• 제목/요약/키워드: Security Level

Search Result 2,725, Processing Time 0.032 seconds

A Study on Strengthening Consequence Management System Against CBRN Threats (CBRN 위협에 대비한 사후관리체계 강화방안)

  • Kwon, Hyuckshin;Kwak, Minsu;Kim, Kwanheon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.4
    • /
    • pp.429-435
    • /
    • 2020
  • North Korea declared itself complete with nuclear force after its sixth nuclear test in 2017. Despite efforts at home and abroad to denuclearize the Korean Peninsula, the prospects for the denuclearization are not bright. Along with political and diplomatic efforts to deter NK's WMD threats, the government is required to strengthen its consequence management capabilities against 'catastrophic situations' expected in case of emergency. Accordingly, this study was conducted to present measures to strengthen follow-up management against CBRN threats. The research model was partially supplemented and utilized by the THIRA process adopted and utilized by the U.S. Department of Homeland Security among national-level disaster management plan development models. Korea's consequence management (CM) system encompasses risk and crisis management on disaster condition. The system has been carried out in the form of a civil, government and military integrated defense operations for the purpose of curbing the spread or use of CBRNs, responding to threats, and minimizing expected damages. The preventive stage call for the incorporation of CBRN concept and CM procedures into the national management system, supplementing the integrated alarm systems, preparation of evacuation facilities, and establishment of the integrated training systems. In the preparation phase, readjustment of relevant laws and manuals, maintenance of government organizations, developing performance procedures, establishing the on-site support systems, and regular training are essential. In the response phase, normal operations of the medical support system for first aid and relief, installation and operation of facilities for decontamination, and development of regional damage assessment and control guidelines are important. In the recovery phase, development of stabilization evaluation criteria and procedures, securing and operation of resources needed for damage recovery, and strengthening of regional damage recovery capabilities linked to local defense forces, reserve forces and civil defense committees are required.

Evaluation Method for Protection Coordination of PV Systems Interconnected with Primary Feeders (태양광전원이 연계된 고압배전선로의 보호협조 평가 방안에 관한 연구)

  • Kim, Byungki;Kim, Sohee;Ryu, Kyungsang;Rho, Daeseok
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.29-37
    • /
    • 2011
  • Dispersed generation (DG) such as wind power (WP) and Photovoltaic systems (PV) that has been promoted at the national level recently is mainly being introduced into distribution systems adjacent to consumers because it is generation on a small scale when compared to current generation. Due to its characteristics, DG can be operated by interconnection with distribution systems to present security of more stable power and efficient use of power facilities and resources. Problems on protection coordination of distribution systems by reverse flow of DG can roughly be divided into three possibilities: excess in rated breaking capacity (12.5KA) of protective devices by a fault in DG current supply, failure to operate protective devices by an apparent effect that can occur by reduction in impedance parallel circuit fault current due to interconnection of DG, and malfunction of protective devices by interconnection transformer connection type. The purpose of this study is to analyze problems in protection coordination that can occur when DG is operated by interconnection with distribution systems by conducting modeling and simulations by using theoretical symmetrical components and MATLAB/SIMULINK to present methods to improve such problems.

A Convergence Study on the Depression Factors of Permanent Rental Apartment Residents : Focusing on K-Metropolitan City (영구임대아파트 입주자의 우울 영향요인에 관한 융합연구 : K 광역시를 중심으로)

  • Lee, Hyoung-Ha;Park, Jong-Seon
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.319-329
    • /
    • 2020
  • The purpose of this study is to identify the link that affects depression, a negative mental health problem for permanent rented apartment tenants, and to provide policy and practical support for reducing depression at the community level. To this end, 1,920 households of permanent rental apartment residents in K Metropolitan City were used in the survey. The results are as follows. First, more than half of the subjects surveyed 51.1% were found to have depressive symptoms. Second, among the demographic variables, the gender, age, single-person households, and social security benefits have a positive effect on depression. On the other hand, age squared and participation in economic activities were identified as factors to reduce depression. Third, among the residential community variables, the consideration for neighbors and their willingness to participate in the community were identified as factors to reduce depression. Fourth, physical health difficulties and mental health difficulties among the health status variables were identified as the determinants of depression. Based on the results of the study, the methods for intervention and follow-up studies to reduce depression in permanent rental apartment residents were discussed.

