• Title/Summary/Keyword: Threat Event

Search Result 84, Processing Time 0.021 seconds

The First Telescope in the Korean History I. Translation of Jeong's Report (한국사 최초의 망원경 I. 정두원(鄭斗源)의 "서양국기별장계(西洋國奇別狀啓)")

  • Ahn, Sang-Hyeon
    • Journal of Astronomy and Space Sciences
    • /
    • v.26 no.2
    • /
    • pp.237-266
    • /
    • 2009
  • In 1631 A.D. Jeong Duwon, an ambassador of the Joseon dynasty was sent to the Ming dynasty. There he met $Jo\tilde{a}o$ Rodrigues, a Jesuit missionary, in Dengzhou of Shandong peninsula. The missionary gave the ambassador a number of results of latest European innovations. A detailed description on this event was written in 'Jeong's official report regarding a message from an European country'(西洋國奇別狀啓), which is an important literature work to understand the event. Since the document was written in classical Chinese, we make a comprehensive translation to Korean with detailed notes. According to the report, the items that Rodrigues presented include four books written in Chinese that describe European discoveries about the world, a report on the tribute of new cannons manufactured by Portuguese in Macao, a telescope, a flintlock, a Foliot-type mechanical clock, a world atlas drawn by Matteo Ricci, an astronomical planisphere, and a sun-dial. We discuss the meaning of each item in the Korean history of science and technology. In particular, Jeong's introduction is an important event in the history of Korean astronomy, because the telescope he brought was the first one to be introduced in Korean history. Even though king Injo and his associates of the Joseon dynasty were well aware of the value as military armaments of new technologies such as telescopes, cannons, and flintlocks, they were not able to quickly adopt such technologies to defend against the military threat of Jurchen. We revisit the reason in view of the general history of science and technology of east-Asian countries in the 17th century.

A Study on ICS Security Information Collection Method Using CTI Model (CTI 모델 활용 제어시스템 보안정보 수집 방안 연구)

  • Choi, Jongwon;Kim, Yesol;Min, Byung-gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.471-484
    • /
    • 2018
  • Recently, cyber threats are frequently occurring in ICS(industrial control systems) of government agencies, infrastructure, and manufacturing companies. In order to cope with such cyber threats, it is necessary to apply CTI to ICS. For this purpose, a security information collection system is needed. However, it is difficult to install security solution in control devices such as PLC. Therefor, it is difficult to collect security information of ICS. In addition, there is a problem that the security information format generated in various assets is different. Therefore, in this paper, we propose an efficient method to collect ICS security information. We utilize CybOX/STIX/TAXII CTI models that are easy to apply to ICS. Using this model, we designed the formats to collect security information of ICS assets. We created formats for system logs, IDS logs, and EWS application logs of ICS assets using Windows and Linux. In addition, we designed and implemented a security information collection system that reflects the designed formats. This system can be used to apply monitoring system and CTI to future ICS.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Vertical Atmospheric Structure and Sensitivity Experiments of Precipitation Events Using Winter Intensive Observation Data in 2012 (2012년 겨울철 특별관측자료를 이용한 강수현상 시 대기 연직구조와 민감도 실험)

  • Lee, Sang-Min;Sim, Jae-Kwan;Hwang, Yoon-Jeong;Kim, Yeon-Hee;Ha, Jong-Chul;Lee, Yong-Hee;Chung, Kwan-Young
    • Atmosphere
    • /
    • v.23 no.2
    • /
    • pp.187-204
    • /
    • 2013
  • This study analyzed the synoptic distribution and vertical structure about four cases of precipitation occurrences using NCEP/NCAR reanalysis data and upper level data of winter intensive observation to be performed by National Institute of Meteorological Research at Bukgangneung, Incheon, Boseong during 63days from 4 JAN to 6 MAR in 2012, and Observing System Experiment (OSE) using 3DVAR-WRF system was conducted to examine the precipitation predictability of upper level data at western and southern coastal regions. The synoptic characteristics of selected precipitation occurrences were investigated as causes for 1) rainfall events with effect of moisture convergence owing to low pressure passing through south sea on 19 JAN, 2) snowfall events due to moisture inflowing from yellow sea with propagation of Siberian high pressure after low pressure passage over middle northern region on 31 JAN, 3) rainfall event with effect of weak pressure trough in west low and east high pressure system on 25 FEB, 4) rainfall event due to moisture inflow according to low pressures over Bohai bay and south eastern sea on 5 MAR. However, it is identified that vertical structure of atmosphere had different characteristics with heavy rainfall system in summer. Firstly, depth of convection was narrow due to absence of moisture convergence and strong ascending air current in middle layer. Secondly, warm air advection by veering wind with height only existed in low layer. Thirdly, unstable layer was limited in the narrow depth due to low surface temperature although it formed, and also values of instability indices were not high. Fourthly, total water vapor amounts containing into atmosphere was small due to low temperature distribution so that precipitable water vapor could be little amounts. As result of OSE conducting with upper level data of Incheon and Boseong station, 12 hours accumulated precipitation distributions of control experiment and experiments with additional upper level data were similar with ones of observation data at 610 stations. Although Equitable Threat Scores (ETS) were different according to cases and thresholds, it was verified positive influence of upper level data for precipitation predictability as resulting with high improvement rates of 33.3% in experiment with upper level data of Incheon (INC_EXP), 85.7% in experiment with upper level data of Boseong (BOS_EXP), and 142.9% in experiment with upper level data of both Incheon and Boseong (INC_BOS_EXP) about accumulated precipitation more than 5 mm / 12 hours on 31 January 2012.

