• 제목/요약/키워드: Threat Protect

Search Result 167, Processing Time 0.025 seconds

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

Effect of a restaurant hygienic grade certificate program on consumer choices

  • Kim, Jae-il;Choi, Jinkyung
    • Nutrition Research and Practice
    • /
    • v.15 no.sup1
    • /
    • pp.70-78
    • /
    • 2021
  • BACKGROUND/OBJECTIVES: The recent coronavirus disease 2019 pandemic has brought to light issues regarding personal and environmental cleanliness. Individuals may have concerns about cleanliness at food service establishments when they consume food prepared at a restaurant. In Korea, a new restaurant hygienic certificate system was implemented in 2017. The effect of this new system has not been evaluated. SUBJECTS/METHODS: This study investigated consumers' perceptions of these new certificates using the protection motivation theory (PMT). An online survey was conducted to collect data and then exploratory factor analysis, analysis of variance, and multiple regression tests were run. RESULTS: The results of this study indicate that 3 different certificates had significant differences in threat (P < 0.001) and benefit (P < 0.001) perception. However, experience with a foodborne illness from a restaurant did not effect on the PMT variables. In addition, the 3-tier certificate did not motivate consumers to protect themselves against foodborne illnesses, while previous experiences of foodborne illness (P < 0.05), coping (P < 0.001), and benefits (P < 0.01) affected this protection motivation. CONCLUSIONS: This study suggests that consumers were not influenced by different certificate levels regarding their motivation to protect themselves from foodborne illnesses. Therefore, an improved plan should be initiated to clarify the meaning of these certificates. The results of this study can help the application and development of a new system for future adaptations.

A Study on Developing Low Altitude Multi-layer Air Defense System to Protect Megacities in the Korean Peninsula (한국형 메가시티 저고도 다중방공체계 구축 방안)

  • Sin, Ui-Cheol;Cho, Sang Keun;Park, Sung Jun;Sim, Jun Hak;Koo, Ja Hong;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.393-398
    • /
    • 2022
  • Megacities of the Repulic of Korea(ROK) will have increased by urbanization and the fourth industrial revolution. Mgacities are absolutely the opportunity factor to make human life enriched. Simultaneously, those are the challenge foctor considering the crucial conventional threat such as massive artillery and multiple rocket launcher from the North Korea. Israel that has faced the geopolitical situation of ROK developed the Multi-layer air defense system to offset the low altitude threat from the neighboring nations. As a result, Israel substantially removed plenty of Hamas' rockes and suicidal drones in 2021. Applying Israel's concept, North Korea's low altitude threat toward the ROK's megacities can effectively be eliminated. Furthermore, this Multi-layer air defense system can be a game-changer that gets rid of the low and high altitude threat from North Korea and neighboring nations with both hyperconnected sensor-C2-shooter and artificial intelligence. Through this approach, the ROK will be able to achieve the prosperity and prowth of nation at the center of Megacities concentrated on PMESII(Politics, Military, Economy, Society, Information, and Infrastructure) factors.

Analyses of Security, Privacy Issues and Challenges for RFID System

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.701-705
    • /
    • 2011
  • RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.

Methodology of Cyber Security Assessment in the Smart Grid

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.495-501
    • /
    • 2017
  • The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

A Study of Scaling Law for the Response of V-shape Structure Protecting Landmine (지뢰폭압 방호용 V형 구조물의 거동에 대한 상사법칙 연구)

  • Kim, Dong Kyu
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.25 no.5
    • /
    • pp.337-344
    • /
    • 2015
  • As many of armored vehicles are seriously exposed to threat of IEDs(Improvised Explosive Devices) in the Afghanistan war and the Iraq war. V-shaped military vehicles are deeply studied in order to protect crews and mounted soldiers against land mines. Generally the experiment on full-scaled V-shaped structure needs excessively high cost, which becomes a huge barrier to study. In this paper, we explore the possibility to make a half-scaled model of the V-shaped structure by using the geometric similarity scaling. We demonstrate the geometric similarity scaling between the original model and the half-scaled model is established on the momentum and deflections of structure via computer simulations and experiments. At this stage, we conduct only numerical analysis of predicting vibration of V-shaped structure because measuring vibration of structure is difficult in the mass-explosion experiment, which is remained as future work.

Effects of the Position of Demographic Questions on Survey Responses

  • Heo, Sun-Yeong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.15 no.4
    • /
    • pp.855-866
    • /
    • 2004
  • In many surveys, one of the most important goals is to obtain reliable and valid responses from respondents. To achieve the goal, a researcher have to make efforts to protect respondents' confidentiality and to reduce the effects of social desirability on answers. The key question of this paper is whether the position of demographic questions have an effect on responses. Two types of questionnaires are considered: one puts the demographic questions at the beginning and the other does at the last. On both types, I asked only a small number of demographic questions which are considered as essential on analytic purposes. The results show no evidence of position effects when the risk to threat confidentiality was minimized.

  • PDF

Biometric Information Protection Measures in the Biometric Person Authentication System Using Match-on-Card (Match-on-Card를 사용한 생체 개인 인증 시스템에서의 생체정보 보호대책)

  • 이상곤;조대성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.6
    • /
    • pp.237-246
    • /
    • 2003
  • To acquire certificate of security evaluation for information protection Products, it is necessary for a designer to grasp the threats listed in a protection profile and to reflect them in the product design. BDPP is a protection profile for the biometric devices. In this paper, we applied BDPP to a Match-on-Card, and ertracted some security requirements to protect biometric data against threats. We also studied some countermeasures satisfying the security requirements.

Coffee cultivation techniques, impact of climate change on coffee production, role of nanoparticles and molecular markers in coffee crop improvement, and challenges

  • Naik, Banavath Jayanna;Kim, Seong-Cheol;Seenaiah, Ragula;Basha, Pinjari Akabar;Song, Eun Young
    • Journal of Plant Biotechnology
    • /
    • v.48 no.4
    • /
    • pp.207-222
    • /
    • 2021
  • Coffee is the most frequently consumed functional beverage world wide. The average daily coffee consumption is increasing. This crop, which plays an important role in the global economy is under great threat from climate change. To with stand the current climate change, farmers have to learn crop cultivation techniques, strategies to protect crops from diseases, and understand which type of seed varieties to use to avoid crop loss. The present review briefly discusses the coffee cultivation techniques, impact of climate changes on coffee production, processing techniques of coffee, and the importance of coffee in our society, including its chemical composition and prevention against, major diseases. Furthermore, the importance and role of advanced nanotechnology along with molecular approaches for coffee crop improvement and facing challenges are explained.