• Title/Summary/Keyword: Port-security

Search Result 307, Processing Time 0.025 seconds

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

Illegal Issuing Practices of Switched Bill of Lading and Precautions against their Potential Risks (스위치선하증권의 불법적 발행 관행에 따른 위험과 그 대책)

  • Park, Sae-Woon
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.389-409
    • /
    • 2012
  • The Switched Bill of Lading(SBL) has been in frequent use in recent years as intermediary trade increases with the growing number of companies' overseas subsidiaries. Its frequent use, though, has brought about disputes regarding its illegal issue. Although there are several legal cases regarding this, studies on this issue are hard to find. Therefore, this study tries to provide countermeasures and precautions against unlawful issues of SBL through examining the legal cases resulting from illegal issuing practices of SBL. When the Switched Bill of Lading is issued, the shipper, consignee, port of loading and unloading, and shipping date of the original bill of lading are usually changed. Statements which may put the shipper at a disadvantageous position may also be deleted and/or the bill of lading may be either divided or integrated when it is issued. However, if the carrier issues the SBL 1)without withdrawing original BL, 2)indicating the shipping date, port of loading and port of discharge falsely, or 3)deleting the statements which may give him disadvantages, it may be regarded as an illegal issue. These unlawful issues of SBL may pose a huge threat to the shipper, banks and the parties relating to the trade. That is, the shipper may take a substantial loss when the goods can be delivered to a third party by SBL without his collecting the proceeds. The issuing bank and the negotiating bank may also have their security rights to the goods hampered by the illegal and improper issue of SBL. In most cases, the carrier has no choice but to issue the SBL without collecting the original BL for fear of hurting the relationship with the intermediary traders. This practice of issuing more than two sets of BL may pose a potential risk to the carrier.

  • PDF

An Analysis of the Implementation of the Maritime Labour Convention, 2006, Through Port State Control (항만국통제를 통한 해사노동협약의 이행실태 분석)

  • Yang, Jinyoung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.1
    • /
    • pp.18-26
    • /
    • 2019
  • The Maritime Labour Convention, 2006, (MLC) aimed to ensure decent working conditions for seafarers and entered into force on August 20, 2013. It was considered as the fourth pillar in the maritime sector. This paper evaluates how the MLC has been implemented in the field and what issues were addressed in the shipping industry. To achieve this, statistical analysis was conducted using inspection data of Port State Control (PSC) carried out by the Paris MOU and the Tokyo MOU during 2010-2012 and 2014-2016 for deficiencies under the MLC and International Labour Organization (ILO) No. 147 Convention. This study compared pre-2013 and post-2013 deficiency data according to ship's age, size (gross tonnage) and type. The results showed that, although the deficiencies reported by the Tokyo MOU during 2014-2016 were nearly double those from 2010-2012, the deficiency share against total deficiencies for the Tokyo MOU remained two thirds of those for the Paris MOU. This study suggests that the Tokyo MOU should strengthen its inspection efforts on MLC and ILO should provide clear references, such as guidelines and a unified interpretation for national discretions under the MLC for the purpose of harmonized PSC inspections. Additionally, it would be desirable to consolidate the deficiency coding system for the MLC by deleting the codes for the ILO No. 147 Convention, which was incorporated into the MLC. It would also be beneficial to add new deficiency codes for social security, including seafarers' leave and repatriation.

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.

The relationship of the office given condition of the country important facility private security and job satisfaction degree (국가중요시설 경비원의 직무여건과 직무만족도의 관계)

  • Son, Ki-Ho
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.103-135
    • /
    • 2012
  • The object is that this research searches the relationship of the office given condition actual condition of the country important facility private security guard and job satisfaction degree. In order to grasp and analyze the real state of the country important facility private security guards directly, the questionnaire, that is the general measurement tool, was utilized and the guard whom it works in the airport, the port region and general work place, that is the national important facility of Busan and Ulsan area, was aimed at. The enough survey object was illustrated to the facility and person in charge in the security company and the item was previewed and the total 400 sheets was distributed and 331 sheets (82.8%) except the doubleness subject intention and incongruent questionnaire was utilized for the analysis. The statistic processing of collected data utilized the SPSS version 15.0 the statistical package program through data coding and cleaning process and performed the frequency analysis, reliability analysis, t-test, one way analysis of variance, Pearson analysis, and regression analysis. The relationship of the office given condition actual condition of the guard about the national important facility and job satisfaction degree was classified into the interpersonal relationship, task characteristic, office environment, and complement factor and the difference of the job satisfaction degree according to the general characteristic was verified. If the conclusion obtained through the method of study described in the above looked at, for as to general tendency, the low wages and poor field environment was continued. In the general characteristic, the man was higher than the excitation about the job satisfaction level. As there was lots of the age and the scholarship was low, the age was high. And as there was lots of the career and income, the police of a petition or search and guide staff was high and the job satisfaction degree in which relatively the employee and the other job group is high so that the case of being the former student incidence can be the poorest was shown rather than the facility security agent. As the interrelation analysis result job satisfaction was high, the change of occupation pseudo was low and the organizational commitment degrees was increased. The regression analysis result job satisfaction degree was exposed to reach the meaningful effect on the change of occupation pseudo and organizational commitment. It had an effect on the change of occupation pseudo as the task characteristic and office ambient level was low. It had an effect on the organizational commitment as the extend of satisfaction about the task characteristic and interpersonal relationship, complement, and office ambient level were high. If the research result of this time is integrated, the support of the political system including the interpersonal relationship thesis between top and bottom of the organized I and substantial complement actualization is urgently needed between the office given condition improvement effort in the country important facility defense manpower field and police of a petition and special guard.

