http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
오늘 본 자료
고호준(Ho Joon Ko),장해인(Hae In Jang),조형민(Hyoung Min Cho),김은영(Eun Young Kim),김경심(Kyoung Sim Kim),김용욱(Yong Wook Kim),김령(Young Kim) 조선대학교 의학연구원 2021 The Medical Journal of Chosun University Vol.46 No.1
Background: The incidence of intestinal metaplasia(IM) of stomach mucosa in children was reported ranging from approximately 1 to 3 percent. But, clinical implications, treatment, long-term prognosis, and surveillance protocols of this finding are not well established in this population. Study Objectives: This study aimed to evaluate the relationship between Helicobacter pylori (HP) infection and IM, and the treatment and long-term consequences of IM. Methods: During 6.5 years from March 2013 through August 2019, endoscopy with CLO test and multiple non-targeted biopsies were performed on 423 children and adolescents, 1 to 20 years of age, with alarm features associated with ulcer disease and gastritis. The clinical and laboratory records, macroscopic and microscopic findings of endoscopy were reviewed retrospectively. Results: Thirty-two cases (7.6%) of IM were identified. Two cases (6.3%) with HP infection were detected in 32 cases of IM, and 38 cases (9.7%) in 391 cases of non-IM. The Odds ratio was 0.619 (0.142-2.693). Proton pump inhibitor (PPI) was prescribed for six months in all cases of IM, and endoscopic follow-up was performed after a year in 11 cases. The disappearance of IM was detected in 6 cases (18.8%). Conclusions: The association of HP infection and IM was very low. After six months of PPI medication, the disappearance of IM was detected in a few cases. A close and prolonged clinical and endoscopic follow-up is needed for children and adolescents with IM.
발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구
고호준(Ho-Jun Ko),김휘강(Huy-Kang Kim) 한국정보보호학회 2014 정보보호학회논문지 Vol.24 No.2
발전소 주제어시스템(DCS, Distributed Control System)은 원격지의 설비를 계통현황에 따라 실시간 조작, 감시 및 운전효율성을 향상시키기 위해 튜닝을 하도록 구현된 자동화 시스템이다. DCS는 IT 기술의 발전과 함께 점차 지능화, 개방화 되고 있다. 많은 전력회사들이 DCS에 설비 관리용 패키지 시스템을 접목하여 예측진단을 통한 유지·보수 및 Risk Management를 실현시키기 위한 투자를 확대하고 있다. 하지만, 최근 해외사례에서 보듯이 원전·전력망 등 국가 주요기반시설인 산업 제어시스템(ICS)을 마비시키고 파괴할 목적으로 개발된 최초의 사이버 전쟁무기인 스턱스넷이 출현하는 등, 폐쇄형 시스템으로 구성된 발전소 주제어시스템도 점차 외부 공격으로부터 위협의 대상이 되고 있음을 알 수 있다. 높은 수준의 가용성(낮은 고장빈도와 신속한 복구)과 운영 신뢰성의 이유로 10년 이상 장기 사용이 요구되는 발전소 주제어시스템의 경우 전적으로 해외 기술에 의존하고 있고 패치 업데이트 등 주기적 보안관리가 이뤄지지 못해 잠재된 취약점이 노출될 경우 심각한 우려가 예상된다. 본 논문에서는 국내 발전회사에서 사용 중인 Ovation 1.5 버전의 간이 시뮬레이터 환경에서 범용 취약점 분석툴인 NESSUS를 활용하여 인가된 내·외부 사용자의 악의적 행위(모의해킹)를 수행하였다. 이를 통해 취약점 탐지 및 발전소 제어시스템 내 사이버 침해사고 발생 시 효과적으로 대응 할 수 있는 취약점 분석 및 로그분석 방안을 제시하고자 한다. DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor"s policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.