• Title/Summary/Keyword: terror

Search Result 353, Processing Time 0.025 seconds

A Countermeasure to Terrorism of Japanese Governmental Organization and Implication to Korea (일본 정부기관의 테러대응책과 한국에의 함의)

  • Kwon, JeongHoon
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.4
    • /
    • pp.423-428
    • /
    • 2013
  • This study aims at countering terror. So, this study explores an implication to Korea through the countermeasure of Japanese organizational direction to countermeasure. As a result, first, some countermeasures on IED need to be sought. Second, a chance of domestic terrorism growing should be checked. Third, safety of major facilities needs to be saught. Finally, Public Service System on Education and Information for Counterterrorism must be built.

A Study on the auto fire-extinguishing system in the subway train (지하철 전동차내 자동소화 시스템 연구)

  • Lee Tae-Shik;Moon Young-Hyun;Hong Hyo-Sik
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.168-173
    • /
    • 2004
  • This research shows the method about the auto extinguishing system construction for the subway train's safety operation. The safety system is the total auto extinguishing system which it is able to overcome the emergency situation, to see fast using the sensing system, to interface using the communication system, finally to extinguish the large-scale fire happened. The system model is the total disaster mitigation system model preventing the arson or terror. and to apply a method of the fire extinguishing system using reinforced fire extinguishing agency in the world first. It is to use the subway train and the railroad train which is prevented and mitigated the large-scale demage the same as the arson and the terror.

  • PDF

Design and Implementation of Watermarked Packet Creation System for the Intruder Traceback (침입자 역추적을 위한 워터마크 패킷 생성 시스템 설계 및 구현)

  • Han, Seung-Wan;Seo, Dong-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2249-2252
    • /
    • 2003
  • 역추적 기술은 해킹이 발생했을 때 해커의 실제적인 위치를 추적하는 기술이다. 해커의 위치를 추적하기 위해 현재 가장 널리 사용되는 방법은 시스템 관리자의 시스템 로그 분석과 시스템 관리자 사이의 상호 정보 교환을 통한 수동적인 역추적 방법이다. 그러나 수동적인 역추적 방법은 수작업으로 수행되는 시스템 로그 분석과 관리자의 개입으로 인하여 땀은 비용이 요구되고 추적 시간의 지연이 발생하기 때문에 이러한 수동적인 방법으로는 해커의 위치를 실시간으로 추적할 수 없다. 만약, 네트워크의 특정 패킷을 식별 가능한 형태로 가공할 수 있다면, 특정 패킷의 이동 경로를 효과적으로 추적할 수 있어 공격자의 위치를 실시간 역추적 하는데 활용될 수 있다. 본 논문에서는 네트워크의 특정 패킷에 의미적인 워터마크를 삽입하여 워터마크 패킷을 생성하는 워터마크 패킷 생성 시스템을 설계하고 구현한다. 이 시스템은 중간 경유지를 활용하여 우회 공격하는 공격자의 실제 위치를 실시간 역추적 하는 ACT 역추적 기법의 구현에 활용되었다.

  • PDF

Criminal Justice Policy against Terrorism in China

  • Xuan, Song-He
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2016
  • China is defending the terrorist crime through the Anti-Terror Law and anti-terrorism criminal legislation. China's Anti-Terror Law and the Criminal Code Amendment (9), which were promulgated in 2015, provide legal grounds for preventing and hurting ever-growing terrorist crimes. In particular, China's amendment to the Criminal Code (9) is designed to rigorously enforce the legal framework for terrorist crimes, protect prejudicial rights that might be violated by serious terrorist crimes, and protect the penalties for terrorist crimes. However, China's anti-terrorism legislation still has drawbacks such as lack of systematicity, limited regulatory boundaries, and lack of rigorous penalties for the establishment of anti-terrorism legislation. To counter this, China's anti-terrorism legislation must strictly regulate the legal system of terrorist crimes, secure penalties, and prescribe anti-terrorism laws as professional chapters.

