• 제목/요약/키워드: Threat Security

Search Result 1,066, Processing Time 0.029 seconds

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

Korea's Public Diplomacy Policy towards Africa: Strategies, Instruments and Its Implications on Economic Linkages with Africa (한국의 대 아프리카 공공외교: 전략과 방안 그리고 경제 연계에 미치는 영향)

  • Ochieng, Haggai Kennedy;Iffat, Tahira;Kim, Sungsoo
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.23 no.3
    • /
    • pp.312-333
    • /
    • 2020
  • Korea-Africa relations date back to the period of independence of African countries. During this time, the ties between Korea and Africa has passed through stagnation, inconsistencies and weak diplomatic exchanges. Recently, Korea began to refocus its efforts towards Africa in order to revitalize their relations. This paper examines Korea's public diplomacy strategies towards Africa and how its various strategies are working in the interest of Korea as well as Africa. The study shows that Korea's renewed interest in Africa is primarily driven by the security threat from North Korea and the need to diversify its market for industrial goods as well as energy sources. The latter motives override Korea's interest in the continent. These motives are not at variance with those pursued by large powers like the US and China in Africa. Furthermore, the paper shows that Korea is employing a mixture of public diplomacy instruments in Africa with varied outcomes. Economic linkages between Korea and Africa are on an upward trajectory since the late 2000s. In order to build sustainable relations, the paper provides a number suggestions with far-reaching implications on Korea's public diplomacy towards Africa in the future.

Humic Acid Confers HIGH-AFFINITY K+ TRANSPORTER 1-Mediated Salinity Stress Tolerance in Arabidopsis

  • Khaleda, Laila;Park, Hee Jin;Yun, Dae-Jin;Jeon, Jong-Rok;Kim, Min Gab;Cha, Joon-Yung;Kim, Woe-Yeon
    • Molecules and Cells
    • /
    • v.40 no.12
    • /
    • pp.966-975
    • /
    • 2017
  • Excessive salt disrupts intracellular ion homeostasis and inhibits plant growth, which poses a serious threat to global food security. Plants have adapted various strategies to survive in unfavorable saline soil conditions. Here, we show that humic acid (HA) is a good soil amendment that can be used to help overcome salinity stress because it markedly reduces the adverse effects of salinity on Arabidopsis thaliana seedlings. To identify the molecular mechanisms of HA-induced salt stress tolerance in Arabidopsis, we examined possible roles of a sodium influx transporter HIGH-AFFINITY $K^+$ TRANSPORTER 1 (HKT1). Salt-induced root growth inhibition in HKT1 overexpressor transgenic plants (HKT1-OX) was rescued by application of HA, but not in wild-type and other plants. Moreover, salt-induced degradation of HKT1 protein was blocked by HA treatment. In addition, the application of HA to HKT1-OX seedlings led to increased distribution of $Na^+$ in roots up to the elongation zone and caused the reabsorption of $Na^+$ by xylem and parenchyma cells. Both the influx of the secondary messenger calcium and its cytosolic release appear to function in the destabilization of HKT1 protein under salt stress. Taken together, these results suggest that HA could be applied to the field to enhance plant growth and salt stress tolerance via post-transcriptional control of the HKT1 transporter gene under saline conditions.

Plant Immunity against Viruses: Moving from the Lab to the Field (식물바이러스 면역반응 최신 연구 동향 및 전망)

  • Kim, Nam-Yeon;Hong, Jin-Sung;Jeong, Rae-Dong
    • Research in Plant Disease
    • /
    • v.24 no.1
    • /
    • pp.9-25
    • /
    • 2018
  • Plant viruses cause significant yield losses and continuously threaten crop production, representing a serious threat to global food security. Studies on plant-virus interactions have contributed to increase our knowledge on plant immunity mechanism, providing new strategies for crop improvement. The prophylactic managements consist mainly following international legislations, eradication of infected plants, and application of pesticide to decrease the population of vectors. Hence, putting together the pieces of knowledge related to molecular plant immunity to viruses is critical for the control of virus disease in fields. Over the last several decades, the outstanding outcomes of extensive research have been achieved on comprehension of plant immunity to viruses. Although most dominant R genes have been used as natural resistance genes, recessive resistance genes have been deployed in several crops as another efficient strategy to control viruses. In addition, RNA interference also regulates plant immunity and contribute a very efficient antiviral system at the nucleic acid level. This review aims at describing virus disease on crops and summarizes current resistance mechanisms. Furthermore, we will discuss the current biotechnological approaches to control viral diseases and the future questions that are to be addressed to secure crop production against viruses.

