• Title/Summary/Keyword: SCAM

Search Result 30, Processing Time 0.03 seconds

Friction Welding of Cr-Mo Steel Bars for Hydraulic of Pneumatic Valve Spools and AE Evaluation (유공압 밸브스풀용 Cr-Mo 강봉의 동종재 마찰용접과 AE평가)

  • ;;Oh, S. K.;Jang, H. K.
    • Journal of Welding and Joining
    • /
    • v.13 no.4
    • /
    • pp.103-112
    • /
    • 1995
  • This study was performed to optimize friction welding conditions of Cr-Mo steel bars used for hydraulic of pneumatic valve spools and to realize the real-time evaluation of weld quality by acoustic emission method. SNCM220, SCM435, SCAM645, and SCM415 steel bars were tested to find optimum conditions of friction welding. Auantitative equations which exhibit the relations of tensile strength, elongation, reduction of area and energy absorption with friction heating time were obtained by the experiment. Acoustic emission was also performed in the friction weldig process, and the real-time evaluation was enabled to find the optimum range of weld strength. Finally, the strength and toughness of welded joints were interpreted by the sem analysis of tensile fracture surfaces.

  • PDF

A Study of the Alternative Means of Korean Resident Registration Number using the Authorized Certificate (공인인증서를 이용한 주민등록번호 대체수단에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.107-117
    • /
    • 2014
  • The personal information extrusion accident(hacking, improper maintenance) by the internet has been increased rapidly during the last ten-year period. The personal information includes Korean resident registration number, name, cellphone number, home telephone number, E-mail address, home address, etc. Korean resident registration number is unchangeable from the cradle to the grave. Illegally accessed personal information can be wrongfully resoled or used at phishing scam. In this paper, we propose a alternative means of Korean resident registration number using the authorized certificate. The authorized certificate is in use safely in Internet. The authorized certificate(included Chinese name) is in used in offline service, the authorized certificate(included English name) is used in online(for government service) and the authorized certificate(not included name) is used in online(for private service). The authorized certificates are possible for discard, republication. The method can reduce the possibility of the personal information extrusion.

Ethereum Phishing Scam Detection Based on Graph Embedding (그래프 임베딩 기반의 이더리움 피싱 스캠 탐지 연구)

  • Cheong, Yoo-Young;Kim, Gyoung-Tae;Im, Dong-Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.266-268
    • /
    • 2022
  • 최근 블록체인 기술이 부상하면서 이를 이용한 암호화폐가 범죄의 대상이 되고 있다. 특히 피싱 스캠은 이더리움 사이버 범죄의 과반수 이상을 차지하며 주요 보안 위협원으로 여겨지고 있다. 따라서 효과적인 피싱 스캠 탐지 방법이 시급하다. 그러나 전체 노드에서 라벨링된 피싱 주소의 부족으로 인한 데이터 불균형으로 인하여 지도학습에 충분한 데이터 제공이 어려운 상황이다. 이를 해결하기 위해 본 논문에서는 이더리움 트랜잭션 네트워크를 고려한 효율적인 네트워크 임베딩 기법인 trans2vec 과 준지도 학습 모델 tri-training 을 함께 사용하여 라벨링된 데이터뿐만 아니라 라벨링되지 않은 데이터도 최대한 활용하는 피싱 스캠 탐지 방법을 제안한다.

Prevention Methods of Cyber-crimes using the Private Security (민간경비를 활용한 사이버범죄 예방 방안)

  • Kim, Sang-Woon;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.141-151
    • /
    • 2013
  • With the spread of Personal Computers(PC) in the 1980's, many people started to deal businesses with PC. From late 1990's, the Internet age with PC have started and many people have showed keen interest in cyber-space and now they are utilizing it. Since 2000's the use of cyber-space have skyrocketed and it caused significant changes to humans' life. There was a huge prosperity to us but the new kind of crime, cyber-crime, was raised. Unlike past physical type of crimes, those cyber-crimes take place in the cyber-space and they have special features of non-facing, anonymity, specialty, technologic, repetition, continuation. Those cyber-crimes are continually growing since 2003 and in 2010 it almost doubled compared to 2003. General cyber-crimes like phishing-scam pornography circulation was most of them and notably perpetrators of them are younger generation. Recently cyber-crimes are showing the trend of advancing more and more and cyber-bullying, fraud like phishing scam are on the rise. The police are responding by making 'Cyber Terror Response Center', but it does not work effectively with the problems of breakup of prevention and investigation unit, procedure of investigation and the system itself. So, I suggest practical use of private security to remedy our police's weakness and to prevent cyber-crimes. Preventing solutions of cyber-crime with private security are physical defense of large-scale servers and vital computers, building of Back-up system to prevent vital data loss, and building of cyber-crime preventing system combining software and hardware.

Case Study on Driver's Liability in Cargo Transit

  • Kwak, Young-Arm
    • The Journal of Industrial Distribution & Business
    • /
    • v.8 no.6
    • /
    • pp.25-31
    • /
    • 2017
  • Purpose - This study examines car accidents that occurred in South Korea territory, and analyzes criminal liability of the offender and certain issues of driver's insurance, but a civil liability to the injured is excluded as civil liability belongs to auto insurance. Research design, data, and methodology - With carrying out this research, case study of driver's liability and literature review were adopted throughout. For this, car accidents that occurred in South Korean territory were examined and then criminal liability of the offender and certain issues of driver's insurance were analyzed. Results - From this case study on driver's liability it was found that the offender cannot receive insurance money from the insurer irrespective of the valid drive insurance, if there is no 'bill of agreement of criminal consensus'. This study suggests some ideas, offers suggestions of convenience and assistance of qualified claim staff to overcome a hurdle of drive insurance. Conclusions - As long as the accident is not a fraud and scam by the parties concerned, advance payment of agreement of criminal consensus is required to the insured, the policy holder within the limit of liability of driver insurance, on condition that the drive insurance is valid.