A Study on Airport Security Performance Improvement based on Risk Management Concept (위험관리 개념에 근거한 항공보안업무 합리화 방안 연구)

  • Hwang, Kyung-Chul;Yoo, Kwang-Eui
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.2
    • /
    • pp.47-57
    • /
    • 2012
  • The strengthened aviation security measurements caused by increased terror threat all around the world have air passengers annoyed by uneasy treatment and some delayed process. The service level of air travel and competitiveness of airlines industry has been weakened also. The aviation security process is mainly conducted at an airport. The threat level of airport is not usually same airport to airport, and the quality of aviation security activity is neither same. However, ICAO requires every international airport to conduct similar process to ensure aviation security without considering situational difference of each airport. The paper has objectives to develop reasonable security measurements based on risk management concept. It studied the ways of achieving target level of security of an airport, considering the threat situation of the airport and its ability to conduct security procedures.

The Sublime in Contemporary Fashion - Focused on the Fashion from the Early 90's - (현대 패션에 표현된 숭고미에 관한 연구 - 1990년 이후부터 현재까지의 패션을 중심으로 -)

  • Choi Soo-Hyun
    • Journal of the Korean Society of Costume
    • /
    • v.55 no.7 s.98
    • /
    • pp.114-130
    • /
    • 2005
  • In postmodernism, the sublime that reaches ecstasy overcoming terror or pain is described as the most expressive phenomenon. The purpose of this study is to understand the sublime expressed in contemporary fashion. for this purpose, 1 investigated the theories of the sublime, categorized the definition and modes, then applied those categories for contemporary fashion. Documentary studies were conducted through aesthetic, design and fashion books and the demonstrative studies were processed by analyzing photos from fashion magazines. In the history of aesthetics, the sublime is explained as the ambivalent feeling mixed with pain and pleasure, terror and delight or negation and affirmation. In this study, the sublime could be defined as the aesthetic pleasure through the transcendence of the pain and terror and classified into 3 categories, the tragic, the initiative, and the deconstructive. The tragic sublime that includes the terrific, the disgusting and the religious character is expressed through the image of death or the physical torture, the satanic image or disgusting object and the ascetic image and religious sign or icons. The limitless sublime that includes the giant and the dynamic character is accomplished by consist of the elongation or the enlargement and the powerful authority. The deconsturctive sublime that includes the negative, the indeterminate and the complex character is associated with the deconstruction in style, the reversal of image and the destruction of the space of the body. Analysis on the sublime expressed in contemporary fashion may provide an excellent way for understanding human aesthetic consciousness in dress.

A Study on New Selective Agent Attack Technology in Windows System (윈도우시스템에서 새로운 선택적 에이전트 공격 기술에 관한 연구)

  • Kim, Yeong-Woo;Lim, Young-Hwan;Park, Won-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.226-233
    • /
    • 2012
  • Recently, Like we saw with 3.4 DDoS Cyber Terror, a behavior of cyber terror becomes increasingly more complicated, sophisticated and larger, and there has been largely damage on industry, the general economy. For responding cyber terrors which occur in the future, we should recognize security holes of system which isn't exposed yet before attacker in advance as we anticipate and implement new technique of cyber attack which not exist hitherto. We design and implement a new technique of cyber attack; it seems to us that a server denies agent' service by altering value of registry in windows system. Network connections of agent are restricted to the new technique we suggest as the a value of registry is changed to a less value than a necessary value and there has happened packet loss by attacker.

DYNAMICS OF PAKISTAN'S POST 9/11 CRISIS FOREIGN POLICY DECISION-MAKING PROCESS

  • Hussain, Mehmood
    • Korea and Global Affairs
    • /
    • v.2 no.2
    • /
    • pp.157-184
    • /
    • 2018
  • The study has applied the four stage "Model of State Behavior in Crisis" to trace the post 9/11 crisis foreign policy decision making process in Pakistan. It argues that ominous attacks on the United States by al-Qaeda and subsequent declaration of President Bush to fight against terrorism transformed the global and regional politico-security dimensions at t1 stage. Being a neighboring country, Pakistan's support was inevitable in the war on terror and Washington applied coercive diplomacy to win the cooperation from Islamabad. Consequently, in case of decline to accept American demands, Pakistan perceived threat to basic values/objectives of the country and simultaneous time pressure amplified the psychological stress in decision makers at t2 stage. Therefore, the decisional forum was setup at t3 stage and Pakistan decided to join the United States at t4 stage, which defused the foreign policy crisis.