• Title/Summary/Keyword: Cyber Target

Search Result 162, Processing Time 0.025 seconds

The Proposal of Installations Standards for Commercial Kitchen Automatic Fire System (상업용 주방자동소화장치 도입과 설치기준 제안)

  • Lee, Changwoo;Kang, Dowoo;Oh, Seungju;Ham, Eungu;Cho, Yongsun
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2016
  • According to the statistics released by Ministry of Public Safety and Security, the number of restaurant fires in Korea reached around 2,400 and 169 damages of human life and damages to property was approximately over $8.8 billion for recent 3 years. It could be desirable having automatic commercial fire-extinguishing equipment at commercial facilities excluding housing facilities for the safety, applying at the place first where it has been more risky and expected fire can be occurred relatively because economical burden can be accelerated. In order to do this, adjust its level to meet the same level of the kitchen for 'Specific Target for Fire Fighting' that "gas leak alarm" has be equipped relevant regulations and it is considered and reasonable to expand the limit of application gradually.

Comparative Study on Legal System on Cybersecurity Stages in South Korea and the United States (한국과 미국의 사이버보안 단계별 법제도 비교 연구)

  • Park, Sangdon;Kim, Injung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.33-40
    • /
    • 2012
  • Existing comparative studies on legal system of cyber security just listed and introduced several laws of Korea and other countries and presented comprehensive comparison. These studies makes it difficult to know that which part of the cyber security activities has insufficient legal system from a practical standpoint because it is not easy to figure out. So cybersecurity stages are chosen as comparison criteria. And the legal system of United States are chosen as the target comparing one of South Korea. Then the legal system on cybersecurity stages in South Korea is compared with one of United States. Therethrough many problems of the legal system of South Korea is identified, for example, the absence of regulations, the lack of clarity, lack of effectiveness, and overlapping regulations, in prevention, detection, response, the recovery in cyber security. And many ways are suggested to improve the legal system for the resolution of such problems.

Practical Implementation of Patient-Specific Quality Assurance for Small and Multiple Brain Tumors in CyberKnife with Fixed Collimators

  • Lee, Eungman;Park, Kwangwoo;Kim, Jin Sung;Kim, Yong Bae;Lee, Ho
    • Progress in Medical Physics
    • /
    • v.29 no.2
    • /
    • pp.53-58
    • /
    • 2018
  • This paper evaluates patient-specific quality assurance (PSQA) in the treatment of small and multiple tumors by the CyberKnife system with fixed collimators, using an ion chamber and EBT3 films. We selected 49 patients with single or multiple brain tumors, and the treatment plans include one to four targets with total volumes ranging from 0.12 cc to 3.74 cc. All PSQA deliveries were performed with a stereotactic dose verification phantom. The A16 microchamber (Standard Imaging, WI, USA) and Gafchromic EBT3 film (Ashland ISP Advanced Materials, NJ, USA) were inserted into the phantom to measure the point dose of the target and the dose distribution, respectively. The film was scanned 1 hr after irradiation by a film digitizer scanner and analyzed using RIT software (Radiological Imaging Technology, CO, USA). The acceptance criteria was <5% for the point dose measurement and >90% gamma passing rate using 3%/3 mm and relative dose difference, respectively. The point dose errors between the calculated and measured dose by the ion chamber were in the range of -17.5% to 8.03%. The mean point dose differences for 5 mm, 7.5 mm, and 10 mm fixed cone size was -11.1%, -4.1%, and -1.5%, respectively. The mean gamma passing rates for all cases was 96.1%. Although the maximum dose distribution of multiple targets was not shown in the film, gamma distribution showed that dose verification for multiple tumors can be performed. The use of the microchamber and EBT3 film made it possible to verify the dosimetric and mechanical accuracy of small and multiple targets. In particular, the correction factors should be applied to small fixed collimators less than 10 mm.

Cyber impact on education and job satisfaction -Certificate holders in the center of- (사이버 교육이 직무만족도에 미치는 영향 -자격증 취득자 중심으로-)

  • Chung, Yong-Geol;Lim, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.159-165
    • /
    • 2012
  • In this paper, the qualification process to target trainees of 200 questionnaires collected 158 call was using the SPSS 18.0 statistical program was statistical results are as follows. First, the demographic characteristics of 158 people a total of 146 people men (92.4%) were 30 and 40 adults. Second, according to gender for women than men showed high satisfaction of sayibeogang. More than a college education group showed a high level of satisfaction. Depending on the marital satisfaction of married people was higher sayibeogang. In addition, cyber-lecture on satisfaction surveys women, highly educated, married, educated in the group were satisfied. 74.5% of total variance, variance, with 88.7 percent reliability was very high reliability. Thus, students' demographic variables, motivation, learning to fit in the field of instructional design and content to support the various efforts will be.

Study on validity verification of Korean version of DELES and its relationship with perceived learning achievement and cyber education satisfaction (한국판 원격교육학습환경척도의 타당도 검증과 지각된 학업성취도 및 사이버교육만족도와의 관계 연구)

  • Kim, Jungjoo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.1
    • /
    • pp.63-72
    • /
    • 2013
  • This study it to verify the validity of Korean version of DELES (distance education learning environment survey) and analyze its relationship with learning achievement and distance education satisfaction. The target population of this study is students of K cyber university and a total of 254 cases are used for the analysis. Exploratory and confirmatory factor analysis is applied to verify 6 factors of DELES and structural equation analysis is applied to examine the relationship between distance education learning environment and learning achievement and distance education satisfaction. The study result shows that DELES is composed of six factors such as instructor support, student interaction & collaboration, personal relevance, authentic learning, active learning and student autonomy and its model fits are appropriate. The result of structural equation analysis shows distance education learning environment significantly influences distance education satisfaction directly as well as indirectly mediated by learning achievement. Learning achievement also significantly influences distance education satisfaction. Conclusions and implications are followed.

