• Title/Summary/Keyword: Physical threats

Search Result 145, Processing Time 0.027 seconds

Simple Identification Methods for Unknown Suspicious White Powders using Microfluidic-based Platform (미세유체 기반의 플랫폼을 이용한 미지의 백색가루 간이식별 탐지방안)

  • Park, Jae Woo;Song, Jiyoung;Na, Sang Cheol;Byun, Kisik;Jeon, Noo Li
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.853-859
    • /
    • 2017
  • Terrorists always threats the global security with the possibility of using prohibited warfare, NBCs(Nuclear, Biological and Chemical Warfare). Compared to other prohibited warfares, most of biological warfare agents (BWAs) have no physical properties and time delays from spread to affect. Therefore the early detection is important to protect and decontaminate from BWAs. On the preliminary detection stage for suspicious material, most of detection kits only serve to know weather the BWAs exists or not. Due to this reason, simple field confirmation testing for suspicious substances have been used to identify materials which show negative result on detection kits. Considering the current Lab on a Chip(LOC) technologies, we suggest simple identification platform for unknown suspicious substances based on paper fluidics. We hope that our research will envision the future direction for the specific point-of-view for LOC technologies on detection strategy of BWAs.

Early-life exposure to endocrine disrupting chemicals associates with childhood obesity

  • Yang, Chunxue;Lee, Hin Kiu;Kong, Alice Pik Shan;Lim, Lee Ling;Cai, Zongwei;Chung, Arthur C.K.
    • Annals of Pediatric Endocrinology and Metabolism
    • /
    • v.23 no.4
    • /
    • pp.182-195
    • /
    • 2018
  • Increasing prevalence of childhood obesity poses threats to the global health burden. Because this rising prevalence cannot be fully explained by traditional risk factors such as unhealthy diet and physical inactivity, early-life exposure to endocrine disrupting chemicals (EDCs) is recognized as emerging novel risk factors for childhood obesity. EDCs can disrupt the hormone-mediated metabolic pathways, affect children's growth and mediate the development of childhood obesity. Many organic pollutants are recently classified to be EDCs. In this review, we summarized the epidemiological and laboratory evidence related to EDCs and childhood obesity, and discussed the possible mechanisms underpinning childhood obesity and early-life exposure to non-persistent organic pollutants (phthalates, bisphenol A, triclosan) and persistent organic pollutants (dichlorodip henyltrichloroethane, polychlorinated biphenyls, polybrominated diphenyl ethers, per- and polyfluoroalkyl substances). Understanding the relationship between EDCs and childhood obesity helps to raise public awareness and formulate public health policy to protect the youth from exposure to the harmful effects of EDCs.

Design of Context-Aware-Based Drone Control Mechanism by Using Two-Factor (이중요소를 이용한 상황인지 기반 드론 제어 메커니즘 설계)

  • Oh, Yoon-Seok;Kim, Aeyoung;Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.57-66
    • /
    • 2019
  • Drones, which are used in various fields, are vulnerable to various security threats such as physical deodorization attacks and information leakage attacks because they operate in an unmanned environment and use wireless communication with weak security. In particular, research is needed to prevent damages such as leakage of stored information and unauthorized use due to illegal drone deodorization. In this paper, we propose a context - aware drone control mechanism that protects stored internal information and prevents unauthorized use when the drones are illegally deactivated. We also demonstrated the feasibility of the proposed mechanism as a prototype implementation and experiment.

Blockchain-Based Mobile Cryptocurrency Wallet

  • Yeom, Gwyduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.59-66
    • /
    • 2019
  • As the monetary value of cryptocurrency increases, the security measures for cryptocurrency becomes more important. A limitation of the existing cryptocurrency exchanges is their vulnerability to threats of hacking due to their centralized manner of management. In order to overcome such limitation, blockchain technology is increasingly adopted. The blockchain technology enables decentralization and Peer-to-Peer(P2P) transactions, in which blocks of information are linked in chain topology, and each node participating in the blockchain shares a distributed ledger. In this paper, we propose and implement a mobile electronic wallet that can safely store, send and receive cryptocurrencies. The proposed mobile cryptocurrency wallet connects to the network only when the wallet actively is used. Wallet owner manages his or her private key offline, which is advantageous in terms of security. JavaScript based wallet apps were implemented to respectively run on Android and iOS mobile phones. I demonstrate the process of transferring Ethereum cryptocurrency from an account to another account through Ropsten, a test net for Ethereum. Hardware wallets, such as Ledger Nano S, provide a slightly higher level of security, yet have the disadvantages of added burden of carrying additional physical devices and high costs (about 80$).

