• Title/Summary/Keyword: countermeasures

Search Result 2,511, Processing Time 0.028 seconds

A Study on the Disaster Prevention Countermeasures of Tradition Buddhist Temple Cultural Treasure - A Case Study of the Fire Damage of the Naksansa which was due to Yangyang Forest Fire - (전통사찰문화재의 방재대책에 관한 연구 - 양양산불에 의한 낙산사의 화재피해사례를 통해 본 방재대책 -)

  • Back, Min-Ho;Lee, Hae-Pyeong
    • Fire Science and Engineering
    • /
    • v.20 no.2 s.62
    • /
    • pp.64-71
    • /
    • 2006
  • After destruction of the Naksansa which was due to Yangyang forest fire, this the fundamental research about the disaster prevention countermeasures of tradition buddhist temple cultural treasure was performed. The present condition of tradition buddhist temple and related laws were investigated and the present damage condition of the Naksansa was surveyed. Also, the fire damage cases of tradition buddhist temple and the fire laws and regulations were investigated, and the survey about disaster prevention countermeasures was carried out. This research drew up the basic material about the disaster prevention countermeasures of traditional buddhist temple.

Environmental Planning Contermeasures Considering Spatial Distribution and Potential Factors of Particulate Matters Concentration (미세먼지 농도의 공간적 현황 및 잠재영향인자를 고려한 환경계획적 대응 방향)

  • Sung, Sun-Yong
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.1
    • /
    • pp.89-96
    • /
    • 2020
  • Adverse impact of Particulate Matters(PM10, PM2.5; PMs) significantly affects daily lives. Major countermeasures for reducing concentration of PMs were focused on emission source without considering spatial difference of PMs concentration. Thus, this study analyzed spatial·temporal distribution of PMs with observation data as well as potential contributing factors on PMs concentration. The annual average concentration of PMs have been decreased while the particulate matter warnings and alerts were significantly increased in 2018. The average concentration of PMs in spring and winter was higher than the other seasons. Also, the spatial distribution of PMs were also showed seasonality while concentration of PMs were higher in Seoul-metropolitan areas in all seasons. Climate variables, emission source, spatial structure and potential PM sinks were selected major factors which could affects on ambient concentrations of PMs. This paper suggest that countermeasures for mitigating PM concentration should consider characteristics of area. Climatic variables(temperature, pressure, wind speed etc.) affects concentrations of PMs. The effects of spatial structure of cities(terrain, ventilation corridor) and biological sinks(green infrastructure, urban forests) on concentration of PMs should be analyzed in further studies. Also, seasonality of PMs concentration should be considered for establishing effective countermeasures to reduce ambient PMs concentration.

Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment

  • Mohaisen, Abedelaziz;Chang, Ku-Young;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1684-1697
    • /
    • 2011
  • We show that two protocols for RFID mutual authentication in pervasive computing environments, recently proposed by Kang et al, are vulnerable to several attacks. First, we show these protocols do not preserve the privacy of users' location. Once a tag is authenticated successfully, we show several scenarios where legitimate or illegitimate readers can trace the location of that tag without any further information about the tag's identifier or initial private key. Second, since the communication between readers and the database takes place over an insecure communication channel and in the plaintext form, we show scenarios where a compromised tag can gain access to confidential information that the tag is not supposed get access to. Finally, we show that these protocols are also vulnerable to the replay and denial-of-service attacks. While some of these attacks are due to simple flaws and can be easily fixed, others are more fundamental and are due to relaxing widely accepted assumptions in the literature. We examine this issue, apply countermeasures, and re-evaluate the protocols overhead after taking these countermeasures into account and compare them to other work in the literature.

Attacks, Detection, and Countermeasures in WSN Network Layer (WSN의 네트워크 계층에서의 공격과 탐지 및 대응 방안)

  • Lee, Daeun;Rhee, Eugene
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.413-418
    • /
    • 2019
  • Attacks on existing sensor networks include sniffing, flooding, and spoofing attacks. The basic countermeasures include encryption and authentication methods and switching methods. Wormhole attack, HELLO flood attack, Sybil attack, sinkhole attack, and selective delivery attack are the attacks on the network layer in wireless sensor network (WSN). These attacks may not be defended by the basic countmeasures mentioned above. In this paper, new countermeasures against these attacks include periodic key changes and regular network monitoring. Moreover, we present various threats (attacks) in the network layer of wireless sensor networks and new countermeasures accordingly.

