• Title/Summary/Keyword: Threat scenario

Search Result 42, Processing Time 0.032 seconds

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

User Requirements Analysis for the Strategic Planning of Virtual University Systems : A Case Study on the Perspective of Instructors (가상대학시스템 전략계획수립을 위한 교수자 측면의 요구분석에 관한 연구: K대학의 사례를 중심으로)

  • Jeong, Dae-Yul;Jun, Yong-Kee
    • Information Systems Review
    • /
    • v.4 no.1
    • /
    • pp.89-110
    • /
    • 2002
  • Today, many universities are confronted with the changing education paradigm such as e-Learning, CBT(Computer-based Training), Virtual University. Particularly, the Virtual University is now in the countrys educational mainstream as a legitimate, potentially standards-setting educational environment. These streams are certainly a new opportunity or threat to our universities. To overcome this problem, we should think this as strategic, and should implement IT-based Virtual University System to which computer and network technology is main edge. So, we think that the Virtual University System is SIS(Strategic Information System) which support universitys future education strategies. We proposed a planning framework for the Virtual University System. The framework which is based on the IS planning methodology is composed of such as environment analysis, requirement analysis of the system, strategic roles and objectives setting, scenario analysis of budget and revenue. To define the strategic roles and objectives of the system, we surveyed it on the side of instructors. We proposed five factors, which are to (1) improve competitiveness (2) reduce cost and secure profit (3) enhance education services (4) change the future education model (5) decrease dysfunctions of virtual education model.

A Study on Countermeasures of Convergence for Big Data and Security Threats to Attack DRDoS in U-Healthcare Device (U-Healthcare 기기에서 DRDoS공격 보안위협과 Big Data를 융합한 대응방안 연구)

  • Hur, Yun-A;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.243-248
    • /
    • 2015
  • U-Healthcare is a convergence service with medical care and IT which enables to examine, manage and maintain the patient's health any time and any place. For communication conducted in U-Healthcare service, the transmission methods are used that patient's medical checkup analysis results or emergency data are transmitted to hospital server using wireless communication method. At this moment when the attacker who executes the malicious access makes DRDoS(Distributed Reflection DoS) attack to U-Healthcare devices or BS(Base Station), various damages occur that contextual information of urgent patients are not transmitted to hospital server. In order to deal with this problem, this study suggests DRDoS attack scenario and countermeasures against DRDoS and converges with Big Data which could process large amount of packets. When the attacker attacks U-Healthcare devices or BS(Base Station), DB is interconnected and the attack is prevented if it is coincident. This study analyzes the attack method that could occur in U-Healthcare devices or BS which are remote medical service and suggests countermeasures against the security threat using Big Data.

Projection of Future Sea Level Change Based on HadGEM2-AO Due to Ice-sheet and Glaciers (HadGEM2-AO 기반의 빙상과 빙하에 의한 미래 해수면 변화 전망)

  • Kim, Youngmi;Goo, Tae-Young;Moon, Hyejin;Choi, Juntae;Byun, Young-Hwa
    • Atmosphere
    • /
    • v.29 no.4
    • /
    • pp.367-380
    • /
    • 2019
  • Global warming causes various problems such as the increase of the sea surface temperature, the change of coastlines, ocean acidification and sea level rise. Sea level rise is an especially critical threat to coastal regions where massive population and infrastructure reside. Sea level change is affected by thermal expansion and mass increase. This study projected future sea level changes in the 21st century using the HadGEM2-AO with RCP8.5 scenario. In particular, sea level change due to water mass input from ice-sheets and glaciers melting is studied. Sea level based on surface mass balance of Greenland ice-sheet and Antarctica ice-sheet rose 0.045 m and -0.053 m over the period 1986~2005 to 2081~2100. During the same period, sea level owing to dynamical change on Greenland ice-sheet and Antarctica ice-sheet rose 0.055 m and 0.03 m, respectively. Additionally, glaciers melting results in 0.145 m sea level rise. Although most of the projected sea level changes from HadGEM2-AO are slightly smaller than those from 21 ensemble data of CMIP5, both results are significantly consistent each other within 90% uncertainty range of CMIP5.

