• Title/Summary/Keyword: Security risk

Search Result 1,311, Processing Time 0.031 seconds

Patterns of the Change and the Predictors of the Social Exclusion of the Older People: Analysis of English Longitudinal Study of Ageing(ELSA) (노인의 사회적 배제 수준의 변화유형과 예측요인: 영국고령화패널(ELSA)분석)

  • Park, Hyunju;Chung, Soondool
    • 한국노년학
    • /
    • v.32 no.4
    • /
    • pp.1063-1086
    • /
    • 2012
  • The purpose of this study is to understand the current state of the older people's social exclusion by identifying patterns of the change in social exclusion level through a longitudinal analysis with an aim of exploring the predictors of changes. To this end, this study has adopted the panel data, the English longitudinal Study of Ageing(ELSA). The data of 7631 respondents who aged over 50 were used for the final analysis. The social exclusion of the older people was analyzed into five different sub-dimensions: social relationship; cultural activities; access to health services; financial security; and sense of loneliness. The person-centered approach that focuses on the various patterns of the trajectories of change has used semi-parametric group based model in order to estimate different trajectories among individuals. The data was analyzed using Spss 18.0 and SAS 9.2 proc traj. In results, First, semi-parametric group-based model analysis has shown that the older people are not 'homogeneous' group with similar exclusion level in every individual with same trajectories of change, but can be divided into various categories with diverse intercept and slope. Second, different trajectories in change of exclusion level help to confirm that the older people's social exclusion level increases gradually over time or remains unchanged. Third, this analysis has provided the useful guidelines to identify the high-risk groups of social exclusion. Forth, the variables that make difference in more than three dimensions include gender, age, self-perceived health, physical activity, weekly income, marital status, family relation, and beneficiary status. Implications and further suggestion were discussed.

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.

An Analysis of the Characteristics of China's Naval Strategy to Become a Maritime Power: Focusing on analyzing the "goals, methods, and means" of strategy (해양강국 달성을 위한 중국 해군전략의 성격 분석: 전략의 "목표·방법·수단"을 이용한 분석을 중심으로)

  • Kim, nam-su
    • Maritime Security
    • /
    • v.2 no.1
    • /
    • pp.1-42
    • /
    • 2021
  • Controversy continues over the offensive nature of China's naval strategy to become a maritime power. Therefore, the purpose of this study is to identify the characteristics of China's naval strategy to become a maritime power by using the three elements of strategy and predict China's military actions in the future. For this purpose, research was conducted by considering the three elements of strategy and the distinct characteristics of naval strategy, and it was found that China's naval strategy was overall aggressive, but there was an imbalance in the pursuit of aggression between each strategic element. Offensive nature was prominent in terms of the methods, but there were limitations in the goals and means, such as the need to cooperate with neighboring countries to become a maritime power and the lack of military technology and operational continuity. The prospects for China's future military actions derived from the imbalance between these strategic elements are as follows. ① The risk of all-out military conflict with the US is low for now. ② China may use its naval power to force or cause limited military clashes against neighboring countries within the first island chain. ③ Accidental military conflicts with the US and neighboring countries may occur over naval confrontation over territorial disputes.

  • PDF

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

Design and Implementation of a Hardware Accelerator for Marine Object Detection based on a Binary Segmentation Algorithm for Ship Safety Navigation (선박안전 운항을 위한 이진 분할 알고리즘 기반 해상 객체 검출 하드웨어 가속기 설계 및 구현)

  • Lee, Hyo-Chan;Song, Hyun-hak;Lee, Sung-ju;Jeon, Ho-seok;Kim, Hyo-Sung;Im, Tae-ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1331-1340
    • /
    • 2020
  • Object detection in maritime means that the captain detects floating objects that has a risk of colliding with the ship using the computer automatically and as accurately as human eyes. In conventional ships, the presence and distance of objects are determined through radar waves. However, it cannot identify the shape and type. In contrast, with the development of AI, cameras help accurately identify obstacles on the sea route with excellent performance in detecting or recognizing objects. The computer must calculate high-volume pixels to analyze digital images. However, the CPU is specialized for sequential processing; the processing speed is very slow, and smooth service support or security is not guaranteed. Accordingly, this study developed maritime object detection software and implemented it with FPGA to accelerate the processing of large-scale computations. Additionally, the system implementation was improved through embedded boards and FPGA interface, achieving 30 times faster performance than the existing algorithm and a three-times faster entire system.

