• Title/Summary/Keyword: 안전보증

Search Result 250, Processing Time 0.021 seconds

ADONIS: A Service Design and Certification Management Tool for Certification of Software Development Process in International Standard Organization (국제표준기국의 SW 개발 공정 인증을 위한 서비스 설계 및 인증 관리 도구: ADONIS)

  • Lee, Sunghyeon;Choe, Youngbuk;Lee, Moonkun
    • Journal of Service Research and Studies
    • /
    • v.8 no.1
    • /
    • pp.59-72
    • /
    • 2018
  • In the perspective of service, it is important to institute certification process required by International Standard Organization (ISO) for software (SW) development process, since Information and Communication Technology (ICT) takes high portion of the Korean industry and its certification for SW is essential internationally for trade. In addition, the certification service provided by BPMN tools like ADONIS is absolutely necessary. In that perspective, this paper proposes a new approach to satisfy this kind of necessity. This approach provides the certification service for the safety of SW required at the international level in Korean industry. Furthermore, the approach can be applied to other domains beside the SW. In order to demonstrate the approach, this paper shows how to guarantee service design for certification of ECSS-E-40 of European Space Agency (ESA) with ADONIS. This paper focuses on specification and verification of SW in E-40, and the main requirement for the verification will be safety of the SW.

A Study of Information Security Maturity Measurement Methodology for Banking System based on Cyber -based Transaction Processing Architecture Diagnosis (사이버거래 처리 구조 진단을 기반으로 한 뱅킹시스템 정보보호 성숙도 측정방법론 연구)

  • Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.121-128
    • /
    • 2014
  • SSE-CMM for security engineering, engineering, assurance, risk is divided into three elements of the process maturity assessment model and the level of information security presented. Maturity measurement of privacy, vulnerability diagnosis and risk analysis methodologies is used in practical field for present a comprehensive conclusion. The common cyber services are internet banking, mobile banking, telephone banking and the like. Transaction structure, a kind of cyber-banking system, information security maturity of the existing measurement methodologies for research purposes, vulnerability diagnosis and risk analysis methodologies to be used in practical field present a comprehensive conclusion. To ensure safety and convenience for the user, convenient to deal with cyber environment is the key to the activation of cyber trading. Particularly by measuring the maturity of cyber banking system to ensure the safety of the practice field much effects are expected as a result.

Method for Calculating the Line Capacity Using Computer Aided Simulation (시뮬레이션 기법에 의한 선로용량 산정방법)

  • Choi, Jong-Bin;Lee, Jinsun;Ki, Hyung-Seo
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.4
    • /
    • pp.555-563
    • /
    • 2016
  • Line capacity of railways is a core criterion to decide maximum trips in accordance with traffic demand and a priority in railway investment to improve transportation capability. Particularly, because two operators will start revenue services in the HSR from mid-2016, the line capacity should be carefully calculated and controlled to avoid conflicts between the maximum number of KTXs, and the number needed to guarantee the effective competition of the operators. Meanwhile, there have been many arguments about calculating the line capacity, because this number is affected by the number of trips by train types, stopping pattern and dwell time in each station, journey time, crossing or passing, safety headway between trains, etc. To deal successfully with these kinds of problems, this study proposes a simulation method to calculate the line capacity that considers train operation according to the operator's service policies.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

Protection Profile for Smart Meters: Vulnerability and Security Requirements Analysis (스마트미터의 취약성/보안요구사항 분석 CC v3.1 기반 보호프로파일 개발)

  • Jung, Chul-Jo;Eun, Sun-Ki;Choi, Jin-Ho;Oh, Soo-Hyun;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.111-125
    • /
    • 2010
  • There is a growing interest in "smart grid" technology, especially after the government recently announced "low-carbon green-growth industry" project. A smart grid uses "smart meters", which can be deployed in any power-consuming places like homes and factories. It has been shown that smart meters have several security weaknesses. There is, however, no protection profile available for smart meters, which means that safety with using them is not guaranteed at all. This paper analyzes vulnerabilities of smart meters and the relevant attack methods, thereby deriving the security functions and requirements for smart meters. Finally, we propose a protection profile based on Common Criterion v3.l for smart meters.

