• Title/Summary/Keyword: Leakage information

Search Result 1,513, Processing Time 0.026 seconds

The probable use of UAV(Unmanned Aerial Vehicle) in crime, cybercrime, and terrorism and responses (무인기 개발과 범죄, 사이버 범죄, 테러 활용 가능성과 대응방안)

  • Joh, Hyeon-Jin;Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.189-216
    • /
    • 2016
  • In March 2015, the North Korean UAVs (Unmanned Aerial Vehicles) were found and countries around the world have actively developed UAVs. UAVs or Drone have become commercialized and more civilians use UAVs for leisure. The positive possibilities of UAV use expand. However, there could be the negative sides of UAV use. The UAVs could be used for the purpose of various crime, cybercrime, and terrorism. For instance, hacking devices attached drone could be infiltrated into the sensitive networks to steal personal informations and public data. This could be a new dimension of cybercrime. As the number of internet users and cyberspace rapidly expands, problems of crimes could be worsened both quantitatively and qualitatively. By contrast, defensive measures against such threats are limited. Especially, the Korean society is vulnerable despite its well-advanced internet and computer network technology. This article investigates the current UAV types and its developments, discusses various possibilites of UAV-related crime, cybercrime, and terrorism, and proposes responses.

  • PDF

A Study on the Adsorption Characteristics of Phenol in the presence of Humic Acid Using Activated Carbon Fiber (섬유상활성탄소를 이용한 Humic Acid 공존시 페놀의 흡착특성에 관한 연구)

  • Tak, Seong-Jae;Seo, Seong-Wen;Kim, Seong-Sun;Kim, Jin-Man
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.14 no.1
    • /
    • pp.54-61
    • /
    • 2000
  • Recently, our circumstances are threatened by an accident that leakage of under ground storage tank and illegal dumping of synthetic organic compounds at chemical plants and many treatment methods, Activated carbon adsorption, Ozonization, Membrane filtration and Photocatalystic oxidation, are developed to remove such a synthetic organic compounds. And it has reported that Activated carbon adsorption have a great removal efficiency to nondegradable matters and organic compounds which have a high molecular weight. Comparing with other adsorbents, Activated carbon adsorption have a worse efficiency when ad desorption speed is low. Thus improved type of adsorbents was invented and one of those is Activated Carbon Filter. The purpose of this study was getting information about adsorption characteristic phenol which can be applied Activated Carbon Fiber and Granular Activated Carbon. In detail, With comparing removal characteristics of phenol in the presence Humic Acid using Activated Carbon Fiber(ACF) and Granular Activated. Carbon(GAC), it is to certify an effective application of Activated Carbon Fiber. At the range of this study, Batch test, Isotherm adsorption test and Factorial analysis, following conclusion were obtained from the results of this study. Batch test was carried to know time of adsorption equilibrium. In this study about time of adsorption equilibrium by ACF was faster than GAC's, for developed micropore of ACF. From the result of phenol adsorption test, High removal rate of adsorption is shown at pH 5. The result of lsotherm adsorption test, it has represented that the Freundlich's isotherm is most suitable one in others, that a ACF's adsorption capacity is more excellent than GAC's. Adsorption of phenol exiting humic acid is decreased getting raised humic acid concentration. Since ACF's micropore is developed at this time, an effect of high molecular humic acid is lower. Factorial analysis was carried to know about Main effect which was injection dosage of adsorbent in the range of this study.

  • PDF

Novel Ni-Silicide Structure Utilizing Cobalt Interlayer and TiN Capping Layer and its Application to Nano-CMOS (Cobalt Interlayer 와 TiN capping를 갖는 새로운 구조의 Ni-Silicide 및 Nano CMOS에의 응용)

  • 오순영;윤장근;박영호;황빈봉;지희환;왕진석;이희덕
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.12
    • /
    • pp.1-9
    • /
    • 2003
  • In this paper, a novel Ni silicide technology with Cobalt interlayer and Titanium Nitride(TiN) capping layer for sub 100 nm CMOS technologies is presented, and the device parameters are characterized. The thermal stability of hi silicide is improved a lot by applying co-interlayer at Ni/Si interface. TiN capping layer is also applied to prevent the abnormal oxidation of NiSi and to provide a smooth silicidc interface. The proposed NiSi structure showed almost same electrical properties such as little variation of sheet resistance, leakage current and drive current even after the post silicidation furnace annealing at $700^{\circ}C$ for 30 min. Therefore, it is confirmed that high thermal robust Ni silicide for the nano CMOS device is achieved by newly proposed Co/Ni/TiN structure.