Contaminant transport through porous media: An overview of experimental and numerical studies

  • Patil, S.B.;Chore, H.S.
    • Advances in environmental research
    • /
    • v.3 no.1
    • /
    • pp.45-69
    • /
    • 2014
  • The groundwater has been a major source of water supply throughout the ages. Around 50% of the rural as well as urban population in the developing countries like India depends on groundwater for drinking. The groundwater is also an important source in the agriculture and industrial sector. In many parts of the world, groundwater resources are under increasing threat from growing demands, wasteful use and contamination. A good planning and management practices are needed to face this challenge. A key to the management of groundwater is the ability to model the movement of fluids and contaminants in the subsurface environment. It is obvious that the contaminant source activities cannot be completely eliminated and perhaps our water bodies will continue to serve as receptors of vast quantities of waste. In such a scenario, the goal of water quality protection efforts must necessarily be the control and management of these sources to ensure that released pollutants will be sufficiently attenuated within the region of interest and the quality of water at points of withdrawal is not impaired. In order to understand the behaviour of contaminant transport through different types of media, several researchers are carrying out experimental investigations through laboratory and field studies. Many of them are working on the analytical and numerical studies to simulate the movement of contaminants in soil and groundwater of the contaminant transport. With the advent of high power computers especially, a numerical modelling has gained popularity and is indeed of particular relevance in this regard. This paper provides the state of the art of contaminant transport and reviews the allied research works carried out through experimental investigation or using the analytical solution and numerical method. The review involves the investigation in respect of both, saturated and unsaturated, porous media.

Statistical Test for Performance Evaluation of Code Carrier Divergence Detection at a GBAS Reference Station (GBAS 기준국의 코드 반송파 발산 검출성능 평가를 위한 통계시험)

  • Yun, Young-Sun;Kim, Joo-Kyoung;Cho, Jeong-Ho;Heo, Moon-Beom;Nam, Gi-Wook
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.9
    • /
    • pp.760-770
    • /
    • 2012
  • In order to provide precision approach service based on GBAS, air navigation service providers should validate the GBAS system performance against international standard requirements and receive approval. The GBAS manufacturer should define integrity threat, analyze the integrity monitors and evaluate performance of the implemented monitors to verify integrity performance which is critical to the aircraft safety. This paper describes a statistical test result to evaluate performance of the code carrier divergence monitors implemented in KARI Integrity Monitor System software. The paper introduces analysis and test procedure which is developed for the performance evaluation and describes the analysis, the test scenario generation and the test results. The results show that the implemented monitors can detect the expected minimum detectable errors with satisfying the probability of missed detection requirements.

Evaluating the Airtightness of Medium- and Low-Intermediate-Level Radioactive Waste Packaging Container through Finite Element Analysis (유한요소 해석을 통한 중·저준위 방사성폐기물 포장용기의 밀폐성 평가)

  • Jeong In Lee;Sang Wook Park;Dong-Yul Kim;Chang Young Choi;Yong Jae Cho;Dae Cheol Ko;Jin Seok Jang
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.29 no.3
    • /
    • pp.203-209
    • /
    • 2023
  • The increasing saturation challenges in storage facilities for Low- and Intermediate-Level Radioactive Waste call for a more efficient storage approach. Consequently, we have developed a square-structured container that features a storage capacity approximately 20% greater than that of conventional drum-type containers. Considering the need to contain various radioactive wastes from nuclear power usage securely until they no longer pose a threat to human health or the environment, this study focuses on evaluating the sealing efficacy of the newly designed rectangular container using finite element analysis. Since radioactive waste containers typically do not experience external forces except under special circumstances, our analysis simulated the impact of an external force, assuming a fall scenario. After fastening the bolts, we examined the vertical stress distribution on the container by applying the calculated external force. The analysis confirms the container's stable seal.

