• Title/Summary/Keyword: attacks

Search Result 3,675, Processing Time 0.03 seconds

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.83-89
    • /
    • 2024
  • After the end of the service of Internet Explorer, the use of ActiveX ended, and the Non-ActiveX policy spread. HTML5 is used as a standard protocol for web pages established based on the Non-ActiveX policy. HTML5, developed in the W3C(World Wide Web Consortium), provides a better web application experience through API, with various elements and properties added to the browser without plug-in. However, new security vulnerabilities have been discovered from newly added technologies, and these vulnerabilities have widened the scope of attacks. There is a lack of research to find possible security vulnerabilities in HTML5-applied websites. This paper proposes a model for detecting tags and attributes with web vulnerabilities by detecting and analyzing security vulnerabilities in web pages of public institutions where plug-ins have been removed within the last five years. If the proposed model is applied to the web page, it can analyze the compliance and vulnerabilities of the web page to date even after the plug-in is removed, providing reliable web services. And it is expected to help prevent financial and physical problems caused by hacking damage.

The Application of Entomopathogenic Fungi Metarhizium anisopliae, Beauveria bassiana, and Trichoderma harzianum for Coptotermes curvignathus and Cryptotermes cynocephalus Termite Control in Indonesia

  • Niken SUBEKTI;Ari SUSILOWATI;Elizabeth Novi KUSUMANINGRUM;Anita FADHILA;Sania SALSABILA;Citra Anisah ZAHRA;Nasiha Al SABRINA;Ikhsan GUSWENRIVO;Yayan SANJAYA;Cepi KURNIAWAN;Apri Heri ISWANTO;Mia MIRANTI
    • Journal of the Korean Wood Science and Technology
    • /
    • v.52 no.3
    • /
    • pp.262-275
    • /
    • 2024
  • In Indonesia, Coptotermes curvignathus Holmgren and Cryptotermes cyanocephalus Light termite attacks can damage wood and causing losses of 8.7 trillion rupiah per year. Wood treatment and soil barrier are very important to protect structures and their components from termite infestation. The application of synthetic chemicals that pose risks to the environment and human health. The growing movement to replace these chemicals with new termiticides that are safe for the environment in place of persistent organic pollutants. Efficacy performance in entomopathogenic fungi spores such as that produce decanoic acid, hexadecanoic acid, palmitic acid, and octadecadienoic acid are potential compounds that provide for ecofriendly termite control. Entomopathogenic fungal spores from Metarhizium anisopliae, Trichoderma harzianum, and Beauveria bassiana, as the active ingredient were formulated with nanocellulose was added as an inert ingredient to which helped to deliver the active ingredients on controlling the target pest, and enhance the utility ability of the product fungi to control termites. The mortality of these termites successively entomopathogenic fungi was the main cause of death. The higher concentrations being associated with of nanocellulose used affect increased the number of termites mortality. M. anisopliae paired with 60% nanocellulose concentrate was the best percentage for yielded the greatest C. curvignathus and C. cynocephalus termite control. In the field testing, M. anisopliae provided better, it showed the finest result of termite control rather than B. bassiana and T. harzianum. The results of the research indicate that entomopathogenic fungi can be used for Pest Control Management as the subterranean termite and drywood termite control.

Clinacal investigation of child sexual abuse (소아 성폭력에 관한 임상적 고찰)

  • Lee, Hyun Joo;Han, Hye Jung;Kim, Ji Hee;Lee, Hye Sun;Lee, In Sil
    • Clinical and Experimental Pediatrics
    • /
    • v.50 no.1
    • /
    • pp.20-27
    • /
    • 2007
  • Purpose : Child sexual abuse is a significant and serious problem that affects public health and society. Pediatricians are responsible for preventing and detecting sexual abuse of children. The aim of this study was to examine clinical findings of child sexual abuse. Methods : The authors retrospectively studied 292 patients between the ages of 0 and 18 who were referred for evaluation of sexual abuse to the Emergency Department of the National Police Hospital from Oct 1, 2001 to May 5, 2005. Results : Sixty three (21.6 percent) of sexual abuse victims were younger than 6 years of age; 89 (30.5 percent) were 6-12 years of age; and 104 (47.9 percent) were 12-18 years of age. Attack time was the most common between noon and 6 pm. Victims were attacked in their home or nearby (51.4 percent). One hundred fifty six (53.6 percent) offenders were accquaitances, thirty nine (13.4 percent) of whom were family members. The disclosure of attack by parents with abnormal physical symptoms was more common in younger children than in adolescence. Eighty nine (30.5 percent) victims had no specific physical findings, 51 percent had injury to the hymen, 37.3% had injury to external genitalia, and 4 percent had anal injury. One case of gonorrhea and thirteen cases of chlamydia were found. Sperm was found in 19 cases and acid phosphatase was positive in 28 cases. The absence of physical findings and laboratory findings was more common in younger children than in those in adolescence. The time interval from attacks to hospital visits had a significant negative correlation with age. Conclusion : For younger victims, the time interval from attack to hospital visitis was more prolonged. Victims may have no physical evidence of sexual abuse. Therefore, a careful history should be obtained and a through physical examination should be performed. Pediatricians must play a leading role in evaluation and treatment of sexually abused children, considering children,s growth and development. Coordination with other professionals is necessary to provide consultation, medical treatment, and legal assistance for the sexually abused children and families.

