• Title/Summary/Keyword: Critical incident management plan

Search Result 7, Processing Time 0.024 seconds

Study on Developing Simulator for Activating Company Risk Management System (위기관리 시스템 활성화를 위한 시뮬레이터 개발에 관한 연구)

  • Ki Jae-Sug
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2006.04a
    • /
    • pp.237-249
    • /
    • 2006
  • Critical incident can be happened at any time, any places without any pre-notification. For minimizing the loss of the life safety, financial and so on caused by the risk, most of company needs a system what can activate the critical incident management plan to prevent, plan for and respond to events that become critical incident. But a lot of company still don't have such a detailed system in our country and almost company has no effective training way for to boot. This paper shows the way to activate the risk management system to work efficiently the plan. The training way, proposed by this paper, is a incident command simulator based on virtual reality and scenario generation software.

  • PDF

Study on Developing Simulator for Activating Company Risk Management System (위기관리 시스템 활성화를 위한 시뮬레이터 개발에 관한 연구)

  • Ki, Jae-Sug
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.4
    • /
    • pp.25-37
    • /
    • 2006
  • Critical incident can be happened at any time, any places without any pre-notification. For minimizing the loss of the life safety, financial and so on caused by the risk, most of company needs a system what can activate the critical incident management plan to prevent, plan for and respond to events that become critical incident. But a lot of company still don't have such a detailed system in our country and almost company has no effective training way for to boot. This paper shows the way to activate the risk management system to work efficiently the plan. The training way, proposed by this paper, is a incident command simulator based on virtual reality and scenario generation software.

A Study for Integrating ICS Security Logs with Centralized SIEM (Security Information and Event Management) using OPC Protocol (OPC 프로토콜을 활용한 제어시스템 보안로그 전송방법 고찰 및 통합 로그서버 구축방안)

  • Kim, Jaehong;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1205-1212
    • /
    • 2022
  • Cyber threat targeting ICS (Industrial Control System) has indicated drastic increases over the past decade and Cyber Incident in Critical Infrastructure such as Energy, Gas Terminal and Petrochemical industries can lead to disaster-level accidents including casualties and large-scale fires. In order to effectively respond to cyber attacks targeting ICS, a multi-layered defense-in-depth strategy considering Control System Architecture is necessary. In particular, the centralized security log system integrating OT (Operational Technology) and IT (Information Technology) plays an important role in the ICS incident response plan. The paper suggests the way of implementing centralized security log system that collects security events and logs using OPC Protocol from Level 0 to Level 5 based on IEC62443 Purdue Model to integrate ICS security logs with SIEM (Security Information Event Management) operated in IT environment.

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

Developing Maker Competency Model and Exploring Maker Education Plan in the Field of Elementary and Secondary Education (메이커 역량 모델 개발 및 초·중등 교육 현장에서의 메이커 교육 방안 탐색)

  • Yoon, Jihyun;Kim, Kyung;Kang, Seong-Joo
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.5
    • /
    • pp.649-665
    • /
    • 2018
  • In this study, we extracted the core competencies of makers through the analysis of critical incident technique and behavioral event interview to explore the nature and attributes of maker education, and then we developed a maker competency model based on these core competencies. As a result, six competency groups and 23 sub-competencies were extracted. In other words, we were able to confirm the existence of integrated thinking competency group consisting of four competencies made up of 'analytic thinking', 'intuitive thinking', 'visual thinking', and 'empirical thinking' and that of collaborative competency group with four competencies of 'sharing', 'communication', 'conflict management', and 'scrupulosity'. In addition, we could also confirm the existence of making mind competency group, which is composed of four competencies namely 'interest in various areas', 'challenge consciousness', 'failure management', and 'pleasure of the making process'. We could also confirm that human-centered competence group consisting of two competencies of 'humanity' and 'user-oriented' and the problem-finding competence group consisting of two competencies of 'observation' and 'recognition of discomfort in daily life'. Lastly, the making practice competency group is composed of seven competencies: 'understanding making tool', 'understanding electricity', 'understanding programming', 'planning', 'hand knowledge', 'information search', and 'direct execution'. We discussed educational implications of these findings.

The Optimal Energy Mix in South Korea's Electricity Sector for Low Carbon Energy Transition in 2030: In Consideration of INDC and Sequential Shutdown of Decrepit Nuclear Power Plants (저탄소 에너지 전환을 위한 2030년 최적전력구성비: 노후 원전 단계적 폐쇄와 INDC를 고려한 시나리오)

  • Kim, Dongyoon;Hwang, Minsup
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.6
    • /
    • pp.479-494
    • /
    • 2017
  • After Fukushima incident, negative sentiment towards nuclear power has led to transition in policies that reduce the dependency on nuclear power in some countries. President Moon of Republic of Korea also announced a national plan of decommissioning retired nuclear power plants stage by stage. Therefore, nuclear power that once was considered the critical solution to energy security and climate change is now a limited option. This study aims to find an optimal energy mix in Korea's electricity system from 2016 through 2030 to combat climate change through energy transition with minimum cost. The study is divided into two different scenarios; energy transition and nuclear sustenance, to compare the total costs of the systems. Both scenarios show that electricity generated by wind technology increases from 2018 whereas that of photovoltaic(PV) increases from 2021. However, the total cost of the energy transition scenario was USD 4.7 billion more expensive than the nuclear sustenance scenario.

Development of GIS based Water Quality Simulation System for Han River and Kyeonggi Bay Area (한강과 경기만 지역 GIS 기반 통합수질모의 시스템 개발)

  • Lee, Chol-Young;Kim, Kye-Hyun
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.4
    • /
    • pp.77-88
    • /
    • 2008
  • There has been growing demands to manage the water quality of west coastal region due to the large scale urbanization along the coastal zone, the possibility of application of TMDL(Total Maximum Daily Loadings) to Han river, and the natural disaster such as oil spill incident in Taean, Chungnam. However, no system has been developed for such purposes. In this background, the demand of GIS based effective water quality management has been increased to monitor water quality environment and propose best management alternatives for Han river and Kyeonggi bay. This study mainly focused on the development of integrated water quality management system for Han river bas in and its estuary are a connected to Kyeonggi bay to support integrated water quality management and its plan. Integration was made based on GIS by spatial linking between water quality attributes and location information. A GIS DB was built to estimate the amount of generated and discharged water pollutants according to TMDL technical guide and it included input data to use two different water quality models--W ASP7 for Han river and EFDC for coastal area--to forecast water quality and to suggest BMP(Best management Practices). The results of BOD, TN, and TP from WASP7 were used as the input to run EFDC. Based on the study results, some critical areas which have relatively higher pollutant loadings were identified, and it was also identified that the locations discharging water pollutant loadings to river and seasonal factor affected water quality. And the relationship of water quality between river and its estuary area was quantitatively verified. The results showed that GIS based integrated system could be used as a tool for estimating status-quo of water quality and proposing economically effective BMPs to mitigate water pollution. Further studies need to be made for improving system's capabilities such as adding decision making function as well as cost-benefit analysis, etc. Also, the concrete methodology for water quality management using the system need to be developed.

  • PDF