• 제목/요약/키워드: 보안구역

Search Result 66, Processing Time 0.022 seconds

A Study on WB(Water-Bubble) Based Highly Secure Flexible Network Section (WB(Water-Bubble) 기반의 강한 보안성을 갖는 탄력적 네트워크 구간에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.737-746
    • /
    • 2017
  • In 2017, amid changes in the security market such as integrated security (IS) and convergence security (CS), a variety of security paradigms in terms of operation and management have been suggested. Rather than changing existing network infrastructure and bringing about fluid, multi-dimensional changes, these solutions and technologies focus entire security capacity on a primary protection, leading to network infrastructure suffering from unexpected inherent violations and problems in a continued manner. Therefore, it is time to propose and develop a flexible network section that can protect from attacks of similar pattern and concentrated traffic attacks by applying a new concept of WB (Water-Bubble) to network infrastructure and analyzing on the basis of experiment and installation. Methodology of the WB-based highly secure flexible network section proposed in this study is expected to provide materials for studies on how to achieve network section security taking into account three major limitations and security standards: fluidity, unpredictability, and non-area scalability by contact point ratio, by changing a network area predicted to be the final target of attack into resonant network section (area) with flexible area changes.

Robot Navigation Control using Laserscanner to Restrict Human Movement (인간행동제약을 위한 레이저파인더 기반의 로봇주행제어)

  • Jin, Tae-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1070-1075
    • /
    • 2013
  • In this research, we describe a security robot system and ongoing research results to control human's wrong direction in order to forbid human to enter security zone. Proposed robot system surveils a security area with equipped laserscanner sensor usually. When it detect walking human who is for the area, robot calculates his velocity vector, plans own path to forestall and interrupts him who want to head restricted area and starts to move along the estimated trajectory. The walking human is assumed to be a point-object and projected onto an scanning plane to form a geometrical constraint equation that provides position data of the human based on the kinematics of the mobile robot. While moving the robot continues these processes for adapting change of situation. After arriving at an opposite position human's walking direction, the robot advises him not to be headed more and change his course. The experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.

Automatic Detection of Dangerous Abandoned Objects for Protection of National Important Facilities (국가주요시설 보호를 위한 유기 위험물 자동 탐지 시스탬 프레임워크)

  • Oh, Won Jun;Ryu, Keun Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.474-475
    • /
    • 2018
  • 전 세계적으로 9.11로 대표되는 자살테러, 비행기테러, 화학가스 테러 등에 의한 인명피해가 늘고 있다. 1986년 김포공항 폭발사고, 1995년 음진리교 지하철 사린가스 사건, 2001년 9.11 사건, 2003년 필리핀 공항 폭탄테러 사건 등의 큰 테러 외에도 작은 사건은 무수히 많다. 이러한 테러 사태를 미연에 방지하기 위한 지능형 영상 보안 감시 시스템이 사회적으로 연구되어왔고 도입되어 왔다. 기존의 지능형 영상 보안 시스템은 모션 디렉션 기반으로 금지구역의 침입자로 판단되는 사람을 찾는 기능 중심으로 발전해왔다. 또한 보안요원의 관찰 모니터를 통해 화면을 계속 주시하는 한계 시간의 존재와 모니터 증가에 따른 한계 시간은 더 급감하게 되는 것으로 판단되었다. 이에 본 연구를 통해 유기물 탐지의 자동화를 추구하고, 보안 요원의 감시 업무를 도와 국가 주요 시설물의 유기물 자동 탐지를 통해 테러로부터 안전하게 보호하고자 한다.

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

An Improvement in Level of Facility Security Operation (시설보안 운영수준 향상방안)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.205-225
    • /
    • 2012
  • This study is to present an improvement of facility security through the evaluation of facility security operation level. To fulfill the purpose of the study, a survey of some facilities was conducted and the result was analyzed as follows; First, although security personnels were deployed in the facilities, the level of security personnel operation was relatively low. Second, job education training level was relatively proper, that is relevant to the result that show the level of service mind and the working mind of security personnel were proper, also relevant to the relatively good work shift system. Third, although situation room was operated well, the level of restricted area set-up and access control of visitor were low, and the level of article inspection and vehicle access control were very low. Forth, the level of security manual application that include detailed security method and procedure was proper. But accident prevention and response manual application was lower than security manual application, that show preparation for fire and negligent-accident is passive. For the improvement of facility security, the high level part and low level part in the survey result could be merged. For example, we could specify factors that show low level in the survey such as security personnel operation, access control of visitor and vehicle, article inspection, accident prevention and response in the security manual and promote education circumstance that show high level.

