• Title/Summary/Keyword: Security risk

Search Result 1,305, Processing Time 0.032 seconds

A study of the selection criteria for Localization of Military Weapon (무기체계 국산화 대상 선정기준 연구)

  • RYU, SEOKBEOM
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.338-344
    • /
    • 2021
  • Elements that threaten domestic security, such as diplomatic changes in the four major powers surrounding the Korean Peninsula and restrictions on supply and demand of parts due to COVID-19, are constantly increasing. The importance of localizing weapon systems has grown to respond proactively to the threat. As localization is not conducted evenly by the field, it is necessary to change the criteria for selecting localization targets. Establishing standards for selecting targets is difficult due to a lack of research to identify targets. This paper emphasized that the smooth supply of parts from overseas should be examined to identify targets for localization. If suppliers are not distributed evenly in the market, there is a risk of potential supply problems. CRk and HHI, representing the market structure, were proposed as indicators for evaluating the degree of smoothness quantitatively. Among them, CRk is used in Korea to check the market concentration, but there is a limit in the subjectivity of the evaluator, so it cannot be applied without a separate study on the market structure. Therefore, HHI should be applied.

Institutional Dynamics of In-Work Poverty Determination: Distributive Process of Labor Markets, Households, and the Welfare State Using Korean Welfare Panel Study, 2008-15 (근로빈곤 결정의 제도 동학: 노동시장과 가구, 복지국가 분배 과정 분석)

  • Ryu, Kirak
    • 한국사회정책
    • /
    • v.25 no.4
    • /
    • pp.71-104
    • /
    • 2018
  • This paper adopts a distributive performance process model of in-work poverty based on labor markets, households, and welfare states and analyzes the 4-11 waves of the Korean Welfare Panel Study during 2008-15. Previous studies on in-work poverty have focused on the definitions and concepts of in-work poverty by analyzing employment and unemployment persistence and repetition dynamics, but rarely paid attention to institutional distributive performance. In this regard, this study preforms a stepwise analysis of labor markets, households, and welfare states as a process of income generation in labor markets, satisfaction of welfare needs and income pooling at households, and deduction of social security contribution and income tax as well as receipt of public transfer income at welfare states. Results of empirical analysis show that in-work poverty had been on increase during 2008-11, followed by a decrease between 2012-15. At labor market stages, full time status had the most prominent impact on in-work poverty process, while status by employment and contract type have generated a huge variation as well. At household stages, household work intensity and number of earners contributed to reduction of in-work poverty, but the relations did not seen to be straightforward. However, welfare state played little role in lifting employees out of in-work poverty. In terms of institutional distributive process, in-work poverty was prevalent in either household-welfare state stage or labor market-household-welfare stage. Non-vulnerable group in terms of in-risk poverty was around 80% of the sample during the period of analysis, the size of which has remained constant.

A Study on Maturity Model of Information Integration System (정보연계 시스템의 성숙도 모델에 관한 연구)

  • Ha, Hyodong;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.570-578
    • /
    • 2019
  • In this era of big data, a variety of government organizations are trying to create new added value via Information Integration. Therefore, several projects related to government agencies' information sharing have activated system connection/integration. The risk factors of system operation, however, have increased as the volume of Information Integration System grows. The interference in information sharing is predicted to affect the operation of the agencies, and the issue will grow even worse with massive impact on civil society when the agency operation is interrupted due to system failures in terms of infrastructure, software, data quality, and security. Diverse studies related to the maintenance of Information System have been conducted, but there is currently no evaluation framework for the operational system of Information Integration between various government agencies. In this respect, this study distinguishes each of the Information System components, Data, IT, People, Process, systematizes with Plan-Do-See, and finally presents a maturity model for Information Integration. Nine derived processes were analyzed through interview and questionnaires from Information Integration System officials, further suggesting maturity stage applying CMMI. This model allows diagnosis of the maturity level of an Information Integration System, and is expected to be utilized as resource for improving organizational processes.

