• Title/Summary/Keyword: Safety Threats

Search Result 257, Processing Time 0.024 seconds

ICT Adoption and Cyber Security of Korean SMEs (중소기업의 ICT 도입과 사이버 안전에 관한 연구)

  • Jung, Jeyong
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.2
    • /
    • pp.53-63
    • /
    • 2021
  • Small and medium-sized enterprises(SMEs) continue to adopt ICT to gain an edge in organizational innovation and competition. This has a management advantage, but it also brings vulnerabilities as to cyber security. Therefore, the purpose of this study is to conduct an exploratory study on the cyber security situation of SMEs. A survey was conducted on Korean SMEs to determine how well they are connected to ICT and how much they are exposed to cyber security threats. The results suggest two things. First, Korean SMEs are well connected to ICT, but there is a gap between the actual adoption and human recognition of its importance. Second, security threats and breaches affect the majority of SMEs, but several problems including costs have not been properly evaluated. The results of this study are expected to help improve the cyber security management system of Korean SMEs.

An Analysis of Security Threats and Security Requirements on the Designated PC Solution

  • Lee, Kyungroul;Lee, Sun-Young;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.29-39
    • /
    • 2017
  • In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.

Phylogenetic and expression analysis of the angiopoietin-like gene family and their role in lipid metabolism in pigs

  • Zibin Zheng;Wentao Lyu;Qihua Hong;Hua Yang;Ying Li;Shengjun Zhao;Ying Ren;Yingping Xiao
    • Animal Bioscience
    • /
    • v.36 no.10
    • /
    • pp.1517-1529
    • /
    • 2023
  • Objective: The objective of this study was to investigate the phylogenetic and expression analysis of the angiopoietin-like (ANGPTL) gene family and their role in lipid metabolism in pigs. Methods: In this study, the amino acid sequence analysis, phylogenetic analysis, and chromosome adjacent gene analysis were performed to identify the ANGPTL gene family in pigs. According to the body weight data from 60 Jinhua pigs, different tissues of 6 pigs with average body weight were used to determine the expression profile of ANGPTL1-8. The ileum, subcutaneous fat, and liver of 8 pigs with distinct fatness were selected to analyze the gene expression of ANGPTL3, ANGPTL4, and ANGPTL8. Results: The sequence length of ANGPTLs in pigs was between 1,186 and 1,991 bp, and the pig ANGPTL family members shared common features with human homologous genes, including the high similarity of the amino acid sequence and chromosome flanking genes. Amino acid sequence analysis showed that ANGPTL1-7 had a highly conserved domain except for ANGPTL8. Phylogenetic analysis showed that each ANGPTL homologous gene shared a common origin. Quantitative reverse-transcription polymerase chain reaction analysis showed that ANGPTL family members had different expression patterns in different tissues. ANGPTL3 and ANGPTL8 were mainly expressed in the liver, while ANGPTL4 was expressed in many other tissues, such as the intestine and subcutaneous fat. The expression levels of ANGPTL3 in the liver and ANGPTL4 in the liver, intestine and subcutaneous fat of Jinhua pigs with low propensity for adipogenesis were significantly higher than those of high propensity for adipogenesis. Conclusion: These results increase our knowledge about the biological role of the ANGPTL family in this important economic species, it will also help to better understand the role of ANGPTL3, ANGPTL4, and ANGPTL8 in lipid metabolism of pigs, and provide innovative ideas for developing strategies to improve meat quality of pigs.

A Study on Flight Crew Cabin Threats

  • Jin-Kook Choi
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.2
    • /
    • pp.116-121
    • /
    • 2023
  • 항공 사고는 첨단 항공 기술의 발달로 꾸준히 감소해 왔지만, 여전히 발생하고 있다. 조종사는 목적지 공항까지 안전하고 효율적으로 비행하기 위해 위협과 오류를 관리해야 한다. 조종사에게 영향을 미치는 위협은 환경적 위협과 항공사 위협으로 나눌 수 있으며, 환경사위협에는 객실 위협이 포함된다. 조종사와 객실 승무원은 정상적인 운항 중에는 협력이 필요하며, 비상시에는 안전한 비행을 위해 효과적인 협력이 절대적으로 필요하다. 조종사가 비행 중에 간섭이나 작업 흐름의 중단이 발생할 때 에러를 할 가능성이 높아진다. 항공사들은 안전 운항을 방해할 수 있는 객실위협의 종류를 적극적으로 식별하고 분석하여, 조종사들이 안전한 비행을 유지하기 위해서 위협을 관리하도록 절차 및 훈련을 개선해야 한다. 본 연구는 안전관리시스템(SMS)의 안전도구인 LOSA(Line Operation Safety Audit)를 기반으로 기내위협의 유형을 파악하고, 항공사들에게 조종실위협 관리를 체계적으로 개선하는 데 필요한 객실위협과 간섭에 대한 자료를 제공하고자 한다.

Contrast Analysis for CBRN attacks on educational research and best practices (테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구)

  • Kim, Tae hwan;Park, Dae woo;Hong, Eun sun
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

A Study on the Model of Safety Guideline based on Affordance Design (어포던스 디자인 관점의 안전가이드라인 개발 모형 연구)

  • Kim, Hwoikwang;Kimm, Hyoil
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.447-454
    • /
    • 2017
  • Human desires start from the factors that make up the basic living environment. The development model of the safety guidelines will start from a sense of departure from collective psychology and systemic environment, at the time of inducing threats to threats. The design and methodology of the safety guidelines should be drawn up repeatedly by the sequence of iterative models, and the design methodology should be designed in the chronological order of the public services through the methodology of service design methodology. Various and complex threats attempt to derive insights from the user's perspective and to derive insight into the development of the safety guidelines and the sophistication of the user experience, and to extract insights from the perspective of a user's perspective and supervision model. This derived insight can be implemented as a multi-dimensional service model derived from the same problem consciousness methodology.

