• Title/Summary/Keyword: Non-bypassability

Search Result 2, Processing Time 0.02 seconds

Role of Bypass Protein in Feeding Ruminants on Crop Residue Based Diet - Review -

  • Garg, Manget Ram
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.11 no.2
    • /
    • pp.107-116
    • /
    • 1998
  • Measurement of DCP is considered inadequate and unsatisfactory means of assessing the protein value of the diet as no distinction is made between the digestion in ferestomach and in the small intestine. Protein meals should be classified on the basis of rumen degradable protein (RDP) and rumen undegradable protein (UDP). Usually, protein meals naturally available with high level of UDP or bypass protein value should be preferred for incorporation in the diet of lactating and growing animals. However, if such resources are non-available or are expensive, protein meals having high degradability can be carefully subjected to heat or formaldehyde treatment to achieve desired level of rumen bypassability. Various studies conducted the world over have revealed that bypass protein feeding to ruminants, especially when animals are fed on crop residue based basal diet, help increasing feed conversion efficiency in growing and lactating ruminants.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.