North Korea's Nuclear Strategy: Its Type Characteristics and Prospects (북한 핵전략의 유형적 특징과 전망)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.2
    • /
    • pp.171-208
    • /
    • 2017
  • This paper is to analyze the type characteristics and prospects of the North Korean nuclear strategy. To this end, the paper is composed of 5 chapters titled introduction; the concept and type of nuclear strategy; the nuclear capabilities of North Korea and the declarative nuclear strategy; the operational characteristics and prospects of the North Korean nuclear strategy; and conclusion. Recently, the deployment of nuclear weapons and the enhancement of nuclear capabilities in North Korea have raised serious problems in our security and military preparedness. Nuclear strategy means military strategy related to the organization, deployment and operation of nuclear weapons. The study of North Korea's nuclear strategy begins with a very realistic assumption that the nuclear arsenal of North Korea has been substantiated. It is a measure based on North Korea's nuclear arsenal that our defense authorities present the concepts of preemptive attack, missile defense, and mass retaliation as countermeasures against the North Korean nuclear issue and are in the process of introducing and deploying them. The declared nuclear declaration strategy of the DPRK is summarized as: (1)Nuclear deterrence and retaliation strategy under the (North Korea's) Nuclear Weapons Act, (2)Nuclear preemptive aggression, (3)The principle of 'no first use' of nuclear weapons in the 7th Congress. And the intentions and operational characteristics of the North Korean nuclear strategy are as follows: (1)Avoiding blame through imitation of existing nuclear state practices, (2)Favoring of nuclear strategy through declarative nuclear strategy, (3)Non-settlement of nuclear strategy due to gap between nuclear capability and nuclear posture. North Korea has declared itself a nuclear-weapon state through the revised Constitution(2012.7), the Line of 'Construction of the Nuclear Armed Forces and the Economy'(2013.3), and the Nuclear Weapons Act(2013.4). However, the status of "nuclear nations" can only be granted by the NPT, which is already a closed system. Realistically, a robust ROK-US alliance and close US-ROK cooperation are crucial to curbing and overcoming the North Korean nuclear threat we face. On this basis, it is essential not only to deter North Korea's nuclear attacks, but also to establish and implement our own short-term, middle-term and long-term political and military countermeasures for North Korea's denuclearization and disarmament.

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF

Strategic Antitrust Policy Promoting Mergers to Enhance Domestic Competitiveness (기업결합규제(企業結合規制)와 국제경쟁력(國際競爭力))

  • Seong, So-mi
    • KDI Journal of Economic Policy
    • /
    • v.12 no.3
    • /
    • pp.153-172
    • /
    • 1990
  • The present paper investigates the potential value of strategic antitrust policy in an oligopolistic international market. The market is characterized by a non-cooperative Cournot-Nash equilibrium and by asymmetry in costs among firms in the world market. The model is useful for two reasons. First, it is important in the context of policy-making to examine the conditions under which it may be beneficial to relax antitrust law to enhance competitiveness. Second, the explicit derivation of the level of cost-saving required for a gain in total domestic surplus provides an empirical rule for excluding industries that do not satisfy the requirements for a socially beneficial antitrust exemption. Results of the analysis include a criterion that tells how the cost-saving and concentration effects of a merger offset each other. The criterion is derived from fairly general assumptions on demand functions and is simple enough to be applied as a part of the merger guidelines. Another interesting policy implication of our analysis is that promoting mergers would not be a beneficial strategy in a net importing industry where cost-saving opportunities are thin. Cost-saving domestic mergers are more likely to increase national welfare in exporting industries. The best candidate industries for application of strategic antitrust policy are those with the following characteristics: (i) a large potential for efficiency enhancement; (ii) high market concentration at the world but not the domestic level; (iii) a high ratio of exports to imports. Recently, many policymakers and economists in Korea have also come to believe that the appropriate antitrust policy in an era of increased foreign competition may actually be to encourage rather than to prohibit domestic mergers. The Industry Development Act of 1986 and the proposed bill for Mergers and Conversions in the Financial Industry of 1990 reflect this changing perspective on antitrust policy. Antitrust laws may burden domestic firms in the sense that they have a more constrained strategy set. Expenditures to avoid antitrust attacks could also increase costs for domestic firms. But there is no clear evidence that the impact of antitrust policy is significant enough to harm the competitiveness of domestic firms. As a matter of fact, it is necessary for domestic financial institutions to become large in scale in this era of globalization. However, the absence of empirical evidence for efficiency enhancement from mergers suggests caution in the relaxation of antitrust standards.

