• Title/Summary/Keyword: Threat Protect

Search Result 167, Processing Time 0.024 seconds

A Study on Exposure to Asbestos a Shipbuilding Repair Business (수리조선 작업장에서의 공기중 석면 노출에 관한 연구)

  • Sim, Sang-Hyo;Chung, Hee-Tae;Song, Ki-Min;Kim, Yoon-Shin;Kang, Yong-Seon
    • Journal of Environmental Health Sciences
    • /
    • v.34 no.4
    • /
    • pp.279-284
    • /
    • 2008
  • This paper aims to provide basic data for work environment control, prevention of worker exposure to asbestos and improvement of air quality to protect workers ‘health after measuring the level of airborne asbestos and workers' exposure in a shipbuilding repair businesses. For this study, a total of 27 samples were collected from 27 workers who had been exposed to asbestos during engine, piping, boiler and other manufacturing processes in 'A' Shipbuilding Repair Company in Gyeongnam. This research was conducted from Oct. 1 to 30, 2007 and had the following results: The target group (27 workers) consisted of all men with an average age of 35.9 years and 6.6 years of work on average. Among them, fifteen 15 (55.6%) were smokers. In terms of their duties at work, there were 12 plumbing repair engineers (44.4%), 8 boiler repair engineers (29.6%) and 7 engine engineers (25.9%). The geometric mean concentration of airborne asbestos was 0.004 f/cc. A total of 4 samples exceeded the exposure limit. In particular, three exceeded the legal limit by more than double, which means that some workers have been highly exposed to asbestos. In terms of the concentration of asbestos fibres by work process, plumbing repair was the highest (0.0071 f/cc($0.001{\sim}0.57\;f/cc$)) while boiler was the lowest (0.0015 f/cc($0.001{\sim}0.007\;f/cc$)). Based on this study, proper action needs to be taken as soon as possible to protect workers from the threat of asbestos.

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

A Research on the Nuclear Deterrence Strategy of South Korea through Dispute of India and Pakistan

  • Dong-Kwon Cho;Young-Hwan Ryu;Sin-Young Yu
    • Journal of Radiation Industry
    • /
    • v.17 no.4
    • /
    • pp.411-416
    • /
    • 2023
  • From Cold War, Nuclear weapons have emerged military power into a very dangerous and important way of each national security. Throughout the era, the U.S. had stationed nuclear weapons in South Korea. But President George Bush initially started the withdrawal of nuclear tactical weapons deployed abroad in 1991. After that, under the protection of the nuclear umbrella, South Korea guarantees that the United States would operate its nuclear weapons to protect South Korea if it would be needed and the economy of South Korea has rapidly developed as more strong countries in the world. However, South Korea has seen and been realized the present state from the recent war between Russia and Ukraine. The protection of the U.S. nuclear umbrella from nuclear weapons and ballistic missiles of North Korea is unlikely to be permanently guaranteed. At the same time, South Korea should consider the security environment changes of surrounding nations such as China as military power acceleration and Russia as re-formation ambition. Because of these reasons, South Korea independently wants to protect itself and have the own nuclear weapons as a way to counter security threats. A majority of South Koreans also definitely believe that North Korea will not denuclearize or give up because North Korea has been having nuclear weapons as the final survival strategy of Kim Jong Un's regime. However, South Korea considers and makes new nuclear strategy through the role and effect of nuclear deterrence strategy in dispute between India and Pakistan and how to overcome the paradox of nuclear deterrence strategy. Therefore, this research is to suggest the effective nuclear deterrence strategy of South Korea from new security threats of surrounding nations through dispute between India and Pakistan. The focus of this research is that what is the role and paradox of nuclear deterrence strategy in dispute between India and Pakistan and how to find the effective nuclear deterrence strategy of South Korea.