A Study on Improving Plan of the Evaluating System for Efficient Defense M&S Accreditation Work (효율적인 국방M&S 인정업무 수행을 위한 평가시스템 발전방안 연구)

  • Han, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.42-48
    • /
    • 2021
  • Recently, the defense industry has been improving high technology by developing convergence technology through the 4th industrial revolution. On the other hand, it is very difficult to guarantee the performance of high-tech weapon systems because the test for weapon systems has many risks and cannot perform in an actual operating environment. Therefore, M&S resources are needed to make sound weapon systems, but many people demand reliable M&S resources. Owing to the continuous demand and execution of the VV&A work, related rules have developed significantly, but tools and techniques for performing the work have not been developed. Hence, there are inefficient parts in the performance of work due to the absence of a systematic system. Accordingly, many risks may cause various safety accidents, such as security. This paper suggests a direction for the development of VV&A work procedures by improving efficiency and reducing risk.

Real-Time RT-PCR for Validation of Reovirus Type 3 Safety During the Manufacture of Mammalian Cell Culture-Derived Biopharmaceuticals (세포배양 유래 생물의약품 생산 공정에서 Reovirus Type 3 안전성 검증을 위한 Real-Time RT-PCR)

  • Lee, Dong-Hyuck;Jeong, Hyo-Sun;Kim, Tae-Eun;Oh, Seon-Hwan;Lee, Jung-Suk;Kim, In-Seop
    • Korean Journal of Microbiology
    • /
    • v.44 no.3
    • /
    • pp.228-236
    • /
    • 2008
  • Validation of viral safety is essential in ensuring the safety of mammalian cell culture-derived biopharmaceuticals, because numerous adventitious viruses have been contaminated during the manufacture of the products. Mammalian cells are highly susceptible to Reovirus type 3 (Reo-3), and there are several reports of Reo-3 contamination during the manufacture of biopharmaceuticals. In order to establish the validation system for the Reo-3 safety, a real-time RT-PCR method was developed for quantitative detection of Reo-3 in cell lines, raw materials, manufacturing processes, and final products as well as Reo-3 clearance validation. Specific primers for amplification of Reo-3 RNA was selected, and Reo-3 RNA was quantified by use of SYBR Green I. The sensitivity of the assay was calculated to be $3.2{\times}10^0\;TCID_{50}/ml$. The real-time RT-PCR method was proven to be reproducible and very specific to Reo-3. The established real-time RT-PCR assay was successfully applied to the validation of Chinese hamster ovary (CHO) cell artificially infected with Reo-3. Reo-3 RNA could be quantified in CHO cell as well as culture supernatant. When the real-time RT-PCR assay was applied to the validation of virus removal during a virus filtration process, the result was similar to that of virus infectivity assay. Therefore, it was concluded that this rapid, specific, sensitive, and robust assay could replace infectivity assay for detection and clearance validation of Reo-3.

A Framework to Develop Safe and Reliable SaaS Certification Systems (안전하고 신뢰할 수 있는 SaaS(Software as a Service) 인증제도 개발을 위한 프레임워크)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.523-528
    • /
    • 2012
  • The recent appearance and evolution of cloud service including IaaS(Infrastructure as a Service), PaaS(Platform as a Service) and SaaS(Software as a Service) is potentially one of the major advances in information and communication technology. While a lot of studies are currently taking place in the technology itself, there is an equally urgent need for understanding and researching the business-related issues surrounding cloud service. As more and more individuals and companies use the cloud service, their concerns are beginning to grow about just how safe and reliable an environment it is. This paper focus on SaaS as an one of the important cloud service. For successful implementation of SaaS service, it is necessary to establish the certification systems to ensure safety and reliability of SaaS. This paper provides the safe and reliable framework for systematic SaaS certification systems. In order to develop it, the critical issues related to service quality and certification of SaaS service are identified and the systematic framework for certification systems of SaaS service and service provider domains are developed. An evaluation methodology for the developed certification systems is also proposed.