  • PDF

A Study on Quantitative Modeling for EPCIS Event Data (EPCIS Event 데이터 크기의 정량적 모델링에 관한 연구)

  • Lee, Chang-Ho;Jho, Yong-Chul
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.4
    • /
    • pp.221-228
    • /
    • 2009
  • Electronic Product Code Information Services(EPCIS) is an EPCglobal standard for sharing EPC related information between trading partners. EPCIS provides a new important capability to improve efficiency, security, and visibility in the global supply chain. EPCIS data are classified into two categories, master data (static data) and event data (dynamic data). Master data are static and constant for objects, for example, the name and code of product and the manufacturer, etc. Event data refer to things that happen dynamically with the passing of time, for example, the date of manufacture, the period and the route of circulation, the date of storage in warehouse, etc. There are four kinds of event data which are Object Event data, Aggregation Event data, Quantity Event data, and Transaction Event data. This thesis we propose an event-based data model for EPC Information Service repository in RFID based integrated logistics center. This data model can reduce the data volume and handle well all kinds of entity relationships. From the point of aspect of data quantity, we propose a formula model that can explain how many EPCIS events data are created per one business activity. Using this formula model, we can estimate the size of EPCIS events data of RFID based integrated logistics center for a one day under the assumed scenario.

An Improved Detection System for the Network Vulnerability Scan Attacks (네트워크 취약점 검색공격에 대한 개선된 탐지시스템)

  • You, Il-Sun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.543-550
    • /
    • 2001
  • In this paper, an improved detection system for the network vulnerability scan attacks is proposed. The proposed system improves the methodology for detecting the network vulnerability scan attacks and provides a global detection and response capability that can counter attacks occurring across an entire network enterprize. Through the simulation, we show that the proposed system can detect vulnerable port attacks, coordinated attacks, slow scans and slow coordinated attacks. We also show our system can achieve more global and hierarchical response to attacks through the correlation between server and agents than a stand-alone system can make.

  • PDF

Protecting Copyright Owners in Nigeria: A Panacea for Intellectual Development

  • Owushi, Emmanuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2020
  • The paper looks at protecting copyright owners in Nigeria: a panacea for intellectual development. A descriptive survey design was adopted in carrying out the study. The sample size for the study was 112. Three research objectives guided the study. The study utilized a self-developed questionnaire for data collection. A total of 112 copies of the questionnaire were distributed to librarian and lecturers, out of which 108 copies were duly filled and returned, representing 96.4%. The collected data was arranged in frequency and analyzed using percentage and mean score. The findings revealed that protection of copyright will encourage creators of intellectual works, and that if authors are well remunerated there is likelihood of adequate availability of various publications to meet information needs of Nigerians. The result showed that the right to intellectual properties is one of the ways to encourage intellectual development. The finding revealed that copyright protection provides security for intellectual product and does not negatively affect the availability of intellectual materials. Based on the research findings, it was recommended that owners of intellectual property deserve good earnings for their intellectual works in order to promote Knowledge proliferation and availability so as to meet the reading needs of the citizens at the various levels. The study also recommended that all cases relating to copyright violation in our courts should be summarily dealt with. The study advocated that the provision on the punishment should be reviewed such that it could deter people from infringing on authors rights.

A Study on Rational Methods for Education of Radiocommunication complying with the Acceptance of GMDSS (GMDSS 도입에 따른 전파통신교육의 개선방안)

  • 김기문;박석주;양규식;예병덕
    • Journal of the Korean Institute of Navigation
    • /
    • v.17 no.2
    • /
    • pp.75-106
    • /
    • 1993
  • GMDSS(Global Maritime Distress and Safety system) is a new communication system for the distress and safety at sea which is utilizing the recent advancements in satellite communication and positioning system, digital communication system, computer and microelectronic technology, etc., and will completely substitute the current communication system by 1999. Although the improvements of education for producing qualified Radio Operators as well as the establi-shments of policy for accepting the system are required, the educational institutions and relating administ-rations have not yet prepared the rational and concrete schemes on the educational methods and accepting procedures for the system. In this study, as the result of analyzing the GMDSS, courses of training and relating data, the authors suggested principles for improving the course and contents of education and rational schemes for balan-cing the demand and supply of Radio Operators. The authors expect not only the consequences of this study can be utilized as reference materials for the instruction to ratio communication in the organs of education but also that the following effects can be obtained by the study. 1. Security of distress and safety communication system at sea by the establishment of relating regula-tions. 2. Rationalization of the management of radio communication at sea and improvement of the communi-cation system on the vessel. 3. Upgrading the quality of Radio Operators and presenting schemes for current qualified persons. 4. Activation of industry producing radio instruments. 5. Balance of the demand and supply of Radio Operators and development of shipping industry.

  • PDF

The case study to verify of a network based on router applying an ACL(: Access List) (ACL(: Access list)이 적용된 라우터 기반 네트워크의 검증 사례연구)

  • Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.491-498
    • /
    • 2016
  • An ACL(: Access List), a list that determines network access, is used for the security of the network. An ACL if applied to a interface of router can filter particular packets. Also it can block or allow the access of certain unauthorized IPs or ports, based on the source address, destination address, and TCP/UDP port. This paper presents a simulation case to verify the effect of a router-based network applying Standard ACL or Extended ACL. The network was created through designing topology and then making a common virtual network using a Packet Tracer.