Android Malware Detection Using Auto-Regressive Moving-Average Model (자기회귀 이동평균 모델을 이용한 안드로이드 악성코드 탐지 기법)

  • Kim, Hwan-Hee;Choi, Mi-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1551-1559
    • /
    • 2015
  • Recently, the performance of smart devices is almost similar to that of the existing PCs, thus the users of smart devices can perform similar works such as messengers, SNSs(Social Network Services), smart banking, etc. originally performed in PC environment using smart devices. Although the development of smart devices has led to positive impacts, it has caused negative changes such as an increase in security threat aimed at mobile environment. Specifically, the threats of mobile devices, such as leaking private information, generating unfair billing and performing DDoS(Distributed Denial of Service) attacks has continuously increased. Over 80% of the mobile devices use android platform, thus, the number of damage caused by mobile malware in android platform is also increasing. In this paper, we propose android based malware detection mechanism using time-series analysis, which is one of statistical-based detection methods.We use auto-regressive moving-average model which is extracting accurate predictive values based on existing data among time-series model. We also use fast and exact malware detection method by extracting possible malware data through Z-Score. We validate the proposed methods through the experiment results.

Key-pair(Public key, Private key) conflict analysis using OpenSSL (OpenSSL을 이용한 키쌍(공개키·개인키) 충돌율 분석)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5294-5302
    • /
    • 2014
  • The development of public-key-based technique that enables a variety of services(E-government, e-banking, e-payment, etc.) evaluated as having complete safety. On the other hand, vulnerabilities(e.g, heartbleed bug, etc.) are constantly being discovered. In this paper, a public key infrastructure to verify the safety and reliability, the collision rate using OpenSSL key pair was analyzed. the experiment was performed using the following procedure. Openssl was used to create five private certification agencies, and each of the private certificate authority certificates to create 2 million, generating a total of 10 million by the certificate of the key pair conflicts analysis. The results revealed 35,000 in 1 million, 0.35% chance of a public key, a private key conflict occurred. This is sufficient in various fields(E-payment, Security Server, etc.). A future public-key-based technique to remove the threat of a random number generator, large minority issues, in-depth study of selection will be needed.

The Media's Agenda Setting on the Nuclear Test of North Korea (북한 핵실험 이슈에 대한 언론의 의제구성)

  • Lee, Wan-Soo;Son, Young-Jun
    • Korean journal of communication and information
    • /
    • v.56
    • /
    • pp.175-193
    • /
    • 2011
  • This study explored how South Korean newspapers covered North Korea's second nuclear test in May of 2009. Findings show that South Korean newspapers mostly reported North Korea's nuclear experiment in relatively negative tones. Their coverage mainly focused on the influences of nuclear threat from the North on the military, political and economic areas in South Korea. However, the media's agenda settings and frames were not similar in terms of each paper's political and ideological inclination. Whereas the progressive papers, such as the Hankyoreh and the Kyunghyang Shinmun, recognized that the current nuclear issue in Korean peninsula is getting worse because of South Korea's rigorous pressure on North Korea, the conservative papers, such as the Chosun Ilbo and the Donga Ilbo, see that the deadlock between North and South mainly comes from the system malfunction of North Korea. To prevent the current impasse, the left-side papers emphasized to develop the six-party talk in dealing with North Korean issue, while the right-wing papers paid attentions to the West's sanctions on North Korea and ensuring national security.

  • PDF

Epigenetic Regulation of Fungal Development and Pathogenesis in the Rice Blast Fungus

  • Jeon, Junhyun
    • 한국균학회소식:학술대회논문집
    • /
    • 2014.10a
    • /
    • pp.11-11
    • /
    • 2014
  • Fungal pathogens have huge impact on health and economic wellbeing of human by causing life-threatening mycoses in immune-compromised patients or by destroying crop plants. A key determinant of fungal pathogenesis is their ability to undergo developmental change in response to host or environmental factors. Genetic pathways that regulate such morphological transitions and adaptation are therefore extensively studied during the last few decades. Given that epigenetic as well as genetic components play pivotal roles in development of plants and mammals, contribution of microbial epigenetic counterparts to this morphogenetic process is intriguing yet nearly unappreciated question to date. To bridge this gap in our knowledge, we set out to investigate histone modifications among epigenetic mechanisms that possibly regulate fungal adaptation and processes involved in pathogenesis of a model plant pathogenic fungus, Magnaporthe oryzae. M. oryzae is a causal agent of rice blast disease, which destroys 10 to 30% of the rice crop annually. Since the rice is the staple food for more than half of human population, the disease is a major threat to global food security. In addition to the socioeconomic impact of the disease it causes, the fungus is genetically tractable and can undergo well-defined morphological transitions including asexual spore production and appressorium (a specialized infection structure) formation in vitro, making it a model to study fungal development and pathogenicity. For functional and comparative analysis of histone modifications, a web-based database (dbHiMo) was constructed to archive and analyze histone modifying enzymes from eukaryotic species whose genome sequences are available. Histone modifying enzymes were identified applying a search pipeline built upon profile hidden Markov model (HMM) to proteomes. The database incorporates 22,169 histone-modifying enzymes identified from 342 species including 214 fungal, 33 plants, and 77 metazoan species. The dbHiMo provides users with web-based personalized data browsing and analysis tools, supporting comparative and evolutionary genomics. Based on the database entries, functional analysis of genes encoding histone acetyltransferases and histone demethylases is under way. Here I provide examples of such analyses that show how histone acetylation and methylation is implicated in regulating important aspects of fungal pathogenesis. Current analysis of histone modifying enzymes will be followed by ChIP-Seq and RNA-seq experiments to pinpoint the genes that are controlled by particular histone modifications. We anticipate that our work will provide not only the significant advances in our understanding of epigenetic mechanisms operating in microbial eukaryotes but also basis to expand our perspective on regulation of development in fungal pathogens.