An Analysis on the Safety related to Architectural Elements in Housing (주거 공간 내 건축 구성 요소의 안전성 분석)

  • Yi, Hoon;Lee, Yong-Hee;Jeong, Sang-Kyu
    • KIEAE Journal
    • /
    • v.5 no.4
    • /
    • pp.9-16
    • /
    • 2005
  • The purpose of this study is to analyze the safety issues with regard to architectural elements in housing. Causes of accidents and threats to health are reviewed for 'safety' aspects. Threats to health tend to draw more attention due to recent increase of SHS and its public perceptions. The majority of victims by accidents in residential houses are on juveniles aged under 14 in bathrooms and living rooms. Non-slip finish materials are recommended to floors for access and circulation and protective pads to furniture edges. Colored glass may increase the safety of the windows in the living room. Handles and non-slip mats will be a good addition for the safety. Human scale design of the kitchen system is mandatory and appropriate size of storages for hazardous equipment are to be provided. Passive air ventilation for better air quality by dwellers in residence is occasionally used whereas large-scale apartments provide mechanical ventilation to supplement the volume of fresh air. Since the internal air quality is proved one of the major causes of atopic and respiratory diseases, steady effort to achive better air quality utilizing appropriate materials, plants and equipment is mandatory. Frequent cleaning and the use of anti-fungus materials are necessary because House Dust Mites are believed to be one of main causes of such diseases.

Development of the framework for quantitative cyber risk assessment in nuclear facilities

  • Kwang-Seop Son;Jae-Gu Song;Jung-Woon Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2034-2046
    • /
    • 2023
  • Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quantitatively assess cyber risks. However, this can be challenging due to limited historical data on threats and customized Critical Digital Assets (CDAs) in nuclear facilities. Previous works have focused on identifying data flows, the assets where the data is stored and processed, which means that the methods are heavily biased towards information security concerns. Additionally, in nuclear facilities, cyber threats need to be analyzed from a safety perspective. In this study, we use the system theoretic process analysis to identify system-level threat scenarios that could violate safety constraints. Instead of quantifying the likelihood of exploiting vulnerabilities, we quantify Security Control Measures (SCMs) against the identified threat scenarios. We classify the system and CDAs into four consequence-based classes, as presented in NEI 13-10, to analyze the adversary impact on CDAs. This allows for the ranking of identified threat scenarios according to the quantified SCMs. The proposed framework enables stakeholders to more effectively and accurately rank cyber risks, as well as establish security and response strategies.

Strategic Approaches and the Role of Naval Forces to Counter Increasing Maritime Threats (해양안보 위협 확산에 따른 한국 해군의 역할 확대방안)

  • Park, Chang-Kwoun
    • Strategy21
    • /
    • s.31
    • /
    • pp.220-250
    • /
    • 2013
  • South Korean national security strategy should be developed to effectively handle and counter increasing maritime threats and challenges. There are three major maritime threats South Korea faces today; maritime disputes on the EEZ boundary and Dokdo islet issues, North Korean threats, and international maritime security. Maritime disputes in the region are getting intensified and turned into a military confrontation after 2010. Now regional countries confront each other with military and police forces and use economic leverage to coerce the others. They are very eager to create advantageous de facto situations to legitimize their territorial claims. North Korean threat is also increasing in the sea as we witnessed in the Cheonan incident and Yeonpyoung shelling in 2010. North Korea resorts to local provocations and nuclear threats to coerce South Korea in which it may enjoy asymmetric advantages. The NLL area of the west sea would be a main hot spot that North Korea may continue to make a local provocation. Also, South Korean national economy is heavily dependent upon foreign trade and national strategic resources such as oil are all imported. Without an assurance on the safety of sea routes, these economic activities cannot be maintained and expanded. This paper argues that South Korea should make national maritime strategy and enhance the strength of naval forces. As a middle power, its national security strategy needs to consider all the threats and challenges not only from North Korea but also to maritime security. This is not a matter of choice but a mandate for national survival and prosperity. This paper discusses the importance of maritime security, changing characteristics of maritime threats and challenges, regional maritime disputes and its threat to South Korea's security, and South Korea's future security strategy and ways to enhance the role of naval forces. Our national maritime strategy needs to show middle and long term policy directions on how we will protect our maritime interests. Especially, it is important to build proper naval might to carry out all the roles and missions required to the military.

  • PDF

A Study on Chaining Threat Analysis of Cybersecurity against Reactor Protection Systems (원자로보호계통 사이버보안 연계 위협 분석 연구)

  • Jung, Sungmin;Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.2
    • /
    • pp.39-48
    • /
    • 2022
  • The application of digital technology to instrumentation and control systems in nuclear power plants has overcome many shortcomings of analog technology, but the threat of cybersecurity has increased. Along with other systems, the reactor protection system also uses digital-based equipment, so responding to cybersecurity threats is essential. We generally determine cybersecurity threats according to the role and function of the system. However, since the instrumentation and control system has various systems linked to each other, it is essential to analyze cybersecurity threats together between the connected systems. In this paper, we analyze the cybersecurity threat of the reactor protection system with the associated facilities. To this end, we quantitatively identified the risk of the reactor protection system by considering safety functions, a communication type, the use of analog or digital-based equipment of the associated systems, and the software vulnerability of the configuration module of the reactor protection system.