• 제목/요약/키워드: Threat Protect

검색결과 167건 처리시간 0.025초

A Study on the Security Management System for Preventing Technology Leakage of Small and Medium Enterprises in Digital New Deal Environment

  • Kim, Sun-Jib
    • International Journal of Advanced Culture Technology
    • /
    • 제9권4호
    • /
    • pp.355-362
    • /
    • 2021
  • Through the Korean version of the New Deal 2.0, manufacturing-oriented SMEs are facing a new environmental change called smart factory construction. In addition, SMEs are facing new security threats along with a contactless environment due to COVID-19. However, it is practically impossible to apply the previously researched and developed security management system to protect the core technology of manufacturing-oriented SMEs due to the lack of economic capacity of SMEs. Therefore, through research on security management systems suitable for SMEs, it is necessary to strengthen their business competitiveness and ensure sustainability through proactive responses to security threats faced by SMEs. The security management system presented in this study is a security management system to prevent technology leakage applicable to SMEs by deriving and reflecting the minimum security requirements in consideration of technology protection point of view, smart factory, and remote access in a non-contact environment. It is also designed in a modular form. The proposed security management system is standardized and can be selectively used by SMEs.

Comparative study on the efficiency of pesticide residue removal in foods (Perilla Leaves, Strawberries, Apples)

  • Seung-Woon Myung
    • Analytical Science and Technology
    • /
    • 제37권1호
    • /
    • pp.1-11
    • /
    • 2024
  • In agricultural households cultivating vegetables and fruits, the use of various pesticides to protect crops from diseases and pests or to control weeds is widely practiced enhancing quality and productivity. However, pesticides can pose a threat to consumer health by remaining on the food surface or migrating into the food interior. Households commonly peel off skins, wash with water, or use chemical methods to remove foreign substances including residual pesticides on the food surface. In this study, we measured the washing rate by comparing the pesticide concentrations before and after washing in the leafy vegetable perilla leaves and the fruits strawberries and apples, which were intentionally exposed to pesticides. We compared washing rates using tap water, a baking soda solution, and a commercially available food-specific cleaning solution. The target pesticides for analysis were azoxystrobin, bifenthrin, boscalid, difenoconazole, flubendiamide, and indoxacarb, and the residual pesticide analysis was performed using GC-MS/MS or LC-MS/MS. The removal rates of pesticides were highest with the food-specific cleaner, followed by baking soda and tap water in order.

Regulation and Its Tasks of Privately Contracted Armed Security Personnel on Board Ships Against Somali-based Piracy (소말리아 해적행위 대응을 위한 민간무장보안요원 승선의 규제 및 그 과제에 관한 연구)

  • Keum, Jong-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • 제20권1호
    • /
    • pp.26-32
    • /
    • 2014
  • The increased threat to commercial shipping by Somalia-based pirates has triggered an increased use of PMSC(Private Maritime Security Contractors). The use of PMSC to protect merchant ships against Somali-based piracy threat seems to have been most effective counter-piracy measures. However, there are various legal and practical questions around using PMSC and PCASP(Privately Contracted Armed Security Personnel) on board at sea. This paper aims to study the regulation and its problems of PMSC and PCASP on board to protect merchant ships against Somali-based piracy in the Indian Ocean and Gulf of Aden. In particular, this paper focuses on the legal issues including jurisdictional issues of PCASP on board merchant vessels, use of force by PCASP in self-defense, and authority for using PMSC. Currently, the legal framework relating to use of PMSC and PCASP on board protecting ships from Somali-based piracy is complex, sometimes ambiguous or inconsistent, and currently in a state of flux. Thus, this paper concludes that at this juncture an effort to coordinate this legal framework is necessary, as regards both the interpretation of existing rules related to PCASP on board merchant ships under UNCLOS(United Nations Convention on the Law of the Sea) and the creation of new rules. Also, this paper suggested that there is an urgent need to establish the PMSC-specific laws in Korea.

A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development (모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구)

  • Shin, Jun-Yuop;Kim, Dong-Soo;Han, Ki-Jun;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • 제12권8호
    • /
    • pp.113-127
    • /
    • 2014
  • The use of mobile devices offers a variety of services to the individuals and companies. On the other hand, security threats and new mobile security threats that exist in IT infrastructure to build the environment for mobile services are present at the same time. Services such as mobile and vaccine management services, such as MDM (Mobile Device Management) has attracted a great deal of interest in order to minimize the threat of security in mobile environment. These solutions can not protect an application that was developed for the mobile service from the threat of vulnerability of mobile application itself. Under these circumstances, in this paper, we proposed mobile application security checklists based on application security review items in order to prevent security accidents that can occur in a mobile service environment. We collected and analyzed Android applications, we performed a total inspection of the applications for verification of the effectiveness of the check items. And we checked that the check items through a survey of experts suitability was verified.

