• Title/Summary/Keyword: Protect

Search Result 7,488, Processing Time 0.032 seconds

Comprehensive Security and Crisis & Emergency Management for Protecting Critical Infrastructure

  • Lee, Jae-Enn
    • International Journal of Contents
    • /
    • v.5 no.3
    • /
    • pp.71-78
    • /
    • 2009
  • Recently, interest has heightened over 'critical infrastructures' and their reliability in the face of potential terrorist attack. Assault on any of the critical infrastructures as transportation, power, water, telecommunications, and financial services, entails great consequences for their users as well as the other interdependent critical infrastructures. How to protect our vital critical infrastructures is the key question in this paper. The purpose of this article is to suggest the implications for crisis and emergency management to protect the critical infrastructures in our society. For achieving the purpose, we examined the concept of comprehensive security, national crisis, and critical infrastructure and, using the holistic approach, we examined the comprehensive emergency management for suggesting the implications for establishing the critical infrastructure protection system; building up the high reliability organization, organizing and partnering, assessing the risk, preparing first responders, working with private owners of critical infrastructures, working with communities, improving the administrative capacity.

Application of Multi-Resolution Modeling in Collaborative Design (협업 설계에서의 다중해상도 모델링 응용)

  • Kim, Taeseong;Han, Junghyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.9 no.2
    • /
    • pp.1-9
    • /
    • 2003
  • Information assurance(IA) refers to methodologies to protect engineering information by ensuring its availability, confidentiality, integrity, non-repudiation, authentication, access control, etc. In collaborative design, IA techniques are needed to protect intellectual property, establish security privileges and create "need to know" protections on critical features. Aside from 3D watermarking, research on how to provide IA to distributed collaborative engineering teams is largely non-existent. This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing. Such role-based viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution mesh hierarchies. Extracting an appropriately simplified model suitable for access rights for individual designers within a collaborative design environment is driven by an elaborate access control mechanism.

  • PDF

Vulnerability Verification of 27 MHz Wireless Keyboards (27MHz 무선 키보드의 취약성 분석)

  • Kim, Ho-Yeon;Sim, Bo-Yeon;Park, Ae-Sun;Han, Dong-Guk
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2145-2152
    • /
    • 2016
  • Internet generalization has led to increased demands for Internet banking. Various security programs to protect authentication information are being developed; however, these programs cannot protect the wireless communication sections of wireless keyboards. In particular, vulnerabilities have been reported in the radio communication sections of 27 MHz wireless keyboards. In this paper, we explain how to analyze M's 27 MHz wireless keyboard. We also experimentally show that an attacker can acquire authentication information during domestic Internet banking using a 27 MHz wireless keyboard. To do this, we set up an experimental encironment to analyze the electromagnetic signal of a 27 MHz wireless keyboard.

Study on tunnel geometry protecting a propeller using potential based panel method (포텐셜 기저 패널법에 의한 프로펠러 보호터널의 형상변화에 관한 연구)

  • Suh, Sung-Bu
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.31 no.5
    • /
    • pp.614-621
    • /
    • 2007
  • The fishing boat propulsion system employing the modified stern shape and the tunnel to protect a propeller is developed to increase the cruise speed and reduce he problem resulting from the open propeller accidentally catching the waste net and able on the sea. Using 3 different tunnel types, the model test was performed in the circular water channel and the panel method based on the potential theory is applied to analyze the open water performance of the propeller. In the numerical analysis using he potential-based panel method, it calculates the hydrodynamic interaction between the propeller and the tunnel and evaluates the effect of the tunnel geometry. From the numerical and experimental results differing tunnel geometries, the propulsion efficiency is increased by the larger diameter of the inlet than the outlet of the tunnel and the smaller gap between the propeller tip and the tunnel internal surface. These results provide the information of the propeller system with the tunnel and the hydrodynamic interaction between the propeller and the tunnel.

Design of a Protection Fence by Crashworthiness Analysis (충돌해석을 통한 방호울타리의 설계)

  • 한석영;고성호
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2002.10a
    • /
    • pp.487-492
    • /
    • 2002
  • In this study, designs of protection fences such as the concrete median barrier and the guardrail were performed. The foreign standard of concrete median barrier was introduced and implemented without modification fitting to domestic vehicles and highway conditions. In a car accident, median barrier doesn't protect vehicles effectively, especially for heavy vehicles such as bus and heavy truck. Guardrail doesn't protect vehicle effectively, either. The purpose of this study is to develop the optimal performance design of concrete median barrier and design of guardrail using the design of experiment as well as crashworthiness analysis which is done by Pam-Crash. As a result of this study, an optimal design of concrete median barrier was obtained considering von Mises stress, volume and COG acceleration of truck. And design of guardrail satisfying the domestic requirements was obtained.

