• Title/Summary/Keyword: 사전공격

Search Result 337, Processing Time 0.027 seconds

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

The clinical utility of K-CBCL 6-18 in diagnosing ADHD -focused on children with psychological disorders in child welfare institution- (ADHD 진단에서 K-CBCL 6-18의 임상적 유용성 -아동복지시설 심리장애 아동에의 적용-)

  • Kim, Sang A;Ha, Eun Hye
    • Journal of the Korean Society of Child Welfare
    • /
    • no.56
    • /
    • pp.253-281
    • /
    • 2016
  • The purpose of this study was to verify the clinical utility of th Korea Child Behavior Checklist 16-18(K-CBCL 6-18) in diagnosing ADHD among children with psychological disorders in child welfare institutions. The participants were 509 elementary school children(309 boys and 200 girls) who lived in child welfare institutions. They were assessed using the Korean ADHD Rating Scale(K-ARS) and K-CBCL 6-18. Only five scales of the K-CBCL 6-18 related with attention were used for analysis: syndrom total, externalizing total, aggressive behavior, attention problems and DSM-oriented ADHD scales. The results were as follows. First, K-ARS and K-CBCL 6-18 had significantly positive correlations with all five scales. Second, as a result of a t-test on the ADHD and the non-ADHD groups, which were divided using K-ARS, the mean scores of ADHD group were significantly higher than the non-ADHD group for all five scales of the K-CBCL 6-18. The hit rate of all five scales of the K-CBCL 6-18 was 60 to 70 percent. The syndrom total and externalizing total scales had high sensitivity, whereas the aggressive behavior, attention problems, and the DSM-oriented ADHD scales had high specificity. In addition, all scales had high positive predictive values. Third, as the result of a t-test on the ADHD group and the emotional disorder group, there were significant difference in the mean scores of the attention problems and the DSM-oriented ADHD scales. The attention problems and the DSM-oriented ADHD scales had a similar percentage of hit rate, high specificity and low sensitivity. Especially, the DSM-oriented ADHD scale revealed higher specificity than the attention problems scale. The results of this study suggested that the five scales related to attention of the K-CBCL 6-18 are useful in diagnosing ADHD in child welfare institutions.

Counter-terrorism Safety Measures in Public Facilities (다중이용시설의 대테러 안전대책)

  • Kim, Du-Hyun;Ahn, Kwang-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.37-64
    • /
    • 2010
  • Since the September 11, 2001, the motives and objectives of terrorism that have been targeted at hard targets such as key national facilities have now shifted towards soft targets such as subways, department stores, and tourist hotels; the attacks on these soft targets are steadily increasing. Simultaneous, unconventional, and indiscriminate terrorist attacks on civilians has also increased. In November, 2010, nearly forty states of the G20 and B20 (Business 20) will join in international summits to be hosted in Seoul. This coming July, an additional 350 troops will be deployed to Afghanistan for the sustainment of public security. Such events are sensitive topics, and there is the possibility of terrorist movement. Korea has successfully hosted various international events such as the APEC and ASEM Summits, and the 2002 Korea-Japan World Cup. The experiences from these events must be applied to ensure the safety of public facilities against the dangers of terrorism. First, counter-terrorism center must be established for the long-term, above the General Officer level to ensure the safety and efficiency of multilateral, international summits, as well as promoting policies and legislation aimed at preventing terrorism. Second, a terrorist threat management system must be secured and safety measures must be emphasized. Third, a fundamental structure must be established for the prevention of terrorism on public facilities, as well as legal and government action against the new threat of IED. Fourth, the police and fire fighting networks' must have a firm rapid response posture on the scene of an attack. Fifth, the state of mentality on the recognition of terrorist threats must be changed and restructured by promoting to and educating the population. Sixth, prevention measures must be established via research and academia. Seventh, for the guarantee of security in public facilities, safety management should employ cutting edge technology such as the 3D SICS and further develop and apply such technology. All methods and resources must be fully utilized for the establishment and strengthening terrorism prevention measures.

  • PDF

The Influence of Musical Activities on Social and Emotional Behavior of Infants (음악활동이 영아의 사회·정서적 행동에 미치는 영향 - 만 2세(25-36개월) 영아를 중심으로)

