• Title/Summary/Keyword: Security threats

Search Result 1,413, Processing Time 0.027 seconds

Study on Safety Measures for Foreign Tourists Visiting Korea (외국인 관광객 대상 위법행위 실태와 관광경찰제도에 관한 연구)

  • Lee, Chang-Moo;Lee, Do-Sun
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.197-220
    • /
    • 2013
  • To develop the tourism industry, which is a 'no smoking environment-friendly green industry' and can contribute to creating jobs, it is the goal of top priority to resolve foreign tourists' discomfort and fear by allowing them to look around the country satisfactorily without fear and return to their home and inducing them to naturally promote tourism in South Korea to people around them. No matter how great tourist attractions a country has, there is not many foreign tourists who will go on a tour trembling with fear of crimes such as thefts, frauds, threats and blackmail. Therefore, it is necessary to prepare the conditions of tourism free from various illegal acts and inconveniences for domestic and foreign tourists, and for this, it is urgently necessary to make efforts to improve laws and institutions. Domestic tourists can report their complaints themselves through the Tourist Complaint Center of Korea Tourist Service, Inc. or Korea Consumer Agency, or to the police through the 112 Crime Report. In contrast, there are a lot of cases in which foreign tourists cannot receive compensation as it is not easy for them to report due to the differences in language, culture and the criminal justice system though they have suffered illegal acts or inconveniences. This, consequently, has an adverse effect that would disturb the tourism in South Korea as the tourists may spread its bad images to people around them after they return to their home countries with discomfort, so it is urgently necessary to establish a foreign tourist-centered tourist police system.

  • PDF

A Study on Communication Safety and Evaluation Tool in Railway Communication System (열차제어시스템 통신 안정성 및 평가 도구 연구)

  • Kim, Sung-Un;Seo, Sang-Bo;Song, Seung-Mi;Jo, Chan-Hyo;Hwang, Jong-Gyu;Jo, Hyun-Jeong
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.349-356
    • /
    • 2008
  • Put Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. Recognizing the safety-critical nature of the types of communications required in rail control operations, the communications infrastructure will be required to meet a number of safety requirements such as system faults, user errors and the robustness in the presence of malicious attackers who are willing to take determined action to interfere in the correct operation of a system. This paper discusses the safety strategies employed in the railway communications and proposes a security mechanism for Korean railway communication system. We present the developed communication safety evaluation tool based on the proposed security mechanism and also evaluate its protecting capability against the threats of masquerading, eavesdropping, and unauthorized message manipulation.

A study on extraction of optimized API sequence length and combination for efficient malware classification (효율적인 악성코드 분류를 위한 최적의 API 시퀀스 길이 및 조합 도출에 관한 연구)

  • Choi, Ji-Yeon;Kim, HeeSeok;Kim, Kyu-Il;Park, Hark-Soo;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.897-909
    • /
    • 2014
  • With the development of the Internet, the number of cyber threats is continuously increasing and their techniques are also evolving for the purpose of attacking our crucial systems. Since attackers are able to easily make exploit codes, i.e., malware, using dedicated generation tools, the number of malware is rapidly increasing. However, it is not easy to analyze all of malware due to an extremely large number of malware. Because of this, many researchers have proposed the malware classification methods that aim to identify unforeseen malware from the well-known malware. The existing malware classification methods used malicious information obtained from the static and the dynamic malware analysis as the criterion of calculating the similarity between malwares. Also, most of them used API functions and their sequences that are divided into a certain length. Thus, the accuracy of the malware classification heavily depends on the length of divided API sequences. In this paper, we propose an extraction method of optimized API sequence length and combination that can be used for improving the performance of the malware classification.

