• 제목/요약/키워드: Control System Security

검색결과 1,725건 처리시간 0.032초

전력시스템의 정적안전도 개선을 위한 UPFC의 운전방법 (The UPFC Operation for an Increase of the Power System Security)

  • 김선호;임정욱;문승일
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1999년도 하계학술대회 논문집 C
    • /
    • pp.1155-1157
    • /
    • 1999
  • The UPFC is known to have the ability to control both the real power flow and the reactive power flow. [1],[2] The power flow in the system is heavily related with the system security. [4] This paper deals with the operation of the UPFC to increase the power system security. The concept of the power system security is verified and the index to indicate the power system security level is suggested. And the algorithm to find the optimum operation point of the UPFC improving the system security level is presented.

  • PDF

보안환경에서 이질형 시스템의 전역 복구 관리 프로토콜 (Global Recovery Management Protocol for Heterogeneous System in Security Environments)

  • 정현철
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.51-59
    • /
    • 2009
  • Many failures are due to incorrectly programmed transactions and data entry errors. System failure causes the loss or corruption of the contents of volatile storage. Although global processing protects data values to detect direct or indirect information effluence, security environments are very important in the recovery management of heterogeneous systems. Although transaction can't control system fault, the restart for the system can cause information effluence by low bandwith. From various faults, it is not easy to maintain the consistency and security of data. This paper proposes recovery management protocols to assure global multilevel secure one-copy quasi-serializability in security environments of heterogeneous systems with replicated data and proves its correctness. The proposed secure protocols guarantee the reliability and security of system when the system fault is happened.

SCADA 시스템의 안전성 확보방안에 관한 연구 (A Study on the Secure Plan of Security in SCADA Systems)

  • 김영진;이정현;임종인
    • 정보보호학회논문지
    • /
    • 제19권6호
    • /
    • pp.145-152
    • /
    • 2009
  • 전기, 가스, 교통 등 주요 기반시설을 감시 제어하는 SCADA 시스템은 보안관리 소홀로 제어권한이 공격자에게 절취당하거나 서비스를 하지 못할 경우 국가적으로 큰 손실과 혼란을 초래할 수 있다. 따라서 SCADA 시스템은 구축시 완벽한 보안대책을 함께 강구하고 사후 보안관리도 철저히 하여야 한다. SCADA 시스템은 일반 정보시스템과는 서비스 응답, 통신 프로토콜, 네트워크 구조 등에서 상이한 특성을 지니므로 SCADA 시스템의 특성에 맞는 보안구조 및 기술을 개발하고, 국가차원에서 보안관리를 위한 법적근거를 마련할 필요가 있다. 본 논문에서는 SCADA 시스템에 관한 보안취약요인을 분석하고 이를 토대로 사이버공격에 대한 SCADA 시스템의 안전성 확보방안을 모색해 보았다.

EDI시스템에 있어서 내부통제가 정보시스템 보안성 및 유용성에 미치는 영향 (The Impact of Internal Control on the Security and Usefulness of EDI System)

  • 한인구;이재창
    • Asia pacific journal of information systems
    • /
    • 제9권3호
    • /
    • pp.143-157
    • /
    • 1999
  • EDI is one of the most important information technologies in todays business environment. This study is an exploratory study on the EDI control of Korean companies in their early stage of EDI implementation. The purpose of this study is to examine the impact of EDI controls on the security and usefulness of EDI systems for Korean companies who have adopted EDI. The data of fifty-one Korean companies for financial, manufacturing, and trade industries are collected by the mail survey and interview methods. The level of EDI control is mediocre on the average. The level of EDI security is low while that of EDI usefulness is mediocre. The empirical results show that the EDI controls in general improve the EDI security and usefulness significantly. Especially, the application and security control affect the EDI security significantly while the management, application, and security controls affect the EDI usefulness significantly. The gap between the level and perceived importance of control does not affect the EDI security but decreses the EDI usefulness at the marginal level of significance. The limitation of this study is that only a small number of companies are available for data collection because Korea is in the early stage of EDI implementation.

