• Title/Summary/Keyword: 위험대응

Search Result 1,446, Processing Time 0.028 seconds

Spatio-Temporal Summer Rainfall Pattern in 2020 from a Rainfall Frequency Perspective (2020년 여름철 강우의 시공간적 특성 분석: 빈도해석을 중심으로)

  • Kim, Yong-Tak;Park, Moonhyung;Kwon, Hyun-Han
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.4
    • /
    • pp.93-104
    • /
    • 2020
  • Climate change has emerged as a social issue, and efforts have been made to overcome it in various ways. However, climate change due to global warming is likely to accelerate further than we expected, and the associated damage is also likely to increase. This tendency is expected to continue in the future, leading to difficulties for the existing water resource management system based on historical data. The precipitation in 2020 caused property damage and loss of life due to the extreme rainfall exceeding the design rainfall with the very unusual prolonged rainy days. With this 2020 flood, we should no longer be passive in managing flood risk due to uncertainties in climate change.

Comparative Analysis on ICT Supply Chain Security Standards and Framework (ICT 공급망 보안기준 및 프레임워크 비교 분석)

  • Min, Seong-hyun;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1189-1206
    • /
    • 2020
  • Recently, ICT companies do not directly design, develop, produce, operate, maintain, and dispose of products and services, but are outsourced or outsourced companies are increasingly in charge. Attacks arising from this are also increasing due to difficulties in managing vulnerabilities for products and services in the process of consignment and re-consignment. In order to respond to this, standards and systems for security risk management of ICT supply chain are being established and operated overseas, and various case studies are being conducted. In addition, research is being conducted to solve supply chain security problems such as Software Bill of Materials (SBOM). International standardization organizations such as ISO have also established standards and frameworks for security of ICT supply chain. In this paper, we presents ICT supply chain security management items suitable for domestic situation by comparing and analyzing ICT supply chain security standards and systems developed as international standards with major countries such as the United States and EU, and explains the necessity of cyber security framework for establishing ICT supply chain security system.

Directions for the Development of Digital Twins Applying the Grounded Theory Methods (근거이론을 활용한 디지털 트윈 발전 방향성 제시)

  • Kang, Minshik
    • Journal of Industrial Convergence
    • /
    • v.19 no.1
    • /
    • pp.65-70
    • /
    • 2021
  • This study aims to propose specific directions for developing digital twin contents. This aim is achieved by thorough literature review and applying the grounded theory. Based on customers' need analysis, this study suggests the priorities of contents development of digital twins. As a result, complex workflows and dangerous training contents are adequate to be developed. Moreover, large-scale projects such as nuclear powerplants that are hard to build the mock-ups were considered to be effective. This study provides significant information for not only software developers but also clients who desire to reduce training fees and improve the complex workflows. Since these client companies operate based upon multiple complex workflows, this study encourages stakeholders to make effective decisions. This research needs further analysis of current digital twin technology- possibilities and limitations.

A Study on LSTM-based water level prediction model and suitability evaluation (LSTM 기반 배수지 수위 변화 예측모델과 적합성 평가 연구)

  • Lee, Eunji;Park, Hyungwook;Kim, Eunju
    • Smart Media Journal
    • /
    • v.11 no.5
    • /
    • pp.56-62
    • /
    • 2022
  • Water reservoir is defined as a storage space to hold and supply filtered water and it's significantly important to manage water level in the water reservoir so as to stabilize water supply by controlling water supply depending on demand. Liquid level sensors have been installed in the water reservoir and the pumps in the booster station facilitated management for optimum water level in the water reservoir. But the incident responses including sensor malfunction and communication breakdown actually count on manager's inspection, which involves risk of accidents. To stabilize draining facility management, this study has come up with AI model that predicts changes in the water level in the water reservoir. Going through simulation in the case of missing data in the water level to verify stability in relation to the field application of the prediction model for water level changes in the reservoir, the comparison of actual change value and predicted value allows to test utility of the model.

LSTM(Long Short-Term Memory)-Based Abnormal Behavior Recognition Using AlphaPose (AlphaPose를 활용한 LSTM(Long Short-Term Memory) 기반 이상행동인식)

  • Bae, Hyun-Jae;Jang, Gyu-Jin;Kim, Young-Hun;Kim, Jin-Pyung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.5
    • /
    • pp.187-194
    • /
    • 2021
  • A person's behavioral recognition is the recognition of what a person does according to joint movements. To this end, we utilize computer vision tasks that are utilized in image processing. Human behavior recognition is a safety accident response service that combines deep learning and CCTV, and can be applied within the safety management site. Existing studies are relatively lacking in behavioral recognition studies through human joint keypoint extraction by utilizing deep learning. There were also problems that were difficult to manage workers continuously and systematically at safety management sites. In this paper, to address these problems, we propose a method to recognize risk behavior using only joint keypoints and joint motion information. AlphaPose, one of the pose estimation methods, was used to extract joint keypoints in the body part. The extracted joint keypoints were sequentially entered into the Long Short-Term Memory (LSTM) model to be learned with continuous data. After checking the behavioral recognition accuracy, it was confirmed that the accuracy of the "Lying Down" behavioral recognition results was high.

