• Title/Summary/Keyword: top attack

Search Result 62, Processing Time 0.027 seconds

A Study on the Trade-Economic Effects and Utilization of AEO Mutual Recognition Agreements

  • LEE, Chul-Hun;HUH, Moo-Yul
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.25-31
    • /
    • 2020
  • Purpose: The AEO (Authorized Economic Operator) program, created in 2001 in the United States due to 9.11 terrorist's attack, fundamentally changed the trade environment. Korea, which introduced AEO program in 2009, has become one of the world's top countries in the program by ranking 6th in the number of AEO certified companies and the world's No. 1 in MRA (Mutual Recognition Agreement) conclusions. In this paper, we examined what trade-economic and non-economic effects the AEO program and its MRA have in Korea. Research design, data and methodology: In this study we developed a model to verify the impact between utilization of AEO and trade-economic effects of the AEO and its MRA. After analyzing the validity and reliability of the model through Structural Equation Model we conducted a survey to request AEO companies to respond their experience on the effects of AEO program and MRA. As a result, 196 responses were received from 176 AEO companies and utilized in the analysis. Results: With regard to economic effects, the AEO program and the MRA have not been directly linked to financial performance, such as increased sales, increased export and import volumes, reduced management costs, and increased operating profit margins. However, it was analyzed that the positive effects of supply chain management were evident, such as strengthening self-security, monitoring and evaluating risks regularly, strengthening cooperation with trading companies, enhancing cargo tracking capabilities, and reducing the time required for export and import. Conclusions: When it comes to the trade-economic effects of AEO program and its MRA, AEO companies did not satisfy with direct effects, such as increased sales and volume of imports and exports, reduced logistics costs. However, non-economic effects, such as reduced time in customs clearance, freight tracking capability, enhanced security in supply chain are still appears to be big for them. In a rapidly changing trade environment the AEO and MRA are still useful. Therefore the government needs to encourage non-AEO companies to join the AEO program, expand MRA conclusion with AEO adopted countries especially developing ones and help AEO companies make good use of AEO and MRA.

SnSA Design and Embodiment for ESM of Small Scale Network (소규모 네트워크의 통합보안관제를 위한 SnSA 설계 및 구현)

  • 이동휘;신영준;김귀남
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.85-97
    • /
    • 2003
  • At the end of last January, 2003, a domestic top-level domain name server (DNS) shut down the server and it caused the wired and wireless internet services to be completely paralyzed in the aftermath of a virus attack incurring a various range of losses nationwide. The main reason of this event is the lack of our awareness of cyber security. In particular, in the small-scale network, there are few security administrators and no operating devices to protect information as well. Under this circumstance, using ESM center to service real-time security supervision and correspondence for network, it can be one option. However, due to the economic efficiency, most of security systems have been being developed focusing on the large-scale network first. Therefore, ESM centers which inspect security state of network concentrate on IDC or large-scale network services. This dissertation studies economical ESM service by designing exclusive SnSA for small-scale network for widespread use. Firstly, network invasion feeler function N_SnSA and host invasion feeler function H_SnSA are embodied to collect more informations in the small-scale network. Secondarily, the existing vulnerability is studied to find the solutions linked with a low cost to a Public center such as Kyonggi Univ ESM center.

  • PDF

Aerial Application using a Small RF Controlled Helicopter (IV) - CFD Simulation of Rotor Lift - (소형 무인헬기를 이용한 항공방제기술 (IV) -로터양력의 CFD시뮬레이션 -)

  • Seok T.S.;Koo Y.M.;Sohn C.H.
    • Journal of Biosystems Engineering
    • /
    • v.31 no.4 s.117
    • /
    • pp.342-348
    • /
    • 2006
  • Aerial application using an unmanned agricultural helicopter became necessary for both labor saving and timely spraying. In the previous paper, a rotor system was developed and lift capability was evaluated. The experimental results were compared with simulated predictions using the CFD-ACE program. From the simulation, the relative velocity on the top surface of the blade airfoil increased, resulting in the pressure drop. The CFD analyses were revealed that a drag resistance on the leading edge of the airfoil, a wake at the trailing edge, and a positive pressure underneath the bottom surface were observed. As the results of the simulation, total lifts of 56.8, 74.4 and $95.0kg_f$ were obtained at the 6, 8 and $10^{\circ}$ of AAT (angle of attack), respectively. The simulation results agreed reasonably up to $10^{\circ}$ of AAT. However, at a greater AAT $(<12^{\circ})$ the simulated total lift continuously increased to $105kg_f$, comparing with a decreasing experimental total lift due to the lack of engine power. At a stiff angle of $18^{\circ}$ AAT, a wake was observed at the trailing edge of the airfoil. A rated operating condition determined from the previous paper was also verified through the simulation.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

The Optimization Algorithm for Wall Bracing Supports of Tower Cranes (타워크레인의 횡지지 최적설계 알고리즘 개발)

