• Title/Summary/Keyword: 심층방호

Search Result 13, Processing Time 0.021 seconds

Development of Fire Ignition Frequency Calculation program Using NUREG/CR-6850 Method (NUREG/CR-6850 방법론을 적용한 화재점화빈도 계산 프로그램 개발)

  • Ho, Myoung-Soo;Lee, Jang-Youn;Kang, Dae-Il
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2012.04a
    • /
    • pp.109-112
    • /
    • 2012
  • 원자력발전소는 타 산업시설에 비해 화재발생 가능성이 낮으나 방사성물질 누출가능성을 최소화하기 위하여 심층방어와 다중방호 설계를 통한 안전성확보가 매우 중요하다. 이를 위해 국내에서는 화재위험도분석(FHA)과 안전정지능력분석(SSA) 및 화재 확률론적안전성분석(Fire PSA)을 수행하고 있으며, 이 중 화재 PSA는 주요 화재구역 선별, 구역별 화재발생빈도 및 기기손상확률 계산, 화재사고 경위분석 및 화재취약성 파악 등을 분석한다. 본 논문에서는 미국 원자력규제위원회(USNRC)와 전력연구소(EPRI)가 공동 연구개발한 화재 PSA 방법론인 NUREG/CR-6850 기법을 적용하여, 화재 PSA에 필요한 화재점화빈도(Fire Ignition Frequency)를 정량적으로 계산하였다. 정확한 결과값을 도출하기 위해 매크로를 이용한 프로그램인 FIFA(Fire Ignition Frequency Analyzer)를 개발하였으며, 향후 국내 원전 화재 PSA 분석업무에 유용하게 사용될 수 있을 것으로 기대된다.

  • PDF

A Study on the Response Plan through the Analysis of North Korea's Drones Terrorism at Critical National Facilities - Focusing on Improvement of Laws and Systems - (국가중요시설에 대한 북한의 드론테러 위협 분석을 통한 대응방안 연구 - 법적·제도적 개선을 중심으로 -)

  • Choong soo Ha
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.395-410
    • /
    • 2023
  • Purpose: The purpose of this study was to analyze the current state of drone terrorism response at such critical national facilities and derive improvements, especially to identify problems in laws and systems to effectively utilize the anti-drone system and present directions for improvement. Method: A qualitative research method was used for this study by analyzing a variety of issues not discussed in existing research papers and policy documents through in-depth interviews with subject matter experts. In-depth interviews were conducted based on 12 semi-structured interviews by selecting 16 experts in the field of anti-drone and terrorism in Korea. The interview contents were recorded with the prior consent of the study participants, transcribed back to the Korean file, and problems and improvement measures were derived through coding. For this, the threats and types were analyzed based on the cases of drone terrorism occurring abroad and measures to establish anti-drone system were researched from the perspective of laws and systems by evaluating the possibility of drone terrorism in the Republic of Korea. Result: As a result of the study, improvements to some of the problems that need to be preceded in order to effectively respond to drone terrorism at critical national facilities in the Republic of Korea, have been identified. First, terminologies related to critical national facilities and drone terrorism should be clearly defined and reflected in the Integrated Defense Act and the Terrorism Prevention Act. Second, the current concept of protection of critical national facilities should evolve from the current ground-oriented protection to a three-dimensional protection concept that considers air threats and the Integrated Defense Act should reflect a plan to effectively install the anti-drone system that can materialize the concept. Third, a special law against flying over critical national facilities should be enacted. To this end, legislation should be enacted to expand designated facilities subject to flight restrictions while minimizing the range of no fly zone, but the law should be revised so that the two wings of "drone industry development" and "protection of critical national facilities" can develop in a balanced manner. Fourth, illegal flight response system and related systems should be improved and reestablished. For example, it is necessary to prepare a unified manual for general matters, but thorough preparation should be made by customizing it according to the characteristics of each facility, expanding professional manpower, and enhancing response training. Conclusion: The focus of this study is to present directions for policy and technology development to establish an anti-drone system that can effectively respond to drone terrorism and illegal drones at critical national facilities going forward.

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.