Study on implementation of Secure HTML5 Local Storage (안전한 HTML5 로컬스토리지 구현에 대한 연구)

  • Myeong, Hee-Won;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.83-93
    • /
    • 2012
  • HTML5 has developed not to have browser dependancy considering interoperability as same as maintaining compatability with lower versions of HTML. HTML5, the newest web standardization is on going of being structured. Along with the smart phone boom, HTML5 is spotlighted because it can be applied to cross platforms in mobile web environments. Specially the local Storage that has been listed in new features in HTML5 supports offline function for web application that enables web application to be run even when the mobile is not connected to 3G or wifi. With Local storage, development of server-independent web application can be possible. However Local storage stores plaintext data in it without applying any security measure and this makes the plaintext data dangerous to security threats that are already exist in other client side storages like Cookie. In the paper we propose secure Local storage methods to offer a safe way to store and retrieve data in Local storage guaranteeing its performance. Suggested functions in this paper follow localStorage standard API and use a module that provide cryptographic function. We also prove the efficiency of suggested secure Local storage based on its performance evaluation with implementation.

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

The Return of Great Power Competition to the Arctic (북극해 일대에서 본격화되기 시작한 강대국 경쟁)

  • Hong, Kyu-dok;Song, Seongjong;Kwon, Tae-hwan;JUNG, Jaeho
    • Maritime Security
    • /
    • v.2 no.1
    • /
    • pp.151-184
    • /
    • 2021
  • Global warming due to climate change is one of the biggest challenges in the 21st century. Global warming is not only a disaster that threatens the global ecosystem but also an opportunity to reduce logistics costs and develop mineral resources by commercializing Arctic routes. The Arctic paradox, in which ecological and environmental threats and new economic opportunities coexist, is expected to have a profound impact on the global environment. As the glaciers disappear, routes through the Arctic Ocean without passing through the Suez and Panama Canals emerged as the 'third route.' This can reduce the distance of existing routes by 30%. Global warming has also brought about changes in the geopolitical paradigm. As Arctic ice begins to melt, the Arctic is no longer a 'constant' but is emerging as the largest geopolitical 'variable' in the 21st century. Accordingly, the Arctic, which was recognized as a 'space of peace and cooperation' in the post-Cold War era, is now facing a new strategic environment in which military and security aspects are emphasized. After the Cold War, the Arctic used to be a place for cooperation centered on environmental protection, but it is once again changing into a stage of competition and confrontation between superpowers, heralding 'Cold War 2.0.' The purpose of this study is to evaluate the strategic value of the Arctic Ocean from geopolitical and geoeconomic perspectives and derive strategic implications by analyzing the dynamics of the New Cold War taking place in the Arctic region.

  • PDF

New Approaches to Quality Monitoring of Higher Education in the Process of Distance Learning

  • Oseredchuk, Olga;Drachuk, Ihor;Teslenko, Valentyn;Ushnevych, Solomiia;Dushechkina, Nataliia;Kubitskyi, Serhii;Сhychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.35-42
    • /
    • 2022
  • The article identifies the problem of monitoring the quality of higher education in three main areas, which are comparative pedagogical systems of education. The first direction is determined by dissertation works, the second - monographs and textbooks, and the third reveals scientific periodicals. According to its internal structure, monitoring the quality of education combines important management components identified in the article (analysis, evaluation and forecasting of processes in education; a set of methods for tracking processes in education; collecting and processing information to prepare recommendations for research processes and make necessary adjustments). Depending on the objectives, three areas of monitoring are identified: informational (involves the accumulation, structuring and dissemination of information), basic (aimed at identifying new problems and threats before they are realized at the management level), problematic (clarification of patterns, processes, hazards, those problems that are known and significant from the point of view of management). According to its internal structure, monitoring the quality of education combines the following important management components: analysis, evaluation and forecasting of processes in education; a set of techniques for tracking processes in education; collection and processing of information in order to prepare recommendations for the development of the studied processes and make the necessary adjustments. One of the priorities of the higher education modernization program during the COVID-19 pandemic is distance learning, which is possible due to the existence of information and educational technologies and communication systems, especially for effective education and its monitoring in higher education. The conditions under which the effectiveness of pedagogical support of monitoring activities in the process of distance learning is achieved are highlighted. According to the results of the survey, the problems faced by higher education seekers are revealed. A survey of students was conducted, which had a certain level of subjectivity in personal assessments, but the sample was quite representative.

