• Title/Summary/Keyword: Access prevention

Search Result 373, Processing Time 0.026 seconds

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

Access to Anti-smoking Information among School Children and its Potential Impact on Preventing Smoking Initiation: Results from the Global Youth Tobacco Use Survey (GYTS) 2014 in Viet Nam

  • Hoang, Van Minh;Kim, Bao Giang;Phan, Thi Hai;Trinh, Dinh Hoang;Doan, Thu Huyen;Luong, Ngoc Khue;Nguyen, Thuy Linh;Nguyen, Tuan Lam;Pham, Thi Quynh Nga
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.sup1
    • /
    • pp.31-36
    • /
    • 2016
  • Scientific evidence on all aspects of smoking amongst youth is very important for designing appropriate interventions to reduce smoking among this vulnerable population. This paper describes current access to anti-smoking information among school children aged 13 to 15 years in Vietnam in 2014 and examines its potential impact on preventing smoking initiation. The data used in this paper were obtained from the 2014 Global Youth Tobacco Survey (GYTS) in Vietnam. Students were asked questions about their level of awareness of anti-smoking information from various sources in the past 30 days and about lessons in school regarding the dangers of tobacco use during the last 12 months. Those who have never smoked were asked "whether or not they thought about avoiding cigarettes because of health warnings on cigarette packages" and answers were analyzed in combination with data on access to anti-smoking information from other sources. The prevalence of exposure to antismoking campaigns was high among school children in Viet Nam: 55.3% of current smokers reported thoughts of smoking cessation because of health warnings on cigarette packages; 60.5% of never smokers avoided initiating smoking because of the same health warnings. The potential impact of graphic health warnings to prevent school-aged children from smoking initiation would be stronger if there was concurrent access to anti-smoking programs on the dangers of tobacco use in schools. However, school education for tobacco prevention and control has not been as strong as expected. A more comprehensive school curriculum on tobacco prevention and control is recommended to reinforce antismoking messages among school children.

Predefined Access Routes for Quick Response to Disaster Areas (방재경로 구축방안에 관한 연구 (지구단위 방재경로를 중심으로))

  • Jo, Yong-Chan;Lee, Chang-Ju;Sin, Seong-Il
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.6
    • /
    • pp.43-53
    • /
    • 2007
  • In this research, in order to more concretely define the concept of the previously vaguely defined fire road, the authors propose new terminology called disaster prevention routes. These are defined as predefined access routes for the quick response to disaster areas. For this, the authors suggest selection techniques for disaster prevention routes considering characteristics of fire trucks and selected areas. The paper also includes legally-based ideas for the executive departments with exclusive responsibility for continuous management and supervision of disaster response. In addition, a case study is performed with a virtual scenario including the outbreak of fire in one borough of Seoul. This case study shows that the damage can be decreased by prompt access of fire trucks. The establishment of predefined access routes to disaster areas can help to protect citizens with more rapid response by emergency crews. Indirect benefits also include reduced congestion of roads through the prohibition of parking and stopping on the chosen roads.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

A Study on the Analysis of Disaster Prevention Characteristics According to the Surrounding Environments of State-designated Cultural Properties in Gyeongsangnam-do and Gyeongsangbuk-do Provinces (경상남·북도 국가지정 중요목조문화재 주변 환경에 따른 방재특성 분석 연구)

  • Koo, Wonhoi;Baek, Minho
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • Purpose: This study intends to determine how disaster prevention characteristics of important state-designated wooden cultural properties in Gyeongsangnam-do vary according to the surrounding environments and to examine disaster prevention measures for wooden cultural properties that fit their surrounding environments accordingly. Method: The designation status and characteristics of cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do were identified, and the damage status of cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do was reviewed based on the history of disasters. Also, the disaster prevention environments for 58 state-designated wooden cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do were analyzed separately into mountainous area, rural area and urban area, topographic characteristics were drawn. Results: For cultural properties located in urban areas, it was found that security guards were arranged properly and disaster prevention training was carried out well. In addition, access condition to the cultural properties was adequate; prompt access to such properties was possible. In rural areas, flame retardant works have been undertaken properly and many cultural properties were found to be located on a flat ground. Mountainous areas had highly inadequate access condition to cultural properties and disasters occurred most frequently in these areas in the past. Conclution: First, for wooden cultural properties located in urban areas, it is necessary to secure the self-defense fire service manpower for an initial response and reinforce the disaster prevention education. Second, for wooden cultural properties located in rural areas, prevention projects such as insect control project and disaster prevention insurance should be carried out in order to protect the cultural properties. Third, as for wooden cultural properties located in mountainous areas, it is necessary to prepare establish to reinforce self-response capability.