Edge Security System for Factory Automation Devices (생산자동화설비의 종단보안 시스템 구조)

  • Hwang, Ho-Young;Kim, Seung-Cheon;Ro, Kwang-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제12권2호
    • /
    • pp.251-258
    • /
    • 2012
  • The conventional network security solutions for manufacturing or factory automation devices are concentrated on protecting the internal networks from the attacks of external networks. Recently, however, so called Day-zero attacks are increased; the threat from internal devices such as notebooks, USB devices are as critical as attacks from external networks. Thus a new security solution is needed to protect manufacturing devices from both external and internal threat. To this purpose, we propose an edge-security system to provide cost effective, integrated, and simple end-point security solution specialized for automated manufacturing devices, which may avoid the shortcomings of NAC.

Strategic Approaches and the Role of Naval Forces to Counter Increasing Maritime Threats (해양안보 위협 확산에 따른 한국 해군의 역할 확대방안)

  • Park, Chang-Kwoun
    • Strategy21
    • /
    • 통권31호
    • /
    • pp.220-250
    • /
    • 2013
  • South Korean national security strategy should be developed to effectively handle and counter increasing maritime threats and challenges. There are three major maritime threats South Korea faces today; maritime disputes on the EEZ boundary and Dokdo islet issues, North Korean threats, and international maritime security. Maritime disputes in the region are getting intensified and turned into a military confrontation after 2010. Now regional countries confront each other with military and police forces and use economic leverage to coerce the others. They are very eager to create advantageous de facto situations to legitimize their territorial claims. North Korean threat is also increasing in the sea as we witnessed in the Cheonan incident and Yeonpyoung shelling in 2010. North Korea resorts to local provocations and nuclear threats to coerce South Korea in which it may enjoy asymmetric advantages. The NLL area of the west sea would be a main hot spot that North Korea may continue to make a local provocation. Also, South Korean national economy is heavily dependent upon foreign trade and national strategic resources such as oil are all imported. Without an assurance on the safety of sea routes, these economic activities cannot be maintained and expanded. This paper argues that South Korea should make national maritime strategy and enhance the strength of naval forces. As a middle power, its national security strategy needs to consider all the threats and challenges not only from North Korea but also to maritime security. This is not a matter of choice but a mandate for national survival and prosperity. This paper discusses the importance of maritime security, changing characteristics of maritime threats and challenges, regional maritime disputes and its threat to South Korea's security, and South Korea's future security strategy and ways to enhance the role of naval forces. Our national maritime strategy needs to show middle and long term policy directions on how we will protect our maritime interests. Especially, it is important to build proper naval might to carry out all the roles and missions required to the military.

  • PDF

A Dynamic Approach to Extract the Original Semantics and Structure of VM-based Obfuscated Binary Executables (가상 머신 기반으로 난독화된 실행파일의 구조 및 원본의미 추출 동적 방법)

  • Lee, Sungho;Han, Taisook
    • Journal of KIISE
    • /
    • 제41권10호
    • /
    • pp.859-869
    • /
    • 2014
  • In recent years, the obfuscation techniques are commonly exploited to protect malwares, so obfuscated malwares have become a big threat. Especially, it is extremely hard to analyze virtualization-obfuscated malwares based on unusual virtual machines, because the original program is hidden by the virtual machine as well as its semantics is mixed with the semantics of the virtual machine. To confront this threat, we suggest a framework to analyze virtualization-obfuscated programs based on the dynamic analysis. First, we extract the dynamic execution trace of the virtualization-obfuscated executables. Second, we analyze the traces by translating machine instruction sequences into the intermediate representation and extract the virtual machine architecture by constructing dynamic context flow graphs. Finally, we extract abstract semantics of the original program using the extracted virtual machine architecture. In this paper, we propose a method to extract the information of the original program from a virtualization-obfuscated program by some commercial obfuscation tools. We expect that our tool can be used to understand virtualization-obfuscated programs and integrate other program analysis techniques so that it can be applied to analysis of the semantics of original programs using the abstract semantics.

