• Title/Summary/Keyword: THREAT

Search Result 2,799, Processing Time 0.032 seconds

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

A Study on Estimation of Gait Acceleration Signal Using Gait Video Signal in Wearable Device (걸음걸이 비디오를 활용한 웨어러블 기기 사용자 걸음걸이 가속도 신호 추정)

  • Lee, Duhyeong;Choi, Wonsuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1405-1417
    • /
    • 2017
  • Researches that apply the acceleration signal due to user's gait measured at the wearable device to the authentication technology are being introduced recently. The gait acceleration signal based authentication technologies introduced so far have assumed that an attacker can obtain a user's gait acceleration signal only by attaching accelerometer directly to user's body. And the practical attack method for gait acceleration signal based authentication technology is mimic attack and it uses a person whose physical condition is similar to the victim or identifies the gait characteristics through the video of the gait of the victim. However, mimic attack is not effective and attack success rate is also very low, so it is not considered a serious threat. In this paper, we propose Video Gait attack as a new attack method for gait acceleration signal based authentication technology. It is possible to know the position of the wearable device from the user's gait video signal and generate a signal that is very similar to the accelerometer's signal using dynamic equation. We compare the user's gait acceleration signal and the signal that is calculated from video of user's gait and dynamic equation with experiment data collected from eight subjects.

Effect of Alkaline Activator and Curing Condition on the Compressive Strength of Cementless Fly Ash Based Alkali-Activated Mortar (시멘트를 사용(使用)하지 않은 플라이애시 알칼리 활성(活性) 모르타르의 압축강도(壓縮强度)에 미치는 알칼리 활성제(活性劑) 및 양생조건(養生條件)의 영향(影響))

  • Kang, Hyun-Jin;Ryu, Gum-Sung;Koh, Kyung-Taek;Kang, Su-Tae;Park, Jung-Jun;Kim, Sung-Wook;Lee, Jang-Hwa
    • Resources Recycling
    • /
    • v.18 no.2
    • /
    • pp.39-50
    • /
    • 2009
  • Portland cement production is under critical review due to high amount of $CO_2$ gas released to the atmosphere. Attempts to increase the utilization of fly ash, a by-products from thermal power plant to partially replace the cement in concrete are gathering momentum. But most of fly ash is currently dumped in landfills, thus creating a threat to the environment. Many researches on alkali-activated concrete that does not need the presence of cement as a binder have been carried out recently. Instead, the source of material such as fly ash, that are rich in Silicon(Si) and Aluminium(Al), are activated by alkaline liquids to produce the binder. Hence concrete with no cement is effective in the reduction of $CO_2$ gas. In this study, we investigated the influence of the compressive strength of mortar on alkaline activator and curing condition in order to develop cementless fly ash based alkali-activated concrete. In view of the results, we found out that it was possible for us to make alkali-activated mortar with 70MPa at the age of 28days by using alkaline activator manufactured as 1:1 the mass ratio of 9M NaOH and sodium silicate and applying the atmospheric curing after high temperature at $60^{\circ}C$ for 48hours.

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

Plasmid profiling of multi-drug resistant Vibrio sp. isolated from influent and effluent water samples of fish farms in Jeju, South Korea (제주 양식장 유입수과 방출수에서 분리한 다제내성 Vibrio균 플라스미드 프로파일링)