  • PDF

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

A Study on Piracy Matters and Introduction of the Privately Contracted Armed Security Personnel on Board Ships (해적사건 대응을 위한 무장경비원제도 도입방안에 관한 연구)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.293-326
    • /
    • 2014
  • Piracy is a worldwide issue, but the deteriorating security situation in the seas off Somalia, the Gulf of Aden and the wider Western Indian Ocean between 2005 and 2012 and in the increasing number of attacks in the Gulf of Guinea are a major problem. The depth of concern for the problem internationally is amply demonstrated by the levels of co-operation and coordination among naval and other forces from several countries that have assembled in the west Indian Ocean region and the Gulf of Aden to escort ships carrying humanitarian aid to Somalia and to protect vulnerable shipping. Notwithstanding this unprecedented effort, the vast sea area in which the pirates now operate makes it difficult to patrol and monitor effectively, particularly with the limited resources available. More resources, in the form of naval vessels and aircraft, are needed and at every opportunity the IMO encourages Member Governments to make greater efforts to provide the additional naval, aerial surveillance and other resources needed through every means possible. IMO provide interim guidance and recommendations to be taken into account when considering the use of PCASP(privately contracted armed security personnel) if and when a flag State determines that such a measure would be lawful and, following a full risk assessment, appropriate. The interim guidance and recommendations of IMO are not intended to endorse or institutionalize the use of armed guards. Therefore, they do not represent any fundamental change of policy by the Organization in this regard. It is for each flag State, individually, to decide whether or not PCASP should be authorized for use on board ships flying their flag. If a flag State decides to permit this practice, it is up to that State to determine the conditions under which authorization will be granted. Therefore, Korea should be introduced rationally PCASP for safe shipping. PCASP on board ships is much the same to special guard personnel of security services industry act. Act plan of Oceans and fisheries ministry on PCASP collides with special guard personnel system of National Police Agency. Rather than new law making, PCASP regukations have to be included in security services industry act. Management Agency of PCASP is to not Oceans and fisheries ministry, but Central Headquarters Korea Coast Guard of Public Safety and Security Ministry because of specialty and closely connection.

  • PDF

Distributions of Chromium, Copper, and Arsenic in Soils Adjacent to Stairs, a Deck, and a Sound Barrier Constructed with a Wood Preservative CCA-Treated Timbers (방부제 CCA로 처리된 목재를 사용한 계단, 데크 및 방음벽에 인접한 토양에서 크롬, 구리 및 비소의 분포)

  • Kim He-Kap;Kim Dong-Jin;Park Jeong-Gue;Shin Yong-Seung;Hwang In-Young;Kim Yoon-Kwan
    • Journal of Soil and Groundwater Environment
    • /
    • v.11 no.1
    • /
    • pp.54-64
    • /
    • 2006
  • Chromated copper arsenate (CCA), a wood preservative, has been widely used to protect wood products from attacks by bacteria, fungi and insects. However, the use of CCA is currently forbidden or limited to some applications in many countries because the toxic elements (Cr, Cu, and As) of CCA are released into the environments during outdoor uses, which may cause adverse health effects on humans and ecological systems. This study was conducted to investigate the distributions of chromium, copper and arsenic in soils adjacent to two CCA-treated wood structures. In a 7 month old pond entry structure, ten surface soil samples (0-2.5 cm) were collected at lateral distances of 0, 0.5, and 1 m from the stairway, and nine surface soil samples were collected beneath the deck. Nine top soil samples were taken from a 2 year old sound barrier structure at lateral distances of 0, 1, and 2 m. Background surface soil samples were also collected from each structure. Samples were analyzed for some physicochemical properties such as pH, electrical conductivity, organic matter content, and soil texture. Following the extraction of the elements with a microwave digestion system, samples were analyzed for Cr, Cu, and As. The concentrations of the three elements in soils adjacent to the structures were significantly elevated compared to the background levels, indicating that the elements have been leached out of the structures. Released e1ements showed lateral concentration gradients within 1 m. The elevations of the three elements in soils underneath the deck did not seem different (background-corrected concentrations: Cr, 5.01 mg/kg; Cu, 5.50 mg/kg; As, 4.91 mg/kg), while the elements in soils near the sound barrier were elevated in the order of As>Cu>Cr with measured concentrations of 49.7, 44.7 and 52.5 mg/kg, respectively. Background As, Cu, and Cr concentrations near the sound barrier were 9.88, 30.8, and 46.5 mg/kg, respectively. These results showed that CCA constituents are released into the environment and it is suggested that risk assessment need to be conducted to investigate harmful effects of the released elements on humans and ecological systems.