A Study on Appropriate Military Strength of Unified Korea (Focused on relative balance strategy and conflict scenario) (통일 한국의 적정 군사력에 관한 연구 - 분쟁 시나리오와 상대적 균형전략을 중심으로 -)

  • Hong, Bong-Gi
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.687-738
    • /
    • 2016
  • To prepare for the complicated international relationship regarding Korean Peninsula after reunification, this thesis started off with the awareness that Unified Korea should build its international posture and national security at an early stage by determining its appropriate military strength for independent defense and military strategies that Unified Korea should aim. The main theme of this thesis is 'The research on appropriate military strength of the Unified Korean military'. To derive appropriate military strength of Unified Korea, this research focuses on conflict scenario and relative balance strategy based on potential threats posed by neighboring countries, and this is the part that differentiates this research from other researches. First of all, the main objective of the research is to decide appropriate military strength for Unified Korea to secure defense sufficiency. For this, this research will decide efficient military strategy that Unified Korea should aim. Than by presuming the most possible military conflict scenario, this research will judge the most appropriate military strength for Unified Korea to overcome the dispute. Second, after deciding appropriate military strength, this research will suggest how to operate presumed military strength in each armed force. The result of this thesis is as in the following. First, Unified Korea should aim 'relative balance strategy'. 'Relative balance strategy' is a military strategy which Unified Korea can independently secure defense sufficiency by maintaining relative balance when conflicts occur between neighboring countries. This strategy deters conflicts in advance by relative balance of power in certain time and place. Even if conflict occurs inevitably, this strategy secures initiative. Second, when analyzing neighboring countries interest and strategic environment after unification, the possibility of all-out war will be low in the Korean Peninsula because no other nation wants the Korean Peninsula to be subordinated to one single country. Therefore appropriate military strength of the Unified Korean military would be enough when Unified Korea can achieve relative balance in regional war or limited war. Third, Northeast Asia is a region where economic power and military strength is concentrated. Despite increasing mutual cooperation in the region, conflicts and competition to expand each countries influence is inherent. Japan is constantly enhancing their military strength as they aim for normal statehood. China is modernizing their military strength as they aspire to become global central nation. Russia is also enhancing their military strength in order to hold on to their past glory of Soviet Union as a world power. As a result, both in quality and quantity, the gap between military strength of Unified Korea and each neighboring countries is enlarged at an alarming rate. Especially in the field of air-sea power, arms race is occurring between each nation. Therefore Unified Korea should be equipped with appropriate military strength in order to achieve relative balance with each threats posed by neighboring countries. Fourth, the most possible conflicts between Unified Korea and neighboring countries could be summarized into four, which are Dokdo territorial dispute with Japan, Leodo jurisdictional dispute with China, territorial dispute concerning northern part of the Korea Peninsula with China and disputes regarding marine resources and sea routes with Russia. Based on those conflict scenarios, appropriate military strength for Unified Korea is as in the following. When conflict occurs with Japan regarding Dokdo, Japan is expected to put JMSDF Escort Flotilla 3, one out of four of its Japan Maritime Self-Defense Force Escort Fleet, which is based in Maizuru and JMSDF Maizuru District. To counterbalance this military strength, Unified Korea needs one task fleet, comprised with three task flotilla. In case of jurisdictional conflict with China concerning Leodo, China is expected to dispatch its North Sea fleet, one out of three of its naval fleet, which is in charge of the Yellow Sea. To response to this military action, Unified Korea needs one task fleet, comprised with three task flotilla. In case of territorial dispute concerning northern part of the Korean Peninsula with China, it is estimated that out of seven Military Region troops, China will dispatch two Military Region troops, including three Army Groups from Shenyang Military Region, where it faces boarder with the Korean Peninsula. To handle with this military strength, Unified Korea needs six corps size ground force strength, including three corps of ground forces, two operational reserve corps(maneuver corps), and one strategic reserve corps(maneuver corps). When conflict occurs with Russia regarding marine resources and sea routes, Russia is expected to send a warfare group of a size that includes two destroyers, which is part of the Pacific Fleet. In order to balance this strength, Unified Korea naval power requires one warfare group including two destroyers. Fifth, management direction for the Unified Korean military is as in the following. Regarding the ground force management, it would be most efficient to deploy troops in the border area with china for regional and counter-amphibious defense. For the defense except the border line with china, the most efficient form of force management would be maintaining strategic reserve corps. The naval force should achieve relative balance with neighboring countries when there is maritime dispute and build 'task fleet' which can independently handle long-range maritime mission. Of the three 'task fleet', one task fleet should be deployed at Jeju base to prepare for Dokdo territorial dispute and Leodo jurisdictional dispute. Also in case of regional conflict with china, one task fleet should be positioned at Yellow Sea and for regional conflict with Japan and Russia, one task fleet should be deployed at East Sea. Realistically, Unified Korea cannot possess an air force equal to neither Japan nor China in quantity. Therefore, although Unified Korea's air force might be inferior in quantity, they should possess the systematic level which Japan or China has. For this Unified Korea should build air base in island areas like Jeju Island or Ullenong Island to increase combat radius. Also to block off infiltration of enemy attack plane, air force needs to build and manage air bases near coastal areas. For landing operation forces, Marine Corps should be managed in the size of two divisions. For island defense force, which is in charge of Jeju Island, Ulleung Island, Dokdo Island and five northwestern boarder island defenses, it should be in the size of one brigade. Also for standing international peace keeping operation, it requires one brigade. Therefore Marine Corps should be organized into three divisions. The result of the research yields a few policy implications when building appropriate military strength for Unified Korea. First, Unified Korea requires lower number of ground troops compared to that of current ROK(Republic of Korea) force. Second, air-sea forces should be drastically reinforced. Third, appropriate military strength of the Unified Korean military should be based on current ROK military system. Forth, building appropriate military strength for Unified Korea should start from today, not after reunification. Because of this, South Korea should build a military power that can simultaneously prepare for current North Korea's provocations and future threats from neighboring countries after reunification. The core of this research is to decide appropriate military strength for Unified Korea to realize relative balance that will ensure defense sufficiency from neighboring countries threats. In other words, this research should precisely be aware of threats posed by neighboring countries and decide minimum level of military strength that could realize relative balance in conflict situation. Moreover this research will show the path for building appropriate military strength in each armed force.