Real-Time AT-PCR for Quantitative Detection of Bovine Parainfluenza Virus Type 3 during the Manufacture of Biologics (생물의약품 제조공정에서 Bovine Parainfluenza Virus Type 3 정량 검출을 위한 Real-Time RT-PCR)

  • Lee, Dong-Hyuck;Kim, Chan-Kyong;Kim, Tae-Eun;Kim, In-Seop
    • KSBB Journal
    • /
    • v.23 no.4
    • /
    • pp.303-310
    • /
    • 2008
  • Bovine blood, cell, tissue, and organ are used as raw materials for manufacturing biologics such as biopharmaceuticals, tissue-engineered products, and cell therapy. Manufacturing processes for the biologics have the risk of viral contamination. Therefore viral validation is essential in ensuring the safety of the products. Bovine parainfluenza virus type 3 (BPIV3) is one of the common bovine pathogens and has widely been known as a contaminant of biologics. In order to establish the validation system for the BPIV3 safety of biologics, a real-time RT-PCR method was developed for quantitative detection of BPIV3 contamination in raw materials, manufacturing processes, and final products. Specific primers for amplification of BPIV3 RNA was selected, and BPIV3 RNA was quantified by use of SYBR Green I. The sensitivity of the assay was calculated to be 2.8 $TCID_{50}/mL$. The real-time RT-PCR method was validated to be reproducible and very specific to BPIV3. The established real-time RT-PCR assay was successfully applied to the validation of Chinese hamster ovary (CHO) cell artificially infected with BPIV3. BPIV3 RNA could be quantified in CHO cell as well as culture supernatant. Also the real-time RT-PCR assay could detect 7.8 $TCID_{50}/mL$ of BPIV3 artificially contaminated in bovine collagen. The overall results indicated that this rapid, specific, sensitive, and robust assay can be reliably used for quantitative detection of BPIV3 contamination during the manufacture of biologics.

Real-Time PCR for Quantitative Detection of Bovine Herpesvirus Type 1 (Bovine Herpesvirus Type 1 정량 검출을 위한 Real-Time PCR)

  • Lee, Dong-Hyuck;Jeong, Hyo-Sun;Lee, Jung-Hee;Kim, Tae-Eun;Lee, Jung-Suk;Kim, In-Seop
    • Korean Journal of Microbiology
    • /
    • v.44 no.1
    • /
    • pp.14-21
    • /
    • 2008
  • Bovine blood, cell, tissue, and organ are used as raw materials for manufacturing biopharmaceuticals, tissue engineered products, and cell therapy. Manufacturing processes for the biologicals using bovine materials have the risk of viral contamination. Therefore viral validation is, essential in ensuring the safety of the products. Bovine herpesvirus type 1 (BHV-1) is the most common bovine pathogen found in bovine blood, cell, tissue, and organ. In order to establish the validation system for the BHV-1 safety of the products, a real-time PCR method was developed for quantitative detection of BHV-1 in raw materials, manufacturing processes, and final products as well as BHV-1 clearance validation. Specific primers for amplification of BHV-1 DNA was selected, and BHV-1 DNA was quantified by use of SYBR Green I. The sensitivity of the assay was calculated to be $2\;TCID_{50}/ml$. The real-time PCR method was validated to be reproducible and very specific to BHV-1. The established real-time PCR assay was successfully applied to the validation of Chinese hamster ovary (CHO) cell artificially infected with BHV-1. BHV-1 DNA could be quantified in CHO cell as well as culture supernatant. Also the real-time PCR assay could detect $10\;TCID_{50}/ml$ of BHV-1 artificially contaminated in bovine collagen. The overall results indicated that this rapid, specific, sensitive, and robust assay can be reliably used for quantitative detection of BHV-1 contamination during the manufacture of biologics.