• Title/Summary/Keyword: cyber disaster

Search Result 102, Processing Time 0.024 seconds

Root Cause Analysis of Construction Accident Using 5 Why (5Why를 통한 건설사고 원인분석)

  • Choonhwan Cho
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.3
    • /
    • pp.644-653
    • /
    • 2024
  • Purpose: Looking for the root cause of a construction accident leads to the problem of unreasonable construction costs and air setting by the person placing an order. In addition, low-cost bidding by a contractor with insufficient capacity is combined, creating an inappropriate construction structure that can cause an accident before the start of construction. Method: Analysis of the problem that the lack of original contractor resources in the construction environment is passed on to suppliers, and the phenomenon that partners and their workers are forced to push ahead with excessive work to secure a minimum margin. Result: Going back to the root of construction accidents, there are several dimensions of causes from physical phenomena to root causes, but the reason why accident prevention measures so far remain almost at the one-dimensional level of responding to the phenomenon is the lack of fundamental cause analysis. Conclusion: It is necessary to shift the paradigm to safety accident measures led by the client (the client) and the government, and construction accidents are reduced only when root cause of construction accidents is found through fundamental cause analysis techniques such as 5Why.

An Experiential Case Study of Cyber Financial Fraud: Focusing on specific processes and measures (사이버 금융사기의 체험적 사례 연구: 구체적 과정과 대책을 중심으로)

  • Han, Dong-Ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.193-200
    • /
    • 2018
  • This study is an experiential case study of cybercrime fraud that combines pharming and voice phishing in April 2017. Research on victims who have actually suffered in the study of crime or disaster is a very useful field in establishing crime prevention measures. This study is significant in that Korea is relatively poor in this kind of research. I got cyber fraud as a consequence of my loss of reasonable judgment due to mental confusion when a companion dog who was raised for 8 years was in a very dangerous situation with cystitis. Fortunately, I received all the damages in a quick report, but the period was eight months. It took too much time to get back all the damages, so I had to suffer another pain. Based on my experience, I suggest damage prevention measures. First, when a certain condition and a certain amount are transferred, the transaction is automatically stopped or a more strict confirmation procedure is added. Secondly, trafficking means to arrest the perpetrator without any harm to the victim is sought. Third, the victims of crime should be promptly reimbursed for damages or a system for lending their living funds to zero or lower interest rate.

Study on a methodology for estimation of void ratio of very fine clayey soil by using micro X-ray CT scan (Micro X-ray CT 촬영을 통한 세립 점성토의 간극비 추정 방법 연구)

  • Heo, Seong-Jun;Kim, Kwang-Yeom;Kwon, Young-Cheul;Kim, Hong-Taek;Shin, Hyu-Soung
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.09a
    • /
    • pp.392-403
    • /
    • 2010
  • In this study, a new methodology by using the X-ray CT scan is proposed for estimating void ratio of very fine clayey soil. Since the particle size of the clay is too fine to calculate the volume of void inside the clays, CT scanning tests with a number of clay specimens that were artificially set to have various designated void ratios have been carried out. From the tests, a relationship between the CT values and void ratios is given to be used for estimating the invisible void ratio of very fine clay from a representative CT value scanned. The linear relationship was able to be acquired finally. It is expected that micro X-ray CT scanning can be capable of capturing the void ratio of very fine soils without any errors inherent in the conventional specific gravity tests.

  • PDF

Design and Implementation of Building Control System based 3D Modeling (3D 모델링 기반 빌딩관제시스템의 설계 및 구현)

  • Moon, Sang Ho;Kim, Byeong Mok;Lee, Gye Eun
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.673-682
    • /
    • 2020
  • Buildings are becoming more and more high-rise and large-scale in recent years, so in the event of a disaster such as a fire, enormous human and economic damage is expected. Therefore, management, security, and fire control are essential for large buildings in the city. Because these large buildings are very complex outside and inside, they need a three-dimensional control based on 3D modeling rather than a simple flat-oriented control. To do this, this paper designed and implemented a building control system based on 3D modeling. Specifically, we designed a 3D building / facility editing module for 3D modeling of buildings, a 3D based control module for building control, and a linkage module that connects information such as firefighting equipment, electrical equipment and IoT equipment. Based on this design, a building control system based on 3D modeling was implemented.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

A Study on the System for Controlling Factory Safety based on Unity 3D (Unity 3D 기반 깊이 영상을 활용한 공장 안전 제어 시스템에 대한 연구)

  • Jo, Seonghyeon;Jung, Inho;Ko, Dongbeom;Park, Jeongmin
    • Journal of Korea Game Society
    • /
    • v.20 no.3
    • /
    • pp.85-94
    • /
    • 2020
  • AI-based smart factory technologies are only increase short-term productivity. To solve this problem, collaborative intelligence combines human teamwork, creativity, AI speed, and accuracy to actively compensate for each other's shortcomings. However, current automation equipmens require high safety measures due to the high disaster intensity in the event of an accident. In this paper, we design and implement a factory safety control system that uses a depth camera to implement workers and facilities in the virtual world and to determine the safety of workers through simulation.

Federated Learning modeling for defense against GPS Spoofing in UAV-based Disaster Monitoring Systems (UAV 기반 재난 재해 감시 시스템에서 GPS 스푸핑 방지를 위한 연합학습 모델링)

  • Kim, DongHee;Doh, InShil;Chae, KiJoon
    • Annual Conference of KIPS
    • /
    • 2021.05a
    • /
    • pp.198-201
    • /
    • 2021
  • 무인 항공기(UAV, Unmanned Aerial Vehicles)는 높은 기동성을 가지며 설치 비용이 저렴하다는 이점이 있어 홍수, 지진 등의 재난 재해 감시 시스템에 이용되고 있다. 재난 재해 감시 시스템에서 UAV는 지상에 위치한 사물인터넷(IoT, Internet of Things) 기기로부터 데이터를 수집하는 임무를 수행하기 위해 계획된 항로를 따라 비행한다. 이때 UAV가 정상 경로로 비행하기 위해서는 실시간으로 GPS 위치 확인이 가능해야 한다. 만일 UAV가 계산한 현재 위치의 GPS 정보가 잘못될 경우 비행경로에 대한 통제권을 상실하여 임무 수행을 완료하지 못하는 결과가 초래될 수 있다는 취약점이 존재한다. 이러한 취약점으로 인해 UAV는 공격자가 악의적으로 거짓 GPS 위치 신호를 전송하는GPS 스푸핑(Spoofing) 공격에 쉽게 노출된다. 본 논문에서는 신뢰할 수 있는 시스템을 구축하기 위해 지상에 위치한 기기가 송신하는 신호의 세기와 GPS 정보를 이용하여 UAV에 GPS 스푸핑 공격 여부를 탐지하고 공격당한 UAV가 경로를 이탈하지 않도록 대응하기 위해 연합학습(Federated Learning)을 이용하는 방안을 제안한다.

Symptom severity, Functional Impairment, and Personality Profiles between Partial and Full Post-traumatic Stress Disorder Patients among the Adolescent Survivors from the Incheon Fire Disaster (인천 화재사건 청소년 생존자를 대상으로 한 PTSD 하위유형간 증상, 기능 및 기질성격 특성 비교연구)

  • Hwang, Seo Hyun;Lee, Hong Seock;Lee, Sang Kyu;Lee, Heung Pyo;Jeon, Chul Eun;Lee, So Young;Lee, Yong Ku
    • Anxiety and mood
    • /
    • v.7 no.2
    • /
    • pp.92-100
    • /
    • 2011
  • Objectives : The aim of this study was to investigate Post Traumatic Stress Disorder (PTSD)-related symptom severity, level of functional impairment and personality profiles between full-blown PTSD, partial PTSD and non-PTSD groups among 59 adolescent survivals from the Incheon fire disaster. Method : Using Short Screening Scale for DSM-IV PTSD, victims of the disaster were assigned to a full-blown PTSD group (n=18), a partial PTSD (n=22), or a non-PTSD group (n=19). Assessments included the Beck Depression Inventory (BDI), the State-Trait Anxiety Inventory (STAI), the Impact of Event Scales (IES), the McBride's Degree of General Labor Loss, and the Korean Version of Temperament and Character Inventory (K-TCI). Results : Significantly severe PTSD symptoms (F=4.832, df=2, p<.05) and functional impairment (F=12.144, df=2, p<.01) were demonstrated by PTSD groups as compared to the non-PTSD group. Interestingly, full and partial PTSD did not differ in these comparisons. Similarly, the subtypes of PTSD did not differ with respect to personality profiles using the K-TCI ; however, personality profiles were sharply differentiated between the PTSD and non-PTSD group. Conclusion : Although high subject homogeneity and small sample size may limit the results of this study, the present results highlight the possibility of the underestimation as well as the insufficient, treatment and compensation of partial vs full PTSD.

Evaluation of Smoke Control Performance of Ventilation System Using by Hot Smoke Test (Hot Smoke Test를 이용한 주차장 환기설비의 제연 성능평가)

  • Joung, Suckhwan
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.2
    • /
    • pp.47-56
    • /
    • 2019
  • Recently, in order to overcome the difficulty of entering a fire source due to the occurrence of a large amount of smoke in the event of a fire in a parking lot, it has used that a method of discharge smoke using air supply, exhaust fans and jet fans installed for ventilation of parking lots. In this study, the variation of flow in the smoke layer was observed using CCTV under two conditions, in which only the air supply fan operates and the manned fan operates together, and the temperature around the plume was compared to Albert eq. to assess its suitability as a parking lot ventilation performance evaluation method. As a result, it was found that the smoke layer could be disturbed if the Jet Fan was operated at the same time, which could lead to the possibility of an initial evacuation disturbance. However, the additional operation of the Jet Fan has been confirmed by the observation CCTV that the emission performance is improved, which is believed to help conduct the suppression operation. The temperature around the plume was measured and compared to Alpert eq, and was analyzed to be about $2^{\circ}C$ lower at the center axis of the plume and $9.0^{\circ}C$ higher at 8 m in the direction of the discharge of smoke. The results of temperature measurements around the plume were lower than the maximum temperature expected in AS 4391 and did not exceed the expected temperature risk caused by the experiment. As with these results, the temperature risk from the progression of hot smoke tests is foreseeable, so it will be available as one of the general evaluation methods for assessing smoke control performance in a parking lot without relevant criteria.

Analysis of Fire Risk Assessment Indicators of Publicly-Used Establishments using Delphi/AHP (Delphi/AHP를 활용한 다중이용업 신종업종의 화재위험평가지표 분석)

  • Kim, Myung-Cheol;Kim, Hak-Joong;Park, Kyung-Hwan;Youn, Hae-Kwon;Lee, Seung-Ho
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.87-94
    • /
    • 2019
  • Through a press release dated July 17, 2018, the Anti-Corruption and Civil Rights Commission recommended that the National Fire Agency develop preventive measures against fire in the "Indoor Archery Ground" and "Room Escape Café" etc., which were originally excluded from the category of "Publicly Used Establishments." This study developed the hierarchy of domains and indicators of measurement for fire risk assessment of the new business of publicly used establishments through the Delphi Method. It analyzed the goodness of fit scores (over 3.00) and secured an average score of 4.25. Using AHP analysis, the ratio of consistency for the domains of measurement of fire risk assessment was found to be 4.0%, which was lower than CR ≤ 0.1 (10%). The consistency of subsequent measurement indicators were distributed in the range of 0.1%~3.6%, and they were identified as being commonly consistent. The indicators of measurement appeared as follows in order of importance and priority: Type of Internal Passage of Establishment and Evacuation Capacity of Exit (0.316), Control of Ignition Source (0.141), Inherent Risk (0.106), Appropriateness and Adaptiveness of Fire Detection System (0.097), Control of Inflammables/Combustibles (0.084), Guides and Facilities helping Evacuation (0.075), Fire Resistant Structure and Finishing Materials (0.060), Compartmentalization and Emergency Exit (0.049), Risk of Fire Expansion (0.046), and Appropriateness and Adaptiveness of Fire Extinguishing Facilities (0.026). The findings of this study are expected to be expansively used as data for future research on the development of fire risk assessment indicators.