Prognostic Threshold of Neuroendocrine Differentiation in Gastric Carcinoma: a Clinicopathological Study of 945 Cases

  • Zou, Yi;Chen, Linying;Wang, Xingfu;Chen, Yupeng;Hu, Liwen;Zeng, Saifan;Wang, Pengcheng;Li, Guoping;Huang, Ming;Wang, Liting;He, Shi;Li, Sanyan;Jian, Lihui;Zhang, Sheng
    • Journal of Gastric Cancer
    • /
    • v.19 no.1
    • /
    • pp.121-131
    • /
    • 2019
  • Purpose: The significance of neuroendocrine differentiation (NED) in gastric carcinoma (GC) is controversial, leading to ambiguous concepts in traditional classifications. This study aimed to determine the prognostic threshold of meaningful NED in GC and clarify its unclear features in existing classifications. Materials and Methods: Immunohistochemical staining for synaptophysin, chromogranin A, and neural cell adhesion molecule was performed for 945 GC specimens. Survival analysis was performed using the log-rank test and univariate/multivariate models with percentages of NED ($P_{NED}$) and demographic and clinicopathological parameters. Results: In total, 275 (29.1%) cases were immunoreactive to at least 1 neuroendocrine (NE) marker. GC-NED was more common in the upper third of the stomach. $P_{NED}$, and Borrmann's classification and tumor, lymph node, metastasis stages were independent prognostic factors. The cutoff $P_{NED}$ was 10%, beyond which patients had significantly worse outcomes, although the risk did not increase with higher $P_{NED}$. Tumors with ${\geq}10%$ NED tended to manifest as Borrmann type III lesion with mixed/diffuse morphology and poorer histological differentiation; the NE components in this population mainly grew in insulae/nests, which differed from the predominant growth pattern (glandular/acinar) in GC with <10% NED. Conclusions: GC with ${\geq}10%$ NED should be classified as a distinct subtype because of its worse prognosis, and more attention should be paid to the necessity of additional therapeutics for NE components.

Patterns of the Change and the Predictors of the Social Exclusion of the Older People: Analysis of English Longitudinal Study of Ageing(ELSA) (노인의 사회적 배제 수준의 변화유형과 예측요인: 영국고령화패널(ELSA)분석)

  • Park, Hyunju;Chung, Soondool
    • 한국노년학
    • /
    • v.32 no.4
    • /
    • pp.1063-1086
    • /
    • 2012
  • The purpose of this study is to understand the current state of the older people's social exclusion by identifying patterns of the change in social exclusion level through a longitudinal analysis with an aim of exploring the predictors of changes. To this end, this study has adopted the panel data, the English longitudinal Study of Ageing(ELSA). The data of 7631 respondents who aged over 50 were used for the final analysis. The social exclusion of the older people was analyzed into five different sub-dimensions: social relationship; cultural activities; access to health services; financial security; and sense of loneliness. The person-centered approach that focuses on the various patterns of the trajectories of change has used semi-parametric group based model in order to estimate different trajectories among individuals. The data was analyzed using Spss 18.0 and SAS 9.2 proc traj. In results, First, semi-parametric group-based model analysis has shown that the older people are not 'homogeneous' group with similar exclusion level in every individual with same trajectories of change, but can be divided into various categories with diverse intercept and slope. Second, different trajectories in change of exclusion level help to confirm that the older people's social exclusion level increases gradually over time or remains unchanged. Third, this analysis has provided the useful guidelines to identify the high-risk groups of social exclusion. Forth, the variables that make difference in more than three dimensions include gender, age, self-perceived health, physical activity, weekly income, marital status, family relation, and beneficiary status. Implications and further suggestion were discussed.

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.

