• Title/Summary/Keyword: Control System Security

Search Result 1,725, Processing Time 0.033 seconds

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

A Study on the Realities and Improvement Plan for Professional Qualification System concerning the Private Security in Korea -centering around the Examination Qualified for Security Guard- (한국 시큐리티자격제도의 실태 및 발전방안 -신변보호사 자격제도를 중심으로-)

  • Lee, Sang-Chul;Ahn, Sung-Cho
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.243-264
    • /
    • 2008
  • Recently the private security industry is showing rapid growth compared with the different types of industry. However, it is not prepared the device for the system to verify the professional qualification of the security guards. To protect individual life and property, body and security guards have to be qualified professionally. For it the role of professional qualification systems is emphasized. The problem of the certification of the qualification about the security guard to play the role to protect a body / life of the individual and property are the part to need necessarily as the quality problem of the individual and the trust of the people. The settlement of the qualification system which is such system can induce the development of the security industry with social trust. The certified security certification is needed and how to control the security quality to get better service to the clients. The professional qualification system to be carrying out with America and Japan is fixed through the cooperation of the business world and steady research for the qualification system plan, these are giving the trial of the qualification system of a security of Korea full of the suggestion. This study will do this to the basis which a necessity about the qualification system of the security man emphasis and considerate professional qualification system concerning the private security development plan around the Bodyguard Qualifying Examination which are carried out at twice by the Korea Security Association and the Korean Institute of Security. In summary to meet the social demand professional qualification for the security guards will be drawn from the analyses of civil security qualification systems.

  • PDF

A Study on the Factor on Influencing the Job Resourcefulness of the Private Security Guards (민간경비원의 직무자원동원성 형성에 영향을 미치는 요인에 관한 연구)

  • Kim, Hak-Bum
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.59-83
    • /
    • 2015
  • This study is made for the purpose of analyzing the influencing factors evidently to the private security guards' job resourcefulness. Consequently this study will offer effective ways to develop the private security guards job resourcefulness. Throughout the previous study of job resourcefulness, we selected the influencing factors to the job resourcefulness, as follows : system of reward, staff development opportunity, participation in decision making, self-control and other-control for locus of control, need for achievement, self-esteem. To prove this subject, we distributed the questionnaire to the private security guards of Seoul, Incheon and Gyeonggi. So we used 248 answers sheets for the final analysis. As the result above study, system of reward, participation in decision making, self-control and other-control for locus of control, need for achievement, self-esteem influenced the job resourcefulness positively. Accordingly it is essential that various educational programs and objective evaluations are designed to improve the organizational and individual characteristics of private security guards. However the staff development opportunity don't have an influence on the job resourcefulness. On the basis of above study result, this study suggested some necessary ideas on managing and administrating the organization of private security effectively in the future.

  • PDF

Simulation of Dynamic Characteristics of a Trigenerative Climate Control System Based On Peltier Thermoelectric Modules

  • Vasilyev, G.S.;Kuzichkin, O.R.;Surzhik, D.I.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.252-257
    • /
    • 2021
  • The application of the principle of trigeneration allows to simultaneously provide electricity to power electronic devices, as well as heat and cold to create the necessary microclimate of the premises and increase efficiency compared to separate cooling and heating systems. The use of Peltier thermoelectric modules (TEM) as part of trigenerative systems allows for smooth and precise control of the temperature regime, high manufacturability and reliability due to the absence of moving parts, resistance to shock and vibration, and small weight and size parameters of the system. One of the promising areas of improvement of trigenerative systems is their modeling and optimization based on the automatic control theory. A block diagram and functional model of an energy-saving trigenerative climate control system based on Peltier modules are developed, and the transfer functions of an open and closed system are obtained. The simulation of the transient characteristics of the system with varying parameters of the components is performed. The directions for improving the quality of transients in the climate control system are determined, as well as the prospects of the proposed methodology for modeling and analyzing control systems operating in substantially nonlinear modes.

The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks (사이버-물리 시스템의 보안 프레임워크 개발을 위한 보안 요구사항 분석 연구)

  • Park, Soo-Youl;Choi, Wook-Jin;Chung, Bo-Heung;Kim, Jeong-Nyeo;Kim, Joo-Man
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.5
    • /
    • pp.255-265
    • /
    • 2012
  • A cyber-physical system(CPS) is a collection of cyber and physical components that interact with each other to achieve a particular application. Here, the CPS is emerged the reliability and security problems. Particularly, the defect of reliability in the data/control transmission under the CPS can lead to serious damage. We discuss the reliability and security problem on CPS architecture. Then we would suggest the considerations of cyber security in industrial control systems built with CPS.

Tracking ond Distance Measurement of the Moving Object in Stereo Camera System as a Security Equipment (방범 설비의 스테레오 카메라 시스템에서 이동객체의 추적과 거리측정)

  • 이재수;홍권의;손영우
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.17 no.4
    • /
    • pp.106-115
    • /
    • 2003
  • In crossing stereo camera system as a security equipment system, a new algorithm for the tracking method of the moving object and the measurement method of distance of the object from cameras to moving object is proposed. The stereo input images are matched by a pixel for the moving object extraction, then the moving elements obtained from an adaptive threshold's value for an error correction and the moving object area extracted by noise eliminative algorithm. In addition to, the moving object traced by control pan/tilt of cameras using a coordinate value of the moving object, and the measurement method of distance to moving object by using special features of the crossing stereo camera system is proposed. From the experimental results, the proposed algorithm was found to be able to measure of the distance and trace for moving object in a stereo security camera system. The error rate of a distance measurement be existed within 6%. Moreover in implementation the proposed algorithm, the stereo security system, the automatic moving robot system and the stereo remote control system will be applied practical application.

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.9-17
    • /
    • 2021
  • In this paper, we propose a reversely using the "Man In The Middle Attack" attack technique as a way to introduce network security without changing the physical structure and configuration of the existing network, a Virtual Network Overlay is formed with only a single Ethernet Interface. Implementing In-line mode to protect the network from external attacks, we propose an integrated control method through a micro network security sensor and cloud service. As a result of the experiment, it was possible to implement a logical In-line mode by forming a Virtual Network Overlay with only a single Ethernet Interface, and to implement Network IDS/IPS, Anti-Virus, Network Access Control, Firewall, etc.,. It was possible to perform integrated monitor and control in the service. The proposed system in this paper is helpful for small and medium-sized enterprises that expect high-performance network security at low cost, and can provide a network security environment with safety and reliability in the field of IoT and embedded systems.

A Study on the Civil Maritime Guarder to Enhance the Service of Coast Guard (해양경비 서비스 개선을 위한 경비지도사 제도에 관한 연구)

  • Jin, Sung-Yong;Park, Sung-Yong;Ju, Jong-Kwang;Lee, Eun-Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2007.11a
    • /
    • pp.115-119
    • /
    • 2007
  • The system of civil security service is analyzed and reviewed in order to induce it to maritime security domain. A system of civil maritime guarder who provides security service and cooperates with coast guard at sea is proposed. It is expected not only that some expecters on the field of maritime security service are built up but that the Qualities of security services are improved in considering characteristics of sea control and coast guard.

  • PDF

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.