• 제목/요약/키워드: Comprehensive Security

검색결과 441건 처리시간 0.026초

An Evaluative Study of the Operational Safety of High-Speed Railway Stations Based on IEM-Fuzzy Comprehensive Assessment Theory

  • Wang, Li;Jin, Chunling;Xu, Chongqi
    • Journal of Information Processing Systems
    • /
    • 제16권5호
    • /
    • pp.1064-1073
    • /
    • 2020
  • The general situation of system composition and safety management of high-speed railway terminal is investigated and a comprehensive evaluation index system of operational security is established on the basis of railway laws and regulations and previous research results to evaluate the operational security management of the high-speed railway terminal objectively and scientifically. Index weight is determined by introducing interval eigenvalue method (IEM), which aims to reduce the dependence of judgment matrix on consistency test and improve judgment accuracy. Operational security status of a high-speed railway terminal in northwest China is analyzed using the traditional model of fuzzy comprehensive evaluation, and a general technique idea and references for the operational security evaluation of the high-speed railway terminal are provided. IEM is introduced to determine the weight of each index, overcomes shortcomings of traditional analytic hierarchy process (AHP) method, and improves the accuracy and scientificity of the comprehensive evaluation. Risk factors, such as terrorist attacks, bad weather, and building fires, are intentionally avoided in the selection of evaluation indicators due to the complexity of risk factors in the operation of high-speed railway passenger stations and limitation of the length of the paper. However, such risk factors should be considered in the follow-up studies.

Comprehensive Security and Crisis & Emergency Management for Protecting Critical Infrastructure

  • Lee, Jae-Enn
    • International Journal of Contents
    • /
    • 제5권3호
    • /
    • pp.71-78
    • /
    • 2009
  • Recently, interest has heightened over 'critical infrastructures' and their reliability in the face of potential terrorist attack. Assault on any of the critical infrastructures as transportation, power, water, telecommunications, and financial services, entails great consequences for their users as well as the other interdependent critical infrastructures. How to protect our vital critical infrastructures is the key question in this paper. The purpose of this article is to suggest the implications for crisis and emergency management to protect the critical infrastructures in our society. For achieving the purpose, we examined the concept of comprehensive security, national crisis, and critical infrastructure and, using the holistic approach, we examined the comprehensive emergency management for suggesting the implications for establishing the critical infrastructure protection system; building up the high reliability organization, organizing and partnering, assessing the risk, preparing first responders, working with private owners of critical infrastructures, working with communities, improving the administrative capacity.

CALS의 단계별 구현을 위한 보안기술 (Security for CALS Implementation)

  • 김중인;김석우
    • 한국전자거래학회지
    • /
    • 제1권1호
    • /
    • pp.51-67
    • /
    • 1996
  • Recently the interests in NII, CALS/EC, and security are rapidly increasing. However, only one of the security issues for CALS implementation, i.e., the security for EDI implementation, has been presented in the literature. No comprehensive discussion about CALS security including other CALS applications exists. This paper intends to present such a comprehensive analysis for the security requirements and standards for the well-recognized two-phase CALS implementation. We present a framework for CALS security encompassing security protocols and systems that are arranged into the framework in terms of the CALS implementation phases, application systems, and communication modes. This framework is followed by brief descriptions of the security services and mechanisms for each CALS application.

  • PDF

Detection Mechanism on Vehicular Adhoc Networks (VANETs) A Comprehensive Survey

  • Shobana, Gopalakrishnan;Arockia, Xavier Annie R.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.294-303
    • /
    • 2021
  • VANET is an upcoming technology with an encouraging prospect as well as great challenges, specifically in its security. This paper intends to survey such probable attacks and the correlating detection mechanisms that are introduced in the literature. Accordingly, administering security and protecting the owner's privacy has become a primary argument in VANETs. To furnish stronger security and preserve privacy, one should recognize the various probable attacks on the network and the essence of their behavior. This paper presents a comprehensive survey on diversified attacks and the recommended unfolding by the various researchers which concentrate on security services and the corresponding countermeasures to make VANET communications more secure.

포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 - (A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'-)

  • 김태진
    • 융합보안논문지
    • /
    • 제22권5호
    • /
    • pp.115-126
    • /
    • 2022
  • 본 연구는 포괄안보 관점의 국가위기관리와 국가방위요소간의 작동관계를 연구한 것이다. 국가방위요소는 통합방위법에서 제시하고 있다. 따라서 통합방위의 원칙과 문제, 그리고 대안을 제시하여 국가위기 시 국민의 생명과 재산을 지키고 국가안보를 굳건히 하기 위한 목적으로 연구하였다. 이론적 배경으로 '총체적 위기관리 모델'과 '국가위기관리기본지침'의 위기관리 4단계를 근거로 분석틀을 구상하였다. 이를 통해 국내외 4가지의 사례연구를 진행하였다. 연구결과 국가위기관리 단계별 국가방위요소가 잘 작동하기 위해서는 관련법규, 주관기관, 국민의식이 구비되어야 함을 확인할 수 있다. 국가위기관리의 완전성을 위해서 국가위기관리기본법 제정과 관련법률의 정비, 통합방위계획의 수립, 연계된 훈련, 소통을 위한 C4I구비, 지자체장 능력강화, 소방의 국가방위요소화가 필요함을 제시하였다.

