• Title/Summary/Keyword: Control System Security

Search Result 1,725, Processing Time 0.029 seconds

A Study on the Reform of the Police in Korea: Focused on Institutional Approach

  • Kim, Taek;Jung, In Whan
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.120-126
    • /
    • 2022
  • As part of the police reform, the current government is trying to establish a police bureau under the Ministry of Public Administration and Security and improve the personnel management of the police. Like the prosecution bureau under the Ministry of Justice, the main goal of the police is to establish a police support bureau in the Ministry of Public Administration and Security to have personnel, budget, disciplinary action, and inspection. However, the government's control of police rights was opposed mainly by the "Police Workplace Council," which is like a police union, and even police officials agreed with it, and the opposition was severe. It is becoming a form of struggle between the government and police organizations. As a police major, I don't want to side with anyone and support the police. However, I thought about what democratic control of the police should be with, considered what the police reform plan is, and analyzed the legal and institutional aspects of the current police, and expressed the following issues. First, this paper is as follows: First, we considered what the democratic control of the police was. Second, We focused on reform measures such as the personnel system and institutional approach. Third, I presented my argument on what the police reform plan is.

Security Problem of National Major Facility's Parking Lot and its Improvement Method -Focused on Doonchi(Waterside) Parking Lot of National (국가중요시설의 주차장 보안의 문제점과 개선방안: 국회둔치주차장을 중심으로)

  • Lee, Sang-Hun;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.61-87
    • /
    • 2017
  • National Assembly is a constitutional institution that is required to first consult the will of the people and it should do its effort continuously so that security of citizens using parking lot would be enhanced at the same time while improving parking service in order to increase customer satisfaction of the people. Under this recognition, in this study, Doonchi parking lot of National Assembly under consigned management was first reviewed in a perspective of criminal prevention through environmental design(CPTED) and particularly, fence installation and reinforcement work for securing 'territoriality' and operation of all round shooting camera and installation of No-trespassing warning board at entrance were suggested. Second, it was recommended to change independent control system in which CCTV security system of National Assembly Doonchi parking lot is operated separately from National Assembly safety situation room and integrate it with National Assembly safety situation room(revised to double safety system) and performance of CCTV camera was made to be increased to over 2m. In addition, video recording mode was converted to NVR mode for application to IP camera in the future and in order to avoid dead zone of security monitoring area and based on site inspection result, addition 3 places of newly installing CCTV were indicated. Third, it was recommended to introduce parking fare billing and management system through unmanned equipment in parking lot management and operation.(specialized management of professional parking service provider was reviewed). By doing so, risk of cash handling by charging personnel was removed by reducing current 7 working personnel to 3 and particularly, by converting parking lot management mode being operated temporarily from 9 A.M. to 9 P.M. at present to 24 hours operation mode and providing more specialized parking service, citizens visiting National Assembly were provided with convenience and image of National Assembly was also enhanced. This study was carried out in parallel with various literature and case studies, including data from the Office of the Defense Protection in the National Assembly.

  • PDF

A Study on the Electronic Clearance System of the Advanced Countries and Korea (선진국과 한국의 전자통관제도에 관한 연구)

  • Eom, Kwang-Yeol;Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.5 no.2
    • /
    • pp.185-204
    • /
    • 2003
  • Electronic Clearance System in the Advanced Countries give sane hints Clearance System in Korea to improve. It is as follows. It is necessary to enhance the economical efficiency and rapidity on clearance system. It is important to improve the conveniency of importer and export through all day services in customs. It is necessary to control export and import goods efficiently for guarantee of security. Export entry data in export country has to linked with import entry data in import country to improve speedy, correctness, and efficiency. It is necessary to solve the security problems through the use of the latest cryptograph.

  • PDF

Implementation of the web based environment monitoring system supporting the NMS protocol (NMS를 지원하는 웹기반 환경 감시 시스템의 구현)

  • Bae, Kwang-Jin;Yim, Kang-Bin
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.831-832
    • /
    • 2006
  • In this paper, we introduce a canonical framework of the large-scaled web-based sensor gateway and practically implement it as the environment monitoring system. The system consists of a central management server, up to 250 local embedded subsystems and up to 250 sensor or actuator nodes for each subsystem. The node information is gathered periodically through a well-defined protocol on the sensor network and converted to the web contents and the SNMP MIB objects according to its data type. The MIB objects are well-defined and include system, network, sensor, actuator and alarm specific data classes. Because there is an increasing trend that a large number of sites are willing to adapt unmanned sensing and control, the developed system will play a key role to efficiently manage a large scale sensor networked system such as environment monitoring systems or countermeasure systems against disaster and calamities.

  • PDF

DoS Attack Control Design of IoT System for 5G Era

  • Rim, Kwangcheol;Lim, Dongho
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.2
    • /
    • pp.93-98
    • /
    • 2018
  • The Internet of Things (IoT) is a form of the emerging 4th industry in the 5G era. IoT is expected to develop naturally in our daily life in the 5G era in which high-speed communication will be completed. Along with the rise of IoT, concerns about security and malicious attacks are also increasing. This paper examines DoS attacks, which are one of the representative security threats of IoT and proposes a local detection and blocking system that are suitable for response to such attacks. First, systems of the LoRaWAN type, which are most actively researched in the IoT system field and DoS attacks that can occur in such systems were examined. Then, the inverse order tree algorithm using regional characteristics was designed as a cluster analysis form. Finally, a system capable of defending denial-of-service attacks in the 5G IoT system using local detection and blocking with the Euclidean distance was designed.

Managing the Heterogeneous File System for Anti-Virus

  • Kim, Kyung-Su;Han, Seung-Jo;Kim, Pan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.3-10
    • /
    • 1997
  • Computer viruses are increasing in number and are continually intellectualized as well. To cope with this problem, anti-virus tools such as a scanner and the monitoring program have been developed. But it is not guaranteed that these softwares will work in safety under MS-DOS' control. If the virus is run first, it can avoid the monitoring of anti-virus software or even can attack the anti-virus software. Therefore, anti-virus programs should be run before the system is infected. This paper presents a new PC starting mechanism which allows the PC system to start from a clean state after booting. For this mechanism, we build a new disk file system different from DOS' file system, and manage the two file systems heterogeneously. Our system is strong against boot viruses and recovers from infections automatically.

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

Randomness Based Fuzzing Test Case Evaluation for Vulnerability Analysis of Industrial Control System (산업제어시스템 취약성 분석을 위한 무작위성 기반 퍼징 테스트 케이스 평가 기법)

  • Kim, SungJin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.179-186
    • /
    • 2018
  • The number of devices connect to the internet is rapidly increasing with the advent of the IoT(Internet of Things). The IoT has improved the convenience of life. However, it makes security issues such as privacy violations. Therefore cybersecurity is the most important issue to be discussed nowadays. Especially, various protocols are used for same purpose due to rapidly increase of IoT market. To deal with this security threat noble vulnerability analysis is needed. In this paper, we contribute to the IoT security by proposing a new randomness-based test case evaluation methodology using variance and entropy. The test case evaluation method proposed in this paper can evaluate the test cases at a high speed regardless of the test set size, unlike the traditional technique.