• Title/Summary/Keyword: 탈취

Search Result 441, Processing Time 0.026 seconds

Industrial Security Crime's Realities and Counter-Measure (산업보안범죄의 실태 및 대응방안)

  • Seo, Bong Sung;Lim, You Seok
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.141-149
    • /
    • 2015
  • Modern society is to have an significant impact on the competitiveness of the country in which the economic value is very high occupancy and ensure a state-of-the-art science and technology. The country's core technology or industry security crimes going seized state-of-the-art technology firms can threat of damage to the country's economic security. In particular, the defense industry serious crime that is directly related to national security. The company's core technology and trade secrets leaked once the industrial countries must prevent security breaches and offenses of strict punishment measures because it is impossible to recover. Also, some advanced countries directly has been operating industrial security crime for the country's economy and national security. In recent years, Nation core technology infringement cases are rapidly increasing in the country. In addition, industrial security crime threat to national security. Therefore, the industry security crimes damage to the national security that infringe on the business secrets of core technologies and businesses. It is necessary to identify that industry security crime associated with the visibility of the broad scope of intellectual property protection.

A Study on the Domestic Model for Cyber Threat Information Sharing by Analyzing the Relevant Systems of Major Advacnced Countries (주요국의 사이버위협정보 공유체계 분석을 통한 국내 적용모델 연구)

  • Yoon, Oh Jun;Cho, Chang Seob;Park, Jeong Keun;Bae, Sun Ha;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.101-111
    • /
    • 2016
  • The recent cyber threats are becoming real threats to our lives. This gloomy situation from cyber threats necessarily demands the establishment of the cyber threat information sharing system between the public and private area. Key countries, like the US, Japan and the UK, are stabilizing the cyber threat information sharing systems by founding exclusive organizations for sharing information and setting up and implementing relevant measures. In this thesis, I would like to propose the model for cyber threat information sharing in order to cope efficiently with the ever-intensifying cyber threats. My model would include key elements for the efficient information sharing, such as the clear designation of main operator of information sharing system, the management of collaboration system between the public and private sector, the build-up of the integrated and automated system and the supplementation of legal system including the grant of privilege, and so on.

Degumming Effect on Vegetable oil of Degumming agent (각종 탈검제에 의한 식물성 기름의 탈검효과)

  • 김덕숙;안명수
    • Korean journal of food and cookery science
    • /
    • v.4 no.1
    • /
    • pp.27-32
    • /
    • 1988
  • The almost similar degumming effect was obtained by using oxalic acid instead of phosphoric acid, which also improves waste-water treatment. At this point, solution of Phosphoric, Acetic, Citric, Oxalic, and Nitric acid were used for degumming of rapeseed and soybean oil. Compared with Phosphoric(PA) and Oxalic acid(OA) were showed a simillar degumming effect in these vegetable oils. In rapeseed oil of 85% PA treating group and 5,10% OA fretting group, residual soap and phosphorus content in neutralized oil, color in bleached oil, and peroxide value and fatty acid content in deodrized oil were showed to simillar result. Soybean oil as well as rapeseed oil were showed to similar result. As a result, we could comfirmed substitutive possibility, which change PA into OA as a degumming agent. In the other hand, waste waters were obtained from 55% PA treating group and 10% OA treating group. Analytical result for this waste waters has showed a wide difference, especially in the BOD and COD. The amount of treating agents and time required in the precipitation seperation and chemical treatment each 3 and 1.7 times, which is PA treating group than OA treating group. We have investigated both the simillar degumming effect by OA solution and an alternative the pollution program means of a chemical treatment process is not possible.

  • PDF

A Mobile OS Integrity Verification Using Bootloader & Physically Independent Storage Device (부트로더와 물리적으로 독립된 저장장치를 이용한 모바일 운영체제 무결성 검증)

  • Park, Jae-Kyung;Lee, Sang-Hun;Kwon, Mi-Young;Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.123-132
    • /
    • 2014
  • In this paper, we study the verification techniques for OS integrity that can be more fatal than applications in case of security issues. The dissemination of smartphones is rapidly progressing and there are many similarities of smartphones and PCs in terms of security risks. Recently, in mobile network environment, there is a trend of increasing damages and now, there are active researches on a system that can comprehensively respond to this. As a way to prevent these risks, integrity checking method on operation system is being researched. As most integrity checking algorithms are classified by verification from the levels before booting the OS and at the time of passing on the control to the OS, in which, there are minor differences in the definitions of integrity checking or its methods. In this paper, we suggests the integrity verification technique of OS using a boot loader and a physically independent storing device in the mobile device.

Light Weight Authentication and Key Establishment Protocol for Underwater Acoustic Sensor Networks (수중 음파 센서 네트워크 환경에 적합한 경량화된 인증 및 키 발급 프로토콜)

  • Park, Minha;Kim, Yeog;Yi, Okyoen
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.360-369
    • /
    • 2014
  • Underwater Acoustic Sensor Networks(UASN) enables varied study from collected data of underwater environments such as pollution monitoring, disaster prevention. The collected data is transmitted from underwater to terrestrial communication entity by acoustic communication. Because of the constraints of underwater environments include low data rate and propagation delay, it is difficult to apply cryptographic techniques of terrestrial wireless communication to UASN. For this reason, if the cryptographic techniques are excluded, then collected data will be exposed to security threats, such as extortion and forgery, during transmission of data. So, the cryptographic techniques, such as the authentication and key establishment protocol which can confirm reliability of communication entities and help them share secret key for encryption of data, must need for protecting transmitted data against security threats. Thus, in this paper, we propose the light weight authentication and key establishment protocol.