The Study on Team Work of the Physical Therapist and Home Care Nurse far Home Care Nurse for Home Care Service (가정방문을 위한 물리치료사의 가정간호사의 팀웍에 관한 연구)

  • Lee Hea-Young;Kim Jin-Sang;Choi Jin-Ho
    • The Journal of Korean Physical Therapy
    • /
    • v.12 no.1
    • /
    • pp.79-86
    • /
    • 2000
  • The purpose of this study was analyse the necessity for the Scam work at home care service. The subjects of the study were 14 home m nurses who work in community and in physical ana 16 physical therapist. The data were collected from Sep. 1 to Dec. 31, 1999. The result were analysed statistically by $X^2$, t-test. The main results of this study were as follows : 1. There were statistical significances of the general characteristics between the physical therapists and the home care nurses, 2. There were statistical significances of currencies of the home us service which the subjects experienced. 3. There were no statistical significances of the necessity of team work and the participation in home care service. 4. Regarding the effects of expectation which consisted 9 items, there were statistical significances in 8 items.

  • PDF

A Study of the Analysis and Countermeasure about the Phishing Scam (피싱에 대한 분석 및 대응방안에 대한 연구)

  • Kang, Hyun Joong
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.65-74
    • /
    • 2014
  • Phishing scans through wired telephones have been evolving into smissing and pharming. While we use wire or wireless telephones, text messages, e-mails, and online-banking conveniently, the ways of hacking and phishing attacks are getting developed and various. This paper investigates the various aspects of attacks depending on the kinds of phishing and suggests general prevention measures. In addition, the user-oriented practical preventive measures and government-driven long term measures are proposed in this paper. Technological developments, short or long term preventive measures proposed by the government, and continuous public relations could be solutions since in a short time, it could be difficult to eradicate phishing scams evolving continuously. Besides, the internet media as well as SNS are great helps in promoting the preventives against phishing and smissing. Finally this paper asserts that the newly developed service technology should be made carefully without security problems.

A Study on the Effective Countermeasure of Business Email Compromise (BEC) Attack by AI (AI를 통한 BEC (Business Email Compromise) 공격의 효과적인 대응방안 연구)

  • Lee, Dokyung;Jang, Gunsoo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.835-846
    • /
    • 2020
  • BEC (Business Email Compromise) attacks are frequently occurring by impersonating accounts or management through e-mail and stealing money or sensitive information. This type of attack accounts for the largest portion of the recent trade fraud, and the FBI estimates that the estimated amount of damage in 2019 is about $17 billion. However, if you look at the response status of the companies compared to this, it relies on the traditional SPAM blocking system, so it is virtually defenseless against the BEC attacks that social engineering predominates. To this end, we will analyze the types and methods of BEC accidents and propose ways to effectively counter BEC attacks by companies through AI(Artificial Intelligence).

A Finite Element Analysis of the Effects of Necrotic Area on Stresses in Early Osteonecrosis of Femoral Head (대퇴 골두내 무혈성괴사 영역에 따른 응력변화 분석 -3차원 유한요소법을 이용한 분석-)

  • Kang, S.B.;Joo, W.;Kim, Y.M.;Kim, H.J.;Choi, J.B.;Choi, K.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.11
    • /
    • pp.349-350
    • /
    • 1996
  • Using FEM, we analyzed the stress changes on early osteonecrosis of femoral head as the necrotic area increases. A 3D FEM model of proximal femur was made from the CT scam data of fresh frozen adult proximal femur with the material properties from literature. The model consisted of 5994 elements and 5275 nodes. FE analyses were peformed using MSC/NASTRAN. At normal states, stress transmission is mainly along the primary compression trabeculae(PCT). Until 60% involvement of PCT with necrotic lesion, stress transmission is still along the remained PCT. When the PCT involvement is from 60% to 85%, stress transmission is along the PCT and margin of the necrotic lesion. When involvement is more than 85%, stress is mostly transferred to posterior part of femoral head.

  • PDF

A Study on Countermeasures through Messenger Phishing Experience Analysis (메신저피싱 경험사례 분석을 통한 대응방안 연구)

  • Nam, Sowon;Lee, Haksun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.791-805
    • /
    • 2022
  • In recent years, the number of scams related to voice phishing has been on the decline, but the number of messenger phishing attacks, a new type of crime, is increasing. In this study, by analyzing SNS posts containing messenger phishing cases, criminal trends of the main methods, imposture of trusted relative and fake payment were identified. Through the analysis, main words and patterns composing the message and the similarity and continuity of the phone numbers used were derived as criminal attributes, and criminal organizations were grouped. As the results of the analysis, we propose a cooperative system to prevent damage from messenger phishing by disseminating the criminal information collected by investigative agencies to private operators, and a plan to respond to messenger phishing predicted through grouping of criminal organizations.