• Title/Summary/Keyword: CCTV Vulnerability

Search Result 13, Processing Time 0.022 seconds

Development and Application of CCTV Priority Installation Index using Urban Spatial Big Data (도시공간빅데이터를 활용한 CCTV 우선설치지수 개발 및 시범적용)

  • Hye-Lim KIM;Tae-Heon MOON;Sun-Young HEO
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.27 no.2
    • /
    • pp.19-33
    • /
    • 2024
  • CCTV for crime prevention is expanding; however, due to the absence of guidelines for determining installation locations, CCTV is being installed in locations unrelated to areas with frequent crime occurrences. In this study, we developed a CCTV Priority Installation Index and applied it in a case study area. The index consists of crime vulnerability and surveillance vulnerability indexes, calculated using machine learning algorithms to predict crime incident counts per grid and the proportion of unmonitored area per grid. We tested the index in a pilot area and found that utilizing the Viewshed function in CCTV visibility analysis resolved the problem of overestimating surveillance area. Furthermore, applying the index to determine CCTV installation locations effectively improved surveillance coverage. Therefore, the CCTV Priority Installation Index can be utilized as an effective decision-making tool for establishing smart and safe cities.

An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control (CCTV 보안관제 취약성 및 성능 분석)

  • Seo, Tae-Woong;Lee, Sung-Ryoul;Bae, Byung-Chul;Yoon, E-Joong;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.93-100
    • /
    • 2012
  • Recently, the security monitoring and control systems based on spatial information in various field are operated and being developed according to evolve the spatial information technology. Especially, the CCTV monitoring and control system can be used in various field as a typical system. However, the security vulnerability problems have become an issue because the system connected by computer network and getting bigger than before. Therefore we studied security vulnerabilities of CCTV monitoring and control system which is being developed and operated. In addition, it is important to consider disaster and terrorism with unauthorized changes on location information. Therefore we analyzed the performance of observation when the cameras are break down as a result by hacking to CCTV monitoring and control system.

An In-Tunnel Traffic Accident Detection Algorithm using CCTV Image Processing (CCTV 영상처리를 이용한 터널 내 사고감지 알고리즘)

  • Baek, JungHee;Min, Joonyoung;Namkoong, Seong;Yoon, SeokHwan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.2
    • /
    • pp.83-90
    • /
    • 2015
  • Almost of current Automatic Incident Detection(AID) algorithms involve the vulnerability that detects the traffic accident in open road or in tunnel as the traffic jam not as the traffic accident. This paper proposes the improved accident detection algorithm to enhance the detection probability based on accident detection algorithms applied in open roads. The improved accident detection algorithm provides the preliminary judgment of potential accident by detecting the stopped object by Gaussian Mixture Model. Afterwards, it measures the detection area is divided into blocks so that the occupancy rate can be determined for each block. All experimental results of applying the new algorithm on a real incident was detected image without error.

Development of Guidelines for Physical Security Systems of Small-scale Water Supplies (소규모수도시설의 보안시설 설치지침 개발)

  • Kim, Youngil;Yi, Sangjin;Lee, Doojin;Lee, Wontae
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.27 no.6
    • /
    • pp.723-730
    • /
    • 2013
  • Due to the event of hazardous chemical injection into a water storage tank in Hongseong, Chungcheongnam-do in 2012, the Korean Ministry of Environment has revised the enforcement rules of the Water Supply and Waterworks Installation Act to install surveillance equipments such as closed-circuit television(CCTV). However, the enforcement rules still do not provide concrete provision for installation of physical security equipments. Thus we studied vulnerability of small-scale water supplies in Korea and developed guidelines for the physical security system of the facilities. The guidelines include selection and recommendation of the physical security approaches and measures to detect, delay and response to the presence of an intruder in small-scale water supplies. The security features include protection utilities(e.g., fencing and fence topping), exterior intrusion detectors and alarms, locks and padlocks, surveillance utilities(e.g., CCTV), and others.

