• Title/Summary/Keyword: vulnerabilities

Search Result 1,017, Processing Time 0.027 seconds

Comparison on Patterns of Conflicts in the South China Sea and the East China Sea through Analysis on Mechanism of Chinese Gray Zone Strategy (중국의 회색지대전략 메커니즘 분석을 통한 남중국해 및 동중국해 분쟁 양상 비교: 시계열 데이터에 근거한 경험적 연구를 중심으로)

  • Cho, Yongsu
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.273-310
    • /
    • 2020
  • This study aims at empirically analyzing the overall mechanism of the "Gray Zone Strategy", which has begun to be used as one of Chinese major maritime security strategies in maritime conflicts surrounding the South China Sea and East China Sea since early 2010, and comparing the resulting conflict patterns in those reg ions. To this end, I made the following two hypotheses about Chinese gray zone strategy. The hypotheses that I have argued in this study are the first, "The marine gray zone strategy used by China shows different structures of implementation in the South China Sea and the East China Sea, which are major conflict areas.", the second, "Therefore, the patterns of disputes in the South China Sea and the East China Sea also show a difference." In order to examine this, I will classify Chinese gray zone strategy mechanisms multi-dimensionally in large order, 1) conflict trends and frequency of strategy execution, 2) types and strengths of strategy, 3) actors of strategy execution, and 4) response methods of counterparts. So, I tried to collect data related to this based on quantitative modeling to test these. After that, about 10 years of data pertaining to this topic were processed, and a research model was designed with a new categorization and operational definition of gray zone strategies. Based on this, I was able to successfully test all the hypotheses by successfully comparing the comprehensive mechanisms of the gray zone strategy used by China and the conflict patterns between the South China Sea and the East China Sea. In the conclusion, the verified results were rementioned with emphasizing the need to overcome the security vulnerabilities in East Asia that could be caused by China's marine gray zone strategy. This study, which has never been attempted so far, is of great significance in that it clarified the intrinsic structure in which China's gray zone strategy was implemented using empirical case studies, and the correlation between this and maritime conflict patterns was investigated.

  • PDF

The Interrelationship between Riparian Vegetation and Hydraulic Characteristics during the 2020 Summer Extreme Flood in the Seomjin-gang River, South Korea (2020 여름 섬진강 대홍수시 하안식생과 수리 특성의 상호관계)

  • Lee, Cheolho;Lee, Keonhak;Kim, Hwirae;Baek, Donghae;Kim, Won;Kim, Daehyun;Lee, Hyunjae;Woo, Hyoseop;Cho, Kang-Hyun
    • Ecology and Resilient Infrastructure
    • /
    • v.8 no.2
    • /
    • pp.79-87
    • /
    • 2021
  • Because active interactions occur among vegetation, hydrology, and geomorphology in riparian systems, any changes in one of these factors can significantly affect the other two. In this study, we evaluated these interactions at four sites (two in Gajeong and two in Hahan) along the Seomjin-gang River that was substantially devastated by an extreme flood in 2020. We examined the relationship between the riparian vegetation and the hydraulic characteristics of the flood using remote sensing, hydraulic modeling, and field surveys combined. The evaluation results showed that the floods caused a record-breaking rise of up to 43.1 m above sea level at the Yeseong-bridge stage gauge station (zero elevation 27.4 m) located between the Gajeong and Hahan sites, with the shear stress being four times higher in Hahan than in Gajeong. Additionally, the water level during the flood was estimated to be a maximum of 1 m higher depending on the location in the presence of riparian plants. Furthermore, both sites underwent extensive biological damage due to the flood, with 78-80% loss in vegetation, with preferential damage observed in large willow species, compared to Quercus acutissima. The above findings imply that all plant species exhibit different vulnerabilities towards extreme floods and do not induce similar behavior towards events causing a disturbance. In conclusion, we developed strategies for effectively managing riparian trees by minimizing flood hazards that could inevitably cause damage.

