• Title/Summary/Keyword: Threat Protect

Search Result 167, Processing Time 0.025 seconds

Confirmation of fumigation effect on and toxicity analysis on microorganisms isolated from records (기록물에서 분리된 미생물에 대한 훈증소독의 효능검증과 독성조사)

  • Jo, Yih-Yung;Shin, Jong-Sun;Yoon, Dai-Hyun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.1
    • /
    • pp.231-243
    • /
    • 2001
  • The sterilization method of records by fumigation using mixed gas of methyl bromide(MB) and ethylene oxide(ETO) has been generally used as a way to protect biological deterioration by microorganisms and insects. In this study, we confirmed sterilization effect of MB and ETO [86 : 14(Vol.%)] on and analyzed toxicity on microorganisms isolated from records. To analyze sterilization effect of fumigation on microorganisms and insect, we have fumigated microorganisms and insect with a various amounts mixed gas of MB and ETO, and various exposure time. Insect was sterilized at all experimental conditions. In microorganisms, sterilization effect was detected only when the mixed gas was treated at $120g/m^3$ concentration for at least 24 hrs. To test the possibility of isolated microorganisms as a threat to human health, it was investigated that toxicity test using yeast, radish and cancer cells on microorganisms. Only Aspergillus oryzae had an inhibition effect on growth of yeast. radish and cancer cells, respectively. These results demonstrate that sterilization effect can occur at low concentrations of the mixed gas on insect but requires higher concentrations of the mixed gas on microorganisms. In addition to, it is suspected that the possibility of the microorganism as a threat to human health is little.

A Study on the Role of Maritime Enforcement Organization As Response of Illegal Fishing (불법어업에 대한 해상집행기관의 역할 및 방향 - 중국어선의 불법어업을 중심으로 -)

  • Jung, Bong-Kyu;Choi, Jung-Ho;Lim, Seok-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.26 no.4
    • /
    • pp.769-788
    • /
    • 2014
  • Today, all the countries of the world newly recognize importance of sea on 70% area of the earth, which are focused on efforts for security of marine territory and fishes resources. On the security concerns of the ocean & fishes resources, Sea are very important on the ground of the importance of the ocean, thus international community has been trying to combat a maritime security threat and illegal fisheries. Coastal states need to have proper state's jurisdiction and exercise it's jurisdiction to response effectively to a maritime security threat and illegal fisheries. Here, many of the coastal states strengthened the rights in Exclusive Economic Zone(;EEZ) naturally, there are made cooperation activities and keen competition in the sea because deepening of complex understanding of the relationship between the surrounding countries with marine surveys & continental shelf development, island territorial sovereignty & marine jurisdiction in overlap of sea area on EEZ. In these circumstances, foreign fishing boats invaded to our territorial waters and EEZ many times. in addition, Chinese fishing boats are going to illegal fisheries naturally. On this point, a powerful crackdown of maritime enforcement organization had no effect on them. Also more and more their resistance gathered strength and tendency of a illegal activities became systematization, group action and atrocity little by little. So this thesis includes a study on the regal regulation, the system and formalities on the control of illegal fishing. And the author analyzed the details of the activities of illegal fishing and boats controlled by Korea Coast Guard(KCG), fishing patrol vessels of Ministry of Maritime Affaires and Fisheries(MOMAF) and Navy etc. from in adjacent sea area of Korea. In relation to this, the policy and activity plan were devised to crackdown to illegal fisheries of foreign fishing boats and then it was enforced every year. According to this, analyze the present conditions of illegal fisheries of a foreign fishing boats on this study, also analyze the present conditions of maritime enforcement organization & found out problems to compared it. protect the territorial waters, at the same time protection of marine mineral resources & fishes resources of EEZ including continental shelf, which has want to study for the role & response of maritime enforcement organization for the protection of fisheries resources and a proper, a realistic confrontation plan of maritime enforcement organization against illegal fisheries of foreign fishing boats.

A Study on Current Status of Detection Technology and Establishment of National Detection Regime against Nuclear/Radiological Terrorism (핵테러/방사능테러 탐지 기술 현황 및 국내 탐지체계 구축 방안에 관한 연구)