The New Challenges for the Republic of Korea Navy and the Development of Maritime Task Flotilla's Force Development (한국해군의 새로운 도전과 기동전단의 발전 방향)

  • Kim, Duk-ki
    • Strategy21
    • /
    • 통권39호
    • /
    • pp.163-197
    • /
    • 2016
  • The completion of Jeju Naval Base on February 2016 made the Republic of Korea Navy(ROKN) review the size and role of the Maritime Task Flotilla(MTF). The new strategic environment for the 12st century and the new challenges require the Navy to counter North Korea's provocations and prevent potential enemy's threat. The Navy is also required to take part in the variety of international roles and missions commensurated with Korea's global status to maximize the national interest. Despite these changes, Korea's military construction concept is still unable to break away from the old paradigm of the North Korean threat largely centered. In order to develop the current MTF into the Task Group with the construction of Jeju Naval Base, the Navy must newly not only establish new force development plan and fleet management concepts but also go to persuade and convince policy decision makers. To this end, the following efforts should be promoted. First, the ROK Navy steps up efforts in order to share with the Task Group's vision and strategy. The Navy should also provide the size and structure as well as the missions and roles of the Task Group to react to new maritime security environment. Second, the Navy analyse the MTF's ability and what is required and necessary to perform its duty. After that, it must set out the direction of the Task Group's force development. Third, the current missions and roles of the MTF should be re-established to respond various threats. Finally, accommodating of new technology to the MTF should intensify its strengths. The ROK Navy has a mixed force structure consisting of three fixed- base fleets and a MTF. The fixed base fleet has a passive force to defend and protect its own sea areas, but the MTF should actively not only counter North Korea's threats, including ballistic missiles, but also fight potential threats and takes international missions as a primary task force. However, the MTF has a limited capability to accomplish given missions and long-range operations, and thus, the ROK Navy is strongly required to construct the Task Group.

The Influence of Violence Experience on the Job Stress among Hospital Employees Working at Administration and Discharging Department (병원 원무행정근무자의 폭력경험이 직무스트레스에 미치는 영향)

  • Choi, Yun-young;Han, Mi Ah;Park, Jong;Choi, Seong Woo
    • Health Policy and Management
    • /
    • 제26권4호
    • /
    • pp.325-332
    • /
    • 2016
  • Background: Workplace violence was recognized to be social problems that might impact the health status and the job satisfaction of employee in hospitals. This study investigated the current status of violence and job stress among hospital employees working at administration and discharging department. Methods: The study subjects were 213 administrative employees working at 20 general hospitals. Data were collected by self-administered questionnaire that included information such as demographics, job-related characteristics, experience of violence, and job stress. The violence was classified as verbal violence, physical threat, and physical violence occurred by patients and caregivers. Analysis of variance, t-tests, correlation analysis, and multiple linear regression analysis were performed to examine the associated factors with job stress. Results: The levels of verbal violence, physical threat, and physical violence were $1.64{\pm}1.08$, $0.54{\pm}0.67$, and $0.04{\pm}0.17$, respectively. The score of job stress was $2.74{\pm}0.50$ and it was associated with age, existence of spouse, drinking frequency, subjective health status, disease history, night-time treatment, and public health administration career in simple analysis. In multiple linear regression analysis, the level of verbal violence experience was significantly associated with job stress (B=0.09, p=0.001). Also physical threats (B=0.18, p<0.001) and physical violence (B=0.48, p=0.008) showed positive association with job stress. Conclusion: This study attempted to examine the association between experience of violence and job stress in administrative employees at medical institutions. Levels of violence showed positive correlation with the job stress. Environment improvement to protect employee from violence and management of employees who experienced workplace violence are needed to reduce the job stress.

Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment (클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델)

  • Kim, Young Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • 제18권6호
    • /
    • pp.434-442
    • /
    • 2018
  • Recently, the threat to the security and damage of important data leaked by devices of intranet infected by malicious code through the Internet have been increasing. Therefore, the partitioned intranet model that blocks access to the server for business use by implementing authentication of devices connected to the intranet is required. For this, logical net partition with the VDI(Virtual Desktop Infrastructure) method is no information exchange between physical devices connected to the intranet and the virtual device so that it could prevent data leakage and improve security but it is vulnerable to the attack to expose internal data, which has access to the server for business connecting a nonregistered device into the intranet. In order to protect the server for business, we suggest a blockchain based network partition model applying blockchain technology to VDI. It contributes to decrease in threat to expose internal data by improving not only capability to verify forgery of devices, which is the vulnerability of the VDI based logical net partition, but also the integrity of the devices.