• Title/Summary/Keyword: 보안 시설

Search Result 457, Processing Time 0.027 seconds

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications (안전한 SCADA 통신을 위한 트리 기반의 효율적인 키 관리 구조)

  • Choi, Dong-Hyun;Lee, Sung-Jin;Jeong, Han-Jae;Kang, Dong-Joo;Kim, Hak-Man;Kim, Kyung-Sin;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.37-50
    • /
    • 2009
  • The SCADA(Supervisory Control And Data Acquisition) system is a control system for infrastructure of nation. In the past, the SCADA system was designed without security function because of its closed operating environment. However, the security of the SCADA system has become an issue with connection to the open network caused by improved technology. In this paper we review the constraints and security requirements for SCADA system and propose advanced key management architecture for secure SCADA communications. The contributions of the present work are that our scheme support both message broadcasting and secure communications, while the existing key management schemes for SCADA system don't support message broadcasting. Moreover, by evenly spreading much of the total amount of computation across high power nodes (MTU or SUB-MTU), our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power (RTU) nodes at minimal.

Simply Separation of Head and Face Region and Extraction of Facial Features for Image Security (영상보안을 위한 머리와 얼굴의 간단한 영역 분리 및 얼굴 특징 추출)

  • Jeon, Young-Cheol;Lee, Keon-Ik;Kim, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.125-133
    • /
    • 2008
  • As society develops, the importance of safety for individuals and facilities in public places is getting higher. Not only the areas such as the existing parking lot, bank and factory which require security or crime prevention but also individual houses as well as general institutions have the trend to increase investment in guard and security. This study suggests face feature extract and the method to simply divide face region and head region that are import for face recognition by using color transform. First of all, it is to divide face region by using color transform of Y image of YIQ image and head image after dividing head region with K image among CMYK image about input image. Then, it is to extract features of face by using labeling after Log calculation to head image. The clearly divided head and face region can easily classify the shape of head and face and simply find features. When the algorism of the suggested method is utilized, it is expected that security related facilities that require importance can use it effectively to guard or recognize people.

  • PDF

Services analysis and improvement of MKE(Ministry of Knowledge Economy) Cyber Security Center (지식경제사이버안전센터의 대응활동분석과 개선방안)

  • Lee, Seung-Won;Roh, Young-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.249-258
    • /
    • 2012
  • Cyber attacks expose sensitive information and cause fatal damage in both the public and the private sectors. Therefore, MKE (Ministry of Knowledge Economy) Cyber Security Center was founded on July 25, 2008, to perform three major roles. First, it detects and analyzes cyber attacks for the both sectors. Second, its ISAC (Information Sharing & Analysis Center) service analyzes and evaluates the vulnerability of the communication and network infrastructure to security threats, including control systems. Third, it provides CERT/CC (Computer Emergency Response Team Coordination Center) service to prevent and to respond to computer security incidents. This study focuses on the MKE Cyber Security Center's service analysis, which is playing an increasingly larger role in the both sectors. Based on this analysis, after grasping the response services activity and pointing out the problems, this study suggests improvements to the MKE Cyber Security Center.

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

A Study on the Revision of Regulations to Reinforce Security for National Assembly (국회보안강화를 위한 법규개정방안에 관한 연구)

  • Kim, Doo-Hyun;Chung, Tae-Hwang;Choi, Byung-Kwon
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.7-28
    • /
    • 2011
  • This study is to propose the improvement of security related regulations to reinforce security activity and actualize constitutionalism in the National Assembly. For the purpose, some improvements could be considered as followings; First, legislating of regulations including some articles on the scope of security activity such as order preservation at assembly hall, facility security, security agents' right and protection of personal is necessary. Second, changing the organization and command system of security management is necessary for the unification of security activity and efficiency of the job. Also clear definition of terminology on the security job is need. For the shake of above object, one officer in charge of situation management and three section such as the personal protection section, facility security section and order preservation section could be substructured under security department. Third, elimination of unnecessary article on the arrest of red handed criminal in the assembly hall and on the physical checkup of audience by security agent is need. Also legislating of regulations on the hoarding of person who could disorder is necessary. Forth, legislating of regulations on the cooperation with government branch, judicial police power, carry and use of weapon and uniform and equipment to reinforce practical efficiency of security activity. For the proper legislating of the regulations, comparition with other public organizations such as presidential security Service, police, private security could be considered.