A Study on the Procedure for Establishing an Integrated Platform Plan for Safety Management of 5G Digital Twin-Based Facilities: Focusing on Facilities in Metropolitan Cities (5G 디지털 트윈 기반 시설물 안전관리 통합플랫폼 계획 수립 절차에 관한 연구 : 수도권 광역시 시설물을 중심으로)

  • Chang, Hye-Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.4
    • /
    • pp.257-268
    • /
    • 2021
  • As the variety and scale of facilities increase due to industrialization and urbanization, blind spots for facility safety management have occurred, resulting in numerous casualties.To meet safety and security needs of citizens living in smart cities, we present a procedure for establishing an integrated platform for facility safety management by combining 5G and digital twin technologies. It can be used to perform inspection according to risk factors and aging of facilities. In this paper, the current status of facility management and application directions of new 5G digital twin-based smart city technologies are reviewed and digital twin implementation procedures are presented. Five cities were selected as target areas: Osan, Gwangmyeong, Guri, Uijeongbu, and Anyang. Old and emergency facilities of each local government were selected. A total of 33 digital twin facilities reflecting policy directions of each city were selected. Focusing on facilities determined by each city, the purpose of this study was to define information technology infrastructure elements for the application of the 5G digital twin facility safety management integrated platform, define categories of implementation services, and suggest a concrete integrated platform configuration plan.

Monthly Water Balance Analysis of Hwanggang Dam Reservoir for Imjin river in Border Area using Optical Satellite (광학위성을 활용한 임진강 접경지역 황강댐 저수지의 월단위 물수지 분석)

  • KIM, Jin-Gyeom;KANG, Boo-Sik;YU, Wan-Sik;HWANG, Eui-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.4
    • /
    • pp.194-208
    • /
    • 2021
  • The Hwanggang Dam in North Korea is located upstream of the Imjin River which is a shared river in the border area. It is known to have a reservoir capacity of 350 million cubic meters and releases a discharge primarily for generating hydroelectric power and partly for transferring to the Yesung River basin. Due to the supply of water from the Hwanggang Dam to another basin, the flow of the Imjin River has decreased, which has a negative impact on the water supply, river maintenance flow, water quality, and ecological environment in Korea. However, due to the special national security issue of the South and North Korea border region, the hydrological data is not shared, and the operation method of the Hwanggang Dam is unknown, so there is a risk of damage to the southern part of the downstream area. In this study, the monthly diversion as the long-term runoff concept was derived through the calibrated hydrological model based on optical remotely sensed Images and water balance analysis. As a result of the water balance analysis from January 2019 to September 2021, the average diversion of the Hwanggang Dam was 29.2m3/s, which is equivalent to 922 million tons per year and 45.6% of the annual inflow of 2.02 million tons into the Hwanggang Dam.

Decision Making of Seismic Performance Management for the Aged Road Facilities Based on Road-Network and Fragility Curve (취약도곡선을 이용한 도로망기반 노후도로시설물 내진성능관리 의사결정)

  • Kim, Dong-Joo;Choi, Ji-Hae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.5
    • /
    • pp.94-101
    • /
    • 2021
  • According to the Facility Management System (FMS) operated by the Korea Authority of Land & Infrastructure Safety, it is expected that the number of aging facilities that have been in use for more than 30 years will increase rapidly to 13.9% in 2019 and 34.5% in 2929, and end up with a social problem. In addition, with the revision of "Common Application of Seismic Design Criteria" by the Ministry of Public Administration and Security in 2017, it is mandatory to re-evaluate all existing road facilities and if necessary seismic reinforcement should be done to minimize the magnitude of earthquake damage and perform normal road functions. The seismic performance management-decision support technology currently used in seismic performance management practice in Korea only determines the earthquake-resistance reinforcement priority based on the qualitative index value for the seismic performance of individual facilities. However with this practice, normal traffic functions cannot be guaranteed. A new seismic performance management decision support technology that can provide various judgment data required for decision making is needed to overcome these shortcomings and better perform seismic performance management from a road network perspective.

