• Title/Summary/Keyword: Security Conditions

Search Result 891, Processing Time 0.026 seconds

A Study on Rescue of the Human Life against the Fire in the High-rise Building (고층건물 화재시 인명구조 방법에 관한 연구)

  • Choi, Kwon-Joong
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.309-325
    • /
    • 2002
  • It was because mankind could use the fire that we have been civilized. creating a brilliant culture and developing an industrial society. While fire is very useful to our life, the number of the victims of fire continues to increase, This study suggests the ways to rescue the people safely when they are subject to a fire in a high-rise building. To this end, the concept of fire is reviewed. Fire breaks out when the conditions for congestion are met, and therefore. if any of the conditions can be blocked, the fire will be extinguished. In other words. the knowledge of such conditions will greatly help the fire fighters to rescue the people, and so. such conditions for congestion as flammable, heat, oxygen and chain reaction are examined. In addition, the effects of such by-products of fire as heat and smoke on human body are reviewed. In order to rescue the people more safely, the fire fighters are requested to review the situation and design a rescue strategy before being engaged in a full-scale rescue activity. This study discusses various rescue methods using such passages or equipments as stair case, double ladder, special fire fighting vehicle, elevator, jumar, rope, helicopter, etc. In conclusion. since it is more difficult to rescue the people from a high-rise building than from the ground, it is essential to design a rescue program not after fire but before it and thereby, minimize the number of victims.

  • PDF

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

A Study on Employee's Compliance Behavior towards Information Security Policy : A Modified Triandis Model (조직 구성원의 정보보안정책 준수행동에 대한 연구 : 수정된 Triandis 모델의 적용)

  • Kim, Dae-Jin;Hwang, In-Ho;Kim, Jin-Soo
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.209-220
    • /
    • 2016
  • Although organizations are providing information security policy, education and support to guide their employees in security policy compliance, accidents by non-compliance is still a never ending problem to organizations. This study investigates the factors that influence employees' information security policy compliance behavior using elements of Triandis model. We analyzed the relationships among Triandis model's factors using PLS(Partial Least Squares). The result of the hypothesis tests shows that organization can induce individual's information security policy compliance intention and behavior by information security policy and facilitating conditions that support it, and proves the importance of members' expected value, habit and affect about information security compliance. This study is significant in a way that it applies Triandis model in the field of information security, and presents direction for members' information security behavior, and will be able to provide measures to establish organization's information security policy and increase members' compliance behavior.

A Study on Development of Private Security Service: -Focused on event security service- (민간경비업무의 발전방안 연구: 이벤트 경비업무를 중심으로)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.157-176
    • /
    • 2018
  • The purpose of this study is to explore the development methods of private security services based on the problems that field experts in charge of event security are currently aware of. In order to accomplish the purpose of this study, we conducted interviews with 4 professors in relevant fields and 6 field experts with more than 10 years experience and analyzed the data. They suggested the development of private security services as follows. First, education that is related to event security work is necessary. Second, training should be conducted in response to audience and audience complaints. Third, service-related training is required. Fourth, in the Security Law, the provisions of the collective complaints field should be adjusted to the reality. Fifth, improving poor working conditions. Sixth, it is necessary to educate to develop responsibility and sense of mission.

Improving the Security Policy Based on Data Value for Defense Innovation with Science and Technology (과학기술 중심 국방혁신을 위한 데이터 가치 기반 보안정책 발전 방향)

  • Heungsoon Park
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.109-115
    • /
    • 2023
  • The future outlook for defense faces various and challenging environments such as the acceleration of uncertainty in the global security landscape and limitations in domestic social and economic conditions. In response, the Ministry of National Defense seeks to address the problems and threats through defense innovation based on scientific and technological advancements such as artificial intelligence, drones, and robots. To introduce advanced AI-based technology, it is essential to integrate and utilize data on IT environments such as cloud and 5G. However, existing traditional security policies face difficulties in data sharing and utilization due to mainly system-oriented security policies and uniform security measures. This study proposes a paradigm shift to a data value-based security policy based on theoretical background on data valuation and life-cycle management. Through this, it is expected to facilitate the implementation of scientific and technological innovations for national defense based on data-based task activation and new technology introduction.