Effect of Filter Aid Treatment on the Quality Characteristics of Salt-Fermented Anchovy Sauce (멸치액젓의 품질특성에 미치는 여과조제 처리의 효과)

  • JO Jin-Ho;DO Jeong-Ryong
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.32 no.6
    • /
    • pp.770-773
    • /
    • 1999
  • To obtain the basic data for the improvement of flayer and color in salt-fermented anchovy (Engraulis japonicus) sauce and for the inhibition of non-soluble precipitates formation during storage, experiments were carried out on the changes of chemical properties by treatment with 1, 3, 5 and $7\%$ (w/v) of active carbon and filter aids such as active clay, $Al_2O_3$ diatomaceous earth, and celite. Deceleration rate were $32\~33\%$ in case of $5\%$ (w/v) active carbon or $5\%$ (w/v) active clay treatments, but deodoration effect was not expected in all treatments. The inhibition rate of non-soluble precipitates formation in me of $5\%$ (w/v) active clay, diatomaceous earth and $Al_2O_3$ treatments. was shown as $82\%,\;73\%$, and $70\%$, respectively.

  • PDF

Thermo-Degradation Kinetics of Polyethylene (폴리에틸렌의 열분해 Kinetics)

  • Cha, Wang Seog
    • Applied Chemistry for Engineering
    • /
    • v.10 no.3
    • /
    • pp.432-437
    • /
    • 1999
  • Pyrolysis of polyethylene was carried out in the stainless steel reactor of internal volume of $10cm^3$. Pyrolysis reactions were performed at temperature $390{\sim}450^{\circ}C$ and the pyrolysis products were collected separately as reaction products and gas products. The molecular weight distributions(MWDs) of each product were determined by HPLC-GPC and GC analysis. Distribution balance equation for MWDs of random and specific products were proposed to account for initiation-termination and propagation-depropagation, such as hydrogen abstraction, chain cleavage, coupling of polymer and radical. A separate chain-end scission process produces low molecular weight noncondensable gases(C1 through C5) of average molecular weight 38. Activation energies of the random-chain scission and chain-end scission rate parameters, respectively, were determined to be 35, 17 kcal/mole.

  • PDF

A Study on Combined Processes of Sliding Arc Plasma and Corona Dielectric Barrier Discharge for Improve the Efficiency Treatment of Harmful Substance (슬라이딩아크 방전과 코로나 방전의 복합공정을 통한 유해물질 처리효율 개선에 관한 연구)

  • Kwon, Woo-Taeg;Lee, Woo-Sik
    • Fire Science and Engineering
    • /
    • v.28 no.6
    • /
    • pp.108-113
    • /
    • 2014
  • The combined process of Sliding Arc Plasma and corona dielectric barrier discharge process (CDBD) was used to efficiently improve harmful substance, which convert into OH radicals which have strong oxidation potential, and so have deodorization and sterilizing effects, by generating specific radicals and anion and then reacting with the moisture contained in harmful substance. As a result of experiment, even if the size of SAP reactor is reduced from 80 A to 50 A, there is no much change and therefore it is judged the size of reactor may be minimized. And it was confirmed that after the anion and ozone generated from CDBD rector react with harmful substance, a anion was reduced from 510,000 ppb to 470 ppb and ozone from 98 ppb to 22 ppb. It was also judged the stability and durability of plasma producer are excellent. Accordingly, it is considered the harmful substances which exist in indoor air quality will be efficiently improved and removed by using further plasma combined process through this study.

A Blockchain-based User Authentication Model Using MetaMask (메타마스크와 연동한 블록체인 기반 사용자 인증모델)

  • Choi, Nakhoon;Kim, Heeyoul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2019
  • This paper proposes a new authentication model to solve the problem of personal information takeover and personal information theft by service providers using centralized servers for user authentication and management of personal information. The centralization issue is resolved by providing user authentication and information storage space through a decentralize platform, blockchain, and ensuring confidentiality of information through user-specific symmetric key encryption. The proposed model was implemented using the public-blockchain Ethereum and the web-based wallet extension MetaMask, and users access the Ethereum main network through the MetaMask on their browser and store their encrypted personal information in the Smart Contract. In the future, users will provide their personal information to the service provider through their Ethereum Account for the use of the new service, which will provide user authentication and personal information without subscription or a new authentication process. Service providers can reduce the costs of storing personal information and separate authentication methods, and prevent problems caused by personal information leakage.

Generation and Management of Strong Passwords using an Ownership Verified Smartphone (소유권 확인된 스마트폰을 이용한 강력한 패스워드 생성 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.30-37
    • /
    • 2020
  • Enforcing additional authentication to password-based authentication, in addition to attempting to increase the security of the password itself, helps to improve the security of the password authentication scheme. For a well-known problem of using strong passwords that differ from site to site, we propose a scheme for password generation and management with an inherent supplementary authentication. Like the so-called password manager, the scheme retrieves and presents a strong site-specific password whenever requested without requiring the user to remember multiple passwords. Unlike the existing methods, however, the scheme permits the password retrieval process to proceed only through the authenticated user's ownership verified smartphone. Hence, even for sites not enforcing or supporting two-factor authentication, the logon process can benefit from the scheme's assurance of enhanced security with its two-factor equivalent authentication. The scheme can also prevent an attacker from impersonating a user or stealing secrets even when the stored information of the server for password retrieval service or the user's smartphone is leaked.