A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure (IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구)

  • Hwang, Song-yi;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.617-635
    • /
    • 2021
  • Internet of Things (IoT) devices connected to the network without appropriate security solutions have become a serious security threat to ICT infrastructure. Moreover, due to the nature of IoT devices, it is difficult to apply currently existing security solutions. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are actually increasing every year. Even though several security solutions are being developed to protect IoT infrastructure, there is a great risk to apply unverified security solutions to real-world environments. Therefore, verification tools to verify the functionality and performance of the developed security solutions are also needed. Furthermore, just as security threats vary, there are several security solution s that defend against them, requiring suitable verification tools based on the characteristics of each security solution. In this paper, we propose an high-speed malware propagation tool that spreads malware at high speed in the IoT infrastructure. Also, we can verify the functionality of the security solution that detect and quickly block attacks spreading in IoT infrastructure by using the high-speed malware propagation tool.

Detection of Anomaly VMS Messages Using Bi-Directional GPT Networks (양방향 GPT 네트워크를 이용한 VMS 메시지 이상 탐지)

  • Choi, Hyo Rim;Park, Seungyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.125-144
    • /
    • 2022
  • When a variable message signs (VMS) system displays false information related to traffic safety caused by malicious attacks, it could pose a serious risk to drivers. If the normal message patterns displayed on the VMS system are learned, it would be possible to detect and respond to the anomalous messages quickly. This paper proposes a method for detecting anomalous messages by learning the normal patterns of messages using a bi-directional generative pre-trained transformer (GPT) network. In particular, the proposed method was trained using the normal messages and their system parameters to minimize the corresponding negative log-likelihood (NLL) values. After adequate training, the proposed method could detect an anomalous message when its NLL value was larger than a pre-specified threshold value. The experiment results showed that the proposed method could detect malicious messages and cases when the system error occurs.

An Analysis of the Relative Importance of Security Level Check Items for Autonomous Vehicle Security Threat Response (자율주행차 보안 위협 대응을 위한 보안 수준 점검 항목의 상대적 중요도 분석)

  • Im, Dong Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.145-156
    • /
    • 2022
  • To strengthen the security of autonomous vehicles, this study derived checklists through the analysis of the status of autonomous vehicle security. The analyzed statuses include autonomous vehicle characteristics, security threats, and domestic and foreign security standards. The derived checklists are then applied to the AHP(Analytic Hierarchy Process) model to find their relative importance. Relative importance was ranked as one of cyber security management system establishment and implementation, encryption, risk assessment, etc. The significance of this study is to reduce cyber security incidents that cause human casualties as well improve the level of security management of autonomous vehicles in related companies by deriving the autonomous vehicle security level checklists and demonstrating the model. If the inspection is performed considering the relative importance of the checklists, the security level can be identified early.

Study on the Development for Traffic Safety Curriculum of Automated Vehicles on Public Roads (실 도로 기반 자율주행자동차 교통안전 교육과정 개발 연구)

  • Jin ho Choi;Jung rae Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.266-283
    • /
    • 2022
  • With the rapid development of autonomous vehicle technology, unexpected accidents are occurring. Therefore, it is necessary to minimize user accident damage through the development of autonomous traffic safety education. Since edge cases, accident type, and risk factor analysis are important for realistic education, overseas case studies and demonstrations were carried out, and based on this, two curriculum for service providers and general users were developed. The service provider curriculum consisted of OEDR, sudden stop, cut-in, take-over, defensive driving, system malfunction, policy and information security education, and the general user curriculum consisted of attention duty, take-over, operating design domain, accidents type, laws, functions, information security education.

A Study on the Improvement of Safety Management in the Workplaces Subject to Process Safety Management (PSM) (공정안전관리(PSM) 대상 사업장의 안전관리 개선 연구)

  • Jong-hun Park
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.490-497
    • /
    • 2023
  • Purpose: Since the 1990s, Korea has been making various efforts to prevent serious industrial accidents, such as implementing a hazardous risk prevention plan and implementing a process safety management system, but a series of recent major industrial accidents have shown its limitations. Therefore, this study aims to present measures to improve safety management of PSM target workplaces. Method: Investigate previous studies and cases on improving safety management at workplaces subject to PSM, seek ways to improve safety management at workplaces subject to PSM based on existing safety management, and evaluate safety management system one of the causes of accidents. Therefore, a safety education program is established to increase employees' safety awareness and understanding, and to improve the safety level. Result: Measures such as establishing an organizational culture to improve safety management of PSM target workplaces, responding to disasters, systematic safety management, replacing and strengthening old facilities, and strengthening management's firm commitment to safety were presented. Conclusion: Through this study, it is meaningful to present a systematic plan to secure safety to reduce precious lives and damage, and it is expected to be useful in considering the direction of PSM improvement for each workplace.