• Title/Summary/Keyword: Threat Agents

Search Result 56, Processing Time 0.024 seconds

Inductive Classification of Multi-Spectral Threat Data for Autonomous Situation Awareness (자율적인 상황인식을 위한 다중센서 위협데이타의 귀납적 분류)

  • Jeong, Yong-Woong;Noh, Sang-Uk;Go, Eun-Kyoung;Jeong, Un-Seob
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • To build autonomous agents who can make a decision on behalf of humans in time-critical complex environments, the formulation of operational knowledge base could be essential. This paper proposes the methodology of how to formulate the knowledge base and evaluates it in a practical application domain. We analyze threat data received from the multiple sensors of Aircraft Survivability Equipment(ASE) for Korean helicopters, and integrate the threat data into the inductive model through compilation technique which extracts features of the threat data and relations among them. The compiled protocols of state-action rules can be implemented as the brain of the ASE. They can reduce the amounts of reasoning, and endow the autonomous agents with reactivity and flexibility. We report experimental results that demonstrate the distinctive and predictive patterns of threats in simulated battlefield settings, and show the potential of compilation methods for the successful detection of threat systems.

Analysis of Threat Agent for Important Information Systems (중요 정보시스템 위협원에 대한 분석)

  • Kim, Tai-Hoon;Kim, Seok-Soo;Park, Gil-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.2
    • /
    • pp.203-208
    • /
    • 2007
  • Because the networks and systems become more complex, the implementation of the security countermeasures for important Information Systems becomes more critical consideration. The designers and developers of the security policy should recognize the importance of building security countermeasures by using both technical and non-technical methods, such as personnel and operational facts. Security countermeasures may be made for formulating an effective overall security solution to address threats at all layers of the information infrastructure. But all these works can be done after assuming who is the threat agent. In this paper we identify the treat agents for information systems, summarize the characteristics of threat agents, and apply weighting factors to them.

  • PDF

Development Security agents for Integrated security management of the Educational Network (교육망의 통합보안관리를 위한 보안 에이전트 개발)

  • Lee, Do Hyeon;Kim, Hyun Cheol;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.43-55
    • /
    • 2015
  • Security infrastructure of Educational Network responds to threats by collecting and analyzing security events from various information protection system based on the integrated management system. Even if this system provides useful and detailed information to the administrator, there are some problems that this system does not provide effective response process and management systems for various threatening situations and the simultaneous threat processes. To solve this problem, we propose and develop security agents that enable the administrator to effectively manage integrated security for Educational Network. The proposed solution provides the administrator with efficient management techniques and process scheduling for various security events so that the administrator can response promptly to problems with the initial threat to Educational Network.

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF

Effects of Relational and Mandatory Influence Strategies on Sales Representatives and Headquarter Trust (관계적과 강제적 영향전략이 본사 신뢰에 미치는 영향 : 영업사원 신뢰의 매개역할)

  • Lee, Chang-Ju;Lee, Phil-Soo;Lee, Yong-Ki
    • Journal of Distribution Science
    • /
    • v.14 no.6
    • /
    • pp.53-63
    • /
    • 2016
  • Purpose - This study examines the effects of the influence strategies on sales representative and headquarter trust, and investigates how sales representative trust plays a mediating role in the relationship between influence strategies and headquarter trust. For these purposes, a structural model which consists of several constructs was developed. In this model, influence strategies that consist of relational influence strategies (information exchange, recommend, promise) and mandatory influence strategies (legal plea, request, threat) were proposed to affect the sales representative trust and in turn, increase the headquarter trust. Thus, this study proposed that sale representative trust plays a core mediating role in the relationship between relational and mandatory influence strategies and headquarter trust in B2B food materials distribution context. Research design, data, and methodology - For these purposes, the authors collected the data from 208 B2B specialized complex agents. We used the 2,200 B2B specialized complex agents which trade with CJ, Ottogi, and Daesang firms and supply food materials to restaurant, school cafeteria, supermarket and traditional market as a sample frame. Once we identified 330 B2B specialized complex agent owners, CEOs, and/or Directors who had agreed to participate in this study, we dropped off a questionnaire at each B2B specialized complex agent and explained the purpose of this study. The survey was conducted from October 1, 2015 to December 15, 2015. A total of 230 questionnaires were collected. Of these collected questionnaires, 28 questionnaires excluded since they had not been fully completed. The data were analyzed using frequency test, reliability test, measurement model analysis, and structural equation modeling with SPSS and SmartPLS 2. Results - First, information exchange, recommendation, and promise of relational influence strategies had positive effects on sales representative trust. The threat of mandatory influence strategies had a negative effect on sales representative trust, but legal plea and request did not have a significant effect on sales representative trust. Second, information exchange and recommendation of relational influence strategies had positive effects on headquarter trust, but promise did not. Also, legal plea, request, and threat of mandatory influence strategies did not have a significant effect on headquarter trust. Third, this findings show that sales representative trust plays a partial mediator between information exchange and headquarter trust, and threat and headquarter trust, and a full mediator between promise and headquarter trust, and recommendation and headquarter trust. Conclusions - The aim of this study was to examine the effects how diverse dimensions of relational and mandatory influence strategies relate to sales representative trust and headquarter trust. To do so, we integrated the influence strategies and the trust transfer theory to hypothesize that various influence strategies increase sales representative and headquarter trust. The findings of this study suggest that headquarter firms should establish and enforce proper influence strategies guidelines to make clear what proper actions sales representatives should implement in relationship with B2B specialized complex agents. Also, relational and mandatory influence strategies must be regarded as a long-term and ongoing strategy that eventually build a long-term orientation with B2B specialized complex agents and guarantee a company's sustainable growth and success.