Concepts and Legal Problems Related to the Health-vulnerable Class, and Measures to Ensure Health (건강취약계층의 개념과 법적 문제점, 그리고 건강보장을 위한 방안)

  • Kim, JESUN
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.3
    • /
    • pp.125-144
    • /
    • 2021
  • The purpose of this study is to present a legal improvement plan for health protection of the health-vulnerable class in our society in the 'COVID-19'. The contents of the first study examined the meaning of the existing (social) vulnerable class, and then critically considered the health-vulnerable class as an expanded concept in connection with the social risk of health. The term "vulnerable class" tends to have both meaning as the traditionally marginalized class such as the elderly, the disabled, and women, as well as the condition of having no ability to live due to low income, such as the low-income class. The concept of the health-vulnerable class is meaningful in that it appears as a recently expanded concept as it is linked to the concept of the vulnerable class and social risks such as health threats. The content of the second study looked at the problems that appeared when the health-vulnerable class was used together with the health care-vulnerable class in laws. Due to the laws used in both terms, there was a problem that the social security system related to health and health care could create blind spots. The contents of the third study suggested legal improvement directions for social security measures for health for the underprivileged.

A study on role of ROK Escort Task Gruop according to recently Pirate Conducting Trend and Anti-Piracy Operation in Indian Ocean (최근 인도양 해적활동과 대해적작전 변화에 따른 한국 청해부대 역할 연구)

  • Choi, Hyoung-Min
    • Strategy21
    • /
    • s.32
    • /
    • pp.192-221
    • /
    • 2013
  • In order to deal with the current economic crisis, the U.S. government, as a part of its austerity fiscal policy, implemented a budget sequester. The sequester will hit the U.S. defense budget the hardest, and as a result will most likely put the security of the international community in jeopardy. The U.S. will have to cut 46 billion dollars from its original 525 billon defense spending in 2013. And by the year 2022, will have to cut 486.9 billion dollars. Such an astronomical decrease in the U.S. defense spending will inevitably burden the friendly nations. According to recent studies, pirate related incidents in Somalia, where piracy is most active, has declined from its 226 incidents to 76 incidents per year in 2012, a 66% drop from previous years'. However, piracy threats as well as those related to firearms still remain and thus participants of anti-piracy operations, namely the U.S., U.K., France, Canada, NCC, EUNAVFOR, and NATO, are facing a problem of declining forces. Considering the current situation as well as rising expectations from the international community, Republic of Korea, a supporter of NCC's maritime security operation, not to mention its foremost duty of securing its sea, is at a stage to re-examine its operational picture. Such action will be a good opportunity for Republic of Korea to build the trust and live up to the international community's expectation. To quote from the network theory, although in relation to other friendly nations participating in the anti-piracy operation, Republic of Korea currently remains at a single cell level, this opportunity will certainly develop Korea to a 'node' nation in which power and information would flow into. Through this expansion of operational capability, Republic of Korea will be able to exert more influence as a more developed nation. Currently however, not only is the single 4,500 ton class destroyer deployed in Somalia a limited unit to further expand the scale and amount of force projection in the area, but also the total of six 4,500 ton class destroyers ROK feet possess is at a high fatigue degree due to standard patrolling operations, midshipman cruise and the RIMPAC exercise. ROK fleet therefore must consider expanding the number of ships deployed along with either deploying combat support ships or constructing logistics support site in the African region. Thus, by expanding its operational capabilities and furthermore by abiding to the rightful responsibilities of a middle power nation, Republic of Korea will surely earn its respect among the members of the international community.

  • PDF