  • PDF

A Study on the Suppression and Punishment of International Terrorism (국제(國際)테러리즘의 억제(抑制)와 처벌(處罰)에 관한 연구(硏究) -중국민항기(中國民航機) 공중납치사건(空中拉致事件)을 중심(中心)으로-)

  • Yoh, Yeung-Moo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.87-123
    • /
    • 1989
  • The purpose of this thesis is to do a research on suppression of peacetime international terrorism and penal system of terrorists by political and economic means. International terrorism means wanton killing, hostage taking, hijacking, extortion or torture committed or threatened to be comitted against the innocent civilian in peacetime for political motives or purposes provided that international element is involved therein. This research is limited to international terrorism of political purposes in peacetime, especially, hijacking of civil aircraft. Hijacking of civil aircraft include most of international terrorism element in its criminal act and is considered to be typical of international terrorism in view of multinationality of its crews, passengers and transnational borders involved in aircraft hijacking. Civil air transportation of today is a indispensable part of international substructure, as it help connect continuously social cultural and economic network of world community by dealing with massive and swift transportation of passengers and all kinds of goods. Current frequent hijacking of civil aircraft downgrade the safety and trust of air travel by mass slaughter of passengers and massdestruction of goods and endanger indispensable substructure of world community. Considering these facts, aircraft hijacking of today poses the most serious threat and impact on world community. Therefore, among other thing, legal, political, diplomatic and economic sanctions should be imposed on aircraft hijacking. To pursue an effective research on this thesis aircraft hijacking by six Chineses on 5th May, 1983, from mainland China to Seoul, Korea, is chosen as main theme and the Republic of Korea's legal, political and diplomatic dealing and settlement of this hijacking incident along with six hijackers is reviewed to find out legal, political diplomatic means of suppression and solution of international terrorism. Research is focused on Chinese aircraft hijacking, Korea-China diplomatic negotiation, Korea's legal diplomatic handling and settlement of Tak Chang In, mastermind of aircraft hijacking and responses and position of three countries, Korea, China and Taiwan to this case is thoroughly analyzed through reviewing such materials as news reportings and comments of local and international mass media, Korea-China Memorandum, statements of governments of Korea, China and Taiwan, verdicts of courts of Korea, prosecution papers and oral argument by the defendants and lawyers and three antiaircraft hijacking conventions of Hague, Tokyo and Montreal and all the other instruments of international treaties necessary for the research. By using above-mentioned first-hand meterials as yardsticks, legal and political character of Chinese aircraft hijacking is analyzed and reviewed and close cooperation among sovereign states based on spirit of solidarity and strict observance of international treaties such as Hague, Tokyo and Montreal Conventions is suggested as a solution and suppressive means of international terrorism. The most important and indispensable factor in combating terrorism is, not to speak, the decisive and constant resolution and all-out effort of every country and close cooperation among sovereign states based on "international law of cooperation."

  • PDF

Illegal Issuing Practices of Switched Bill of Lading and Precautions against their Potential Risks (스위치선하증권의 불법적 발행 관행에 따른 위험과 그 대책)

  • Park, Sae-Woon
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.389-409
    • /
    • 2012
  • The Switched Bill of Lading(SBL) has been in frequent use in recent years as intermediary trade increases with the growing number of companies' overseas subsidiaries. Its frequent use, though, has brought about disputes regarding its illegal issue. Although there are several legal cases regarding this, studies on this issue are hard to find. Therefore, this study tries to provide countermeasures and precautions against unlawful issues of SBL through examining the legal cases resulting from illegal issuing practices of SBL. When the Switched Bill of Lading is issued, the shipper, consignee, port of loading and unloading, and shipping date of the original bill of lading are usually changed. Statements which may put the shipper at a disadvantageous position may also be deleted and/or the bill of lading may be either divided or integrated when it is issued. However, if the carrier issues the SBL 1)without withdrawing original BL, 2)indicating the shipping date, port of loading and port of discharge falsely, or 3)deleting the statements which may give him disadvantages, it may be regarded as an illegal issue. These unlawful issues of SBL may pose a huge threat to the shipper, banks and the parties relating to the trade. That is, the shipper may take a substantial loss when the goods can be delivered to a third party by SBL without his collecting the proceeds. The issuing bank and the negotiating bank may also have their security rights to the goods hampered by the illegal and improper issue of SBL. In most cases, the carrier has no choice but to issue the SBL without collecting the original BL for fear of hurting the relationship with the intermediary traders. This practice of issuing more than two sets of BL may pose a potential risk to the carrier.

  • PDF