• Title/Summary/Keyword: Threat Security

Search Result 1,066, Processing Time 0.024 seconds

The Singapore Field Epidemiology Service: Insights Into Outbreak Management

  • Ooi, Peng-Lim;Seetoh, Theresa;Cutter, Jeffery
    • Journal of Preventive Medicine and Public Health
    • /
    • v.45 no.5
    • /
    • pp.277-282
    • /
    • 2012
  • Field epidemiology involves the implementation of quick and targeted public health interventions with the aid of epidemiological methods. In this article, we share our practical experiences in outbreak management and in safeguarding the population against novel diseases. Given that cities represent the financial nexuses of the global economy, global health security necessitates the safeguard of cities against epidemic diseases. Singapore's public health landscape has undergone a systemic and irreversible shift with global connectivity, rapid urbanization, ecological change, increased affluence, as well as shifting demographic patterns over the past two decades. Concomitantly, the threat of epidemics, ranging from severe acute respiratory syndrome and influenza A (H1N1) to the resurgence of vector-borne diseases as well as the rise of modern lifestyle-related outbreaks, have worsened difficulties in safeguarding public health amidst much elusiveness and unpredictability. One critical factor that has helped the country overcome these innate and man-made public health vulnerabilities is the development of a resilient field epidemiology service, which includes our enhancement of surveillance and response capacities for outbreak management, and investment in public health leadership. We offer herein the Singapore story as a case study in meeting the challenges of disease control in our modern built environment.

A Study on the Formative Characteristics of Lucy Orta's Fashion Design - Focusing on the Relevance with Architectural Design - (루시 오르타 작품 디자인 특성 연구 - 건축적 디자인과의 관련성을 중심으로 -)

  • Kim, So-Young;Yang, Hee-Young
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.12 no.2
    • /
    • pp.41-54
    • /
    • 2010
  • This paper aims at studying about spatial structures and formative characteristics of Lucy Orta's fashion design. Her works utilizes the thought related on the architectural space that has been revealed sharp change of the paradigm since the late of 20th century. Lucy Orta against individualism of the urban life, and manufactures portable and moving housing and multi-functional fashion that is paved with individual rest unit and give a sense of security through simple combination among the units. Besides, she has development multiple portable clothing and equipments for the rescuethrough exploiting pioneering high technology. The results of this study can be summarized as the following: 1) refuge habitant creates individual space for physical and mental protection from the urban surrounding, 2) nomadic dwelling shows multi-functional fashion space fit for digital nomads' life style aims at continuous movement, 3) connective nexus and urban life guard are comprise of detachable individual unit in public space for remaking of the bonds, affinity, and relationship, and the complex of rescue clothing and equipments for meeting a challenge of the threat about human existence from uncertain environmental change in the future.

  • PDF

The Korea's indiscretion in maritime-terrorism and the counter plan (한국 해양테러의 실태 및 대응방안)

  • Park, Jun-seok;Park, Yu-Deuk;Kim, Gi-sang
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.2
    • /
    • pp.79-93
    • /
    • 2007
  • With international urgence of terror situation, many methods of terror techniques and skills are appearing and more intense and threatening terror is braking out not only in the air(plane), but also in the sea(ship). Korea is surrounded by 3 sides of sea and is a proud maritime nation that should advance to foreign country through the sea because South Korea and North Korea are confronting. Korea depend on the maritime transportation, 99.7% of exporting, importing material resources. Therefore, acquisition of the marine safety has the great affect on national security and economical life. On the high tension of situation about threat and possibility of maritime terroism, the potential ways of the improvement policy for counter-tactics against big maritime terror are the following. First, we should construct clear and well-organized network for accurate information about maritime terrorism Second, we should have the information of all domestic, foreign passenger's ships Third, national important facilities such as atomic energy plant, thermo-electric power plant, shipyard need policies to manage all emergency situation Fourth, government authorities should improve tactic abilitities by competing with support and budget inside of nation as well as outside of nation. To develop big maritime terror of our country, we will have to hold cooperative training & tactics contest of big maritime terror by cooperating educational industry organization with similar institute, improve the ability of members of big terror and acquire tactics information by excavating and exchanging a new technique through tactics seminar and public hearing.

  • PDF

Comparing Financial Portfolios and Housing Wealth Effects of Single Income and Dual Income Couples (외벌이와 맞벌이 부부가구의 자산포트폴리오 특성 및 주택자산효과 차이 비교)

  • Lee, Hyunjeong
    • Journal of the Korean housing association
    • /
    • v.27 no.6
    • /
    • pp.95-104
    • /
    • 2016
  • The purpose of this research is to compare housing wealth effects of home-owning single income couples (SIC) and dual income couples (DIC) on their non-durable consumption and to assess the effects by location, age groups, housing structure type, debt-to-asset ratio and employment status. Using the Korean Labor and Income Panel Study (KLIPS) of 2014, this empirical study identified 1,198 SIC households and 1,044 DIC households, and employed multiple regression analysis. The main results reveal that the difference of financial portfolios between SIC and DIC households was little but housing wealth effects were stronger among SIC households than DIC counterpart. It's evident that housing wealth effects were conspicuous for SIC and DIC households who were headed by wage earners aged over 40s, and resided in apartment outside the Seoul Metropolitan Area. However, household debt became a determinant in contradicting housing wealth effects of SIC and DIC households. While the household financial dimension was in proportion to income, DIC households didn't gain much financial security due to increasing expenditure. Further, this research imply that liquidity constraints explicitly posed a more serious threat to SIC households whose dependence on housing asset is larger than their counterpart.

A Study on Anomaly Signal Detection and Management Model using Big Data (빅데이터를 활용한 이상 징후 탐지 및 관리 모델 연구)

  • Kwon, Young-baek;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.287-294
    • /
    • 2016
  • APT attack aimed at the interruption of information and communication facilities and important information leakage of companies. it performs an attack using zero-day vulnerabilities, social engineering base on collected information, such as IT infra, business environment, information of employee, for a long period of time. Fragmentary response to cyber threats such as malware signature detection methods can not respond to sophisticated cyber-attacks, such as APT attacks. In this paper, we propose a cyber intrusion detection model for countermeasure of APT attack by utilizing heterogeneous system log into big-data. And it also utilizes that merging pattern-based detection methods and abnormality detection method.

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.

The Countermeasure for Threat of Cyber Terror in Sociological Perspective (사회적 이슈 관점에서 바라 본 사이버 테러 유형에 대한 위험 대응방안)

  • Choi, Heesik;Kim, Hyunkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2017
  • In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories (의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로)

  • Son, Mi-Jung;Yoon, Tai-Young;Lee, Sang-Chul
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.2
    • /
    • pp.153-163
    • /
    • 2014
  • Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.