• Title/Summary/Keyword: Hardware Hardening

Search Result 5, Processing Time 0.023 seconds

Study on the categorization of modus operandi and tools used in domestic burglary (건축물 침입에 이용되는 침입수법 및 도구의 유형화 연구)

  • Park, Hyeon-Ho;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.57-86
    • /
    • 2014
  • As the revision of Building Code including applying crime prevention design to buildings passed recently and target hardening ought to be evidence-based, we studied the Modus Operandi (MO) and intrusion tools of domestic burglary to earn basic data for improvement of crime prevention hardware in the future. To be specific, we reviewed related academic literature and police official statistics of domestic burglary critically and interviewed detectives in charge of burglary to specify and categorize MO and tools. We can derive some implications from research findings, including improvement of the statistical system for the MO of burglary, active sharing of the MO of burglary among the criminal justice agencies and related industries and experts. Also, crime prevention advice and education for the local residents focused on MO of burglary can be recommended. Based on this research, to enhance the level of community safety significantly, performance tests of crime prevention hardware such as security doors and windows etc. and the study on related certification system should be vitalized.

  • PDF

Magnetic field distribution in steel objects with different properties of hardened layer

  • Byzov, A.V.;Ksenofontov, D.G.;Kostin, V.N.;Vasilenko, O.N.
    • Advances in Computational Design
    • /
    • v.7 no.1
    • /
    • pp.57-68
    • /
    • 2022
  • A simulation study of the distribution of magnetic flux induced by a U-shaped electromagnet into a two-layer massive object with variations in the depth and properties of the surface layer has been carried out. It has been established that the hardened surface layer "pushes" the magnetic flux into the bulk of the magnetized object and the magnetic flux penetration depth monotonically increases with increasing thickness of the hardened layer. A change in the thickness and magnetic properties of the surface layer leads to a redistribution of magnetic fluxes passing between the poles of the electromagnet along with the layer and the bulk of the steel object. In this case, the change in the layer thickness significantly affects the magnitude of the tangential component of the field on the surface of the object in the interpolar space, and the change in the properties of the layer affects the magnitude of the magnetic flux in the magnetic "transducer-object" circuit. This difference in magnetic parameters can be used for selective testing of the surface hardening quality. It has been shown that the hardened layer pushes the magnetic flux into the depth of the magnetized object. The nominal depth of penetration of the flow monotonically increases with an increase in the thickness of the hardened layer.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

A Study on Selecting Conditions of Rapid Prototype for Controls of Shape of Micro-hole (미세홀 형상제어를 위한 쾌속조형의 조건선정에 관한 연구)

  • Kim T.H.;Park J.D.;Lee S.S.;Seo S.H.;Jeon E.C.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.738-742
    • /
    • 2005
  • Rapid Prototype has been used to design and Production of part in a variety of fields ; Car, Electronic products, Aviation, Heavy industry etc. Moreover development of hardware gave rise to use the method of Rapid Prototype more and more at high precision and complicated shapes. Expecially, to be using process of products that shapes of Micro-hole ; Cellular phones, Antennas, Jewels, Semi conductor cases. In case of Micro-shape, precision of the shape turns on various condition ; Laser size, Laminate height, scanning speed, overcure, viscosity of resin, etc. Sometimes breaks out the case that interner hole of shape is blocked by viscosity of resin. The phenomenon has solved easily to reduce viscosity of resin. But, in case of the method brings about the problem that strength goes down in actuality products hardening. This study on verify to change of shape of Micro-hole and makes the semiconductor case which has shape of Micro-hole by using resin of higher viscosity, scanning speed and overcure

  • PDF

Characteristics of Intrusion MO and Perception of Target Hardening of Burglars (침입절도범 재소자의 수법 특성과 타겟하드닝 관련 인식)

  • Park, Hyeonho;Kim, Kang-Il;Kim, Hyo-gun
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.33-61
    • /
    • 2019
  • It is quite difficult to actually prove the effectiveness of so-called target-hardening, one of the various strategies used to reduce crime, one of the serious problems in society recently. In particular, three to five minutes is often used as golden time for intruders to give up or stop, which is based on foreign and some indirect research cases in Korea, but there were no studies that more directly identified the average break-in operation time or the abandonment time based on the elapsed time when the shield hardware resists intruders. This study was the first of its kind in Korea to investigate and verify samples of 90 inmates of break-in burglars who were imprisoned in August 2018 by profiling the average criminal experience, education level, age, height and weight of typical Korean professional break-in thieves, and specific criminal methods, average break-in operation time, and the criteria for giving up if not breached. According to the analysis results, in the survey on the number of pre-invasion theft crimes by intruders, many of the respondents who participated in the survey were criminals of professional invasions, and by their physical characteristics, there was not much difference from ordinary adult men. Residential facilities were the highest in the world, followed by commercial and educational facilities. According to the survey on the types of facilities that committed intrusion into residential facilities, it was not safe to say that single-family housing accounted for the largest portion of single-family housing, multi-family housing, apartment high-rise (more than three stories), and apartment low-rise (more than one to three stories) among residential facilities, and that the ratio of apartment high-rise was higher than expected. Based on the average time required to break into a place for an intrusion crime, it is assumed that the psychological time worked in a place where the break-in was difficult, since the break-in was not performed while measuring the time of the break-in operation. In the case of time to give up a crime, more than half of the respondents said they would give up the crime even in less than four minutes, suggesting that a significant number of intrusive crimes can be prevented even if the facility has four minutes of intrusion resistance. This proves that most intruders will give up the break-in if the break-in resistance performance of the security facility is exercised for more than five minutes.