A Study on the Civil Military Enterprise System for the Employment of the Discharged (민간군사기업제도의 도입방안에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.7-28
    • /
    • 2004
  • This paper is to introduce the foreign civil military enterprise system and to suggest a plan to improve the employment rate of the discharged soldiers who served for a long term and the welfare of soldiers highly. At first, Military Professional Resources Inc., Dyncorp Inc. and Cubic Inc. of the United States, Sandline International Inc. of England and ATCO Frontec Inc. and Ednoonton Inc. of Canada are introduced in this paper. And also, this paper is to analyze employment conditions and difficulties of the discharged soldiers and suggest to establish a institute of tentatively named 'Korean Civil Military Enterprise' in terms of the Government and the Department of Defense. This civil military enterprise is to plan and manage military projects, to research and develop drill manuals and military doctrines and policies and to evaluate and manage the military training. As a pattern of civil military enterprises, three types of Military Support, Military Consulting and Military Provider are presented. Moreover, in order to advance the civil military enterprise, diverse training programs(for public civil investigators, guard advisors, special security guards and security staffs) to utilize all sorts of special military fields are developed.

  • PDF

Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm

  • Kang, You-Sung;Choi, Doo-Ho;Chung, Byung-Ho;Cho, Hyun-Sook;Han, Dong-Guk
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.556-563
    • /
    • 2009
  • A side channel analysis is a very efficient attack against small devices such as smart cards and wireless sensor nodes. In this paper, we propose an efficient key detection method using a peak selection algorithm in order to find the advanced encryption standard secret key from electromagnetic signals. The proposed method is applied to a correlation electromagnetic analysis (CEMA) attack against a wireless sensor node. Our approach results in increase in the correlation coefficient in comparison with the general CEMA. The experimental results show that the proposed method can efficiently and reliably uncover the entire 128-bit key with a small number of traces, whereas some extant methods can reveal only partial subkeys by using a large number of traces in the same conditions.

An Application of Kohonen Neural Networks to Dynamic Security Assessment (전력계통 동태 안전성 평가에 코호넨 신경망 적용 연구)

  • Lee, Gwang-Ho;Park, Yeong-Mun;Kim, Gwang-Won;Park, Jun-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.6
    • /
    • pp.253-258
    • /
    • 2000
  • This paper presents an application of Kohonen neural networks to assess the dynamic security of power systems. The dynamic security assessment(DSA) is an important factor in power system operation, but conventional techniques have not achieved the desired speed and accuracy. The critical clearing time(CCT) is an attribute which provides significant information about the quality of the post-fault system behaviour. The function of Kohonen networks is a mapping of the pre-fault system conditions into the neurons based on the CCTs. The power flow on each line is used as the input data, and an activated output neuron has information of the CCT of each contingency. The trajectory of the activated neurons during load changes can be used in on-line DSA efficiently. The applicability of the proposed method is demonstrated using a 9-bus example.

  • PDF

The design of a secure hash function using Dickson polynomial

  • Nyang, Dae-Hun;Park, Seung-Joon;Song, Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.200-210
    • /
    • 1995
  • Almost all hash functions suggested up till now provide security by using complicated operations on fixed size blocks, but still the security isn't guaranteed mathematically. The difficulty of making a secure hash function lies in the collision freeness, and this can be obtained from permutation polynomials. If a permutation polynomial has the property of one-wayness, it is suitable for a hash function. We have chosen Dickson polynomial for our hash algorithm, which is a kind of permutation polynomials. When certain conditions are satisfied, a Dickson polynomial has the property of one-wayness, which makes the resulting hash code mathematically secure. In this paper, a message digest algorithm will be designed using Dickson polynomial.

  • PDF

A Performance Comparison of the Mobile Agent Model with the Client-server Model under Security Conditions

  • Jeong, Ki-Moon;Han, Seung-Wan;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.977-981
    • /
    • 2000
  • The traditional client-server model RPC and mobile agents have been used for interprocess communication between processes in different hosts. The performances of two mechanisme were analyzed in the literature [4, 6, 9]. But the security services which extensively affect the performance of systems because of low speed have not been considered. We propose two performance models considering the security services for the RPC and the mobile agent Through the analysis of the models, we show that the execution time of the mobile agent takes less than the RPC In the environment considering security services.

  • PDF