  • Nam, Ok Seon
    • Journal of Music and Human Behavior
    • /
    • v.4 no.2
    • /
    • pp.18-40
    • /
    • 2007
  • The purpose of this study was to verify the influence of musical activities on social and emotional behavior of infants, through providing musical activities to the infants who were cared in a nursery and observing the interactions between peer group, or a therapist and an infant derived during them. The subject is 24 infants who are under 2 years of age(25~36months) at two nurseries located in Bundang area, and 13 infants among them are randomly assigned as study group and 11 infants as control group. Pretest and posttest about social and emotional behavior are performed, and ITSEA developed by Brggs-Gowan and Carter(2001) and amended by Shin Ji Yeon(2004) was used as an evaluation tool. Infants' changes of interaction behaviors during musical play were also analyzed quantitatively and qualitatively, and for the analysis, infant's social play behavior examination tool developed by Holloway and Reichhart-Erickson(1988) was adopted. Based on time sampling method, each item of this tool was evaluated. Each session was performed for 15 minutes, and 60 times of analysis about interactions per session was conducted at every 15 seconds. The analysis result was showed with a table and a graph, and described qualitatively about behavior changes. When compared social and emotional positive behavior average figures and negative behavior average figures between study group and control group, this study showed that the positive behavior figure of study group was increased and the negative behavior figure was decreased. While concentration and empathy among positive behaviors increased meaningfully, aggression, defiance, separation anxiety and rejection to new things among negative activities also decreased meaningfully. The conclusion of this study is as follows. First, interactions with peers or a therapist based on music and musical experience make an effect on strengthening positive behavior among social and emotional behavior and decreasing negative behavior. Second, music has influence on negative behaviors more than positive behaviors of an infant, and produces a good effect on sub behaviors of negative behaviors specially.

  • PDF

DEVELOPMENT OF SCALE FOR MEASURING DELINQUENT BEHAVIOR (청소년 비행행동 측정도구 개발)

  • Kim, Hyun-Sil;Kim, Hun-Soo
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.11 no.1
    • /
    • pp.79-90
    • /
    • 2000
  • Objective:This study was performed in order to develop a measuring instrument for assessing and predicting delinquent behavior of the adolescents in Korea. Methods:This study was methodological research for developing a questionnaire for measuring delinquent behavior. Through the relevant literature review and personal interview using open-ended question with 12 adolescents in schools, outpatient basis and the juvenile corrective institutions, the author developed a pre-questionnaire with 31 items for assessing delinquent behavior among delinquentprone adolescents. Statistical method employed were test-retest reliability and Cronbach's alpha coefficient for testing reliability and factor analysis for testing validity of this questionnaire, and t-test for mean difference between student adolescents and delinquent adolescents, using SAS program. Subject served for this study consisted of 2,177 adolescents including 1,206 students and 971 delinquent adolescents by proportional stratified random sampling method. Results:1) Three stable factors were emerged and these contributed 52.2% of the variance in the total score. All 31 items loaded above .40 on each factor. 2) Factor I was named as antisocial delinquent behavior(17 items), factor II was named as aggressive delinquent behavior(8 items), and factor III was named as psychopathic delinquent behavior(6 items). 3) Comparison of these 3 factors between student adolescents and delinquent adolescents showed that there was a significant difference in factor Ⅰ(t=-42.91(student), -41.71(delinquent), p=.0001), factor II(t=-34.10(student), -35.72(delinquent), p=.0001), factor III(t=-14.24(student), -14.26 (delinquent), p=.0000), and total score(t=37.02(student), -36.38(delinquent), p=.0001). 4) Internal consistency reliability was tested by Cronbach's ${\alpha}$. Cronbach's ${\alpha}$ was .952 for total 31 items and .950, .866 and .721 for each 3 factors related to delinquent behavior. Conclusions:The author confirmed that this scale can use for measuring delinquent behavior, and hope to make a contribution to screening test and prevention of juvenile delinquency in Korea.

  • PDF

A Study on Responses of the Korean kidnapping Terror in overseas (한국인 해외인질납치테러 대응방안)

  • Jeong, Joon-Sik;Kim, Won-Ki
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.339-363
    • /
    • 2009
  • The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. No countries in the world have evaded being a target for terrorists today. As well as South Korea, the whole world must share attentions and responsibilities for fighting against the terrorism. Since the international terrorist groups have expanded their targets from Western countries to Koreans, civilian hostages are no longer other's affair; it became a serious threat to public. Increased Korean investment, trade, missionary, and travel overseas also expanded activity regions worldwide. It also result increased terrorist threats and possible abduction. The number of kidnapping crisis has increased since the terrorists use it as an effective method of sending a message. Piracy refers to a broad range of violent acts at sea, and has traditionally been regarded as common enemies. Piracy constitutes a great threat to the security of navigation as well as to the safety of vessels and crews. Lessons from hostage issues such as Korean hostage crisis in Somalia and Afghanistan show that it can cause criticism on moral issues if armed rescue missions fail or hostages are killed, so the governments and related corporations try to solve it by paying ransom. Terrorists and use these advantages in order to put a huge pressure on the governments. In this study we will look at essential characteristics and types of hostage abductions and recognition of national safety, lessons and solutions to previous Korean hostage cases in overseas. At the same time, it provides a guidelines of the direction in the fighting against terrorist groups and Piracy.

  • PDF

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF