• Title/Summary/Keyword: Threat Response Center

Search Result 50, Processing Time 0.026 seconds

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Joung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1070-1075
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) shared between radio and authentication center by challenge-response protocol. TETRA standard authentication protocol can prevent the clone radio to copy ISSI from accessing network, but can't prevent the clone radio to copy ISSI & authentication-key. This paper analyzes authentication-key generation/delivery/infection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure. Finally we propose the new authentication protocol which prevent the clone radio to copy ISSI & authentication-key from accessing network.

Visible Assessment of Earthquake-induced Geotechnical Hazards by Adopting Integrated Geospatial Database in Coastal Facility Areas (복합 공간데이터베이스 적용을 통한 해안 시설영역 지진 유발 지반재해의 가시적 평가)

  • Kim, Han-Saem;Sun, Chang-Guk
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.171-180
    • /
    • 2016
  • Earthquake event keeps increasing every year, and the recent cases of earthquake hazards invoke the necessity of seismic study in Korea, as geotechnical earthquake hazards, such as strong ground motion, liquefaction and landslides, are a significant threat to structures in industrial hub areas including coastal facilities. In this study, systemized framework of integrated assessment of earthquake-induced geotechnical hazard was established using advanced geospatial database. And a visible simulation of the framework was specifically conducted at two coastal facility areas in Incheon. First, the geospatial-grid information in the 3D domain were constructed with geostatistical interpolation method composed of multiple geospatial coverage mapping and 3D integration of geo-layer construction considering spatial outliers and geotechnical uncertainty. Second, the behavior of site-specific seismic responses were assessed by incorporating the depth to bedrock, mean shear wave velocity of the upper 30 m, and characteristic site period based on the geospatial-grid. Third, the normalized correlations between rock-outcrop accelerations and the maximum accelerations of each grid were determined considering the site-specific seismic response characteristics. Fourth, the potential damage due to liquefaction was estimated by combining the geospatial-grid and accelerations correlation grid based on the simplified liquefaction potential index evaluation method.

Prevalence of Cystic Echinococcosis in Slaughtered Sheep as an Indicator to Assess Control Progress in Emin County, Xinjiang, China

  • Yang, Shijie;Wu, Weiping;Tian, Tian;Zhao, Jiangshan;Chen, Kang;Wang, Qinyan;Feng, Zheng
    • Parasites, Hosts and Diseases
    • /
    • v.53 no.3
    • /
    • pp.355-359
    • /
    • 2015
  • Hydatid disease imposing serious threat on human health and great loss in live-stock pastoralism remains a major public health problem in western China. To assess and monitor the effect of control program on transmission dynamics, we used the prevalence of cystic echinococcosis in slaughtered sheep at slaughterhouse as an indicator during the period of 2007 to 2013 in Emin County, Xinjiang Uygur Autonomous Region, China. The results showed a significant decline trend of prevalence in all age groups during the 7 years when the control program was implemented; particularly, the rate was reduced by 72% after first 3 years. Among the sheep slaughtered, the age distribution evidenced that the prevalence increased significantly as the sheep grew older. The baseline data indicated that the rate was 4.5% at the age <1, 6.7% at age 2~, and reached to the highest 17.9% at age ${\geq}4$ years. Earlier response to the intervention pressure was seen in the sheep at the younger age. Significant decline started from 2008 at the age <1, from 2009 at age of 1~, 2010 at 2~ to 3~, and the latest, in 2012 at age ${\geq}4$. This study demonstrated that the prevalence of cystic echinococcosis in slaughtered sheep may be used as an indicator to assess and monitor the transmission status during and after control program providing information for betterment of performance to sustain control strength.

The protective effects of BMSA1 and BMSA5-1-1 proteins against Babesia microti infection

  • Yu Chun Cai;Chun Li Yang;Peng Song;Muxin Chen;Jia Xu Chen
    • Parasites, Hosts and Diseases
    • /
    • v.62 no.1
    • /
    • pp.53-63
    • /
    • 2024
  • The intracellular parasite Babesia microti is among the most significant species causing human babesiosis and is an emerging threat to human health worldwide. Unravelling the pathogenic molecular mechanisms of babesiosis is crucial in developing new diagnostic and preventive methods. This study assessed how priming with B. microti surface antigen 1 (BHSA 1) and seroreactive antigen 5-1-1 (BHSA 5-1-1) mediate protection against B. microti infection. The results showed that 500 ㎍/ml rBMSA1 and rBMSA5-1-1 partially inhibited the invasion of B. microti in vitro by 42.0±3.0%, and 48.0±2.1%, respectively. Blood smears revealed that peak infection at 7 days post-infection (dpi) was 19.6%, 24.7%, and 46.7% in the rBMSA1, rBmSA5-1-1, compared to the control groups (healthy mice infected with B. microti only), respectively. Routine blood tests showed higher white blood cell, red blood cell counts, and haemoglobin levels in the 2 groups (BMSA1 and BMSA5 5-1-1) than in the infection control group at 0-28 dpi. Moreover, the 2 groups had higher serum interferon-γ, tumor necrosis factor-α and Interleukin-17A levels, and lower IL-10 levels than the infection control group throughout the study. These 2 potential vaccine candidate proteins partially inhibit in vitro and in vivo B. microti infection and enhance host immunological response against B. microti infection.

A Study on the Cooling Center Manual of Facility and Maintenance for Extreme Heat Disaster (폭염재난에 대응하는 Cooling Center 시설 및 운영기준에 관한 연구)

  • Kim, Jin-Wook
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.8 no.4
    • /
    • pp.17-22
    • /
    • 2008
  • Including heat wave, Climate change caused 150,000 casualty in 2000 and heat waves are meteorological events that pose a serious threat to human health. A heat wave is defined as "a period of abnormally and uncomfortably hot and usually humid weather". There is a need for the prevention of health effects due to weather and climate extremes. This study intends to propose the necessity of Response System to correspond to extreme heat. And this research focused on Cooling Center manual of facility and maintenance for extreme heat disaster. It would be useful to be planned based on community and to be taken a role as an E.O.C.(Emergency Operating Center). As a conclusion elderly watching system and the requirements regional cooling center facility was proposed.

Factors related to Continuous Participation in the Pap Smear Screening among Korean Women: using a Structural Model (한국여성의 Pap 도말검사 지속적 참여행위에 관한 설명모델)

  • 박소미
    • Journal of Korean Academy of Nursing
    • /
    • v.30 no.1
    • /
    • pp.160-170
    • /
    • 2000
  • The purpose of this study was to develop an explanatory model to predict factors related to continuous participation in the Pap smear screening among Korean women. A hypothetical model was constructed on the basis of Health Belief Model and extensive review of literature on the Pap smear screening. Exogeneous variables included in this model were knowledge, perceived sensitivity, perceived severity, negative and positive emotional responses and professional support from physicians and nurses. Endogeneous variables were threat to cervical cancer, perceived benefit of the Pap smear screening, perceived barrier, and the final outcome variable was continuous participation in the Pap smear screening. The hypothetical model was tested with an empirical study. The data was collected from 623 married women whose age range was 24 - 83 using a self-reported survey questionnaire which was developed by the researcher. It's Cronbach's alpha score ranged from .6478 to .9118. Data was collected at different locations in Seoul; a university hospital, a local health center, and apartment complexes. Data analysis was done using SPSS 7.5 WIN Program for descriptive statistics and LISREL 8.12a WIN Program for covariance structural analysis. In conclusion, threat, perceived benefit, perceived barrier, positive emotion and professional support had a significant direct effect on continuous participation in the Pap smear screening among Korean women. The results of this study also showed that perceived barrier had the most significant direct effect on continuous participation in the Pap smear screening while negative emotional response had the most significant direct effect on perceived barrier. It can be suggested that decreasing perceived barrier by reducing negative emotional responses may be the most effective strategies for increasing continuous participation in the Pap smear screening among married Korean women.

  • PDF

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response (보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법)

  • Kim, Kyu-Il;Park, Hark-Soo;Choi, Ji-Yeon;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.507-522
    • /
    • 2014
  • Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and most of them are not related to real cyber attacks, security analyst who carries out the security monitoring and response suffers from analyzing all the TMS events and finding out real cyber attacks from them. Also, since the security monitoring and response tasks depend on security analyst's know-how, there is a fatal problem in that they tend to focus on analyzing specific security events, so that it is unable to analyze and respond unknown cyber attacks. Therefore, we propose automated verification method of security events based on their empirical analysis to improve performance of security monitoring and response.

Predicting Health Communication Patterns in Follower-Influencer Networks: The Case of Taiwan Amid COVID-19

  • Chang, Angela;Jiao, Wen
    • Asian Journal for Public Opinion Research
    • /
    • v.8 no.3
    • /
    • pp.246-264
    • /
    • 2020
  • As netizens increasingly utilize social media to obtain and engage with information, this study aims to determine the extent to which the follower-influencer interaction is manifested and strengthened. To analyze information related to the novel coronavirus disease (COVID-19), a total of 62,119 online posts from 11 Internet forums were examined to find a relationship between followers and influencers in Taiwan. These forums are PTT, SOGO, Ck101, Plurk, Mobile01, TalkFetnet, Gamez, PlaySport, Dcard, Eyny, and PCDVD. The variables that were the best predictors of influencer classification were strong influences, engagements, and hot values across 11 Internet forums. Learning the response to the COVID-19 pandemic is vital because public actions could have been fueled by stigmatizing terms that may harm public health and well-being. The results questioned the conventional diffusion of traditional news sources because the influencers brought widespread attention to the health threat issues in the early outbreak stages. This study enhances the understanding of forum types, follower engagement, and influencers' impact maximization in social networks. The conclusion provides insight into the relationships and information diffusion mechanisms to ensure accurate health information dissemination.

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.