• Title/Summary/Keyword: Critical infrastructures

Search Result 112, Processing Time 0.032 seconds

A Study on the State Policy for the Development of National Information Infrastructure (국가정보화 추진정책에 관한연구 - 초고속정보통신망기반의 구축을 중심으로 -)

  • 정충식
    • Journal of the Korea Society of Computer and Information
    • /
    • v.1 no.1
    • /
    • pp.7-24
    • /
    • 1996
  • In the emerging information society. a well-established national Information network plays a crucial role In enhancing economic efficiency and creating national wealth. Most of the advanced nations In the world are putting forward government-driven projects for the construction of their national Information Infrastructures. strategically focusing on the development of key technologies and Industrial essential for their Infrastructures. Development of the NII (National Infrastructure) can help unleash an Information revolution that will change forever the way people 1ive, work. and interact with each other. Nonetheless. the present Information Infrastructure In Korea loaves a lot to be Improved In order to realize the vision of Information society. The establishment of the KII (korea Information Infrastructure) does not merely mean the construction of physical network that enables the transmission of various modes of information such as voice, data, and image. It further implies the creation of a new kind of social overhead capital, ranging from the establishment of social and cultural which are conductive to seamless flow of information. For the successful implementation of the KII, it is critical to build the public consensus on the importance and necessity of informatization. At the same time, careful consideration should be given to the institutional factors such as timely and adequate supply of specialized personnel, the updating of policy and regulations, and the strengthening of interntional cooperation.

  • PDF

A Study on the Large-Scale Power Blackout Management System in the Level of National Crisis Management (대규모 정전상태에 대비한 국가위기관리 방향에 관한 연구)

  • Cho, Kwang-Rae;Joo, Il-Yeob
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.387-407
    • /
    • 2005
  • Thanks to the developments of IT technologies, such critical infrastructures as fundamental structures of energies, material circulations, monetary circulations, and living necessaries are intertwined as well as mutually dependent. In this respect, the fact that national infrastructures are closely related to IT infrastructures implies not only expected benefits to provide diverse information-based services, but also anticipated costs to bring about new dangers. However, in spite of these threats, traditional researchers have not put enough interests in these indirect danger, which yield the damages in broad areas through paralyzing risk management systems, although they have investigated such direct threats as nuclear accidents, conflagrations, traffic troubles, and gasoline accidents. Considering that the tendency to depend on electricity, so-called electrification, which is caused by automation and informationalization, is intensified in all parts of society, the breakout problem as a factor to inhibit securities in information-oriented society is significant. Thus, the problems of large-scale power blackout should be treated as national crises. Also, preparation systems for large-scale power blackout have to be provided quickly. In this paper, with analyzing various cases of large-scale power blackout and investigation the causes of them, researches on the blackout management systems of Korea are to be present, on the basis of national crisis management states which are comprised of protection (mitigating and preparing), responding, and recovering(rewarding).

  • PDF

A Study on the Continuity Essential Function of Critical Infrastructure Protection System for Public Safety (공공안전을 위한 국가기반체계 보호제도의 핵심기능연속성에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.795-802
    • /
    • 2017
  • If the function of the national infrastructure is suspended due to natural disasters and social disasters, the damage of the national infrastructure can be a serious threat to the national security as well as the life, body and property damage of the people. In this paper, we examine the domestic and overseas trends of the national system protection system and examine the domestic and overseas trends of the national system protection system. The detailed function of the essential function continuity, essential function, succession order, authority delegation, continuity facility, continuity communication, We examined the specific issues related to testing, education and training, transferring control and directing authority, analyzing the system related to the national infrastructure protection plan, and examined the specific problems and suggested an effective improvement plan for the critical infrastructure protection system.

A study of the major countries cyber terrorism Response System and Implications - Focusing on Analyzing the U.S., U.K. and Germany Cases - (주요국의 사이버테러 대응체계와 시사점 분석 - 미국·영국·독일 사례의 비교를 중심으로 -)

  • Kwon, Oh-Kook;Seok, Jae-Wang
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.187-214
    • /
    • 2016
  • In the mordern society, the reliance on the cyber domain and the cyber connectivity has been increasingly strengthened. Due to this phenomenon, the cyberterror against critical infrastructures and state organs might lead to fatal consequences. Lately, North Korea's cyberattacks against South Korea's national organizations and financial computer networks are becoming more and more intelligent and sophisticated. The cyberattacks against such critical infrastructures have caused enormous economic loss and social disorder. This paper is designed to examine comparatively the cyberterror related laws and organizations of the advanced countries such as U.S. and U.K. and to draw implications. Although those countries are under different institutional and cultural backgrounds with varying security envrionments, they are identically pursuing measures by establishing government-wide counterterror system for coordination and cooperation. They are also commonly focusing upon creating new organizations equipped with new system and upon enhancing intelligence performance and devising punishment regulations. Korea is lack of framework laws regulating cyber security, having only scattered individual laws. Since such legal base is far from efficient counterterror activities, it is necessary that the legal and policy response of the advanced countries should be closely studied for selective introduction. That will eventually lead to legislation of cyber security law. With such legislation on hand, it is subsequently required to strengthen crisis management for prevention of cyberterror and to create joint response team, cooperating with private organizations.