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

Hardware Architecture of High Performance Cipher for Security of Digital Hologram (디지털 홀로그램의 보안을 위한 고성능 암호화기의 하드웨어 구조)

  • Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.374-387
    • /
    • 2012
  • In this paper, we implement a new hardware for finding the significant coefficients of a digital hologram and ciphering them using discrete wavelet packet transform (DWPT). Discrete wavelet transform (DWT) and packetization of subbands is used, and the adopted ciphering technique can encrypt the subbands with various robustness based on the level of the wavelet transform and the threshold of subband energy. The hologram encryption consists of two parts; the first is to process DWPT, and the second is to encrypt the coefficients. We propose a lifting based hardware architecture for fast DWPT and block ciphering system with multi-mode for the various types of encryption. The unit cell which calculates the repeated arithmetic with the same structure is proposed and then it is expanded to the lifting kernel hardware. The block ciphering system is configured with three block cipher, AES, SEED and 3DES and encrypt and decrypt data with minimal latency time(minimum 128 clocks, maximum 256 clock) in real time. The information of a digital hologram can be hided by encrypting 0.032% data of all. The implemented hardware used about 200K gates in $0.25{\mu}m$ CMOS library and was stably operated with 165MHz clock frequency in timing simulation.

Evaluation of Regional Drought Vulnerability Assessment Based on Agricultural Water and Reservoirs (지역기반 농업용수의 가뭄재해 취약성 평가)

  • Mun, Young-Sik;Nam, Won-Ho;Jeon, Min-Gi;Kim, Han-Joong;Kang, Ku;Lee, Jung-Chul;Ha, Tae-Hyun;Lee, Kwangya
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.62 no.2
    • /
    • pp.97-109
    • /
    • 2020
  • Drought is one of the most influential disasters in sustainable agriculture and food security of nations. In order to preemptively respond to agricultural droughts, vulnerability assessments were conducted to predict the possibility of drought in the region, the degree of direct or indirect damage, and the ability to cope with the damage. Information on agricultural drought vulnerability status of different regions is extremely useful for implementation of long term drought management measures. The purpose of this study is to develop and implement a quantitative approach for measuring agricultural drought vulnerability at sub-district level based on agricultural water and reservoirs. To assess the vulnerability in a quantitative manner and also to deal with different physical and socioeconomic data on the occurrence of agricultural drought, we selected the appropriate factors for the assessment of agricultural drought vulnerability through preceding studies, and analyzed the meteorological and agricultural reservoir data from 2015 to 2018. Each item was weighted using AHP (Analytic Hierarchy Process) analysis and evaluated through the agricultural drought vulnerability estimation. The entire national vulnerability assessments showed that Ganghwa, Naju, and Damyang were the most vulnerable to agricultural droughts. As a result of analyzing spatial expression, Gyeongsang-do is relatively more vulnerable to drought than Gangwon-do and Gyeonggi-do. The results revealed that the methodology and evaluation items achieved good performance in drought response. In addition, vulnerability assessments based on agricultural reservoir are expected to contribute supporting effective drought decisions in the field of agricultural water management.

Abnormal Changes in Groundwater Monitoring Data Due to Small-Magnitude Earthquakes (지하수 모니터링 이상변동 자료를 이용한 소규모 지진 영향 유추)

  • Woo, Nam C.;Piao, Jize;Lee, Jae-Min;Lee, Chan-Jin;Kang, In-Oak;Choi, Doo-Houng
    • The Journal of Engineering Geology
    • /
    • v.25 no.1
    • /
    • pp.21-33
    • /
    • 2015
  • This study tests the potential of detecting small-magnitude earthquakes (~M3.0) and their precursors using a long-term groundwater-monitoring database. In groundwater records from April to June 2012, abnormal changes in water level, temperature, and electrical conductivity were identified in the bedrock monitoring wells of the Gimcheon-Jijwa, Gangjin-Seongjeon, and Gongju-Jeongan stations. These anomalies could be attributed to the M3.1 earthquake that occurred in the Youngdeok area on May 30th, although no linear relationship was found between the scale of changes and the distance between each monitoring station and the epicenter, which is attributed in part to the wide screen design of the monitoring wells. Groundwater monitoring networks designed specifically for monitoring earthquake impacts could provide better information on the safety of underground space and on the security of emergency water-resources in earthquake disaster areas.