The Countermeasures of North Korea's Nuclear Weapon Terror (북한의 핵테러와 대응방안)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.129-138
    • /
    • 2014
  • South Korea should correspond to the primary threat to North Korea's nuclear weapons. It is necessary to have countermeasures to solve the realistic problems of North Korea's nuclear weapons. We can intensify military pact between the United States and Korea and at the same time strengthening the current military power. Currently, we take note the threat North Korea's missile. We can not control the development of a nuclear weapon and there are possibilities that North Korea have successfully miniaturized nuclear enough to carry by the missile. We should overview and check the Korea's missile defenses system. While the direction of the overall missile defense system deployment with a focus on lower and upper air defense network. And discuss defense research should be to build a system that can be protected with a key strategic facilities and cities. While North Korea have nuclear weapon, the main issues related to North Korea's nuclear threat. The six party talks countries try to solve the problem by the international and diplomatic approach. At the same time we should make somewhat to defend measures such as military defenses of Kill chain system to protect our country. Kill Chain is on of the effective defense system. We know that North Korea do not abandon to develop nuclear weapons by diplomatic efforts. We should performed in fact by a variety of military suppression method.

Effect of Stereotype Threat on Spatial Working Memory and Emotion Recognition in Korean elderly (노화에 대한 고정관념 위협이 노인의 공간 작업기억 및 정서인식에 미치는 영향)

  • Lee, Kyoung eun;Lee, Wanjeoung;Choi, Kee-hong;Kim, Hyun Taek;Choi, June-seek
    • 한국노년학
    • /
    • v.36 no.4
    • /
    • pp.1109-1124
    • /
    • 2016
  • We examined the effect of stereotype threat (STT) on spatial working memory and facial emotion recognition in Korean elderly. In addition, we investigated the role of expected moderator such as self-perception of aging. Seventeen seniors (male=7) received basic cognitive tests including K-WMS-IV, MMSE and answered self-report questionnaires including self-perception of aging, anxiety of aging, attitude toward aging and age identity on the first visit. On the second visit, they were exposed to negative stereotype by reading a script detailing cognitive decline related to aging while a control group was exposed to a neutral content. Following the exposure, they were tested on a spatial-working memory task (Corsi-block tapping task) and emotion recognition task (facial expression identification task). The results showed that the seniors exposed to STT showed significantly lower performance on emotion recognition task (p < .05) (i.e., especially on the more difficult facial stimuli). In addition, there was a significant interaction between STT and self-perception of aging (p< .05), indicating that those who have positive self-perception of aging did not show impairment in emotion recognition task and difficult spatial working memory task under STT. On the other hand, those with negative self-perception of aging showed impaired performance under STT. Taken together, the current study suggests that being exposed to STT could negatively influence cognitive and emotional functioning of elderly. Interestingly, having a positive self-perception of aging could protect the underperformance caused by STT.

A Study on a Countermeasure Program using the Martial Arts for a Security Guard Caused by an Accidental Situation (우발상황시 경호무도 대응방안)

  • Park, Jun-Seok;Kang, Young-Gil
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.327-340
    • /
    • 2003
  • As a countermeasure under accidental occurrence situation, First, as application form of martial arts, A security guard foster ability that can protect a target person of guard and own body under accidental occurrence situation through incessant martial arts practice. To achieve this purpose, incessant training mental power and physical strength reinforcement should be kept on to prevent, therefore make a safety control function for such as weapon, small arms, explosive, vehicles terror etc. happened under accidental occurrence situation. Second, according to the contents of training based on the classification category of martial arts for security guard under accidental situation, a security guard must keep safety distance necessarily lest a target person of gurad should be attacked by attacker, therefore, intercept an attack opportunity if a safety distance between a target person of guard and attacker is not kept. Third, It is to practice confrontation techniques based on the type of attack. A security guard must develp situation disposal ability that can cope properly with the attack using empty hands, murderous weapon, small arms, explosive by case or individual or mass of threat that impose danger and injury in a target person's body of guard.

