun-Hye
    • Tunnel and Underground Space
    • /
    • v.25 no.6
    • /
    • pp.568-576
    • /
    • 2015
  • In this study, scenarios based on the leakage of highly compressed air and fire occurrence turned out to be high risks in an operation stage of CAES facility were constructed and estimated. By combining Bernoulli equation with momentum equation, an expression to calculate an impact force of a jet flow of compressed air was derived. An impact force was found to be proportional to the square of diameter of fracture and the pressure of compressed air. Four types of fire scenarios were composed to evaluate an effects that seasonal change and location of fire source have on the spread behavior of smoke. Smoke from the fire ignited in the vicinity of CAES opening descended more quickly below the limit line of breathing than one from the fire occurred 10 m away from CAES opening, which is expected to occur due to a propagation of wave front of smoke. It was shown that a rate of smoke spread of the winter fire is faster than one of the summer fire and smoke from the winter fire spreads farther than one of the summer fire, which are dependent on the direction of air flow into access opening. Evacuation simulation indicated that the required safe evacuation time(RSET) of the summer and winter fires are 262, 670 s each.

A Authentication technique of Internal Information Hacking Protection based on H/W Information (H/W 정보의 인증을 통한 내부정보유출 방지 기법)

  • Yang, Sun Ok;Choi, Nak Gui;Park, Jae Pyo;Choi, Hyung Il
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.