Fabrication and Electrical Properties of Local Damascene FinFET Cell Array in Sub-60nm Feature Sized DRAM

  • Kim, Yong-Sung;Shin, Soo-Ho;Han, Sung-Hee;Yang, Seung-Chul;Sung, Joon-Ho;Lee, Dong-Jun;Lee, Jin-Woo;Chung, Tae-Young
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.6 no.2
    • /
    • pp.61-67
    • /
    • 2006
  • We fabricate local damascene FinFET cell array in sub-60nm feature sized DRAM. The local damascene structure can remove passing-gate-effects in FinFET cell array. p+ boron in-situ doped polysilicon is chosen for the gate material, and we obtain a uniform distribution of threshold voltages at around 0.7V. Sub-threshold swing of 75mV/d and extrapolated off-state leakage current of 0.03fA are obtained, which are much suppressed values against those of recessed channel array transistors. We also obtain a few times higher on-state current. Based on the improved on- and off-state current characteristics, we expect that the FinFET cell array could be a new mainstream structure in sub-60nm DRAM devices, satisfying high density, low power, and high-speed device requirements.

Crack Propagation in Earth Embankment Subjected to Fault Movement (단층 운동시 댐 파괴 거동 해석)

  • 손익준
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 1988.06c
    • /
    • pp.3-67
    • /
    • 1988
  • Model studies on the response of homgeneous earth embankment dams subjected to strike-slip fault movement have been penomed via centrifuge and finite element analysis. The centrifuge model tests have shown that crack development in earth embankment experiences two major patters: shear failure deep inside the embankment and tension failure near the surface. The shear rupture zone develops from the base level and propagates upward continuously in the transverse direction but allows no open leakage chnnel. The open tensile cracks develop near the surface of the embankment, but they disappear deep in the embankment. The functional relationship has been developed based on the results of the centrifuge model tests incorporating tile variables of amount of fault movement, embankment geometry, and crack propagation extent in earth des. This set of information can be used as a guide line to evaluate a "transient" safety of the duaged embankment subjected to strike-slip fault movement. The finite element analysis has supplemented the additional expluations on crack development behavior identified from the results of the centrifuge model tests. The bounding surface time-independent plasticity soil model was employed in the numerical analysis. Due to the assumption of continuum in the current version of the 3-D FEM code, the prediction of the soil structure response beyond the failure condition was not quantitatively accurate. However, the fundamental mechanism of crack development was qualitatively evaluated based on the stress analysis for the deformed soil elements of the damaged earth embankment. The tensile failure zone is identified when the minor principal stress of the deformed soil elements less than zero. The shear failure zone is identified when the stress state of the deformed soil elements is at the point where the critical state line intersects the bounding surface.g surface.

  • PDF

A study on Activation Measures of Local Mobile Easy-to-use Payment (국내 모바일 간편결제 활성화 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.73-82
    • /
    • 2015
  • Thanks to popularization of smart phone, mobile payment market is growing rapidly. As the obligatory use of digital certificate is abolished, easy-to-use payment that can settle with only password is being launched one after another. But its spreading speed is not fast highly. Because of concern about personal information leakage and security, unchangeability of payment habit, insufficiency of consumer protection, inadequacy of payment infrastructure and all sorts of regulations, easy-to-use payment is not activated. Recently global IT companys are entering mobile payment market competitively. It is because the sense of crisis that their survival can be dangerous from now on if they get left behind Fintech innovation and the mentality that they try to take the leadership of mobile payment market process. In this situation, the thorough preparation and a lot of effort are required to promote our autonomous easy-to-use payment growth without dependance on foreign country's. In this paper, the problems of local mobile easy-to-use payment are addressed in depth and the activation measures such as flexible and discriminative security, construction of customer protection system, law system maintenance, service differentiation are proposed.

