• Title/Summary/Keyword: Control System Security

Search Result 1,729, Processing Time 0.027 seconds

Conceptual Design of a Remote Monitoring and Control System for Nuclear Power Plants

  • Lee Seung Jun;Kim Jong Hyun;Seong Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2003
  • Nuclear power plants (NPPs) will be highly connected network enabled systems in the future. Using the network and web enabled tools, NPPs will be remotely monitored by operators at any time from any place connected to the network via a general web browser. However, there will be two major issues associated with this implementation. The first is the security issue. Only the authorized persons need to be allowed to access the plant since NPP is a safety-critical system. However, the web technology is open to the public. The second is the network disturbance issue. If operators can not access the plant due to network disturbances, the plant will come into the out-of-control situation. Therefore, in this work, we performed a conceptual design of a web-based remote monitoring and control system (RMCS) considering these issues.

Regulatory Requirements Analysis for Development of Nuclear Power Plants Cyber Security Vulnerability Inspection Tool (원전 사이버 보안 취약점 점검 도구 개발을 위한 규제요건 분석)

  • Kim, Seung-Hyun;Lim, Su-Chang;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.725-730
    • /
    • 2017
  • The use of general IT resources in the Instrumentation and Control system(I&C) for the safety of Nuclear Power Plants(NPPs) is increasing. As a result, potential security vulnerabilities of existing IT resources may cause cyber attack to NPPs, which may cause serious consequences not only to shutdown of NPPs but also to national disasters. In order to respond to this, domestic nuclear regulatory agencies are developing guidelines for regulating nuclear cyber security regulations and expanding the range of regulatory targets. However, it is necessary to take measures to cope with not only general security problems of NPPs but also attacks specific to NPPs. In this paper, we select 42 items related to the vulnerability inspection in the contents defined in R.G.5.71 and classify it into 5 types. If the vulnerability inspection tool is developed based on the proposed analysis, it will be possible to improve the inspection efficiency of the cyber security vulnerability of the NPPs.

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

Comparison of NSC system in the U.S., Japan, and the Republic of Korea (NSC(국가안전보장회의) 체제의 한미일 비교)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.29-50
    • /
    • 2013
  • With the recent global threats of terrorism as well as religious conflicts, Northeast Asian countries including South Korea, China, and Japan are experiencing particularly serious security crises as demonstrated by North Korea's threats of nuclear weapons testings and long-range missile launching as well as military provocation toward South Korea such as sinking of ROKS Cheonan and bombardment of Yeonpyeong island and the territorial dispute between China and Japan over Senkaku Islands(Diaoyu Islands). As a result, Park Geun Hye Administration of South Korea and the 2nd Abe Shinzo Cabinet of Japan, both recently established, are making efforts to improve their national security and crisis management policies. One of the key elements of such efforts is the strengthening of National Security Council(NSC) or its equivalent organization as the control tower of national security policy, modeled after the NSC of the United States. This paper compares NSC organization of Korea, the U.S., and Japan and draws policy insights focusing on the current political and national security situation South Korea is facing. Although organizational structure, function, and history of NSC of each country differs, it can be inferred from this comparison that NSC-type of organizations can play an important role as a control tower of security and emergency management policies.

  • PDF

A study on the perception of the Korean industrial security ecosystem using Delphi Method (전문가 델파이기법을 활용한 한국 산업보안 생태계 인식 조사연구)

  • Kang, Min Ji;Park, Chansoo
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.89-97
    • /
    • 2020
  • Recently, security issues on industrial technology are undergoing rapid changes around the world. Developed countries are establishing response strategies to protect their own core technologies while creating conflicts with global value chains and foreign capital movement. Also in Korea, we are approaching industrial security issues in the mid- to long-term industrial competitiveness. The purpose of this study is to survey on the awareness of the industrial security ecosystem and derive key policy issues. Based on a three round survey, four policies were suggested as followings : systemization of industrial security control tower, enhancement of security company's technical skills and training of security specialists, improvement of technology leakage prevention system through retirement personnel and M&A, reinforcement of research security in R&D process and proactive technology protection. It is hoped that this study will serve as a basis for policy-making as an evidence-based study reflecting the policy demands of industrial security.

Smart Home Network System Using the Broadband Power Line Communication(BPLC) (광대역 전력선 통신을 이용한 스마트 홈 네트워크 구성에 관한 연구)

  • Yang Hyun-Chang;Sim Kwee-Bo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.87-90
    • /
    • 2005
  • The Intelligent Home provides convenient and comfortable living environment by performing automatic control, heating and air-conditioning, ventilation, home appliances control, home robot control, energy management, visitor management security management, internet, heath state monitoring, etc. through wired/ wireless network and device in the household. Along with the presentation of the features of economical broadband power line communication in the network configuration for new and old houses, its improvement method is proposed.

  • PDF

Ethernet Algorithm for Building Network Integration Using TCP/IP

  • Chang Kyung-Bae;Shim Il-Joo;Park Gwi-Tae
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.1
    • /
    • pp.63-69
    • /
    • 2006
  • Problems like poor security, transfer delay or packet loss occur while building network systems that are applied with TCP/TP integrate with data network systems. To solve this problem, this paper proposes the Separated Ethernet, which can give priority to the system, and by using the OPNET Modeler simulator, we will verify its performances.

The technical requirements and configuration of Home Automation System (주택 자동화 시스템의 기능과 구성)

  • 송언빈
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 1992.11a
    • /
    • pp.64-68
    • /
    • 1992
  • The demand for home automation system has increased in high-rise apartment houses. Home automation system is realized a more comfortable, more secure, more economical, more convenient, and more satisfying home life. The proposed system functions are meter reading, home security, energy saving, and house control. The technical requirements and configuration of home automation system are provided.

  • PDF

Remote Monitoring and Control of PLC Using TCP/IP Communication (TCP/IP 통신을 이용한 PLC 원격 감시 및 제어)

  • 고덕현;이순걸
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.140-143
    • /
    • 2000
  • This research presents new type of remote monitoring and control solution of PLC that can be used bi-directional and efficient management of factory automation through internet. This system has client/server architect for information handling between PLC and remote computer where a user can control and monitor target PLC. Actually the authors redirect RS232C connection between PLC and server computer into Internet connection between PLC and remote client computer using supplied PLC tool program So user feel like in front of PLC panel when he operates remote PLC through Internet. Each client/server program is constructed with Java language for security. In this paper the internet-based remote control system was proposed and proved validity by being applied to redirection of PLC control for factory automation.

  • PDF