악세스플로어(Access Floor)의 연소위험 소고

  • Lee, Deok-Jun;Jin, Yeong-Hwa
    • Fire Protection Technology
    • /
    • s.16
    • /
    • pp.24-27
    • /
    • 1994
  • This report is relevant to the fire-hazard implied in Access Floor being composed of combusti-ble materials. It emphasizes the importance of component materials and first-phased extinguishment for Ac-cess Floor with respect to fire-prevention.

  • PDF

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

Suicide Prevention Strategy by Restricting Access to Suicide Methods in Korea (한국에서 자살방법 접근 제한을 통한 자살예방전략)

  • Hong, Jin-Pyo;Park, Su-Bin;Choi, Soon-Ho;Lee, Soo-Jung;Park, Jong-Ik;Ha, Kyoo-Seob
    • Anxiety and mood
    • /
    • v.8 no.1
    • /
    • pp.41-49
    • /
    • 2012
  • Introduction : Suicide in Korea has increased to 31.2 persons per 100,000 population, the world's highest level. Suicide is the 10th leading cause of death in the world, but in Korea, it is 4th leading cause of death. Therefore suicide is a serious problem in Korea. Many suicide prevention strategies have been proposed. Despite efforts to prevent suicides in Korea, a steady increases in the number of suicides has been brought into question the effectiveness of suicide prevention activities in Korea. Methods : Strategy of restricting suicide methods in many countries was reviewed. Systematic approach to restrict suicidal methods in Korea is proposed. Results : Restricting suicide methods is one of the effective suicide prevention strategies employed in the UK and other countries. Since many suicides occur impulsively, suicide attempt lethality is an important factor in determining the rate of deaths in suicidal attempts. Physical restriction of suicide methods is important in preventing suicide, but restriction of cognitive access to information about suicide and suicide method is more important in preventing suicide. In particular hanging is one of the most common methods of suicides in Korea, it is crucial to develop strategies to prevent suicide by hanging cognitively. Also information about suicide should be properly controlled. To do this, suicide news reporting guidelines should be observed, and website makers whose websites provoke thoughts about suicide should be more strictly sanctioned. Conclusion : Restricting suicide methods along with other suicide prevention plans may be the most effective way to prevent suicide in Korea.

In Whom Do Cancer Survivors Trust Online and Offline?

  • Shahrokni, Armin;Mahmoudzadeh, Sanam;Lu, Bryan Tran
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.15
    • /
    • pp.6171-6176
    • /
    • 2014
  • Background: In order to design effective educational intervention for cancer survivors, it is necessary to identify most-trusted sources for health-related information and the amount of attention paid to each source. Objective: The objective of our study was to explore the sources of health information used by cancer survivors according to their access to the internet and levels of trust in and attention to those information sources. Materials and Methods: We analyzed sources of health information among cancer survivors using selected questions adapted from the 2012 Health Information National Trends Survey (HINTS). Results: Of 357 participants, 239 (67%) had internet access (online survivors) while 118 (33%) did not (offline survivors). Online survivors were younger (p<0.001), more educated (p<0.001), more non-Hispanic whites (p<0.001), had higher income (p<0.001), had more populated households (p<0.001) and better quality of life (p<0.001) compared to offline survivors. Prevalence of some disabilities was higher among offline survivors including serious difficulties with walking or climbing stairs (p<0.001), being blind or having severe visual impairment (p=0.001), problems with making decisions (p<0.001), doing errands alone (p=0.001) and dressing or bathing (p=0.001). After adjusting for socio-demographic status, cancer survivors who were non-Hispanic whites (OR= 3.49, p<0.01), younger (OR=4.10, p<0.01), more educated (OR= 2.29, p=0.02), with greater income (OR=4.43, p<0.01), and with very good to excellent quality of life (OR=2.60, p=0.01) had higher probability of having access to the internet, while those living in Midwest were less likely to have access (OR= 0.177, p<0.01). Doctors (95.5%) were the most and radio (27.8%) was the least trusted health related information source among all cancer survivors. Online survivors trusted internet much more compared to those without access (p<0.001) while offline cancer survivors trusted health-related information from religious groups and radio more than those with internet access (p<0.001 and p=0.008). Cancer survivors paid the most attention to health information on newsletters (63.8%) and internet (60.2%) and the least to radio (19.6%). More online survivors paid attention to internet than those without access (68.5% vs 39.1%, p<0.001) while more offline survivors paid attention to radio compared to those with access (26.8% vs 16.5%, p=0.03). Conclusions: Our findings emphasize the importance of improving the access and empowering the different sources of information. Considering that the internet and web technologies are continuing to develop, more attention should be paid to improve access to the internet, provide guidance and maintain the quality of accredited health information websites. Those without internet access should continue to receive health-related information via their most trusted sources.