A Study on Implementation and Design of Scheme to Securely Circulate Digital Contents (디지털콘텐츠의 안전한 유통을 위한 구조 설계 및 구현에 관한 연구)

  • Kim, Yong;Kim, Eun-Jeong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.2
    • /
    • pp.27-41
    • /
    • 2009
  • With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records or reports, which have high commercial value, e-tickets and so on. However, because those digital contents have commercial value, high-level security should be required for delivery between a consumer and a provider with non face-to-face method in online environment. As a digital contents, an e-ticket is a sort of electronic certificate to assure ticket-holder's proprietary rights of a real ticket. This paper focuses on e-ticket as a typical digital contents which has real commercial value. For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card holding e-tickets for delivery in online environment, 3) how to save an e-ticket transferred through network into a smart card, 4) how to issue and authenticate e-tickets in offline, and 5) how to collect and discard outdated or used e-tickets.

A Study on the necessity of Open Source Software Intermediaries in the Software Distribution Channel (소프트웨어 유통에 있어 공개소프트웨어 중개자의필요성에 대한 연구)

  • Lee, Seung-Chang;Suh, Eung-Kyo;Ahn, Sung-Hyuck;Park, Hoon-Sung
    • Journal of Distribution Science
    • /
    • v.11 no.2
    • /
    • pp.45-55
    • /
    • 2013
  • Purpose - The development and implementation of OSS (Open Source Software) led to a dramatic change in corporate IT infrastructure, from system server to smart phone, because the performance, reliability, and security functions of OSS are comparable to those of commercial software. Today, OSS has become an indispensable tool to cope with the competitive business environment and the constantly-evolving IT environment. However, the use of OSS is insufficient in small and medium-sized companies and software houses. This study examines the need for OSS Intermediaries in the Software Distribution Channel. It is expected that the role of the OSS Intermediary will be reduced with the improvement of the distribution process. The purpose of this research is to prove that OSS Intermediaries increase the efficiency of the software distribution market. Research design, Data, and Methodology - This study presents the analysis of data gathered online to determine the extent of the impact of the intermediaries on the OSS market. Data was collected using an online survey, conducted by building a personal search robot (web crawler). The survey period lasted 9 days during which a total of 233,021 data points were gathered from sourceforge.net and Apple's App store, the two most popular software intermediaries in the world. The data collected was analyzed using Google's Motion Chart. Results - The study found that, beginning 2006, the production of OSS in the Sourceforge.net increased rapidly across the board, but in the second half of 2009, it dropped sharply. There are many events that can explain this causality; however, we found an appropriate event to explain the effect. It was seen that during the same period of time, the monthly production of OSS in the App store was increasing quickly. The App store showed a contrasting trend to software production. Our follow-up analysis suggests that appropriate intermediaries like App store can enlarge the OSS market. The increase was caused by the appearance of B2C software intermediaries like App store. The results imply that OSS intermediaries can accelerate OSS software distribution, while development of a better online market is critical for corporate users. Conclusion - In this study, we analyzed 233,021 data points on the online software marketplace at Sourceforge.net. It indicates that OSS Intermediaries are needed in the software distribution market for its vitality. It is also critical that OSS intermediaries should satisfy certain qualifications to play a key role as market makers. This study has several interesting implications. One implication of this research is that the OSS intermediary should make an effort to create a complementary relationship between OSS and Proprietary Software. The second implication is that the OSS intermediary must possess a business model that shares the benefits with all the participants (developer, intermediary, and users).The third implication is that the intermediary provides an OSS of high quality like proprietary software with a high level of complexity. Thus, it is worthwhile to examine this study, which proves that the open source software intermediaries are essential in the software distribution channel.

  • PDF

Can Welfare States Solve the Problem of Excessive Shadow Education? (복지국가는 사교육 과잉 문제를 풀 수 있나)

  • Lee, Shinyong
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.172-182
    • /
    • 2018
  • This research suggests a solution to the problem of excessive shadow education in Korea as a way to compare the shadow education and income redistribution programs of advanced welfare states. The government has introduced a variety of measures to overcome the problem of excessive shadow education for a long time. However, the trend of increasing shadow education costs has not stopped. The excessive use of shadow education is definitely related to university entrance. But university entrance is not the only concern. In our country, the meaning of university is closely related to the standard of future life. Therefore, participation in shadow education is a reasonable choice by parents or students to ensure a stable future. The belief that the future life can be stabilized when you go to a prestigious university and the reality in the labor market, which reflects this belief, is the essential cause of excessive shadow education. Advanced welfare states such as Sweden and Germany provide hope for our nation. There are shadow education in these countries, too. However, the importance is not so great and its roles are not necessarily directly related to college entrance exams. For the income redistribution programs guarantee the life of all members of society at a certain level. The solution to the problem of excessive shadow education is not the admission system but the improvement of the income security system.