Priority Analysis of Cause Factors of Safety Valve Failure Mode Using Analytical Hierarchy Process (AHP를 활용한 안전밸브(PSV) 고장모드의 Cause Factors 우선순위 분석)

  • Kim, Myung Chul;Lee, Mi Jeong;Lee, Dong Geon;Baek, Jong-Bae
    • Korean Chemical Engineering Research
    • /
    • v.60 no.3
    • /
    • pp.347-355
    • /
    • 2022
  • The safety valve (PSV) is a safety device that automatically releases a spring when the pressure generated by various causes reaches the set pressure, and is restored to a normal state when the pressure falls below a certain level. Periodic inspection and monitoring of safety valves are essential so that they can operate normally in abnormal conditions such as pressure rise. However, as the current safety inspection is performed only at a set period, it is difficult to ensure the safety of normal operation. Therefore, evaluation items were developed by finding failure modes and causative factors of safety valves required for safety management. In addition, it is intended to provide decision-making information for securing safety by deriving the priority of items. To this end, a Delphi survey was conducted three times to derive evaluation factors that were judged to be important in relation to the Failure Mode Cause Factor (FMCFs) of the safety valve (PSV) targeting 15 experts. As a result, 6 failure modes of the safety valve and 22 evaluation factors of its sub-factors were selected. In order to analyze the priorities of the evaluation factors selected in this way, the hierarchical structure was schematized, and the hierarchical decision-making method (AHP) was applied to the priority calculation. As a result of the analysis, the failure mode priorities of FMCFs were 'Leakage' (0.226), 'Fail to open' (0.201), 'Fail to relieve req'd capacity' (0.152), 'Open above set pressure' (0.149), 'Spuriously' 'open' (0.146) and 'Stuck open' (0.127) were confirmed in the order. The lower priority of FMCFs is 'PSV component rupture' (0.109), 'Fail to PSV size calculation' (0.068), 'PSV Spring aging' (0.065), 'Erratic opening' (0.059), 'Damage caused by improper installation and handling' (0.058), 'Fail to spring' (0.053), etc. were checked in the order. It is expected that through efficient management of FMCFs that have been prioritized, it will be possible to identify vulnerabilities of safety valves and contribute to improving safety.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Cooperation Strategy in the Business Ecosystem and Its Healthiness: Case of Win - Win Growth of Samsung Electronics and Partnering Companies (기업생태계 상생전략과 기업건강성효과: 삼성전자와 협력업체의 상생경영사례를 중심으로)

  • Sung, Changyong;Kim, Ki-Chan;In, Sungyong
    • The Journal of Small Business Innovation
    • /
    • v.19 no.4
    • /
    • pp.19-39
    • /
    • 2016
  • With increasing adoption of smart products and complexity, companies have shifted their strategies from stand alone and competitive strategies to business ecosystem oriented and cooperative strategies. The win-win growth of business refers to corporate efforts undertaken by companies to pursue the healthiness of business between conglomerates and partnering companies such as suppliers for mutual prosperity and a long-term corporate soundness based on their business ecosystem and cooperative strategies. This study is designed to validate a theoretical proposition that the win-win growth strategy of Samsung Electronics and cooperative efforts among companies can create a healthy business ecosystem, based on results of case studies and surveys. In this study, a level of global market access of small and mid-sized companies is adopted as the key achievement index. The foreign market entry is considered as one of vulnerabilities in the ecosystem of small and mid-sized enterprises (SMEs). For SMEs, the global market access based on the research and development (R&D) has become the critical component in the process of transforming them into global small giants. The results of case studies and surveys are analyzed mainly based on a model of a virtuous cycle of Creativity, Opportunity, Productivity, and Proactivity (the COPP model) that features the characteristics of the healthiness of a business ecosystem. In the COPP model, a virtuous circle of profits made by the first three factors and Proactivity, which is the manifestation of entrepreneurship that proactively invests and reacts to the changing business environment of the future, enhances the healthiness of a given business ecosystem. With the application of the COPP model, this study finds major achievements of the win-win growth of Samsung Electronics as follows. First, Opportunity plays a role as a parameter in the relations of Creativity, Productivity, and creating profits. Namely, as companies export more (with more Opportunity), they are more likely to link their R&D efforts to Productivity and profitability. However, companies that do not export tend to fail to link their R&D investment to profitability. Second, this study finds that companies with huge investment on R&D for the future, which is the result of Proactivity, tend to hold a large number of patents (Creativity). And companies with significant numbers of patents tend to be large exporters as well (Opportunity), and companies with a large amount of exports tend to record high profitability (Productivity and profitability), and thus forms the virtuous cycle of the COPP model. In addition, to access global markets for sustainable growth, SMEs need to build and strengthen their competitiveness. This study concludes that companies with a high level of proactivity to invest for the future can create a virtuous circle of Creativity, Opportunity, Productivity, and Proactivity, thereby providing a strategic implication that SMEs should invest time and resources in forming such a virtuous cycle which is a sure way for the SMEs to grow into global small giants.