  • Kwak, Sung-Woo;Jang, Sung-Soon;Lee, Joung-Hoon;Yoo, Ho-Sik
    • Journal of Radiation Protection and Research
    • /
    • v.34 no.3
    • /
    • pp.115-120
    • /
    • 2009
  • Since 1990s, some events - detection of a dirty bomb in a Russian nation park in 1995, 9/11 terrorist attack to WTC in 2001, discovery of Al-Qaeda's experimentation to build a dirty bomb in 2003 etc - have showed that nuclear or radiological terrorism relating to radioactive materials (hereinafter "radioactive materials" is referred to as "nuclear material, nuclear spent fuel and radioactive source") is not incredible but serious and credible threat. Thus, to respond to the new threat, the international community has not only strengthened security and physical protection of radioactive materials but also established prevention of and response to illicit trafficking of radioactive materials. In this regard, our government has enacted or revised the national regulatory framework with a view to improving security of radioactive materials and joined the international convention or agreement to meet this international trend. For the purpose of prevention of nuclear/radiological terrorism, this paper reviews physical characteristics of nuclear material and existing detection instruments used for prevention of illicit trafficking. Finally, national detection regime against nuclear/radiological terrorism based on paths of the smuggled radioactive materials to terrorist's target building/area, national topography and road networks, and defence-in-depth concept is suggested in this paper. This study should contribute to protect people's health, safety and environment from nuclear/radiological terrorism.

The Detection of Signaling Dos on 4G LTE Cellular Network (4G LTE 이동통신망에서의 시그널링 DoS 탐지 기술)

  • Jang, Woung;Kim, Se-Kwon;Oh, Joo-Hyung;Im, Chae-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.146-149
    • /
    • 2013
  • For in recently years, global cellular network service is changing rapidly to 4G. However, the fast introducing of 4G has been going with not enough research about security threat, it could be many kind of vulnerability. Therefore the research about security threat on 4G network is ongoing in external countries, but not sufficient in domestic. particularly in domestic situation of rapidly increased subscribers, The security threats which are hindering stability and usability could make a fatal effect on many users. 4G network should be considered about the feature of mobile network to protect 4G network stable. Mobile network has limited radio resources, it releases the radio resource which is not used in selected time and reallocate when detected the data transmission. Many signaling messages are transferred in the network entities to allocate or release the radio resource. In this paper, it will be introduced the technology to detect signaling DoS traffic hindering the stability and usability of network entities managing the radio resources by huge signaling message from the repetitive wireless connection/release message.

  • PDF

A Comparative Study of Machine Learning Algorithms Using LID-DS DataSet (LID-DS 데이터 세트를 사용한 기계학습 알고리즘 비교 연구)

  • Park, DaeKyeong;Ryu, KyungJoon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • Today's information and communication technology is rapidly developing, the security of IT infrastructure is becoming more important, and at the same time, cyber attacks of various forms are becoming more advanced and sophisticated like intelligent persistent attacks (Advanced Persistent Threat). Early defense or prediction of increasingly sophisticated cyber attacks is extremely important, and in many cases, the analysis of network-based intrusion detection systems (NIDS) related data alone cannot prevent rapidly changing cyber attacks. Therefore, we are currently using data generated by intrusion detection systems to protect against cyber attacks described above through Host-based Intrusion Detection System (HIDS) data analysis. In this paper, we conducted a comparative study on machine learning algorithms using LID-DS (Leipzig Intrusion Detection-Data Set) host-based intrusion detection data including thread information, metadata, and buffer data missing from previously used data sets. The algorithms used were Decision Tree, Naive Bayes, MLP (Multi-Layer Perceptron), Logistic Regression, LSTM (Long Short-Term Memory model), and RNN (Recurrent Neural Network). Accuracy, accuracy, recall, F1-Score indicators and error rates were measured for evaluation. As a result, the LSTM algorithm had the highest accuracy.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

The analysis on Japan's New Maritime Strategy and the Development of its Naval Forces - focusing on Japan's countermeasure to China's pursuing of maritime hegemony - (일본의 신(新) 해양전략과 해상전력 발전 동향 분석 - 중국의 해양패권 추구에 대한 대응을 중심으로 -)

  • Bae, Joon-Hyung
    • Strategy21
    • /
    • s.40
    • /
    • pp.5-36
    • /
    • 2016
  • Recently, the Japanese government revised the three guidelines of its security policy, the National Security Strategy(NSS), the National Defense Program Outline and Midterm Defense Buildup Plan, exceptionally at one time. This means Japan has been seeking the new strategy and strengthening military power considering changing regional security environment. Moreover, Japan revised the security laws for the right to collective self-defense, which authorized the use of force even when Japan is not under attack. Also, Japan renewed the Guidelines for Japan-U.S. Defense Cooperation in twenty years, and has expanded JSDF's scope of activity to a worldwide level. These changes imply Japan would constantly seek to build military forces focusing on naval forces. Because Japan's naval forces, the JMSDF is the means that allow Japan to use its force at anywhere overseas and expand its roles and missions in international society by the basis of the right to collective self-defense. This research will analyze Japan's new maritime strategy and trend of force development and eventually look for the implication on our maritime security These days, Japan has perceived Chinese rapid increase of naval power and pursuing of maritime hegemony as a grave threat. In response to this, Japan is designing new maritime strategy, which are "remote islands defense and recapture" and proactively develop a new type of naval forces to accomplish this new strategy. The Japan's "remote island defense and recapture strategy" is to harden its defensive posture in Nansei islands which correspond to China's 1st island chain for chinese A2/AD strategy and directly encounter with China and to protect its own dominium and maritime interest while supporting US national strategy in East Asia. Japan continues to build compact, multi-functional ship to accomplish "remote island defense and recapture strategy" and keep strengthening its maritime power projection capability to include build of new amphibious ship, and large, multi-functional ship which can provide effective C2. These changes imply that Japan is shifting its strategy from passive and defensive to proactive and aggressive way and continues to pursue naval buildup.The implication of Japan's new maritime strategy and naval buildup needs to be observed carefully and we need to keep developing naval power required to protect our maritime sovereignty and interest.