Correlation Analysis of the Change Tendency between Climate Characteristics and Small Power Generating System (기후 요소와 소형 자가발전시스템 발전량의 상관관계 분석)

  • Jeong, Sang-Gu;Cho, Myeong-Heum;Pyo, Kyung-Su;Park, Young-Jin
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.69-70
    • /
    • 2017
  • 국내외에서 CCTV, IoT(Internet of Things)를 활용한 재난 재해 감지 기술이 활발히 연구되고 활용되고 있다. 그러나 재난 감지 시스템은 전기와 같은 기반 시설이 구축되어야 활용이 가능하기에 지역적으로 시스템 구축에 어려움이 있는 재난 취약 지역(Disaster Vulnerability area)이 발생하게 된다. 이를 해결하기 위한 방안으로 소형 자가발전시스템을 구축하여 CCTV를 활용한 실시간 재난 감시 방안을 마련하고자 하며, 이에 일환으로 울산시 기상관측 자료와 소형 자가발전시스템 발전량간의 상관관계를 분석하여 기후 요소가 발전량에 미치는 영향을 살펴보고 추가적인 연구 방향에 대해 논의하고자 한다.

  • PDF

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

A Study on COP-Transformation Based Metadata Security Scheme for Privacy Protection in Intelligent Video Surveillance (지능형 영상 감시 환경에서의 개인정보보호를 위한 COP-변환 기반 메타데이터 보안 기법 연구)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.417-428
    • /
    • 2018
  • The intelligent video surveillance environment is a system that extracts various information about a video object and enables automated processing through the analysis of video data collected in CCTV. However, since the privacy exposure problem may occur in the process of intelligent video surveillance, it is necessary to take a security measure. Especially, video metadata has high vulnerability because it can include various personal information analyzed based on big data. In this paper, we propose a COP-Transformation scheme to protect video metadata. The proposed scheme is advantageous in that it greatly enhances the security and efficiency in processing the video metadata.

A Study on the Convergence of Monitoring and Control System with Geographic Information System (지리정보시스템과 관제시스템의 융합에 관한 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo;Lee, Jae-Sung;Lee, Cheol-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.703-709
    • /
    • 2011
  • State-based infrastructure on IT-based network are prone to numerous cyber attack including subsequent hacking and internet infringement. These acts of terrorism are increasing because of the expanding IT convergence technology. Recently, the trend on cyber security monitoring and control researches focus on combining the general idea of security monitoring and control along with IT field and other control systems. This convergence trend has been increasing in both the use and importance. This research analyzes the state-based infrastructure monitoring and control system, its vulnerability as well as its improvement by incorporating the cyber convergence systems to existing systems. The subject of this research is for extensive use of CCTV systems which is expanded for 'CCTV Monitoring and Control Field' as well as 'Traffic Monitoring and Control Field' operated by 'Intelligent Traffic Information System' and Disaster Management Area which is studied in various fields. Eventually, the objective of the paper is to solve these issues, to apply related systems and to suggest improvement on the convergence system.

A Study on the Improvement of Disaster and Safety Management for Local Cultural Heritages (지방문화재 재난안전관리 개선방안에 관한 연구)

  • Kim, Twe-Hwan;Kim, Jung-Gon;Been, Ju-Hee
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.3
    • /
    • pp.358-366
    • /
    • 2019
  • Purpose: This paper aims to clarify the problems and to examine the improvement methods by investigating the management condition of local-designated cultural property of which management is relatively poor in comparison with state-designated cultural heritage. Method: In order to grasp the management situation of the local-designated cultural heritage, a research on cultural heritage management situation and problems will be carried out with 35 cultual heritages in Goryeong-gun. Also, the improvement methods about the property type vulnerability on the basis of interview with cultual property managers, fire-fighting officers and civil servants, etc. Results: Local cultural heritages were investigated to be very vulnerable to the fire of wooden buildings, the theft of movable cultural heritages, and the effects of wind and water damage. It is because cultural heritages are scattered over wide areas fundamentally. As the result, it has difficulty in the patrols of police officers and fire fighters, and in the situation that it lacks disaster monitoring and CCTV for countermeasures to replace them, electronic security including fire hydrant, sensors, etc and fire extinguishing facilities and so on. It is difficult for local governments managing local-designated cultural heritages to enhance their management systems directly due to their lack of budget and manpower. Conclusion: In order to strengthen disaster and safety management system for the cultural heritages designated by local governments, they have to clarify disaster countermeasure task of fire fighting, police, and cultural heritage managers prepare their manuals, and systematize them through disaster drill mainly in local autonomous governments. Also, so as to establish a surveillance system every day, they have to enhance the community for local cultural heritage manage consisting of local volunteer fire departments, local voluntary disaster prevention organizations, volunteers, etc.