• Title/Summary/Keyword: 기능적 자산

Search Result 205, Processing Time 0.029 seconds

Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems (원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선)

  • Shin-woo Lee;Jung-hee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.537-552
    • /
    • 2024
  • Domestic nuclear power plants operate under the establishment of the "Information System Security Regulations" in accordance with the Nuclear Safety Act, introducing and implementing a cybersecurity system that encompasses organizational structure as well as technical, operational, and managerial security measures for assets. Despite attempts such as phased approaches and alternative measures for physical protection systems, the reduction in managed items has not been achieved, leading to an increased burden on security capabilities due to limited manpower at the site. In the main text, an analysis is conducted on Type A1 assets performing nuclear safety functions using Maintenance Rules (MR) and EPRI Technical Assessment Methodology (TAM) from both a maintenance perspective and considering device characteristics. Through this analysis, approaches to re-evaluate the impact of cyber intrusions on asset functionality are proposed.

A Study on Sijo Theory of Jasan An Whak (자산 안확의 시조론 연구)

  • Bae, Eun-Hee
    • Sijohaknonchong
    • /
    • v.30
    • /
    • pp.219-240
    • /
    • 2009
  • Jasan An Whak did research on the essence of Sijo to show that Sijo has some features as a literature. I tried to show the formation process of Sijo theory in 1930s through Jasan's Sijo theory. As a preparatory step for it, I introduced Jasan's Sijo theory released in early 1930s and examined the characteristic aspects of it. Jasan recognized a literature as a directing post that reveals the history of our national spirit. He thought a literature as a foundation for satisfying new age. Also, he recognized the essence of a literature as a emotional expression. He emphasized that a new literature in Joseon age should have not only particularity of Joseon literature but also universality of modern literature. Jasan studied style of Sijo. Because he was at the time of modernization, he used the term, 'style', instead of 'poongkyeok', which had used before modern time. He tried to show linguistic artistry of Sijo through the series of his works about the style of Sijo. Jasan tried to find formal beauty of Sijo in the aspect of rhythm instead of rhyme. And he claimed that poetic words can be lengthened or shortened to be harmonious with the melody of Sijo. In other words, it is possible to change the words of Sijo for harmonizing with a tune. Jasan recognized that the words of Sijo have a musical function as well as a semantic function.

  • PDF

A Study on a Measure of Asset Management Information Systems for Highway Transportation Facilities using AHP (계층적 분석기법을 이용한 도로시설 자산관리정보시스템 평가에 관한 연구)

  • Jeong, Seong Yun;Choi, Won Sik;Kim, Woo Je
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.6D
    • /
    • pp.663-673
    • /
    • 2010
  • We are developing asset management information systems to introduce the preventive/proactive approach at operation and management (O&M) of infrastructures. The objective of this study is to explore the future direction for development and operation of asset management information systems. So, we developed the success model and selected the evaluation criteria for analyzing user satisfaction to assess the expected performance of asset management information systems and the degree of impact on asset management functions to operation and management of highway transportation facilities. We estimated the relative importance weight according to the selected evaluation criteria through AHP analysis. We verified the logical consistency of the importance weight and exclude biased outlier from importance weight group using the concept of the Compatibility.

A Comparison between Pavement Asset Management Information Model and Pavement Management Systems based on Level of Service (서비스수준에 기반한 포장자산관리 정보모델과 국도포장관리시스템의 비교)

  • Choi, won-sik;Nah, hei-suk;Jeong, seong-yun;Lim, jong-tae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.469-470
    • /
    • 2011
  • 국도는 사회간접자본 중 하나로서 지속적으로 관리되어야 그 기능을 발휘할 수 있는 국가의 중요한 자산이다. 지금까지는 국도를 포장관리시스템이라는 체계로 관리하여왔다. 이 포장관리시스템은 시설물유지관리차원에서 사회기반시설을 관리하는 것으로서 주로 관리자 관점에서 공학적 판단을 기준으로 최소의 비용으로 공용수명을 최대화하는 모델이다. 그러나 경제발전으로 국민의 소득수준이 올라감에 따라 기본적인 욕구가 해결되어 이제는 납세자로서 국민의 동의는 국가의 정책을 결정하는데 중요한 변수로 작용하기 시작했다. 따라서 사용자 관점의 평가는 이러한 요구의 수준을 측정할 수 있는 중요한 척도가 되었으며 이에 기반한 LoS(Level of Service, 서비스 수준)라는 지수를 시설물 자산관리에 활용하려는 여러 가지 시도가 있다. 이 논문에서는 기존 국도포장관리시스템의 정보모델과 KTAM-40(Korea Total Asset Management-40)이라는 자산관리 정보모델을 비교하여 LoS의 필요성과 도로포장자산관리에서 LoS가 사용자 관점을 반영하는 방식을 조명해 이의 장점을 밝히고자 한다.

  • PDF

The Changes of Social Spatiality in Rural Areas: Focusing on Population Structure and Utilization of Territorial Assets in Gyeongnam Provincial Villages (촌락 지역의 사회적 중간성 변화 -경상남도 촌락의 인구 구조와 영역 자산 활용을 중심으로-)

  • Sim, Kwang-Taek
    • Journal of the Korean Geographical Society
    • /
    • v.44 no.4
    • /
    • pp.510-531
    • /
    • 2009
  • This paper aims to explain the changes of social spatiality in rural areas as seen on a sloping scale in reference of population structure and utilization of territorial assets. Guessing from the population characteristics of rural communities and farming activities in Hwangsan village of Uichon-Myeon, Geochang-Gun and Hanam village of Chogye-Myeon, Hapchon-Gun, it will become a society characterized by super-aged intensification and large-scale crop cultivation. Deokgok-Myeon and Yulji village of Hapchon-Gun are required to intake outside residents. They have to understand the complementary cooperation and become conscious of the relationship between existing residents and relocated people in Yudong village of Yokji-Myeon, Tonyoung-Si. Due to a decreasing population and the phenomena of the 'super-aged', the efforts to revive the spatial function as a living and working space while utilizing territorial assets could be challenged in these case study regions.