  • PDF

Accommodation of Trade Measures for Environment Purposes on the WTO Rules (환경조치의 WTO체제 수용에 관한 연구)

  • Chae, Dae-Seok;Kim, Mie-Jung
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.433-457
    • /
    • 2011
  • This study attempts to make a constructive contribution to the debate on which WTO rules accommodate trade measures for environmental purposes. Does trade undermine the regulatory efforts of governments. However, the theoretical dimensions are partly addressed on the several key questions. For instances, is economic integration through trade and investment a threat to the environment? to control pollution and resource degradation? Will economic grow driven by trade help us to move towards a sustainable use of the world's environmental resources? The growing world economy has been accompanied by environmental degradation including deforestation, losses in bio-diversity, global warming, air pollution, depletion of the ozone layer, overfishing and so on. The sheer number of us obviously put pressure on natural resources and ecological systems, and this pressure will counting to rise as we grow towards 10 billion in the next century. What is more, there is no indication that consumption per capita is slowing. The perceived costs of acting alone in terms of lost investments and jobs often take the stream out of regulatory initiatives. In the worst case scenario environmental community is fearful that international trade will magnify the effects of poor environmental polices in the world Generally, economic growth drive by trade may speed up the process of environmental degradation unless sufficient environmental safeguards are put in place. Under these circumstances, this paper attempts to make a constructive contribution to the study on which WTO rules accommodate trade measures for environmental purposes.

  • PDF

Centralized TDMA Slot Assignment Scheme Based on Traffic Direction for QoS Guarantee in Unmanned Robot Systems (무인로봇체계에서 QoS 보장을 위한 트래픽 방향 기반 중앙집중식 TDMA 슬롯 할당 기법)

  • Han, Jina;Kim, Dabin;Ko, Young-Bae;Kwon, DaeHoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.555-564
    • /
    • 2016
  • This paper proposes a time slot allocation scheme for military patrol environments. This proposal comes from analysis of traffic properties in a military patrol environment. In the near future, robots are expected to explore enemy grounds and measure threat, taking the place of human patrol. In order to control such robots, control messages must be extremely accurate. One mistake from the control center could cause a tragedy. Thus, high reliability must be guaranteed. Another goal is to maintain a continual flow of multimedia data sent from patrol robots. That is, QoS (Quality of Service) must be guaranteed. In order to transmit data while fulfilling both attributes, the per-path based centralized TDMA slot allocation scheme is recommended. The control center allocates slots to robots allowing synchronization among robots. Slot allocation collisions can also be avoided. The proposed scheme was verified through the ns-3 simulator. The scheme showed a higher packet delivery ratio than the algorithm in comparison. It also performed with shorter delay time in the downlink traffic transmission scenario than the algorithm in comparison.