• Title/Summary/Keyword: 보안 시설

Search Result 455, Processing Time 0.024 seconds

The research regarding an information system risk management process characteristics (정보시스템 위험관리 프로세스 특성에 관한 연구)

  • Kim, Tai-Dal;Lee, Hyung-Won
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.303-310
    • /
    • 2007
  • Information system failure is various such as program test unpreparedness, physical facilities for damage prevention unpreparedness from simple software error. Although cross is trifling the result causes vast damage. Recently, became difficult by simple outside security system to solve this problem. Now, synthetic countermove establishment and suitable confrontation connected with danger came in necessary visual point about general Information Technology of enterprise. In connection with, in this paper, various informations and system and control about data that can happen information inside and outside considering integrity for IT resource, solubility, confidentiality within organization studied about special quality to model synthetic Risk Management System that can of course and cope in danger.

The Present State of Domestic Alert Systems for Cyber Threats (사이버 위협에 대한 국내 경보 체계 현황)

  • 이도훈;백승현;오형근;이진석
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.251-257
    • /
    • 2004
  • Todays, the more information technologies(IT) like internet is developed, the more main facilities of individuals and social organizations get deeply involved in IT. Also, the trend of cyber threats such as internet worms and viruses is moving from local pc attacks to IT infrastructure attacks by exploiting inherent vulnerabilities of IT. Social organizations has a limit to response these attacks individually, and so the systematic coordinate center for social organizations is necessary. To analyze and share cyber threat information is performed prior to the construction of the coordinate center. In this paper, we survey domestic alert systems for cyber threats of related organizations and companies, and then classify them into two categories by the range of threat assessment: global alert systems for global If infrastructure and individual alert systems for each threat. Next, we identify problems of domestic alert systems and suggest approaches to resolve them.

  • PDF

Signal Interlocking System of a Programmable Logic Controller Improvement Report (신호보안설비 전자연동장치(PLC) 개선 관련 보고)

  • Seok, Tae-Woo;Ko, Yang-Og;Yoo, Do-Gyun
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.623-628
    • /
    • 2007
  • Metro Subway System is widely known as the leader of public transportation in a metropolitan area. The signal interlocking is one of the most important organs that plays a major role in the system. By improving the quality of signal interlocking on of the traffic system and keeping its maintenance on a high level will not only repair the current state, but it will also let the PLC(Programmable Logic Controller). The Non-Vital relay of No. 3, 4 Line are the most one of the unstable system, device, which underwent a process of fine manufacture establishment and a close examination, obtained as a new device. Utilizing the equipment with cautious preservation on the system will enhance the current state of the signal device. Especially, the test for improvement and development based upon the technique that decreases the frequency of defect produced will further precipitate its efficiency. With authorization of imposing the newly made equipment will bring improvement to the signal technology and to the industry at largest extent.

  • PDF

A Study on the Countermeasure of Traffic Terror (대중교통테러의 대응방안)

  • Kim, Jin-Hyeok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.109-123
    • /
    • 2007
  • Traffic terror is one of the terror types subject on transportation means. However, unlike the aircraft or ship, there is no case of negotiating with passengers as hostage but to unconditionally attack that the human casualty would be much greater. In act, the terror on subway or bus would have much bigger damage than the terror on aircraft or ship. Because of such fact, there is a need for full preparation thereto, however, there is no preparation of advance preventive measure, particularly, when comparing to the cases involving aircraft. In addition, the passengers who use railway and others in the position of citizens do not have any defense mechanism against any terror activity to make the problem even more serious. Therefore, in order to prevent traffic terror, the first thing is to implement the identity confirmation of passengers, followed by the through search of cargos of the passengers, supplement the capability against the terror by the security team members, strengthen the responsive capability of citizens, thorough check on facilities, expansion of social security network and others. All terrors are within the reach of our neighborhood at the time when we neglect it, and the most secured and safe way to prevent the terror is to check and prepare at all times beginning from our familiar facilities or means.

  • PDF

Design and Verification of Newly Developed Anti-jamming GPS Test System (새롭게 개발된 항재밍 위성항법장치 점검 시스템 설계 및 검증)

  • Kwon, Byung-Gi;Lee, Jong-Hong;Heo, Yong-Kwan;Lee, Chul
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.1-7
    • /
    • 2015
  • These anti-jamming GPS systems are verified using large anechoic chamber or field-test until now. When using a large anechoic chamber, Independent verification from external enviroments like noise is an advantage but high cost and availability of chamber are disadvantages. And in case of field test, verification under real propagation enviroment is an advantage but security problem of military equipments and problem of making same test condition are disadvantages. This paper presents an newly developed anti-jamming GPS test system. This test system mainly consists of small anechoic chamber, jamming divider, jamming signal generator and satellite simulator. The small anechoic chamber is installed many jamming antennas to transmit multi jamming signals and the jamming divider is newly developed to control multi jamming signals. According to self performance test and combined test with Anti-jamming GPS receiver, we verified our system's reliability.

