• Title/Summary/Keyword: Threat Level

Search Result 363, Processing Time 0.022 seconds

The International Legal Actions against Maritime Terrorism and its National Countermeasures in Korea (해상테러의 국제법적 규제 및 국내적 대응방안)

  • Lee Yun-Cheol
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.11a
    • /
    • pp.91-110
    • /
    • 2005
  • Maritime terrorism at sea is the form of violent interference with shipping. Its global reach and negative impact on sea transportation, safety of navigation and marine environment, as well as the threat it poses to human lives and property, call for effective countermeasures at the international and national level at the same time. First, this paper gives a factual assessment of the phenomenon of maritime terrorism as well as a legal analysis of the international provisions to suppress such forms of violence at sea which is different from piracy. And also this paper attempts to address and identify issues relevant to the existing international regulations such as SUA Convention as the main source of international regulations applicable to acts of terrorism at sea, ISPS Code, PSI, etc. Finally this paper suggests the national countermeasures against maritime terrorism in light of above mentioned the definition, causes, types of maritime terrorism and concerning international regulations.

  • PDF

Modeling of RC Frame Buildings for Progressive Collapse Analysis

  • Petrone, Floriana;Shan, Li;Kunnath, Sashi K.
    • International Journal of Concrete Structures and Materials
    • /
    • v.10 no.1
    • /
    • pp.1-13
    • /
    • 2016
  • The progressive collapse analysis of reinforced concrete (RC) moment-frame buildings under extreme loads is discussed from the perspective of modeling issues. A threat-independent approach or the alternate path method forms the basis of the simulations wherein the extreme event is modeled via column removal scenarios. Using a prototype RC frame building, issues and considerations in constitutive modeling of materials, options in modeling the structural elements and specification of gravity loads are discussed with the goal of achieving consistent models that can be used in collapse scenarios involving successive loss of load-bearing columns at the lowest level of the building. The role of the floor slabs in mobilizing catenary action and influencing the progressive collapse response is also highlighted. Finally, an energy-based approach for identifying the proximity to collapse of regular multi-story buildings is proposed.

An Empirical Study on the Factors Influencing User Resistance to ERP : Focused on the Vietnam Users (ERP에 대한 사용자 저항의 영향 요인에 관한 실증적 연구 : 베트남 사용자를 중심으로)

  • Kim, Hongkeun;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.127-158
    • /
    • 2015
  • This study analyzes the factors affecting user resistance to ERP in Vietnam, including the factors related to the cultural values of the users, which is rarely dealt in the previous ERP research. A research model is developed based on Klaus and Blanton [2010] and Hofstede [2011], consisting of the independent variables ('cultural value', 'system', 'organization', and 'process' related variables), a dependent variable ('user resistance to ERP') and a moderating variable ('self efficacy'). Major results of study include (1) users with high degree of uncertainty avoidance and femininity regard ERP as potential threat to their job and are likely to resist to ERP; (2) By training the users with high level of femininity to enhance their self efficacy, the degree of resistance to ERP can be reduced; (3) For ERP to be utilized successfully, systems should be developed in such a way in which working with ERP is not regarded as complex and difficult; and (4) communication and training play an important role in reducing the resistance of users.

The Field of Power/Ground Planes influenced by the HPEM Source, and its Damage Reduction

  • Kahng, Sung-Tek;Kim, Hyeong-Seok
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.406-410
    • /
    • 2012
  • This paper looks into the field inside the wide rectangular box structure that is excited by the High Power Electromagnetic(HPEM) source as a potential threat to electric grid and communication networks causing malfunction or destruction. The rectangular box is assumed power/ground planes and its internal field is calculated by the cavity model with the lightning strike excitation as an HPEM pulse. The accuracy of the calculation method employed here is validated through a $156mm{\times}106mm{\times}508{\mu}m$ parallel metallic plate case which is manufactured and tested, and is applied to the size of a building. With the help of the cavity model that takes into account loading, the level of the electric field is shown to decrease when a metal pillar is loaded between the power and ground planes.