An Analysis of the Characteristics of China's Naval Strategy to Become a Maritime Power: Focusing on analyzing the "goals, methods, and means" of strategy (해양강국 달성을 위한 중국 해군전략의 성격 분석: 전략의 "목표·방법·수단"을 이용한 분석을 중심으로)

  • Kim, nam-su
    • Maritime Security
    • /
    • v.2 no.1
    • /
    • pp.1-42
    • /
    • 2021
  • Controversy continues over the offensive nature of China's naval strategy to become a maritime power. Therefore, the purpose of this study is to identify the characteristics of China's naval strategy to become a maritime power by using the three elements of strategy and predict China's military actions in the future. For this purpose, research was conducted by considering the three elements of strategy and the distinct characteristics of naval strategy, and it was found that China's naval strategy was overall aggressive, but there was an imbalance in the pursuit of aggression between each strategic element. Offensive nature was prominent in terms of the methods, but there were limitations in the goals and means, such as the need to cooperate with neighboring countries to become a maritime power and the lack of military technology and operational continuity. The prospects for China's future military actions derived from the imbalance between these strategic elements are as follows. ① The risk of all-out military conflict with the US is low for now. ② China may use its naval power to force or cause limited military clashes against neighboring countries within the first island chain. ③ Accidental military conflicts with the US and neighboring countries may occur over naval confrontation over territorial disputes.

  • PDF

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

Design and Implementation of a Hardware Accelerator for Marine Object Detection based on a Binary Segmentation Algorithm for Ship Safety Navigation (선박안전 운항을 위한 이진 분할 알고리즘 기반 해상 객체 검출 하드웨어 가속기 설계 및 구현)

  • Lee, Hyo-Chan;Song, Hyun-hak;Lee, Sung-ju;Jeon, Ho-seok;Kim, Hyo-Sung;Im, Tae-ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1331-1340
    • /
    • 2020
  • Object detection in maritime means that the captain detects floating objects that has a risk of colliding with the ship using the computer automatically and as accurately as human eyes. In conventional ships, the presence and distance of objects are determined through radar waves. However, it cannot identify the shape and type. In contrast, with the development of AI, cameras help accurately identify obstacles on the sea route with excellent performance in detecting or recognizing objects. The computer must calculate high-volume pixels to analyze digital images. However, the CPU is specialized for sequential processing; the processing speed is very slow, and smooth service support or security is not guaranteed. Accordingly, this study developed maritime object detection software and implemented it with FPGA to accelerate the processing of large-scale computations. Additionally, the system implementation was improved through embedded boards and FPGA interface, achieving 30 times faster performance than the existing algorithm and a three-times faster entire system.

A Study on the Procedure for Establishing an Integrated Platform Plan for Safety Management of 5G Digital Twin-Based Facilities: Focusing on Facilities in Metropolitan Cities (5G 디지털 트윈 기반 시설물 안전관리 통합플랫폼 계획 수립 절차에 관한 연구 : 수도권 광역시 시설물을 중심으로)

  • Chang, Hye-Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.4
    • /
    • pp.257-268
    • /
    • 2021
  • As the variety and scale of facilities increase due to industrialization and urbanization, blind spots for facility safety management have occurred, resulting in numerous casualties.To meet safety and security needs of citizens living in smart cities, we present a procedure for establishing an integrated platform for facility safety management by combining 5G and digital twin technologies. It can be used to perform inspection according to risk factors and aging of facilities. In this paper, the current status of facility management and application directions of new 5G digital twin-based smart city technologies are reviewed and digital twin implementation procedures are presented. Five cities were selected as target areas: Osan, Gwangmyeong, Guri, Uijeongbu, and Anyang. Old and emergency facilities of each local government were selected. A total of 33 digital twin facilities reflecting policy directions of each city were selected. Focusing on facilities determined by each city, the purpose of this study was to define information technology infrastructure elements for the application of the 5G digital twin facility safety management integrated platform, define categories of implementation services, and suggest a concrete integrated platform configuration plan.