• Title/Summary/Keyword: Internal Leaks

Search Result 33, Processing Time 0.023 seconds

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.

Novel Endoscopic Stent for Anastomotic Leaks after Total Gastrectomy Using an Anchoring Thread and Fully Covering Thick Membrane: Prevention of Embedding and Migration

  • Jung, Gum Mo;Lee, Seung Hyun;Myung, Dae Seong;Lee, Wan Sik;Joo, Young Eun;Jung, Mi Ran;Ryu, Seong Yeob;Park, Young Kyu;Cho, Sung Bum
    • Journal of Gastric Cancer
    • /
    • v.18 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • Purpose: The endoscopic management of a fully covered self-expandable metal stent (SEMS) has been suggested for the primary treatment of patients with anastomotic leaks after total gastrectomy. Embedded stents due to tissue ingrowth and migration are the main obstacles in endoscopic stent management. Materials and Methods: The effectiveness and safety of endoscopic management were evaluated for anastomotic leaks when using a benign fully covered SEMS with an anchoring thread and thick silicone covering the membrane to prevent stent embedding and migration. We retrospectively reviewed the data of 14 consecutive patients with gastric cancer and anastomotic leaks after total gastrectomy treated from January 2009 to December 2016. Results: The technical success rate of endoscopic stent replacement was 100%, and the rate of complete leaks closure was 85.7% (n=12). The mean size of leaks was 13.1 mm (range, 3-30 mm). The time interval from operation to stent replacement was 10.7 days (range, 3-35 days) and the interval from stent replacement to extraction was 32.3 days (range, 18-49 days). The complication rate was 14.1%, and included a single jejunal ulcer and delayed stricture at the site of leakage. No embedded stent or migration occurred. Two patients died due to progression of pneumonia and septic shock 2 weeks after stent replacement. Conclusions: A benign fully covered SEMS with an anchoring thread and thick membrane is an effective and safe stent in patients with anastomotic leaks after total gastrectomy. The novelty of this stent is that it provides complete prevention of stent migration and embedding, compared with conventional fully covered SEMS.

Assessment of Internal Leak on RCS Pressure Boundary Valves (원자로냉각재계통 압력경계밸브 내부누설 평가)

  • Park, Jun-Hyun;Moonn, Ho-Rim;Jeong, Ill-Seok
    • Proceedings of the KSME Conference
    • /
    • 2001.06a
    • /
    • pp.322-327
    • /
    • 2001
  • The internal leaks of RCS pressure boundary valves may cause thermal fatigue crack because of the TASCS in RCS branch line. After experienced unisolable piping failures in several PWR plants, many studies have peformed to understand these phenomena and various methods were applied to ensure the structural integrity of piping. In this paper, the cause of unisolable piping failures and the alternatives to prevent recurrence of failure were reviewed. Also, the severity of piping failure including susceptibility of valve leaks was evaluated for the Westinghouse 2-loop plant. The length of turbulent penetration on RHR inlet piping was measured and, thermal fluid analysis and fatigue analysis was performed for this piping. As a means of ensuring the structural integrity, temperature monitoring and specialized UT and other alternatives were compared for the further application.

  • PDF

A Study on Insider Behavior Scoring System to Prevent Data Leaks

  • Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.77-86
    • /
    • 2015
  • The organization shall minimize business risks associated with customer information leaks. Enhance information security activities through voluntary pre-check and must find a way to detect the personal information leakage caused by carelessness and neglect accident. Recently, many companies have introduced an information leakage prevention solution. However, there is a possibility of internal data leakage by the internal user who has permission to access the data. By this thread it is necessary to have the environment to analyze the habit and activity of the internal user. In this study, we use the SFI analytical technique that applies RFM model to evaluate the insider activity levels were carried out case studies is applied to the actual business.

A Study on Industrial Technology Leakage and Effective Industrial Security Measures through analysis of domestic portal article data (국내 포털 기사자료 분석을 통한 산업기술유출 사례와 산업보안 강화 방안 연구)

