• Title/Summary/Keyword: 사고대응체계

Search Result 382, Processing Time 0.022 seconds

Study on the Trend for Changing Civil Aviation Law in Korea (국내 항공법 체계 개정 방안 - 외국의 항공법 체계와의 비교를 중심으로 -)

  • Lee, Kang-Seok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.2
    • /
    • pp.55-96
    • /
    • 2004
  • The Reform Aviation Act of 2004 that which devided the basic aviation act and the act related aviation accident investigation announced in July 2004. The purpose of this study is to review standards and recommendations of Annexes for International Civil Aviation Convention and CFR of FAA in USA, Aviation Act of Japan, Civil Aviation Act of Australia, Aeronautics Act of Canada, Air Navigation Act of Singapore. and then after these review, we tried to compare them with Korean Aviation Law, Enforcement Decree, Regulations related their system. At the result of this study, we find out many advanced countries divided into basic Aviation act and accident investigation act. finally we have suggested mid and longtern plan and implementation which applicable to set up domestic aviation law system.

  • PDF

Developing an Intelligent System for the Analysis of Signs Of Disaster (인적재난사고사례기반의 새로운 재난전조정보 등급판정 연구)

  • Lee, Young Jai
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.2
    • /
    • pp.29-40
    • /
    • 2011
  • The objective of this paper is to develop an intelligent decision support system that is able to advise disaster countermeasures and degree of incidents on the basis of the collected and analyzed signs of disasters. The concepts derived from ontology, text mining and case-based reasoning are adapted to design the system. The functions of this system include term-document matrix, frequency normalization, confidency, association rules, and criteria for judgment. The collected qualitative data from signs of new incidents are processed by those functions and are finally compared and reasoned to past similar disaster cases. The system provides the varying degrees of how dangerous the new signs of disasters are and the few countermeasures to the disaster for the manager of disaster management. The system will be helpful for the decision-maker to make a judgment about how much dangerous the signs of disaster are and to carry out specific kinds of countermeasures on the disaster in advance. As a result, the disaster will be prevented.

  • PDF

A Study on Reforming the National Personal Identification Number System : The Unconnected Random Personal Identification Number System (국가 개인식별번호체계 개선에 관한 연구 : 독립적 난수기반 개인식별번호체계로 전환)

  • Han, Mun-Jung;Jang, GyeHyun;Hong, Seokhie;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.721-737
    • /
    • 2014
  • The Resident Registration Number(RRN) system has been effectively acted as a national identification system since it was enforced. On the other hand, there are some problems such as leakages of personal informations including RRNs on a large scale and each RRN makes a pair with each person in all areas of the society. Nevertheless leakages of them might cause a big damage, there is no radical countermeasure for they are never changed in actual fact. In Republic of Korea, a RRN acts as a primary key of a database, so it has to be protected by severing the connectivity between leaked RRNs and the other personal data. In this paper, the Unconnected Random Personal Identification Number system is proposed for preventing damage of data spills by removing a dependency which the RRN has. Furthermore, this paper suggests the solutions against some potential issues in the system.

Developing an XR based Hyper-realistic Counter-Terrorism, Education, Training, and Evaluation System (확장현실(XR) 기반 초실감 대테러 교육훈련체계 구축 방안 연구)

  • Shin, Kyuyong;Lee, Sehwan
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.65-74
    • /
    • 2020
  • Recently, with the rapid development of eXtended Reality(XR) technology, the development and use of education and training systems using XR technology is increasing significantly. In particular, in areas that involve great risks and high costs such as military training and counter-terrorism training, the use of XR based simulators is preferred because they can improve training performance, reduce training costs, and minimize the risk of safety issues that may occur in actual training, by creating a training environment similar to actual training. In this paper, we propose a plan to build and evaluate an XR based hyper-realistic counter-terrorism education, training, and evaluation system to improve the ROK police's ability to respond to terrorist situations using the 5G and AR based Integrated Command and Control Platform previously developed by the Korea Military Academy. The proposed system is designed to improve counter-terrorism capabilities with virtual training for individual and team units based on hyper-realistic content and training scenarios. Futhermore, it can also be used as a on-site command and control post in connection with a simulation training site and an actual operation site.