A Study on The Law and System of The Private Body Guard in Korea (한국(韓國) 민간신변보호(民間身邊保護)의 발전(發展)을 위한 법규(法規) 및 제도(制度)에 관한 고찰(考察))

  • Lee, Han-Ick
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.283-319
    • /
    • 1997
  • Our society witnesses the rapid progress in the areas of politics, economy, society and culture in the process of national modernization since 1960s, which in turn as a reverse function gets to contract a societic pathology, totally lowering the security level of citizens' lives owing to various violent crimes like hostage commotions and murders with rifles and deadly weapons. what is the main reason for that? That may be partly because the chief police force concentrates on the current situation resulting in the vacuum of the public peace. However, the main reason is that the police fall short of man-power and equipments even if the whole police power were put to use in preventing and quelling the crimes. That is true not only of Korea but also of the advanced countries like the U.S.A., England and Japan. We realize that these advanced countries have higher level of security in every individual's life and property than Korea because their progress of the private guard systems can fill in a vacuum of the shortage of the police power, Therefore, we should without delay internationalize our private guard systems expecting the widely opening of the guard service markets in the age of Uruguay Round. To do this, we need to change our ideas for fostering the policy of the private guard from passive defense ideas into positive aggressive ones. Our police should urgently set up a plan to pursue the orientation of vision that we should dispatch our private guards overseas before foreign guards rush into our markets. Accordingly it goes without saying that the private guard group should distinguish their services from the public services initiating their own theory and strategy of private guard services and also readjust themselves between the public duties and the private services with the study of minimizing the reverse function of the private guard systems. The history criminal justice has always shown that the criminal system progressed at the initiative of the civil factor in case its demand and supply do not make both ends meet. Nevertheless, in the process the power of the government never weakens, rather it is built up in general. In conclusion, the necessity of the build-up of the private guard services must duly be acknowledged by the police as well as by the business which has its unique sphere within the criminal justice instead of as the suplemtary services of the simple the police power on the long-term basis. The purpose of the private guard services can be largely classified into the two categories; first it means the function to prevent the crimes against the citizens and secondly to enhance the national interest as an increasing mammoth business with a worldly competition capacity. The police has an absolute responsibility that they should protect the modem public in general from feeling the crisis of the personal threat, tension, anxiety and nervousness. In short, if we develop the complete private guard system to guarantee the societic atmosphere for all citizens, keep the public peace, and protect all citizens' lives and properties, we will sure enjoy a beautiful land, a wholesome society and a happy life in goodharmony of law and order.

  • PDF

The Study on Threats of Information Security and Their Solutions in the Fourth Industrial Revolution (4차 산업혁명 시대에 정보보안의 위협요인과 대응방안에 대한 연구)

  • Cho, Sung-Phil
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.11-35
    • /
    • 2017
  • The third industrial revolution, characterized by factory automation and informatization, are moving toward the fourth industrial revolution which is the era of superintelligence and supernetworking through rapid technology innovation. The most important resources in the fourth industrial revolution are information or data since the most of industrial and economic activities will be affected by information in the fourth industrial revolution. Therefore we can expect that more information will be utilized, shared and transfered through the networks or systems in real time than before so the significance of information management and security will also increase. As the importance of information resource management and security which is the core of the fourth industrial revolution increases, the threats on information security are also growing so security incidents such as data breeches and accidents take place more often. Various and thorough solutions are highly needed to protect information resources from security risks because information accidents or breaches seriously damage brand image and cause huge financial damage to organization. The purpose of this study is to research general trends on data breaches and accident that can be serious threat of information security. Also, we will provide resonable solutions to protect data from nine attack patterns or other risk factors after figuring out each characteristic of nin attack patterns in data breaches and accidents.

  • PDF

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.