  • PDF

Decision Making for the Industrial Security Management Measures' Importance in Operation Level (운영 수준에서의 산업보안 관리대책 중요도 결정)

  • Chae, Jeong-Woo;Jeong, Jin-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.389-398
    • /
    • 2013
  • This study aims to support rational security investment decision making through prioritizing on operational level of management measures strategically, in carrying out industrial security activities. For this, AHP survey is conducted against industrial security professionals and analyzed. Thereafter, the importance and the priority of industrial security management measures are determined. As a result, in a comparison evaluation among the criteria, 'ICT service management' represents the highest weight (0.54). And the sub-criteria could be divided into three groups (Group I, II, III), depending on their importance. The sensitivity analysis results show that if the weight of the criterion, 'ICT systems/networks access control' is doubled, the sub-criteria, 'O/S access control', 'application access control', and 'wired/wireless network access control' are enter into top rank group. In case of the criterion, 'physical/environmental security' is doubled, the sub-criteria, 'protection zoning/access control' and 'disaster prevention on business equipment/counter-terrorism' are enter into the top rank group, 'securing utilities' is enter into the mid rank group.

Probability Analysis of Rock Slope Stability using Zoning and Discontinuity Persistence as Parameters (사면의 구역 및 절리의 연장성을 고려한 암반사면의 안정성 확률해석)

  • Jang, Bo-An;Sung, Suk-Kyung;Jang, Hyun-Sic
    • The Journal of Engineering Geology
    • /
    • v.20 no.2
    • /
    • pp.155-167
    • /
    • 2010
  • In analysis of slope stability, deterministic analysis which yields a factor of safety has been used until recently. However, probability of failure is considered as a more efficient method because it deals with the uncertainty and variability of rock mass. In both methods, a factor of safety or a probability of failure is calculated for a slope although characteristics of rock mass, such as characteristics of joints, weathering degree of rock and so on, are not uniform throughout the slope. In this paper, we divided a model slope into several zones depending on conditions of rock mass and joints, and probabilities of failure in each zone are calculated and compared with that calculated in whole slope. The persistence of joint was also used as a parameter in calculation of probability of failure. A rock slope located in Hongcheon, Gangwondo was selected and the probability of failure using zoning and persistence as parameter was calculated to confirm the applicability of model analysis.

An Implementation of Wireless Channel Scanning for Unauthorized Mobile APs Detection (비인가 모바일 AP 탐지를 위한 채널 스캔의 구현에 관한 연구)

  • Hwang, Jaeryong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.363-364
    • /
    • 2015
  • On the area which is restricted an unauthorized WiFi service, mobile WiFi hotspot causes security problems like leaking and gathering internal data. In this paper, we modify a wireless lan driver and implement a detector that periodically scans the wireless channels.

  • PDF

A Study on Implementation Method of ECM-based Electronic Document Leakage Prevention System through Security Area Location Information Management (보안구역 위치정보 관리를 통한 ECM기반 전자문서유출방지 시스템 구현방안 연구)

  • Yoo, Gab-Sang;Cho, Seung-Yeon;Hwang, In-Tae
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.83-92
    • /
    • 2020
  • The current technology drain at small and medium-sized enterprises in Korea is very serious. According to the National Intelligence Service's survey data, 69 percent of technology leaks are made through employees of small and medium-sized enterprises. A document security system was introduced to compensate for the problem. However, small and medium-sized enterprises are not doing well due to their poor environment. Therefore, it proposes a document security system suitable for small businesses by developing a location information machine learning system that automatically creates a document security Green Zone through learning, and an ECM-based electronic document leakage prevention system that manages generated Green Zone information by reflecting it into the document authority system. And step by step, propose a universal solution through cloud services..

A Study on Secure Data Communication System for Hospital using Visible Light (가시 광을 이용한 병원 내 데이터보안통신 시스템 연구)

  • Kim, Minchul;Suh, Taeweon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.96-99
    • /
    • 2019
  • 병원에서는 업무를 효율적으로 수행하기위해 통신장비는 꼭 필요한 장비이다. 하지만 병원 내에서 스마트폰을 비롯한 여러 전자기기의 사용이 제한된 구역이 존재한다. 이는 라디오주파수를 사용하는 디바이스와 전자파를 발산하는 디바이스로 구분되어 함께 통제된다. 이를 위해 본 논문에서는 라디오주파수를 사용하지 않는 가시 광을 이용한 통신방법을 제안하며, 이를 위한 하드웨어를 제시한다. 가시광 통신의 1 kbit/s의 전송속도를 가지는 송신측과 수신측을 디자인했으며 이를 운용하기 위한 보안 인코딩 방식을 제안한다.