A study on the Trend Analysis and Road map Design of the Facilities Disaster and Safety Technology in the Country and Oversea (국내외 인적재난 안전기술개발 동향분석 및 로드맵 수립에 관한 연구)

  • Lee, Tae Shik;An, Jae Woo;Song, Cheol Ho;Seok, Geum Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.3
    • /
    • pp.49-57
    • /
    • 2013
  • This paper is to show the long-term roadmap by analyzing the development trend for the safety technology of facility disaster in the country and abroad, and it is designed to plan the long term and roadmap in response to change the disaster environment. Recently in the country, it is increasing the needs of the long term roadmap design of the facility disaster research development in the facility disaster, by the repidly of the social and the living and the related governments response's changing. The U.S. is going to develop the disaster responding research by planning the its master plans, including the NRF (National Responing Framwork), the NIMS (National Incident Management System), and its sinarios etc.. Japan is going to develop the research planning in the annual report of the disaster prevention, and we going to do the study projects about the facility disaster area with the NEMA (National Emergency Management Agency) and NDMI (National Disaster Management Institute). This paper is showed to design the long term roadmap of the facility disaster's study development, and to minimize the damage of the man and his property, and to set the study development system of the national facility disaster, and furthering to make the resilient planning in changing of the facility disaster's environment.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

A Study on Traffic Situation Recognition System Based on Group Type Zigbee Mesh Network (그룹형 Zigbee Mesh 네트워크 기반 교통상황인지 시스템에 관한 연구)

  • Lim, Ji-Yong;Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1723-1728
    • /
    • 2021
  • C-ITS is an intelligent transportation system that can improve transportation convenience and traffic safety by collecting, managing, and providing traffic information between components such as vehicles, road infrastructure, drivers, and pedestrians. In Korea, road infrastructure is being built across the country through the C-ITS project, and various services such as real-time traffic information provision and bus operation management are provided. However, the current state-of-the-art road infrastructure and information linkage system are insufficient to build C-ITS. In this paper, considering the continuity of time in various spatial aspects, we proposed a group-type network-based traffic situation recognition system that can recognize traffic flows and unexpected accidents through information linkage between traffic infrastructures. It is expected that the proposed system can primarily respond to accident detection and warning in the field, and can be utilized as more diverse traffic information services through information linkage with other systems.

Study on the way of Institutionalized Budget for Information Security (정보보호 강화를 위한 예산편성 제도화 방안 연구)

  • Kim, So-Jeong;Choi, Seok-Jin;Lee, Cheol-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.115-122
    • /
    • 2007
  • US is strengthening the information security by managing federal agency's information and information system systematically. For this purpose. US government put the Federal Information Security Management Act into the E Government Act of 2002. According to the FISMA, it is required to have information securitv management plan for all federal agencies. In addition that, OMB Circular A II requires all federal agencies to identity the ratio of information security investment. That is the basis of strengthening the information security of federal agency, This paper will compare the budget status and information security mechanism of Korea and US.

The Management of Water Supply and Sewerage Facilities using GIS Technique for Urban Local Area (도시내 소규모 단지의 상.하수도 시설물관리를 위한 GIS 기술의 활용)

  • 김충평;김감리
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.17 no.1
    • /
    • pp.51-59
    • /
    • 1999
  • Today there are many problems of facility management, water supply and sewerage, because expansion of urban and growing of population, limitation of old facility management. The nearest, it is needed to use GIS technique to reduce the pollution of underground water from sewage leaking and to make quick search of an accident area for water service pipe damage. Therefore, this paper shows that GIS is efficient and scientific technique for management of Urban facilities, water supply and sewerage. Finally, I think that this study help managers of facilities.

  • PDF

A Design for Single Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증 설계)

  • Lee, Jae-Wan;Ban, Kyung-Sig;Kim, Hyoung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.457-460
    • /
    • 2007
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services.

  • PDF