  • PDF

Dismantling and Restoration of the Celadon Stool Treasure with an Openwork Ring Design (보물 청자 투각고리문 의자의 해체 및 복원)

  • KWON, Ohyoung;LEE, Sunmyung;LEE, Jangjon;PARK, Younghwan
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.2
    • /
    • pp.200-211
    • /
    • 2022
  • The celadon stools with an openwork ring design which consist of four items as one collection were excavated from Gaeseong, Gyeonggi-do Province. The celadon stools were designated and managed as treasures due to their high arthistorical value in the form of demonstrating the excellence of celadon manufacturing techniques and the fanciful lifestyles during the Goryeo Dynasty. However, one of the items, which appeared to have been repaired and restored in the past, suffered a decline in aesthetic value due to the aging of the treatment materials and the lack of skill on the part of the conservator, raising the need for re-treatment as a result of structural instability. An examination of the conservation condition prior to conservation treatment found structural vulnerabilities because physical damage had been artificially inflicted throughout the area that was rendered defective at the time of manufacturing. The bonded surfaces for the cracked areas and detached fragments did not fit, and these areas and fragments had deteriorated because the adhesive trickled down onto the celadon surface or secondary contaminants, such as dust, were on the adhesive surface. The study identified the position, scope, and conditions of the bonded areas at the cracks UV rays and microscopy in order to investigate the condition of repair and restoration. By conducting Fourier-transform infrared spectroscopy(FT-IR) and portable x-ray fluorescence spectroscopy on the materials used for the former conservation treatment, the study confirmed the use of cellulose resins and epoxy resins as adhesives. Furthermore, the analysis revealed the addition of gypsum(CaSO4·2H2O) and bone meal(Ca10 (PO4)6(OH)2) to the adhesive to increase the bonding strength of some of the bonded areas that sustained force. Based on the results of the investigation, the conservation treatment for the artifact would focus on completely dismantling the existing bonded areas and then consolidating vulnerable areas through bonding and restoration. After removing and dismantling the prior adhesive used, the celadon stool was separated into 6 large fragments including the top and bottom, the curved legs, and some of the ring design. After dismantling, the remaining adhesive and contaminants were chemically and physically removed, and a steam cleaner was used to clean the fractured surfaces to increase the bonding efficacy of the re-bonding. The bonding of the artifact involved applying the adhesive differently depending on the bonding area and size. The cyanoacrylate resin Loctite 401 was used on the bonding area that held the positions of the fragments, while the acrylic resin Paraloid B-72 20%(in xylene) was treated on cross sections for reversibility in the areas that provided structural stability before bonding the fragments using the epoxy resin Epo-tek 301-2. For areas that would sustain force, as in the top and bottom, kaolin was added to Epo-tek 301-2 in order to reinforce the bonding strength. For the missing parts of the ring design where a continuous pattern could be assumed, a frame was made using SN-sheets, and the ring design was then modeled and restored by connecting the damaged cross section with Wood epos. Other restoration areas that occurred during bonding were treated by being filled with Wood epos for aesthetic and structural stabilization. Restored and filled areas were color-matched to avoid the feeling of disharmony from differences of texture in case of exhibitions in the future. The investigation and treatment process involving a variety of scientific technology was systematically documented so as to be utilized as basic data for the conservation and maintenance.