A Study on Countermeasures Against Cyber Infringement Considering CPTED

  • Lim, Heon-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.106-117
    • /
    • 2021
  • The aim is to find cyber measures in consideration of physical CPTED in order to prepare countermeasures for cybercrime prevention. For this, the six applied principles of CPTED were used as the standard. A new control item was created in connection with the control items of ISO27001. A survey was conducted on former and current investigators and security experts. As a result of the reliability analysis, the Kronbar alpha coefficient value was 0.947, indicating the reliability of the statistical value. As a result of factor analysis, it was reduced to six factors. The following are six factors and countermeasures. Nature monitoring blocks opportunities and strengthens business continuity. Access control is based on management system compliance, personnel security. Reinforcement of territoriality is reinforcement of each wife and ethics. Establishment of security policy to enhance readability, security system maintenance. Increasing usability is seeking ways to utilize, periodic incentives. For maintenance, security education is strength and security-related collective cooperation is conducted. The differentiation of this study was to find countermeasures against cybercrime in the psychological part of the past. However, they approached to find in cyber measures. The limitation of the study is to bring the concept of physical CPTED to the cyber concept.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

Basic Studies on Establishment of Facility Guidelines for the Prevention of Infectious Diseases (감염병 예방을 위한 건축물 시설가이드라인 설정에 관한 기초 연구)

  • Choi, Kwangseok
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.28 no.3
    • /
    • pp.27-38
    • /
    • 2022
  • Purpose: This study tried to present basic data for establishment of facility guidelines and facility certification standards for the comprehensive prevention of infectious diseases in buildings. Methods: This study examines the concept of architectural countermeasures for the prevention of infectious diseases through literature reviews, and then classifies and organizes the countermeasures by viewing the infectious diseases hospitals as the top-level facility in terms of responding to infectious diseases. Results: At first, this study categorized and organized infection prevention countermeasures of infectious disease hospitals, which are the highest level facilities in terms of response to infectious diseases. And by presenting the concept of step-by-step setting of countermeasures for general buildings such as welfare facilities and multi-use facilities, which are lower-level facilities in the aspect of prevention of infectious diseases, this study tried to present basic data for establishing facility guidelines and facility certification standards for comprehensive prevention of infectious diseases in buildings. Implications: In the future, it is expected that spatial changes for the prevention of infectious diseases will spread to general constructions such as public buildings, private buildings, and multi-use facilities, and comprehensive infection prevention facility guidelines are needed.

A Survey on Side-Channel Attacks and Countermeasures for ECC Processor (ECC 프로세서에 대한 부채널 공격 및 대응방안 동향)

  • Jeong, Young-su;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.101-103
    • /
    • 2022
  • Elliptic curve cryptography (ECC) is widely used in hardware implementations of public-key crypto-systems for IoT devices and V2X communication because it is suitable for efficient hardware implementation and has high security strength. However, ECC-based public-key cryptography is known to have security vulnerabilities against side-channel attacks, so it is necessary to apply countermeasures against security attacks in designing ECC processor. This paper describes a survey on the side-channel attacks and countermeasures applicable to ECC processor design.

  • PDF

Cyber Security Considerations and Countermeasures for UAM Air Traffic Management Infrastructure (UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안)

  • Kyungwook Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.17-29
    • /
    • 2023
  • In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

A Study on Combustion Troubles, Issues and Countermeasures in the Coal Fired Power Plant Boilers with Various Coals (다양한 탄종 연소에 따른 석탄화력 보일러 연소장애 및 연소현안에 대한 대처방안 연구)

  • Kim, Chun-Kun
    • 한국연소학회:학술대회논문집
    • /
    • 2006.10a
    • /
    • pp.282-292
    • /
    • 2006
  • Various kinds of coals are supplied for coal fired power plants as the coal market situations are fluctuated with the high prices of oil and coals over the world. The quality of coal is decreasing as coal consumption increased and some specifications of coals are out of boiler design criteria. It could make combustion troubles such as coal clogging, spontaneous combustion, coal firing in the coal handling equipments, ash slag and clinker issues, etc. This paper covers combustion troubles, issues and countermeasures in the biggest coal fired power plant in Korea.

  • PDF