  • PDF

The Secure Hybrid Authentication message protocol (안전한 하이브리드 인증 메시지 프로토콜)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.77-85
    • /
    • 2007
  • Asecure channel provides protection against interception, while an authentication system is created to protect the client and the server from fabrication attacks. This paper proposes a hybrid authentication algorithm, which fixes the lapses problem encountered in the SSL authentication. Also, the Proposed hybrid authentication system has been created to protect the client and the server from modification and fabrication attacks. By using a modified three-way authentication there is no need for a timeserver. thus timestamps are not needed.

  • PDF

Criminal Justice Policy against Terrorism in China

  • Xuan, Song-He
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2016
  • China is defending the terrorist crime through the Anti-Terror Law and anti-terrorism criminal legislation. China's Anti-Terror Law and the Criminal Code Amendment (9), which were promulgated in 2015, provide legal grounds for preventing and hurting ever-growing terrorist crimes. In particular, China's amendment to the Criminal Code (9) is designed to rigorously enforce the legal framework for terrorist crimes, protect prejudicial rights that might be violated by serious terrorist crimes, and protect the penalties for terrorist crimes. However, China's anti-terrorism legislation still has drawbacks such as lack of systematicity, limited regulatory boundaries, and lack of rigorous penalties for the establishment of anti-terrorism legislation. To counter this, China's anti-terrorism legislation must strictly regulate the legal system of terrorist crimes, secure penalties, and prescribe anti-terrorism laws as professional chapters.

A study on crashworthiness analysis and evaluation of Korea High Speed Train (한국형 고속전철의 충돌안전도 해석 및 평가기술 개발에 관한 연구)

  • Koo Jeong seo;Cho Hyn Jik;Kwon Tae soo
    • Proceedings of the KSR Conference
    • /
    • 2003.05a
    • /
    • pp.686-693
    • /
    • 2003
  • An intensive study was conducted for crashworthiness structural design of recently developed Korean High Speed Train. Two nam design concepts are setup to protect the both crews and passengers from serious injury at heavy collision accidents, and to reduce damages of the train itself at light collision accidents. For occupant protection a collision against a movable 15 tons rigid obstacle at 110 kph and a train-to-train collision at 30 kph were selected as accident scenarios for the heavy collisions based on the train accident investigations. A train-to-train collision at 8 kph was used for the light collisions. The crashworthiness behaviors of KHST have been evaluated numerically using the finite element method. Also, one-dimensional collision analyses show good crashworthy responses in a full rake consist and 3-dimensional shell element analyses do in the front-end structures of the power car. Occupant analyses and sled tests demonstrated that KHST performs well enough to protect occupants under the considered accident scenarios.

  • PDF

New Switching Pattern for the Paralleling of SRM Low Voltage Inverter (저전압형 SRM 인버터의 병렬운전 위한 새로운 스위칭)

  • 이상훈;박성준;원태현;안진우;이만형
    • The Transactions of the Korean Institute of Electrical Engineers B
    • /
    • v.53 no.6
    • /
    • pp.359-367
    • /
    • 2004
  • The switched reluctance motor(SRM) has considerable potential for industrial applications because of its high result lily as a result of the absence of rotor windings. In some applications with SRM, paralleling strategy is often used for cost saving, increasing of current capacity and system reliability. A SRM inverter has very low ,switching frequency. This results in reducing the burden for a high-speed of the gate-amp interface circuit. and the linearity of optocoupler is used to protect the instantaneous peak current for the stable operation. In this paper, series resistor is used to equal the current sharing of each switching device and a linear gate-amp is proposed to protect the instantaneous peak current which occurs in transient state. The proposed paralleling strategy is verified by experimental results.

The Development of Android Application for Intelligent Concent (지능형 콘센트를 위한 안드로이드 어플리케이션 개발)

  • Han, Young-Oh;Kim, Dong-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1515-1521
    • /
    • 2013
  • In this paper, we develop the power management application of the Android operating system that works with a intelligent concent having the functions to protect resistive leakage current, over-current and standby power. Using this power management application a user monitors electrical fire, shock from a concent due to leakage current, can control home appliances by controlling the power supplied to the concents and can easily protect wasted standby powers, anytime and anywhere.