A Core Asset Instantiation Process using Variability Type in Product line Engineering (가변성 타입을 이용한 프로덕트 라인 핵심자산 특화 프로세스)

  • Kang, Hyun-Koo;Chang, Soo-Ho;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.2
    • /
    • pp.154-166
    • /
    • 2006
  • Product Line Engineering(PLE) is a software reuse paradigm that core assets are defined using common features in a domain and are instantiated in various applications. To apply the core asset effectively, variants which satisfy application requirements are extracted and the core asset should be also instantiated based on the variants. For the work, variability on architecture and components should be extracted exactly and an instantiation process and guidelines should be defined based on this variability In this paper, we define variability types depending on core assets elements and describe artifact templates related to tile variability. We also propose a systematic process which uses defined core assets including variability and verify practicability of the proposed process and variability expression through doing ease study. If utilizing with the proposed process in PLE, it can be feasible to model concrete core asset and variability and to utilize practical application engineering.

Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines (다중 검색엔진을 활용한 보안관제 모델 개선방안)

  • Lee, Je-Kook;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.284-291
    • /
    • 2021
  • As the current security monitoring system is operated as a passive system only for response after an attacker's attack, it is common to respond to intrusion incidents after an attack occurs. In particular, when new assets are added and actual services are performed, there is a limit to vulnerability testing and pre-defense from the point of view of an actual hacker. In this paper, a new security monitoring model has been proposed that uses multiple hacking-related search engines to add proactive vulnerability response functions of protected assets. In other words, using multiple search engines with general purpose or special purpose, special vulnerabilities of the assets to be protected are checked in advance, and the vulnerabilities of the assets that have appeared as a result of the check are removed in advance. In addition, the function of pre-checking the objective attack vulnerabilities of the protected assets recognized from the point of view of the actual hacker, and the function of discovering and removing a wide range of system-related vulnerabilities located in the IP band in advance were additionally presented.

Cluster-Based Similarity Calculation of IT Assets: Method of Attacker's Next Targets Detection

  • Dongsung Kim;Seon-Gyoung Shon;Dan Dongseong Kim;Huy-Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Attackers tend to use similar vulnerabilities when finding their next target IT assets. They also continuously search for new attack targets. Therefore, it is essential to find the potential targets of attackers in advance. Our method proposes a novel approach for efficient vulnerable asset management and zero-day response. In this paper, we propose the ability to detect the IT assets that are potentially infected by the recently discovered vulnerability based on clustering and similarity results. As the experiment results, 86% of all collected assets are clustered within the same clustering. In addition, as a result of conducting a similarity calculation experiment by randomly selecting vulnerable assets, assets using the same OS and service were listed.

Digital Asset Analysis Methodology against Cyber Threat to Instrumentation and Control System in Nuclear Power Plants (원자력발전소의 디지털계측제어시스템의 사이버보안을 위한 디지털 자산분석 방법)

  • Koo, In-Soo;Kim, Kwan-Woong;Hong, Seok-Boong;Park, Geun-Ok;Park, Jae-Yoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.839-847
    • /
    • 2011
  • Instrumentation & Control(I&C) System in NPP(Nuclear Power Plant) plays a important role as the brain of human being, it performs protecting, controling and monitoring safety operation of NPP. Recently, the I&C system is digitalized as digital technology such as PLC, DSP, FPGA. The different aspect of digital system which use digital communication to analog system is that it has potential vulnerability to cyber threat in nature. Possibility that digital I&C system is defected by cyber attack is increasing day by day. The result of cyber attack can be adverse effect to safety function in NPP. Therefore, I&C system required cyber security counter-measures that protect themselves from cyber threat efficiently and also cyber security design should be taken into consideration at concept stage in I&C system development process. In this study, we proposed the digital asset analysis method for cyber security assessment of I&C system design in NPP and we performed digital asset analysis of I&C system by using the proposed method.

Product Line based Application Methodology for Developing CEC Threat Evaluation System (CEC 위협평가시스템 개발의 제품계열적 적용방법론)

  • Woo, Dong-Sung;Yoon, Hee-Byung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.295-297
    • /
    • 2005
  • CEC, 근접방어무기체계, 지휘통제체계 등에 사용되는 위협평가시스템은 자동위협평가, 방어구역 위협지수, 무기할당 등의 공통된 기능을 포함하고 있고, 시스템 환경의 변화 또는 성능 향상에 따라 수시로 업그레이드가 요구된다. 따라서 본 논문에서는 생산성 향상과 중복투자 방지로 인한 비용감소 효과를 거둘 수 있는 제품계열 방법론을 위협평가시스템 개발에 적용하는 방안을 제안한다. 위협평가시스템의 제품계열 방법론 적용을 위해 핵심자산 개발 프로세스를 수행하여 제품계열 영역지정, 핵심자산, 제품계획을 정의한다. 제품계열 영역지정은 Feature 모델링을 이용하여 공통점과 차이점을 식별하고, 핵심자산은 아키텍처 설계 중심으로, 그리고 각 핵심자산의 부착 프로세스를 종합하여 제품계획을 수립한다.

  • PDF