  • Lee, Hyun-Min;Ho, Jong-Kwan;Kim, Sun-Kuk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.1
    • /
    • pp.130-141
    • /
    • 2010
  • Poor expertise in equipment operation and installation, coupled with unpredictable natural disaster, usually directly leads to disastrous accidents of large lifting equipment such as tower cranes. For example, 52 tower cranes fell down due to the unstable support in Korea at the attack of Typhoon "Maemi" in 2003, which damaged property and caused loss of life. In high-rise construction projects, top-slewing or luffing-jib tower cranes needs checking the stability of lateral-support in addition to the bottom support such as the foundation. In this study, the optimization algorithm for lateral-support of tower cranes is conducted, which is expected to enhance the structural stability of tower cranes and save the cost in conflict with the safety.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

Automatic Fire Extinguisher Having Flammable Pipes Inserted in a Cultural Assets Roof (가연성 파이프 시공에 의한 전통가옥지붕에 매설된 자동소화장치)

  • Cho, Taejun;Kim, Jae-Jun
    • The magazine of the Korean Society for Advanced Composite Structures
    • /
    • v.5 no.2
    • /
    • pp.26-31
    • /
    • 2014
  • This invention is purposed to provide an innovative solution for the inside of roof structures, which is cultural assets. The Asian old houses generally have several layered roofs on top of the structures. If a fire has started inside of the roof, it is hard to be extinguished before eliminating all the upper layers of the roof. This invention provides pre constructed embedded pipes, which is flammable and easy to be dissolved by the fire. The material of pipe is composed of rubbers, of which the combustion point is so low that the extinguishing of initial fire is possible without additional fire service. The inside of pipe is filled with halon gas. If the filled gas is consumed after ignited by fire, additional fire extinguishing water is supplied. If the flexible pipes are totally combusted by a big fire, the sprinkler at the end of inflexible pipe will work continuously, which is located between flexible and inflexible pipes. The extinguishing pipe network is suggested as dividing whole roof as multiple sections for a swift fire extinguishing in case of intentional or natural fire attack to our invaluable cultural assets.

  • PDF

Storm Surge Vulnerability Assessment due to Typhoon Attack on Coastal area in Korea (태풍 내습으로 인한 연안역 해일 취약성 평가)

  • Kang, Tae-Soon;Oh, Hyeong-Min;Lee, Hae-Mi;Eum, Ho-Sik
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.5
    • /
    • pp.608-616
    • /
    • 2015
  • In this study, we have estimated the storm surge heights using numerical modeling on coastal area, and then evaluated the vulnerability index by applying the vulnerability assessment techniques. Surge modelling for 27 typhoons affected from 2000 to 2014 were simulated by applying the ADCIRC model. The results of validation and verification was in significant agreement as compared with observations for the top 6 ranking typhoons affected. As results, the storm surge heights in Jinhae Bay, Sacheon Bay, Gwangyang Bay, Cheonsu Bay and Gyeonggi Bay were higher than other inner coastal areas, then storm surge vulnerability assessment was performed using a standardization, normalization and gradation of storm surge heights. According to results of storm surge vulnerability assessment, index of Jinhae Bay, Sacheon Bay, Gwangyang Bay etc. are estimated to be vulnerable(4~5) because of the characteristics of storm surge such as inner bay are vulnerable compared with exposed to the open sea areas. However, index in the inner bay of western Jeonnam are not vulnerable(1~3) relatively. It may not appear the typhoons affected significantly for the past 15 years. So, the long-term vulnerability assessment with the sensitivity of geomorphology are necessary to reduce the uncertainty.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

Surface Deterioration Diagnosis of Taejong Heonreung Sindobi Monument using Nondestructive Method (비파괴 기법을 이용한 태종 헌릉 신도비의 표면 훼손도 진단)

  • Lee, Myeong-seong;Park, Sung-mi;Chun, Yun-gun;Lee, Sun-myung;Lee, Jae-man
    • Korean Journal of Heritage: History & Science
    • /
    • v.46 no.4
    • /
    • pp.90-107
    • /
    • 2013
  • The Stone Monument of Taejong King in Heonreung Royal Tomb, Seoul was originally erected in 1424 to pay a tribute to Bang Won Lee's achievement who was named Taejong, the Third King of Joseon Dynasty. The monument has been damaged by Japanese Invasion of Korea in 1592 so that another monument was newly made and erected together with the original monument in 1695. The original monument was made of medium-grained biotite granite for the turtle base and medium-grained milky white crystalline limestone for the stele body and the top stone. The turtle base of the original monument is destroyed beyond the original shape and inscription due to irregular shaped breaking and a set of longitudinal crack. Analyzing the deterioration degree by using nondestructive methods, the 88 percentage of the front area and 38 percentage of the back area of the monument are damaged, and the lower part of the stele body is dominantly deteriorated especially due to the combination of discoloration and physical deterioration. The new monument in 1695 is also made of granite and limestone. The weathering indices of the turtle base and stele body stones by the calculation from ultrasonic velocity are 0.10 and 0.74, respectively. This is because the original monument is presumed to be degraded by heat shock and physical attack during the Japanese war, and the long-term outdoor exposure accelerated the weathering of the monument afterward without protective shelter.