Experience of Violence and Hospital Violence Attitude according to Gender and Gender-Role Identity of Clinical Nurses (임상간호사의 성별, 성역할정체감에 따른 병원폭력 경험과 병원폭력에 대한 태도)

  • Kim, Ju Yeun;Cho, Jin-Young
    • Korean Journal of Occupational Health Nursing
    • /
    • v.31 no.2
    • /
    • pp.57-65
    • /
    • 2022
  • Purpose: This study aims to examine differences in experiences of violence and hospital violence attitude according to gender and gender-role identity of clinical nurses. Methods: The quota sampling method, was used to select the research subjects. They were divided into two groups male and female nurses who worked for three general hospitals or higher level-hospitals in Incheon and Gyeongbuk. The data of 219 subjects was used for final analysis. The IBM SPSS 22.0 was used to analyze the data t-test and ANOVA. Results: According to gender, the hospital violence experience of female nurses was oserved frequently when the verbal violence came from guardians, and when the physical threats came from others. For male nurses, the experiences of hospital violence was obserbed. According to gender, the hospital violence attitude revealed significant differences in female nurses that the negative attitude was higher (t=-4.69, p<.001). According to gender-role identity, the undifferentiated and femininity showed significant differences (F=4.86 p=.003). Conclusion: The differentiated strategies of coping measures and violence preventive education considering the gender and gender-role identity of clinical nurses would help formulate measures for the effective management of hospital violence.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

A Study on NAS-Linked Network Separation System Using AHP (AHP를 이용한 NAS 연동형 망분리 시스템에 관한 연구)

  • Kim, Min Su;Shin, Sang Il;Lee, Dong Hwi;Kim, Kui Nam J.
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.85-90
    • /
    • 2013
  • To provide high-quality services, national public institutions and companies have provided information and materials over the internet network. However, a risk of malware infection between transmission and reception of data leads to exposure to various security threats. For this reason, national institutions have proceeded with projects for network separation since 2008, and data linkage has been made using network connection storage through network separation technologies, along with physical network separation. However, the network connection storage has caused waste of resources and problems with data management due to the presence of the same data in internal network storage and external network storage. In this regard, this study proposes a method to connect internal and external network data using NAS storage as a way to overcome the limitations of physical network separation, and attempts to verify the priority of items for the optimization of network separation by means of AHP techniques.

Impacts of health behaviors on oral health in juveniles with experience in drug (약물경험이 있는 청소년의 건강행위가 구강건강에 미치는 영향)

  • Park, Min-Hee;Jeon, Hae-Ok
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.12 no.1
    • /
    • pp.91-102
    • /
    • 2011
  • Objectives: The purpose of this study is to identify the extent of the health behaviors of juveniles with experience in drug and the extent of their oral health behaviors. Then the impact of such factors on the oral health was analyzed. Methods: The analysis in this study used the raw data from 'The Fifth Korea Youth Risk Behavior Web-based Survey' after getting approval for use from the Center for Disease Control. The research subjects of this study were juveniles with experience in drug. Analysis was done by using 8 socio-demographic variables, 6 health behaviors related variables, 4 oral-health behaviors related variables and 1 oral health related variable. All survey data were analyzed by SPSS WIN 17.0 program. as frequency analysis and logistic regression. Results: The factors that give impact on the oral health of juveniles with drug experience were found as: gender, academic year, study grade, school type, school class, city scale, economic status, residential type, experience in alcohol, experience in smoking, obesity, frequency of medium-level physical exercise, eating breakfast frequency, hours of sleeping, number of tooth-brushing in one day, brushing teeth after lunch frequency, experience in dental treatment and experience in oral health training. Conclusions: In order to improve the oral health of juveniles with drug experience, health behaviors such as stop-smoking, stop-drinking and regular physical exercise are recommended. In addition, they should stop using drugs that threats their oral health. The development of nursing intervention to maintain the continuous enhancement of their oral health is also required.

  • PDF

OTP-Based Transaction Verification Protocol Using PUFs (PUF를 이용한 OTP 기반 거래 검증 프로토콜)

  • Lee, Jonghoon;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.492-500
    • /
    • 2013
  • The One-Time Password(OTP) Generator is used as a multi-factor authentication method to ensure secure transaction during e-Financial transaction in the bank and securities company. The OTP based e-Financial Transaction Verification Protocol ensures secure e-financial transaction through confirming the user's identity using OTP authentication information and counters not only Man-in-the-Browser(MITB) attacks but also memory hacking attacks. However, it is possible to generate correct OTPs due to potential of stealing sensitive information of the OTP generator through intelligent phishing, pharming, social engineering attacks. Therefore, it needs another scheme to prevent from above threats, and this paper proposes advanced scheme using Physical Unclonable Functions(PUFs) to solve these problems. First, it is impossible to generate the same OTP values because of the hysically unclonable features of PUFs. In addition, it is impossible to clone OTP generator with hardware techniques. Consequently, the proposed protocol provides stronger and more robust authentication protocol than existing one by adding PUFs in the OTP generator.

The Effect of Organization's Industrial Security Management on Employees' Security Policy Compliance Intention (조직의 산업보안 활동이 구성원의 보안 정책 준수 의도에 미치는 영향)

  • Donghwan Lee;Seungwook Park
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.57-68
    • /
    • 2022
  • As the importance and awareness of security have recently expanded, companies and governments are making continuous efforts and investments for security management. However, there are still many security threats in the organization, especially security incidents caused by internal staff. Therefore, it is very important for members to comply with security policies for organizational security management. Therefore, this study classified industrial security management into technical security, physical security, and managerial security, and applied the theory of planned behavior to investigate the impact relationship on the intention to comply with security policies. SPSS 25 and AMOS 25 were used for statistical analysis, and the study found that technical security had a positive(+) effect on subjective norms, physical security had a positive(+) effect on perceived behavior control, and attitude and perceived behavior control had a positive(+) effect on security policy compliance intention.