Efficient countermeasures against e-terrorism (e-테러리즘의 효율적 통제방안)

  • Lee, Yoon-Ho;Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.271-289
    • /
    • 2009
  • In e-terrorism, terrorists use cyber spaces including the internet in order to strike terror into the heart of a nation. It is revealed that recently happening terror cases use cyber spaces as a strategic tool. This research aims to investigate efficient countermeasures against various types of terror attacks made by terrorists and their cyber networking, in order to contribute to the prevention of terrors from a modern standpoint. Based on the results of the investigation, relevant problems are suggested such that terrors are not cases happening in a specific country only because they take place in cyber spaces, that hacking incidents frequently happen in Korea which is used as a footstool by foreign hackers, and that Korea has poor professional security manpower and foundational facilities in comparison with other advanced countries. Answers to the problems include cultivating cyber information manpower to cope with e-terrorism, making an appropriate budget, setting up networks to integrate and systematize anti-e-terrorism organizations, and intensifying the collection of information of cyber attacks and the analysis of the information.

  • PDF

A Probabilistic Model of Damage Propagation based on the Markov Process (마코프 프로세스에 기반한 확률적 피해 파급 모델)

  • Kim Young-Gab;Baek Young-Kyo;In Hoh-Peter;Baik Doo-Kwon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.524-535
    • /
    • 2006
  • With rapid development of Internet technology, business management in an organization or an enterprise depends on Internet-based technology for the most part. Furthermore, as dependency and cohesiveness of network in the communication facilities are increasing, cyber attacks have been increased against vulnerable resource in the information system. Hence, to protect private information and computer resource, research for damage propagation is required in this situation. However the proposed traditional models present just mechanism for risk management, or are able to be applied to the specified threats such as virus or worm. Therefore, we propose the probabilistic model of damage propagation based on the Markov process, which can be applied to diverse threats in the information systems. Using the proposed model in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

A Experimental Study of Rock Fragmentation with Plasma Method (플라즈마 공법에 의한 암석파괴의 실험적 연구)

  • Yoon, Ji-Son;Kim, Sang-Hoon
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.4 no.1
    • /
    • pp.27-35
    • /
    • 2002
  • For the excavation of the rock, blast method is put into operation in most of the construction site in Korea. In comparison to other methods of excavation, blast method has many merits such as improvement in efficiency in operation, reducement of operation period, and etc. However, blast operation also creates much loss due to the blast vibration, noise, and fly rocks. Thus, in this study, we have examined main features, rock fragmentation effect and the application of plasma method the one of shallow vibration method. In this study, the attenuation exponent of blast method operated in the site was 1.39~1.40 and that of the plasma method was analysed to be 1.45~2.23. From the location where the distance between excavation location and observation location was over 15 m, most of excavation vibration were measured to be less than 0.2 kine(cm/sec), which is also the allowed standard value of sensitive buildings, such as cultural assets and computer facilities. According to the result of FFT(Fast Fourier Transform) analysis, the frequency measured through blast method in this site was 30~50 Hz and the frequency of plasma method ranges in between 30~130 Hz.

  • PDF

Suggestion of Secure Driver Authentication and Vehicle Control System based on NFC Communication and Biometric Information (보안성을 갖춘 NFC 통신 및 생체정보 기반의 운전자 인증 및 차량 제어 시스템 제안)

  • Park, Tae-hwan;Seo, Hwa-joeng;Lim, Ji-hwan;Kim, Ho-won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.4
    • /
    • pp.700-707
    • /
    • 2018
  • Vehicles are used in daily life as convenient transport, it is important to authenticate driver because vehicles are controlled by driver. Especially, in these days, there is a discussion on introduction of Driving Under the Influence car-starting locking device installation for preventing accidents caused by Driving Under the Influence of alcohol, these car-starting locking device installation requires a lot of money and time. Suitable user authentication for solving user's inconvenience during the disabled and men of national merit to receive discount benefits is needed. In this paper, For solving these problems, we propose the efficient vehicle control and user authentication system for preventing driving under the influence and providing the disabled and men of national merit benefit based on driver authentication by using user's smartphone NFC communication and user's biometric information.