The Ways of Improving Technical Standards to Increase Effectiveness of Wetting Agent (침윤소화약제의 효과성 증대를 위한 기술기준 개선방안)

  • Jang, Kwan Su;Kim, Jung Min;Cho, Young Jae
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.581-588
    • /
    • 2022
  • Purpose: This study is about offering ways of improving existing technical standards in order to propose how to deal with coal deep-seated fire and to increase effectiveness of wetting agent. Method: This study conducts infiltration experiment using eight tons of coal, three types of wetting agents and fire water. And this study analyzes domestic and international technical standards, overseas experimental cases. Result: It is found that two findings are identified; one is fire water cannot infiltrate into the coal due to high level of surface tension, and the other is three types of wetting agent can infiltrate into the coal to the depth of 5~25cm. Also, domestic wetting agent technical standards include measuring surface tension only and testing wood on extinguishing capacity test. On the other hand, this study found that deep-seated fire experiment using cotton, B-class fire test using heptane are used from abroad. Besides it is analyze that capillary rise test, sink test, contact angle measurement are conducted to increase effectiveness of wetting agent at the U.S. Bureau of Mines. Conclusion: Based on standards and cases of U.S. NFPA and Bureau of Mines, this study suggests that domestic technical standards should include adding a new test standard which measures infiltration directly.

Application of Artificial Intelligence Technology for Dam-Reservoir Operation in Long-Term Solution to Flood and Drought in Upper Mun River Basin

  • Areeya Rittima;JidapaKraisangka;WudhichartSawangphol;YutthanaPhankamolsil;Allan Sriratana Tabucanon;YutthanaTalaluxmana;VarawootVudhivanich
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.30-30
    • /
    • 2023
  • This study aims to establish the multi-reservoir operation system model in the Upper Mun River Basin which includes 5 main dams namely, Mun Bon (MB), Lamchae (LC), Lam Takhong (LTK), Lam Phraphoeng (LPP), and Lower Lam Chiengkrai (LLCK) Dams. The knowledge and AI technology were applied aiming to develop innovative prototype for SMART dam-reservoir operation in future. Two different sorts of reservoir operation system model namely, Fuzzy Logic (FL) and Constraint Programming (CP) as well as the development of rainfall and reservoir inflow prediction models using Machine Learning (ML) technique were made to help specify the right amount of daily reservoir releases for the Royal Irrigation Department (RID). The model could also provide the essential information particularly for the Office of National Water Resource of Thailand (ONWR) to determine the short-term and long-term water resource management plan and strengthen water security against flood and drought in this region. The simulated results of base case scenario for reservoir operation in the Upper Mun from 2008 to 2021 indicated that in the same circumstances, FL and CP models could specify the new release schemes to increase the reservoir water storages at the beginning of dry season of approximately 125.25 and 142.20 MCM per year. This means that supplying the agricultural water to farmers in dry season could be well managed. In other words, water scarcity problem could substantially be moderated at some extent in case of incapability to control the expansion of cultivated area size properly. Moreover, using AI technology to determine the new reservoir release schemes plays important role in reducing the actual volume of water shortfall in the basin although the drought situation at LTK and LLCK Dams were still existed in some periods of time. Meanwhile, considering the predicted inflow and hydrologic factors downstream of 5 main dams by FL model and minimizing the flood volume by CP model could ensure that flood risk was considerably minimized as a result of new release schemes.

  • PDF