• Title/Summary/Keyword: Leakage Prevention System

Search Result 123, Processing Time 0.024 seconds

A Trend Analysis and Technology Application of Defense Technology Protection (방위산업 기술보호 동향분석 및 기법적용)

  • Lee, Hyo Keun;Lee, Woon Soon;Oh, Yoo Jin;Park, ShinSuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.579-586
    • /
    • 2017
  • The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.

Design and Implementation of DB Protection System through Critical Query Signature (핵심 쿼리 결제를 통한 DB 보호 시스템 설계 및 구현)

  • Kim, Yang-Hoon;Kwon, Hyuk-Jun;Lee, Jae-Pil;Park, Chun-Oh;Kim, Jun-Woo;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.228-237
    • /
    • 2011
  • The risk of leakage or theft of critical data which is stored in database is increasing in accordance with evolution of information security paradigm. At the same time, needs for database security have been on the rapid increase due to endless leakage of massive personal information. The existing technology for prevention of internal information leakage possesses the technical limitation to achieve security goal completely, because the passive control method including a certain security policy, which allows the only authorized person to access to DBMS, may have a limitation. Hence in this study, we propose Query Signature System which signatures the queries accessing to the critical information by interrupting and passing them. Furthermore this system can apply a constant security policy to organization and protect database system aggressively by restricting critical query of database.

A Study on Dynamic Characteristics of EFPCD for Electrical Fire Prevention (전기화재 예방을 위한 EFPCD동작 특성에 관한 연구)

  • 이상호;오홍석
    • Fire Science and Engineering
    • /
    • v.16 no.3
    • /
    • pp.8-11
    • /
    • 2002
  • Recently, the spark and the overheat due to in the failure of pressure contacts on connecting points and the momentary short circuit have been the major causes of electrical fire because these may cause the deposition and the graphite of insulating materials in electrical wiring system. Also, because in these cases the current is a surge one, the losses and faults of a communication, a home appliances, a computer and a measuring instrument may occur. Especially, in such cases, we are very difficult to detect the failure of pressure contacts on connecting points and the momentary short circuit. In this paper, we have developed an auxiliary control device, the electrical fire prevention control device(EFPCD), of an earth leakage breaker(ELB). And we can pre-vent the electrical fire caused by the spark and the overheat occurring in the failure of pressure contacts in connecting points and the momentary short circuit with the EFPCD.

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis (로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석)

  • Hong, Jun Suk;Park, Won Hyung;Kim, Yanghoon;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

Design of Electronic ID System Satisfying Security Requirements of Authentication Certificate Using Fingerprint Recognition (지문 인식을 이용하여 공인인증서의 보안 요건을 만족하는 전자 신분증 시스템의 설계)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.610-616
    • /
    • 2015
  • In this paper, an electronic ID system satisfying security requirements of authentication certificate was designed using fingerprint recognition. The proposed electronic ID system generates a digital signature with forgery prevention, confidentiality, content integrity, and personal identification (=non-repudiation) using fingerprint information, and also encrypts, sends, and verify it. The proposed electronic ID system exploits fingerprint instead of user password, so it avoids leakage and hijacking. And it provides same legal force as conventional authentication certificate. The proposed electronic ID consists of 4 modules, i.e. HSM device, verification server, CA server, and RA client. Prototypes of all modules are designed and verified to have correct operation.

A Study on the Unbalanced Current Distribution of HTS Power Cable (초전도 전력케이블의 전류 불평형에 관한 연구)

  • Kim, Jae-Ho;Park, Chung-Hwa
    • Journal of the Korean Society of Safety
    • /
    • v.27 no.6
    • /
    • pp.43-47
    • /
    • 2012
  • The unbalance currents flow the High Temperature Superconducting (HTS) power cable caused by asymmetrical fault, harmonic distortion and unbalanced load. That problem causes additional loss and leakage field in the HTS power cable, and deteriorates the electric power quality and stability. In addition, large amounts of unbalanced current can cause negative sequence and ground relays to operate. This paper presents an analysis unbalanced three-phase current distribution in HTS power cable caused by unbalanced load condition and grounding methods using PSCAD/EMTDC. The results obtained through the analysis would provide important data for the design of HTS power cables and valid information for their installation in power system.

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.

The TRS Terminal for Wireless Remote Corrosion Monitoring System (무선 원격 부식모니터링용 TRS 단말기)

  • Ha, Tae-Hyeon;Bae, Jeong-Hyo;Lee, Hyeon-Gu;Ha, Yun-Cheol;Kim, Dae-Gyeong
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.544-547
    • /
    • 2003
  • The owner of water pipeline has a burden of responsibility for the protection of corrosion and the prevention against leakage of water. So, they have been installed a CP(Cathodic Protection) System in odor to protect corrosion. And they also have been measured and analyzed the data about P/S(Pipe to Soil) potential of water pipeline. The P/S potential is basic data of evaluation for water pipeline corrosion. They need remote automatic corrosion monitoring system for easy maintenance. In this paper, The communication method was studied mainly. And the specifications of proposed TRS (Truncked Radio System ) terminal for corrosion monitoring are introduced briefly.

  • PDF

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

Analysis on the Consciousness and Image Character of the Internet Shopping Mall Consumer (인터넷 쇼핑몰 이용자의 의식 및 이미지 특성 분석 - 대학생을 중심으로 -)

  • Lee, Jeong;Lee, Sang-Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.3
    • /
    • pp.87-97
    • /
    • 2005
  • This study deals with the analysis on the consciousness and image character of the internet shopping mall. As consciousness analysis result of internet shopping mall consumer, 'cheap price' and 'convenience' are evaluated high by reason that buy goods/service. 'Delivery delay' shows that deficiency of swiftness is indicated preferentially by shortcoming when the goods/service are purchased at the internet shopping mall. Consumer is prferring most 'deferred payment' with consumer's protection system of internet shopping mall. In image character of internet shopping mall, computer system speed and swiftness of reaction time, intimacy of shopping mall site design, delivery system trustability, goods/service contiguity, trustability of billing system, recognition shopping mall company, consistency about good service etc., showed high assessment, but comparative satisfaction is not high in solution at authoritativeness of personal information leakage prevention, problem occurrence.