Enhanced Security Measurement of Web Application Testing by Outsourcing (외주 개발 웹 어플리케이션 테스팅의 보안성 강화 방안)

  • Choi, Kyong-Ho;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.3-9
    • /
    • 2015
  • A web application that allows a web service created by a internal developer who has security awareness show certain level of security. However, in the case of development by outsourcing, it is inevitable to implement the development centered on requested function rather than the issue of security. Thus in this paper, we improve the software testing process focusing on security for exclusion the leakage of important information and using an unauthorized service that results from the use of the vulnerable web application. The proposed model is able to consider security in the initial stage of development even when outsourced web application, especially, It can prevent the development schedule delay caused by the occurrence of modification for program created by programer who has low security awareness. This result shows that this model can be applied to the national defense area for increasing demand web application centered resource management system to be able to prevent service of web application with security vulnerability based on high test.

Determination of Phase Velocity Dispersion Curve and Group Velocity of lamb Waves Using Backward Radiation (후방복사를 이용한 램파의 위상속도 분산과 군속도의 측정)

  • 송성진;권성덕;정용무;김영환
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.1
    • /
    • pp.61-68
    • /
    • 2003
  • The guided wave has been widely employed to characterize thin plates and layered media. The dispersion curves of phase and group velocities are essential for the quantitative application of guided waves. In the present work, a fully automated system for the measurement of backward radiation of LLW has been developed. The specimen moves in two dimensional plane as well as in angular rotation. The signals of backward radiation of LLW were measured from an elastic plate in which specific modes of Lamb wave were strongly generated. Phase velocity of the corresponding modes was determined from the incident angle. The generated Lamb waves propagated forward and backward with the leakage of energy into water. Backward radiated LLW was detected by the same transducer and its frequency components were analyzed to extract the related information to the dispersion curves. The dispersion curves of phase velocity were measured by varying the incident angle. Moving the specimen in the linear direction of LLW propagation, group velocity was determined by measuring the transit time shift in the ultrasonic waveform.

A Study of Technical Countermeasure System for the Smishing Detection and Prevention Based on the Android Platform (안드로이드 플랫폼 기반에서 스미싱 탐지 및 차단을 위한 기술적 대응체계 연구)

  • Seo, Gil-Won;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.569-575
    • /
    • 2014
  • Since 2009 the number of users of smart phones and tablet PC is growing exponentially. In particular Apple's iOS and Google's Android OS are the heart of this remarkable growth, most of smart phone and tablet PC are designed to operate based on these two OS. Such increasing use of smart devices has led to changes in the social environment that allows, without the constraints of time and place. However, such development does not supply only ease to do something, even compared to past, financial fraud and information leakage are easier than before by variety of new types of attack for example phishing, pharming, smishing and qshing. So according to this paper, analyzes for smishing attack, propose a countermeasure system of the technical way and proved its higher performance compare to the existing method.

A Study on the Recognition and Demand of Teachers and Parents of Using IoT Health-Care Devices in Day-Care Centers (어린이집에서의 IoT 헬스케어 디바이스 활용에 대한 교사와 부모의 인식 및 요구)

  • Kwon, Hye-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.11
    • /
    • pp.71-79
    • /
    • 2019
  • This study was conducted to examine the awareness and demands of parents and teachers on the use of IoT healthcare devices at daycare centers. A survey was conducted on 200 teachers and 200 parents. Collected data were analyzed by Frequency analysis, t-test, 𝑥2, using the SPSS WIN 22.0. The results of this study are as follows. First, teachers showed a higher level of preference for using IoT healthcare devices as they showed positive perception and support compared to parents, and showed higher recognition of information leakage than parents. Second, teachers and parents were most hoping to use IoT healthcare devices at emergency response in daycare-centers and had the highest demands for wearable devices. As a result of the both parents and teachers demand cost-sharing. Based on the results of this study, the possibility of utilizing IoT healthcare devices in daycare centers were discussed.