  • Yang, Hyun Jung;Lee, Chang Moo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.3-13
    • /
    • 2017
  • In the knowledge-information society, many domestic companies put lots of investment in technical development to possess core technologies and intellectual property. However, in the results of passive investment in security to protect their technologies compared to the active investment in technical development, the technology leaks from many companies and research institutes are rapidly increasing. Such increase of technology leaks not only causes damage to companies, but also has harmful effects on national economy directly and indirectly. Even though it has been perceived that a lot of industrial technology leak crimes are committed by former/current workers of small and medium-sized businesses, it is hard to find researches that mainly compare and analyze them. Therefore, this study aimed to understand the actual status of industrial technology leaks by analyzing cases of industrial technology leaks from 2014 to 2016 based on the type of victimized companies, corporate internal leakers' positions, matter of complicity, tools used for technology leaks, and motivation for technology leaks. Through the analysis in each type, the patterns and characteristics of industrial technology leaks were researched, and also the exploratory research on industrial security for the prevention of industrial technology leaks was conducted.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

A Study on The Leak of Core Business Technologies Using Preventative Security Methods Such as Clustering (군집화를 이용한 기업 핵심기술 유출자 분류에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.23-28
    • /
    • 2010
  • Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and invesment companies. This shows that the source of the leaks are internal personnel. In this manner, we can infer that the management and plan of personnel security has not implemented sound practices to prevent technology leak by people. Therefore, this thesis suggests classifying methods of technology leak through clustering, one of the data mining methods about the information of internal personnel to prevent core technology leak from businesses.

Endoscopic Intervention for Anastomotic Leakage After Gastrectomy

  • Ji Yoon Kim;Hyunsoo Chung
    • Journal of Gastric Cancer
    • /
    • v.24 no.1
    • /
    • pp.108-121
    • /
    • 2024
  • Anastomotic leaks and fistulas are significant complications of gastric surgery that potentially lead to increased postoperative morbidity and mortality. Surgical intervention is reserved for cases with severe symptoms or hemodynamic instability; however, surgery carries a higher risk of complications. With advancements in endoscopic treatment options, endoscopic approaches have emerged as the primary choice for managing these complications. Endoscopic clipping is a traditional method comprising 2 main categories: through-the-scope clips and over-the-scope clips. Through-the-scope clips are user friendly and adaptable to various clinical scenarios, whereas over-the-scope clips can close larger defects. Another promising approach is endoscopic stent insertion, which has shown a high success rate for leak closure, although vigilant monitoring is required to monitor stent migration. Infection control is essential in post-surgical leakage cases, and endoscopic internal drainage provides a relatively safe and noninvasive means to manage fluids, contributing to infection control and wound healing promotion. Endoscopic suturing offers full-thickness wound closure, but requires additional training and endoscopic versatility. As a promising tool, endoscopic vacuum therapy potentially surpasses stent therapy by draining inflammatory materials and closing defects. Furthermore, the use of tissue sealants, such as fibrin glue and cyanoacrylate, has been reported to be effective in selected situations. The choice of endoscopic device should be tailored to individual cases and specific patient conditions, with careful consideration of the nature of the defect. Further extensive studies involving larger patient populations are required to provide more robust evidence on the efficacy of endoscopic approach in managing post-gastric anastomotic leaks.

Cooling Test of The HTS Power Cable (초전도케이블 냉각시험)

  • 염한길;고득용;홍용주;김익생;김춘동;김도형
    • Proceedings of the Korea Institute of Applied Superconductivity and Cryogenics Conference
    • /
    • 2003.02a
    • /
    • pp.295-297
    • /
    • 2003
  • Cryogenic systems is requirement for the operation of HTS power cables. In general, HTS power cables require temperature below 77K, a temperature that can be achieved from the liquid nitrogen or sub-cooled LN2. HTS power cable is needed for sufficient refrigeration to overcome its low temperature heat loading. This loading typically comes in two forms : (1) heat leaks from the surroundings and (2) internal heat generation. This paper is a explanation for the cooling test of 10m HTS power cable.

  • PDF

Privacy Leakage Monitoring System Design for Privacy Protection (개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계)

  • Cho, Sung-Kyu;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.99-106
    • /
    • 2012
  • Numerous private corporations and public institutions are collecting personal information through the diverse methods for the purpose of sales, promotion and civil services, and using personal information for the profits of the organizations and services. However, due to immaturity of the technical, managerial measures and internal control for the collected personal information, the misuse, abuse and the leaks of personal information are emerged as major social issues, and the government also is promoting implementation of the act on the privacy protection by recognizing the importance of the personal information protection. This research describes on the measures to detect the anomaly by analyzing personal information treatment patterns managed by the organizations, and on the measures to coup with the leaks, misuse, and abuse of personal information. Particularly, this research is intended to suggest privacy leakage monitoring system design, which can be managed by making the elements related to personal information leaks to numeric core risk indexes to be measured objectively.