A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Case (사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -)

  • Kim, Dong Hee;Park, Sangdon;Kim, So Jeong;Yoon, Oh-Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.53-68
    • /
    • 2017
  • Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. Korea is sharing cyber threat information in public and private sectors mainly through the National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). In addition, Korean government is attempting to strengthen and make legal basis for unified cyber threat information sharing system through establishing policies. However, there are also concerns about issues such as leakage of sensitive information of companies or individuals including personal identifiable information that may produced during the cyber threat information sharing process, reliability and efficiency issues of the main agents who gather and manage information. In this paper, we try to derive improvement plans and implications by comparing and analyzing cyber threat information sharing status between U.S. and Korea.

Antimicrobial Agents That Inhibit the Outer Membrane Assembly Machines of Gram-Negative Bacteria

  • Choi, Umji;Lee, Chang-Ro
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • Gram-negative pathogens, such as Klebsiella pneumoniae, Pseudomonas aeruginosa, and Acinetobacter baumannii, pose a serious threat to public health worldwide, due to high rates of antibiotic resistance and the lack of development of novel antimicrobial agents targeting Gram-negative bacteria. The outer membrane (OM) of Gram-negative bacteria is a unique architecture that acts as a potent permeability barrier against toxic molecules, such as antibiotics. The OM is composed of phospholipids, lipopolysaccharide (LPS), outer membrane ${\beta}-barrel$ proteins (OMP), and lipoproteins. These components are synthesized in the cytoplasm or in the inner membrane, and are then selectively transported to the OM by the specific transport machines, including the Lol, BAM, and Lpt pathways. In this review, we summarize recent studies on the assembly systems of OM components and analyze studies for the development of inhibitors that target these systems. These analyses show that OM assembly machines have the potential to be a novel attractive drug target of Gram-negative bacteria.

Bioprospecting of Endophytic Fungi as Promising Anti-MRSA Agents

  • Wei, Yee-Min;Tan, Joo-Shun;Tang, Hock-Wei;Tong, Woei-Yenn;Leong, Chean-Ring;Tan, Wen-Nee
    • Natural Product Sciences
    • /
    • v.28 no.3
    • /
    • pp.93-104
    • /
    • 2022
  • Methicillin-resistant Staphylococcus aureus (MRSA) is a serious threat to the global healthcare system. Ineffective and resistance to antibiotic treatments have increased morbidity and mortality rates worldwide. New and effective antibiotics are needed to combat against bacterial resistance. Endophytic fungi are crucial reservoirs of novel bioactive metabolites. In particular, the secondary metabolites show promising therapeutic potential, notably, antibacterial. This review discussed the emerging potential of endophytic fungi as anti-MRSA agents. The ecological sources of endophytic fungi were discussed with the synthesis of bioactive metabolites. The mode of antibacterial actions was elucidated to give a better understanding of the mechanisms involved. This review may serve as an important reference for future discovery and developments of anti-MRSA agents from endophytic fungi.

Study on the formulations for Topical Skin Protectant against Liquid-Phase Chemical Warfare Agents (액체성 화학작용제의 흡수를 차단하는 피부보호제 제제 설계 연구)

  • Kim, Sang Woong;Seo, Dong Sung;Son, Hong Ha;Yu, Chi Ho;Joe, Hae Eun;Cho, Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.210-217
    • /
    • 2022
  • Chemical warfare agents(CWA) such as nerve agents and vesicating agents show lethality by skin contamination. Skin protection, therefore, is one of the top priorities to deal with the growing threat from CWA. In an attempt to develop the most effective topical skin protectant(TSP), candidate substances including PFPE(perfluorinated polyether), PTFE(polytetrafluoroethylene), glycerin, and polysaccharides were evaluated in forms of various formulations against nerve agent simulant DMMP(dimethylmethyl phosphonate) penetration. The protective efficacy of the formulation against DMMP penetration was estimated as the onset time of color change of the KM9 chemical agent detection paper. Based on this study, it was found that several PFPE- and glycerin-based formulations exhibit remarkably superior efficacy as a protective cream. This protective cream is expected to be used as TSP for military application after further research.

Microbial Forensics: Bioterrorism and Biocrime

  • Eom, Yong-Bin
    • Biomedical Science Letters
    • /
    • v.24 no.2
    • /
    • pp.55-63
    • /
    • 2018
  • Microbes and their toxins can be bioweapons that bioterrorists use them to commit bioterrorism and biocrime. Due to the potential and relative ease of the bioattack, life-threat pathogenic agents (bacteria, viruses, and toxins) as bioweapon revealed the need for a new field of microbial forensics. Microbial forensics is a new scientific discipline combining microbiology and forensic science, which is focused on characterization of evidence from a bioterrorism, biocrime, and an inadvertent release of biothreat agents. The sophisticated analytical tool and knowledge of microbial forensics can provide investigative leads and help determine who was responsible for the biocrime, the source of the bioweapon, and how and where the bioweapon was produced. Among the fields of microbial forensics, this paper will briefly describe evidence collection, handling, packaging, transportation, storage, analytical methods of evidence, and review microbial forensics as a response to bioterrorism and biocrime.