A Study on Prediction of Mass SQL Injection Worm Propagation Using The Markov Chain (마코브 체인을 이용한 Mass SQL Injection 웜 확산 예측에 관한 연구)

  • Park, Won-Hyung;Kim, Young-Jin;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.173-181
    • /
    • 2008
  • Recently, Worm epidemic models have been developed in response to the cyber threats posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical model techniques such as Epidemic(SI), KM (Kermack-MeKendrick), Two-Factor and AAWP(Analytical Active Worm Propagation). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the network such as CodeRed worm and it was able to be applied to the specified threats. Therefore, we propose the probabilistic of worm propagation based on the Markov Chain, which can be applied to cyber threats such as Mass SQL Injection worm. Using the proposed method in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

  • PDF

Skin Dose Comparison of CyberKnife and Helical Tomotherapy for Head-and-Neck Stereotactic Body Radiotherapy

  • Yoon, Jeongmin;Park, Kwangwoo;Kim, Jin Sung;Kim, Yong Bae;Lee, Ho
    • Progress in Medical Physics
    • /
    • v.30 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Purpose: This study conducts a comparative evaluation of the skin dose in CyberKnife (CK) and Helical Tomotherapy (HT) to predict the accurate dose of radiation and minimize skin burns in head-and-neck stereotactic body radiotherapy. Materials and Methods: Arbitrarily-defined planning target volume (PTV) close to the skin was drawn on the planning computed tomography acquired from a head-and-neck phantom with 19 optically stimulated luminescent dosimeters (OSLDs) attached to the surface (3 OSLDs were positioned at the skin close to PTV and 16 OSLDs were near sideburns and forehead, away from PTV). The calculation doses were obtained from the MultiPlan 5.1.2 treatment planning system using raytracing (RT), finite size pencil beam (FSPB), and Monte Carlo (MC) algorithms for CK. For HT, the skin dose was estimated via convolution superposition (CS) algorithm from the Tomotherapy planning station 5.0.2.5. The prescribed dose was 8 Gy for 95% coverage of the PTV. Results and Conclusions: The mean differences between calculation and measurement values were $-1.2{\pm}3.1%$, $2.5{\pm}7.9%$, $-2.8{\pm}3.8%$, $-6.6{\pm}8.8%$, and $-1.4{\pm}1.8%$ in CS, RT, RT with contour correction (CC), FSPB, and MC, respectively. FSPB showed a dose error comparable to RT. CS and RT with CC led to a small error as compared to FSPB and RT. Considering OSLDs close to PTV, MC minimized the uncertainty of skin dose as compared to other algorithms.

Cyberattack Goal Classification Based on MITRE ATT&CK: CIA Labeling (MITRE ATT&CK 기반 사이버 공격 목표 분류 : CIA 라벨링)

  • Shin, Chan Ho;Choi, Chang-hee
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.15-26
    • /
    • 2022
  • Various subjects are carrying out cyberattacks using a variety of tactics and techniques. Additionally, cyberattacks for political and economic purposes are also being carried out by groups which is sponsored by its nation. To deal with cyberattacks, researchers used to classify the malware family and the subjects of the attack based on malware signature. Unfortunately, attackers can easily masquerade as other group. Also, as the attack varies with subject, techniques, and purpose, it is more effective for defenders to identify the attacker's purpose and goal to respond appropriately. The essential goal of cyberattacks is to threaten the information security of the target assets. Information security is achieved by preserving the confidentiality, integrity, and availability of the assets. In this paper, we relabel the attacker's goal based on MITRE ATT&CK® in the point of CIA triad as well as classifying cyber security reports to verify the labeling method. Experimental results show that the model classified the proposed CIA label with at most 80% probability.

A study on the psychosocial variables of the youth's addiction to internet and cyber sex and their problematic behavior (청소년의 인터넷 중독 및 사이버 성중독의 심리사회적 변인과 문제행동 연구)

  • Nam, Young-Ok
    • Korean Journal of Social Welfare
    • /
    • v.50
    • /
    • pp.173-207
    • /
    • 2002
  • The purpose of the study is to examine the impact of the youth's addiction to Internet and what behavior do they show depending on the extent of addiction, and further to analyze the reason of cyber sex addiction and the addiction level. The results are as following; First, 2% of the target students of the study was in severe internet addiction and 47% in the 'early addiction' which is in the risk of addiction. Second, the larger the youth's depression and impulsiveness was, the lower their self-esteem was, the poorer their parents' bringing-up attitude was, and the lower their satisfaction to school life was, the more deep they are addicted to internet. Third, the problem behavior due to Internet addiction were categorized into seven area of trouble; family, social, physical, psychological, public relation, cyber sex, and school life. It showed that 'heavily addicted group' had the most severe problems. Forth, as to the extent of cyber sex addiction, 0.7% of the youth was in severe 'heavy addiction' and about 7% was in the 'early addiction' which is in the range of addiction risk. Fifth, the higher the youth's personal depression and impulsiveness was, the lower their self-esteem was, the poorer their parents' couple relation and bringing-up attitude were, and the worse their relation with peers and teachers was, they got indulged into cyber addiction.

  • PDF

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.