  • PDF

High-Secure Multivariable Knapsack Cryptosystem (안전성이 높은 다변수 Knapsack 암호시스템)

  • Lee, Byeong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.611-618
    • /
    • 1995
  • In the high information societies, the requirement of encryption security is increasing so as to protect information from the threat of attacks by illegal changes of data, illegal leakage of data, disorder of data sequences and the unauthorized sender and an unauthorized receiver etc. In this paper, multivariable knapsack crytosystem is proposed for security of computer communication. This system is securer and simpler than the conventional knapsack cryptosystems. And, proposed cryptosystem composed what represented each element of superincreasing vector with multivar able polynomial after transforming it of ciphervector. For the deciphering of ciphertext, the plaintext is determined by using the integers of secret and the superincreasing vector of secret key. Thus, the stability of this cryptosystem is based on the difficulty of obtaining the root that ciphervector becomes the superincreasing vector, in substituting the integers of secret for ciphervector to represent with the miltivariable polynomial. The propriety of proposed multivariable knapsack cryptosystem was proved through computer simulation.

  • PDF

Trends of Deep UV-LED Technology for the Pathogen and Biotoxin Aerosol Detection System (병원균 및 생물독소 탐지시스템을 위한 원자외선 LED 기술동향)

  • Chong, Eugene;Jeong, Young-Su;Choi, Kibong
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.28 no.5
    • /
    • pp.277-284
    • /
    • 2015
  • The humans are under attack involving the hazardous environment and pathogen/biotoxin aerosol that is realistic concerned. A portable, fast, reliable, and cheap Pathogen and Biotoxin Aerosol threat Detection(PBAD) trigger is an important technology for detect-to-protect and detect-to-treat system because the man-made biological terror is a fast and lethal infection. The ultraviolet C(UVC) wavelengths light source is key issue for PBAD that is sensitive because of strong fluorescence cross section from fluorescent amino acids in proteins such as tryptophan and tyrosine. The UVC-light emitting diode(LED) is emerging light source technology as alternative to laser or lamps as they offer several advantages. This paper discussed about the design consideration of UVC-LED for the PBAD system. The UVC-LED and PBAD technology, currently available or in development, are also discussed.

Security of Database Based On Hybrid Blockchain (하이브리드 블록체인을 이용한 데이터베이스 보안)

  • Bae, Keun-Woo;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.9-15
    • /
    • 2020
  • Recently, interest in blockchain technology has increased. The data industry is increasingly growing around the world. In addition, databases which obtain important information such as personal data are targeted by hackers. Data exposed by attackers happen frequently. In 2017, OWASP announced SQL injection is a top 1 threat to web applications. However, the proportion of data security is the smallest in the data industry. To prevent data exposure, this paper proposes a method that can protect databases by using hybrid blockchain.

A study on the application and counter measures of IC tag in international marine container transport (국제해상컨테이너운송에서 보안강화를 위한 전자태그(IC tag)의 적용과 대응방안)

  • Han, Sang-Hyun;Choi, Jun-Ho
    • International Commerce and Information Review
    • /
    • v.12 no.2
    • /
    • pp.133-158
    • /
    • 2010
  • Since 11 September 2001, the awareness of terrorists' actions has clearly risen. The potential threat of terrorists using containers poses a large risk to our economies and to our societies. In order to protect cargo from damage and terrorist threats, business and government turn to RFID and IC tags, and tradition container is replaced by IC smart container. In this study, presented application of IC tag and future tasks to Container transport by sea in viewpoint of security strengthening. First, realization and international SCM realization structural order that cover container supply chain whole of international standardization and association between industry are certainly needed. Second, it may have to try in technical development for IC tag Ratio that can read elevation moment develop suitable IC tag or reader in International Standard. Third, Need to establish concrete use policy as soon as possible in national dimension at the same time effort for international standard normalization of frequency. Finally, it shows to uses jointly with electron sealing and must solve problem about usable plan and information leak.

  • PDF