A Study on the Impact of Protection Layers on Workplace Workers in the Event of a Toxic Substance Release (독성물질 누출 시 방호계층 적용에 따른 사업장 내 근로자 피해 영향 연구)

  • Sun Jae Hwang;Joon Won Lee;Deuk Hwan Kim;Sang Chan Choi
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.4
    • /
    • pp.43-49
    • /
    • 2023
  • Hydrofluoric acid is a less acidic substance than hydrochloric acid, nitric acid, and sulfuric acid, but it is one of the most dangerous substances for humans. In recent years, it has become an indispensable substance in industries such as chemical plants and the semiconductor industry, and although it is a threat to the human body, its use is increasing for various purposes, and the amount of use is constantly increasing due to the expansion and development of the industry. The dangers of hydrogen fluoride have been highlighted since the 2012 accident, which led to a more than fivefold increase in management standards for handling facilities. Hydrogen fluoride converts to hydrofluoric acid when exposed to the air, which can be fatal to humans. This study simulates the effects of a release of a toxic substance in the workplace, even though a protection layer has been provided to minimize the damage caused by the released toxic substance, and recommend ways to control the risk to workers in the event of a release in the workplace.

Assessment of the Extreme 2014~2015 Drought Events in North Korea Using Weekly Standardized Precipitation Evapotranspiration Index (SPEI) (주단위 표준강수증발산지수를 활용한 2014~2015년 북한의 극한 가뭄 평가)

  • Nam, Won-Ho;Hong, Eun-Mi;Choi, Jin-Yong;Kim, Taegon;Hayes, Michael J.;Svoboda, Mark D.
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.4
    • /
    • pp.65-74
    • /
    • 2017
  • North Korea is one of the high vulnerable countries facing the threat of natural disaster and has experienced more frequent disasters in recent years. These disasters have significantly led to food shortages and large reductions in crop yields. In 2015, both North Korean officials and international agencies had identified the extreme drought event, the worst in one hundred years according to the North Korean government. The objective of this study was an assessment of the extreme drought events in 2014~2015, and to apply climatic drought indices for drought monitoring in North Korea. Characteristics of the extreme drought in North Korea are examined by using the weekly-based Standardized Precipitation Evapotranspiration Index (SPEI). The drought characteristics illustrated by the SPEI results are compared with a Standardized Precipitation Index (SPI) results and drought impact information to understand how these indices can explain the drought conditions within the country. These results demonstrated that the SPEI could be an effective tool to provide improved spatial and temporal drought conditions to inform management decisions for drought policy.

Characteristics of Water Quality by Storm Runoffs from Intensive Highland Agriculture Area in the Upstream of Han River Basin (한강상류 고령지 농업지역에서의 강우시 비점오염 유출 특성)

  • Jung, Sungmin;Jang, Changwon;Kim, Jai-Ku;Kim, Bomchul
    • Journal of Korean Society on Water Environment
    • /
    • v.25 no.1
    • /
    • pp.102-111
    • /
    • 2009
  • Turbid storm runoff from intensive highland agriculture area has emerged as the major problem of water quality deterioration in the upstream region of the Han River. High slope of the upland combined with high rate of fertilization and intensive plowing causes high rate of soil erosion, and subsequently high suspended sediment and phosphorus content in the runoff water. The variations of water quality during rain spells were surveyed for two years (2005 and 2006) in the Jawoon Stream that is one of hot spots of intensive horticulture discharging turbid storm runoff. SS and TP showed large increase according to the increase of flow rate, whereas TN and BOD showed less fluctuations. Mean EMCs of SS and TP measured for nine rain events were as high as $207mgSS{\cdot}L^{-1}$ and $0.27mgP{\cdot}L^{-1}$, respectively. The export coefficient of SS and TP per area of cultivated field were calculated as $11,912kgSS{\cdot}yr^{-1}{\cdot}km^{-2}$ and $785kgP{\cdot}yr^{-1}{\cdot}km^{-2}$, repectively, which are significantly higher than reports of other area. It can be concluded that SS and TP in the runoffs were high enough to impose major threat to aquatic habitats, and the highland agriculture should be the main target of water quality management or habitat conservation in the study area.

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

A Study on the Security Vulnerability for Android Operating System (안드로이드 운영체제의 보안 취약점에 관한 연구)

  • Cho, Hee-Hoon;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.224-226
    • /
    • 2015
  • Recently, Android-based mobile devices has increased. Thus increasing market share of the Android operating system. However, in the case of the Android operating system, it has the relatively large number of security vulnerabilities Unlike other closed operating systems. Most Android application requires the identity of the mobile device or over-authorization approval. This information can be a security threat. In addition, in the event of a security problem because obtaining the user's consent during the installation of the application is the user responsible. If these problems persist, loss of reliability of the user operating system, as well as to feel a resistance when using an Android application. In this paper, we investigate a security vulnerability in the Android operating system, and proposed countermeasures.

  • PDF