  • Farooq, Adeel;Unno, Tatsuya
    • Korean Journal of Microbiology
    • /
    • v.54 no.1
    • /
    • pp.53-59
    • /
    • 2018
  • The objective of this study was to investigate the plasmid profiling of multi-drug resistant (MDR) Vibrio in influent (inflow) and effluent (discharged) water samples of fish farms in Jeju, South Korea. MDR isolates identified through disc diffusion susceptibility tests, were subjected to plasmid profiling. One hundred fifty Vibrio isolates were obtained from each influent and effluent water sample. All MDR isolates were subjected to plasmid profiling. Greater number of bacteria were enumerated from effluents (61%) comparing to influents (39%). High incidence of neomycin, sulfamethoxazole, amoxicillin and oxytetracycline resistance was observed among the isolates, which was higher in effluent samples. In contrast, Vibrio isolates were more susceptible to florfenicol, chloramphenicol, ciprofloxacin, and nalidixic acid. Among 99 (influent 39 and effluent 60) MDR isolates, a total of 58 (influent 38 and effluent 20) were found to bear plasmids ranging from 1.7 kb to >10 kb and showed 19 different antibiograms according to the size of plasmids. MDR isolates showed six and four distinct plasmid profiles in influent and effluent, respectively. Effluent samples contained more plasmid-carrying MDR Vibrio isolates with more diverse plasmid profiles and antibiograms, suggesting that fish farm tanks may serve as a reservoir of antibiotic resistance genes. The presence of plasmid-carrying MDR Vibrio isolates in fish farm effluent water may contribute to the dissemination of antibiotic resistance genes to the environments, which ultimately poses threat to human health.

Inactivation of Avian Influenza Viruses by Alkaline Disinfectant Solution (알칼리성 소독액에 의한 조류인플루엔자바이러스 불활성화)

  • Jo, Su-Kyung;Kim, Heui-Man;Lee, Chang-Jun;Lee, Joo-Seob;Seo, Sang-Heui
    • Journal of Life Science
    • /
    • v.17 no.3 s.83
    • /
    • pp.340-344
    • /
    • 2007
  • Avian influenza viruses cause a considerable threat to humans and animals. In this study, we investigated whether alkaline disinfectant solution can inactivate H5N1, H3N2, H6N1, and H9N2 subtypes of avian influenza virus. When H5N1, H3N2, H6N1, and H9N2 avian influenza viruses were treated with alkaline solution diluted with PBS (pH 7.2) prior to infection into MDCK cells, alkaline disinfectant solution (at dilutions up to $10^{-2}$) completely inactivated all avian influenza subtypes tested. To confirm the inactivation of avian influenza viruses by alkaline disinfectant solution, we used an immunofluorescence assay with influenza A anti-nucleoprotein antibody and FITC-labeled secondary antibody to stain MDCK cells infected with avian H9N2 influenza viruses. No staining was observed in MDCK rells infected with H9N2 viruses that were pre-treated with a $10^{-2}$ dilution of alkaline disinfectant solution, while strong staining was observed in MDCK cells infected with H9N2 viruses without pre-treatment. Our results indicate that alkaline solution could help to control avian influenza viruses including the highly pathogenic H5N1 subtype.

Monitoring of nervous necrosis virus in fertilized eggs of walleye pollock (Gadus chalcogrammus) (명태(Gadus chalcogrammus) 수정란에서 신경괴사증바이러스(nervous necrosis virus) 모니터링)

  • Nam, U-Hwa;Lee, Jong-Hyuk;Kim, Mi-Ri;Jang, Su-Rim;Yoon, Do-Hyun;Seo, Joo-Young;Kwon, O-Nam;Kim, Jeong-Ho
    • Journal of fish pathology
    • /
    • v.31 no.1
    • /
    • pp.9-13
    • /
    • 2018
  • We previously monitored nervous necrosis virus (NNV) in brain samples of artificially produced walleye Pollock (Gadus chalcogrammus) seedlings, with a low prevalence (1.8%, 1/55) but no clinical symptoms. Given that this virus is considered one of the most serious viral threats for almost all marine aquaculture fish species and characterized by both vertical and horizontal transmission, it would be interesting to monitor NNV in the fertilized eggs as well. We collected fertilized walleye pollock eggs from the farms located in Goseong during January to March, 2017. Approximately 50 mg of eggs were periodically taken from 4 each different batches, and 37 different pooled sample sets in total were made during sampling period. RNA was extracted from the eggs by using Trizol and cDNA was synthesized for RT-PCR for detecting NNV. Primers and PCR conditions are the same as previously described. As a result, NNV was not detected from any of the sample sets by one step PCR (0%, 0/37), suggesting NNV may not be a threat in walleye pollock aquaculture in Korea at present time. However, continuous monitoring for NNV should be conducted because introducing a new species into aquaculture industry involves potentials of disease outbreak and NNV is already known to cause outbreaks in gadoid fishes.

Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration (데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석)

  • Lim, Wongi;Kwon, Koohyung;Kim, Jung-Jae;Lee, Jong-Eon;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.440-446
    • /
    • 2016
  • Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods.

A Study on Improvement of Legal System for Harmful Chemical Substance Response Management System (유해화학물질 대응시스템 적용을 위한 제도 개선 연구)

  • Oak, Young-Suk;Lee, Young-Sub
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.216-223
    • /
    • 2017
  • Chemicals are an indispensable element of modern society to the extent that more than 15 million species are commercially available worldwide. However, among them are chemicals whose toxicityposes a threat to public health and the environment, as illustrated by past cases of chemical accidents, which revealed their danger to human life. Chemical accidents can spread and cause huge damage in a short time because of their characteristics. Therefore, it is important to do as much as possible to prevent them in advance and to respond promptly after an accident. The legal system pertaining to domestic chemical substances is the "Toxic Chemical Control Act", which is made up of the "Act on the Registration and Evaluation of Chemicals" and the "Chemical Control Act" since 2015. Under this law, the Comprehensive Chemical Information System and Chemical Substance Data Processing system were established and are still operating;however, chemical accidents are still occurring. These systems are comprehensive information systems aimed at providing chemical information rather than acting as chemical response systems, which has limited the effectiveness of accident response. This study is intended to analyze the information management systems, response management systems and the basis of chemical substance management support for hazardous chemicals and suggest ways to improve the legal system for developing and operating chemical response systemswithin a municipality.

Modelling protection behaviour towards micronutrient deficiencies: Case of iodine biofortified vegetable legumes as health intervention for school-going children

  • Mogendi, Joseph Birundu;De Steur, Hans;Gellynck, Xavier;Makokha, Anselimo
    • Nutrition Research and Practice
    • /
    • v.10 no.1
    • /
    • pp.56-66
    • /
    • 2016
  • BACKGROUND/OBJECTIVES: Despite successes recorded in combating iodine deficiency, more than 2 billion people are still at risk of iodine deficiency disorders. Rural landlocked and mountainous areas of developing countries are the hardest hit, hence the need to explore and advance novel strategies such as biofortification. SUBJECTS/METHODS: We evaluated adoption, purchase, and consumption of iodine biofortified vegetable legumes (IBVL) using the theory of protection motivations (PMT) integrated with an economic valuation technique. A total of 1,200 participants from three land-locked locations in East Africa were recruited via multi-stage cluster sampling, and data were collected using two, slightly distinct, questionnaires incorporating PMT constructs. The survey also elicited preferences for iodine biofortified foods when offered at a premium or discount. Determinants of protection motivations and preferences for iodine biofortified foods were assessed using path analysis modelling and two-limit Tobit regression, respectively. RESULTS: Knowledge of iodine, iodine-health link, salt iodization, and biofortification was very low, albeit lower at the household level. Iodine and biofortification were not recognized as nutrient and novel approaches, respectively. On the other hand, severity, fear, occupation, knowledge, iodine status, household composition, and self-efficacy predicted the intention to consume biofortified foods at the household level; only vulnerability, self-efficacy, and location were the most crucial elements at the school level. In addition, results demonstrated a positive willingness-to-pay a premium or acceptance of a lesser discount for biofortification. Furthermore, preference towards iodine biofortified foods was a function of protection motivations, severity, vulnerability, fear, response efficacy, response cost, knowledge, iodine status, gender, age. and household head. CONCLUSIONS: Results lend support for prevention of iodine deficiency in unprotected populations through biofortification; however 'threat' appraisal and socio-economic predictors are decisive in designing nutrition interventions and stimulating uptake of biofortification. In principle, the contribution is threefold: 1) Successful application of the integrated model to guide policy formulation; 2) Offer guidance to stakeholders to identify and tap niche markets; 3) stimulation of rural economic growth around school feeding programmes.