  • PDF

Study on security measures for protecting major national facilities using the wind corridor (바람길을 활용한 국가중요지역 안전대책 강구에 관한 연구)

  • Choi, Kee-Nam
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.109-120
    • /
    • 2011
  • How meteorological situations have affected human life for survival have been an important element of living or military strategy throughout history. In modern society, overcrowding of cities has brought about many problems. Moreover, high-rise buildings and land cover have been causing abnormal weather conditions. The wind corridor, especially in urban areas has been flowing differently from the dominant weather condition of the surroundings. Therefore, the wind corridor in urban areas can be a main component in protecting major national facilities in urban areas from damage. Especially the wind corridor is a main factor to derive harm from poisonous substances in air. This paper seeks to find out the wind corridor in urban areas and the efficiency of that. In addition to that, it studies how to use the direction to protect major national facilities and areas from damage. It is considered that this study will be useful to make defence project, not only for preventing CBR(chemical, biological, and radiological) terrorism and violent assembly, but also for evacuation of people in case of big accidents or natural disasters.

Prospects about Nuclear Electro Magnetic Pulse developed by North Korea (북한의 핵전자기파(NEMP)탄 개발에 대한 전망)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.159-164
    • /
    • 2017
  • The international community recognizes North Korea's nuclear and missile provocation as a real threat. This is due to the analysis and evaluation that has developed nuclear electro magnetic pulse of domestic and overseas North Korea experts, intelligence agencies related to electro magnetic pulse. Electro magnetic pulse experts are concerned about North Korea's nuclear electro magnetic pulse in the following aspects. First, industrial, military, medical, and living facilities in modern society are constructed with electrical and electronic systems. So, All electrical and electronic appliances will become neutralization if North Korea's nuclear electro magnetic pulse was set off over the world(i.e. Korean Peninsula, United States etc). Second, North Korea will judge that possibility of criticism by the international community is low from the point of view of an attacker. Because nuclear electro magnetic pulse aim to destroy only the electronic equipment of the opposite nation and cause damage rather than taking life. Finally, nuclear electro magnetic pulse is more threatening than weapons like mass destruction because it does not need to hit targets accurately and can strike a wide area with nuclear weapon of the low technology levels. In this respect, we will analyze and evaluate nuclear and missile development and make a prospects about nuclear electro magnetic pulse developed by North Korea.

A Study on the Consciousness of Maintenance Work of Small-scale Apartment Owners (소규모 공동주택 소유자의 유지관리 업무에 대한 의식구조 분석)

  • Cha, Chang Jin;Yoon, Hyo Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.5
    • /
    • pp.647-656
    • /
    • 2019
  • This paper aims to analyze the priority of elements in building management system surveying owners living in Small-scale Apartment, and to suggest basic data for establishing effective management alternatives. To achieve the goal, this paper extracted the elements from a guideline supported by the Ministry of Land, Infrastructure and Transport in Korea, and tried to analyze their priority. The result as follows. First, the analysis of the first level suggested that people give priority to facility management, moving management, security management and administrative for management. Second, on the analysis of the second level, settlement of budget was the most important for the administrative, cleaning for facility management, parking management for security management and advertisement of the administrative for moving management. By suggesting the result, this paper concludes that it would be very important to establish a regional management corporation to manage the Small-scale Apartment.

A Study of the Next Generation STOCK-NETWORK and Design (차세대 증권전산망(STOCK-NET)의 연구와 설계)

  • Ha, Sung-Yong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.95-102
    • /
    • 2008
  • The next generation network preparation of stock computer network designated to facilities and goal facilities-based national main information communication certainly necessary for 'national competitiveness enhancement and national economic strength elevations'. This paper studies current government policy and network, security and securities computer network, and substitute for securities computer network-based the existing SONET/SDH, and next generation securities computer network designs so as to provide ALL-IP service-based MPLS for international GMG service. Set up stability, standardization, security, a basis of and compare is current next generation securities computer network by each bases in case of designs. Analyze an expected effect to have been improved at next generation stock computer network characteristics and merits and substitution width and QoS, communication instrument liquor, an information protection system etc. too. Result of research of this paper will contribute to national competitiveness enhancement and a national economic strength elevation to accomplish u-Korea.

  • PDF