  • PDF

VPN을 이용한 Embedded 홈 네트워크 시스템 보안 (Embedded Home Network System Security using VPN)

  • 진선일;정진규;안광혁;유영동;홍석교
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 학술회의 논문집 정보 및 제어부문 B
    • /
    • pp.701-704
    • /
    • 2003
  • The home network system of ubiquitous computing concept is changing present our home life as more comfortable and safe. Also, it permits that we can connect the home network system and control the appliance which is linked to the home network system without limitation in time and place. But, as other systems that use the public network like the Internet, remote control/monitoring of the home network system that use the Internet includes problems such as user's access which is not admitted and information changing. This paper presents the efficient solution about the security problem that is recognized to important problem of the home network system. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

  • PDF

기존 전산 프로그램 연계에 의한 신뢰도 제어 운전 지원을 위한 전문가시스템 (An Expert System for Operational Aids of Security Control by Incorporation with Conventional Program Packages)

  • 문영현;최병윤;김세호
    • 대한전기학회논문지
    • /
    • 제39권3호
    • /
    • pp.240-246
    • /
    • 1990
  • The security control can be defined as all control actions and counter-measures to return the operating state of the system to a normal state. In an emergency state, fault clearing and/or overload suppression is enabled as a security control in order to prevent the extension of the fault. In the alert state, counter-measures should be set up in advance for the dangerous points of the system operation in drder to protect the system from expected accidents. In the normal state, the routine scenario is conducted to analyze system state. In the decision-making of the classification of system states, the heuristic and experienced knowledge can be well applied and thus application of expert system to this area attains considerable achievements. In this study, it is attempted to extract empirical rules through heuristic analysis and establish the knowledge base. Finally, the incorporation method with the conventional program packages in proposed. The expert system is designed to select an appropriate method and to perform the corresponding package. The input data can be automatically set up by using the data base. The computation results can be automatically added to the data base.

  • PDF

물리보안의 기술동향과 미래 서비스에 대한연구 (Study on Technical trend of physical security and future service)

  • 신병곤
    • 한국산업정보학회논문지
    • /
    • 제15권5호
    • /
    • pp.159-166
    • /
    • 2010
  • 사회불안, 소득증대, 인구구조 변화, 보안인식 변화로 물리보안은 지속적으로 성장하고 변화되고 있다. 현재 물리보안은 전화망과 방범장비로 구성된 무인방범, DVR과 카메라를 이한 영상보안, 지문인식과 RF카드를 활용한 출입통제가 대표적이다. 하지만, 네트워크 카메라, 생체인식기술, USIM NFC를 활용한 개인인증, 위치기반 서비스 등 ICT기반의 융합으로 산업영역을 확대시켜 나가고 있다. 본 논문에서는 물리보안에 적용할 수 있는 주요 기술동향과 융합보안의 서비스를 개인 신변보호를 위한 개인보안, 대형건물의 다양한 보안 서비스를 제공하는 빌딩 IT 컨버전스, 전방위 보안을 위한 홈랜드 시큐리티로 구분하여 미래의 물리보안 서비스를 제안한다.

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

초전도 케이블의 Quench 특성에 대한 계통안전성 제어방식 (Power System Security Control Method for Quench Characteristic of High-Temperature Superconducting Cable)

  • 이근준;황시돌
    • 조명전기설비학회논문지
    • /
    • 제19권6호
    • /
    • pp.29-35
    • /
    • 2005
  • 본 논문은 고온 초전도 케이블을 전력계통의 송전용량 증대를 위해 적용시켰을 경우, 고장발생시 초전도케이블에서 예상되는 ??????치의 영향에 대해 안전하게 제어할 수 있는 방법을 제시하였다. 접근 방법으로는 초전도케이블의 ??????치 특성을 열평형 방정식으로 모델링하고 그 결과 고장전류에 따른 케이블의 설계 최대 온도상승한계에 도달하는 시간을 산출하여 기존의 보호계전시스템의 차단시간과 비교함으로서 안전성 여부를 판정하였다. ??????치발생 고장시간을 모의하기 위해 초전도케이블용 EMTDC모형을 개발하였으며, 모의 결과 초전도 케이블 계통을 보호할 수 있는 안전성 제어방식이 설계 가능함을 보였다.

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

  • Woo, Pil Sung;Kim, Balho H.;Hur, Don
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.888-894
    • /
    • 2015
  • This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition) system. In the past, this system was primarily utilized as an isolated facility on a local basis, and then it started to be integrated with wide-area networks as the communication technology would make rapid progress. The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. However, an up-to-date power system often requires the real-time operations, which clearly implies that the cyber security would turn out to be a complicated but also crucial issue for the power system. In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the SCADA components.