DS/MC-CDMA system performance through Rayleigh fading channel in the presence of partial band interference (레이레이 페이딩 채널상에서 Jamming 환경을 고려한 DS/MC(MultiCarrier)-CDMA 시스템의 성능분석에 관한 연구)

  • 김인겸
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10A
    • /
    • pp.1486-1491
    • /
    • 2000
  • A Multicarrier system required a lower speed paralled-type of signal processing in contrast to a fast serial processing in a single carrier CDMA system. For the analysis we evaluate MC-CDMA system performance with that of a single-carrier CDMA system and a multi-carrier CDMA system based on the various jamming conditions. Also we studied to the capacity level against the threat environment through the performance comparison in commercial CDMA system and Limiting repeater system. as a result we found that M-CDMA system has a robustness to narrowband interference and multipath environments like as a Rayleigh fading.

  • PDF

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

Threat Level Based Attribute Oriented Induction (위협수위 기반 AOI 클러스터링 기법)

  • 김순동;서정택;김도환;이도훈;김동규;채송화
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.379-381
    • /
    • 2004
  • 지난 10년간 네트워크 기반의 컴퓨터 공격은 급격히 증가했으며 이에 따라 보안 기술도 발달하게 되었다. 침입탐지시스템은 컴퓨터 보안 기술로써 발전되어 왔으나 과도한 침입시도정보의 발생과 그 대부분이 긍정오류(false positive)를 발생시킴으로써 실제로 관리하는데 많은 어려움을 준다. 이러한 문제에 대안으로 여러 연구들이 진행되어 왔으며, 침입시도정보의 축약을 통한 관리적 측면에서의 효율을 높이는 연구도 진행되고 있다 그러한 연구들의 한 방법으로서 속성중심귀납법(Attribute Oriented induction, 이하 AOI)은 침입시도정보를 속성정보에 기반 하여 의미 있는 묶음으로 클러스터링 하는 방식이다 본 논문은 이 방식에서의 문제점을 분석하였으며 그 해결책으로써 본 논문에서는 위협수위 기반 AOI 클러스터링 기법을 제시하였다.

  • PDF

Analysis of the global gene expression profiles in genomic instability-induced cervical cancer cells

  • Oh, Jung-Min
    • International Journal of Oral Biology
    • /
    • v.47 no.2
    • /
    • pp.17-24
    • /
    • 2022
  • Preserving intact genetic material and delivering it to the next generation are the most significant tasks of living organisms. The integrity of DNA sequences is under constant threat from endogenous and exogenous factors. The accumulation of damaged or incompletely-repaired DNA can cause serious problems in cells, including cell death or cancer development. Various DNA damage detection systems and repair mechanisms have evolved at the cellular level. Although the mechanisms of these responses have been extensively studied, the global RNA expression profiles associated with genomic instability are not well-known. To detect global gene expression changes under different DNA damage and hypoxic conditions, we performed RNA-seq after treating human cervical cancer cells with ionizing radiation (IR), hydroxyurea, mitomycin C (MMC), or 1% O2 (hypoxia). Results showed that the expression of 184-1037 genes was altered by each stimulus. We found that the expression of 51 genes changed under IR, MMC, and hypoxia. These findings revealed damage-specific genes that varied differently according to each stimulus and common genes that are universally altered in genetic instability.

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

Research on the identification and blocking of known executalbe files at the network packet level (네트워크 패킷 레벨에서 알려진 실행 파일 식별 및 차단 연구)

  • Jo, Yongsoo;Lee, heejo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.177-179
    • /
    • 2020
  • 최근의 사이버 침해 사고는 공격 대상을 지정하여 지속적으로 공격을 시도하는 APT(Advanced Persistent Threat)와 랜섬웨어(Ransomware) 공격이 주를 이룬다. APT 공격은 dirve by download 를 통하여 의도하지 않은 파일의 다운로드를 유도하고, 다운로드 된 파일은 역통신채널을 만들어 내부 데이터를 외부로 유출하는 방식으로 공격에 사용되는 악성 파일이 사용자 모르게 다운로드 되어 실행된다. 랜섬웨어는 스피어 피싱 (Spear-phishing) 과 같은 사회공학기법을 이용하여 신뢰 된 출처로 유장 된 파일을 실행하도록 하여 주요 파일들을 암호화 한다. 때문에 사용자와 공격자 사이 네트워크 중간에 위치한 패킷 기반의 보안 장비들은 사용자에 의해 다운로드 되는 파일들을 선제적으로 식별하고, 차단하여 침해 확산을 방지 할 수 있는 방안이 필요하다. 본 논문에서는 네트워크 패킷 레벨에서 알려진 악성파일을 식별하고 실시간 차단하는 방안에 대하여 연구하고자 한다.