A study on security oversight framework for Korean Nuclear Facility regulations

  • So Eun Shin;Heung Gyu Park;Ha Neul Na;Young Suk Bang;Yong Suk Lee
    • Nuclear Engineering and Technology
    • /
    • 제56권2호
    • /
    • pp.426-436
    • /
    • 2024
  • Nuclear security has been emphasized to ensure the safety of the environment and humans, as well as to protect nuclear materials and facilities from malicious attacks. With increasing utilization of nuclear energy and emerging potential threats, there has been a renewed focus on nuclear security. Korea has made efforts to enhance the regulatory oversight processes, both for general and specific legislative systems. While Korea has demonstrated effective nuclear security activities, continuous efforts are necessary to maintain a high level of security and to improve regulatory efficiency in alignment with international standards. In this study, the comprehensive regulatory oversight framework for the security of Korean nuclear facilities has been investigated. For reference, the U.S. regulatory oversight frameworks for nuclear facilities, with a focus on nuclear security, and the motivations of changes in regulatory oversight framework have been identified. By comparing these regulatory programs and frameworks, insights and considerations for enhancing nuclear security regulations have been identified. A comprehensive security inspection program tailored for the Korean regulatory oversight framework has been proposed, and has been preliminarily applied to hypothetical conditions for further discussion.

기업의 지속적 정보보안 강화를 위한 접근법 개발 (A Development of Comprehensive Framework for Continuous Information Security)

  • 정태석;임명성;이재범
    • 디지털융복합연구
    • /
    • 제10권2호
    • /
    • pp.1-10
    • /
    • 2012
  • 컴퓨터의 활용의 지속적 증가는 전 세계적으로 보안에 대한 인식을 새롭게 하고 있다. 역사적으로 볼 때, 그동안의 연구들은 정보시스템의 보안을 기술적인 대안을 기반으로 접근하여 왔다. 그러나 절차나 논리적 혹은 물리적 장치의 복잡성의 증가로 인해 더 이상 이러한 접근법이 효력을 발생하는 데는 한계가 있다. 즉, 정보기술환경에 대한 보안을 유지하기 위해서는 오늘날에 발생하고 있는 현상을 반영한 포괄적인 이해가 필요하다. 이를 위해 본 연구는 오늘날의 현상을 반영한 포괄적인 정보보안 접근법을 제시하고자 한다.

트럼프 행정부의 동맹정책 변화에 관한 연구 (A Study on the Change of the Trump Administration's Alliance Policy)

  • 최원상;신진
    • 융합보안논문지
    • /
    • 제19권4호
    • /
    • pp.55-66
    • /
    • 2019
  • 지난 66년간 한미동맹은 냉전시기에 미국이 한국에게 안보를 지원하고 한국은 미국에게 정책의 자율성을 일부 양보하는 전형적인 비대칭 동맹이었다. 그러나 이명박 정부는 군사적 성격의 한미동맹을 '포괄적 전략 동맹', '가치동맹'으로, 박근혜 정부는 '협력의 프론티어', '글로벌 파트너십'으로 발전시켰으며, 문재인 정부는 '호혜적·포괄적 동맹'으로의 발전을 국가안보전략에서 밝혔다. 본 연구는 트럼프 행정부의 동맹정책 변화에 따른 한국의 정책적 자율성을 보장하기 위해 한미 동맹정책 발전을 위한 호혜적·포괄적 한미동맹관계 구축 방안을 모색하는 것이 목적이다. 연구에 따른 분석결과는 한미동맹의 호혜적·포괄적 구축을 위해 한국은 미국이 추진하는 '인도-태평양 전략' 참여와 양국의 상호 경제적 이익을 위한 지속적인 외교적 노력 그리고 공공외교 강화의 필요성을 보여 준다.

네트워크 보안시스템 보안성 평가 연구 (A Study on Evaluation Technique of Network Security System)

  • 김점구
    • 융합보안논문지
    • /
    • 제9권2호
    • /
    • pp.33-39
    • /
    • 2009
  • 네트워크 보안시스템을 단일 요소로 구분하여 점검하고 있는 현실의 문제점을 개선하기 위해 본 논문은 네트워크 보안시스템 점검은 취약성을 찾는 것이 아니라, 네트워크 보안시스템을 이루는 각 보안장비가 유기적으로 잘 작동하는지 종합적으로 점검하는 것임에 착안 네트워크 보안시스템을 점검하는 자동화 방법을 제안하고 이를 구현하였다.

  • PDF

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.