  • PDF

Comparative Analysis of Methodology for Improving Information Security Consulting for SMEs in Korea (중소기업 정보보호 컨설팅 개선을 위한 방법론 비교 분석)

  • Jang, Sang-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.1-6
    • /
    • 2020
  • The government is carrying out information security consulting support projects to solve the difficulties of SME information protection activities. Since the information security consulting methodology applied to SMEs does not apply the proven methodology such as the critical information and communication infrastructure(CIIP), ISMS, ISO27001, etc. It applies various methods for each consulting provider. It is difficult to respond appropriately depending on the organizational situation such as the type and size of SMEs. In order to improve such problems of SME information security consulting and to improve more effective, effective and standard methodology, the information security consulting methodology applied in the current system was compared and analyzed. Through the improvement plan for SME information security consulting method suggested in this study, it is possible to provide information security consulting suitable for all enterprises regardless of SME size or business type.

Ultra low-power active wireless sensor for structural health monitoring

  • Zhou, Dao;Ha, Dong Sam;Inman, Daniel J.
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.675-687
    • /
    • 2010
  • Structural Health Monitoring (SHM) is the science and technology of monitoring and assessing the condition of aerospace, civil and mechanical infrastructures using a sensing system integrated into the structure. Impedance-based SHM measures impedance of a structure using a PZT (Lead Zirconate Titanate) patch. This paper presents a low-power wireless autonomous and active SHM node called Autonomous SHM Sensor 2 (ASN-2), which is based on the impedance method. In this study, we incorporated three methods to save power. First, entire data processing is performed on-board, which minimizes radio transmission time. Considering that the radio of a wireless sensor node consumes the highest power among all modules, reduction of the transmission time saves substantial power. Second, a rectangular pulse train is used to excite a PZT patch instead of a sinusoidal wave. This eliminates a digital-to-analog converter and reduces the memory space. Third, ASN-2 senses the phase of the response signal instead of the magnitude. Sensing the phase of the signal eliminates an analog-to-digital converter and Fast Fourier Transform operation, which not only saves power, but also enables us to use a low-end low-power processor. Our SHM sensor node ASN-2 is implemented using a TI MSP430 microcontroller evaluation board. A cluster of ASN-2 nodes forms a wireless network. Each node wakes up at a predetermined interval, such as once in four hours, performs an SHM operation, reports the result to the central node wirelessly, and returns to sleep. The power consumption of our ASN-2 is 0.15 mW during the inactive mode and 18 mW during the active mode. Each SHM operation takes about 13 seconds to consume 236 mJ. When our ASN-2 operates once in every four hours, it is estimated to run for about 2.5 years with two AAA-size batteries ignoring the internal battery leakage.

K-Trade : Data-driven Digital Trade Framework (K-Trade : 데이터 주도형 디지털 무역 프레임워크)

  • Kim, Chaemee;Loh, Woong-Kee
    • Journal of Information Technology Services
    • /
    • v.19 no.6
    • /
    • pp.177-189
    • /
    • 2020
  • The OECD has assessed Korea as the third highest in trade facilitation worldwide. The paperless trade of Korea is world class based on uTradeHub : national e-trade service's infrastructure for trade community. Over 800 trade-related document standards provide interoperability of message exchange and trade process automation among exporters, importers, banks, customs, airlines, shippers, forwarders and trade authorities. Most one-to-one unit processes are perfectly paperless & online; however, from the perspective of process flow, there is a lack of streamlining end-to-end trade processes spread over many different parties. This situation causes the trade community to endure repetitive-redundant load for handling trade documents. The trade community has a strong demand for seamless trade flow. For streamlining the trade process, processes with data should flow seamlessly to multilateral parties. Flowing data with an optimized process is the critical success factor to accomplish seamless trade. This study proposes four critical digital trade infrastructures as a platform service : (1) data-centric Intelligent Document Recognition(IDR), (2) data-driven Digital Document Flow (DDF), (3) platform based Digital Collaboration & Communication(DCC), and (4) new digital Trade Facilitation Index (dTFI) for precise assessment of K-Trade Digital Trade Framework. The results of new dTFI analyses showed that redundant reentry load was reduced significantly over the whole trade and logistics process. This study leads to the belief that if put into real-world application can provide huge economic gains by building a new global value chain of the K-trade eco network. A new digital trade framework will be invaluable in promoting national soft power for enhancing global competitiveness of the trade community. It could become the advanced reference model of next trade facilitation infrastructure for developing countries.

The Effect and Problem on Mathematics Study Through E-Learning (e-러닝을 이용한 수학 학습의 효과 및 문제점)

  • Kang, Hyo-Soon;Jung, Jung-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.413-416
    • /
    • 2012
  • The information technology such as personal computers and the internet has become a critical factor in forming a common and popular culture over the last few decades. Those technical inventions have transformed the educational environment. In the past, the only way to get an education was for students to attend schools or private institutions by themselves. In contrast, the internet enables people to learn from a distance by using cyber-education courses and many e-learning contents are provided. Based on those infrastructures, students can be educated in a convenient and flexible way without totally depending on attending school. The purpose of this paper is to examine what the effect of cyber-learning at home is, and to analyse what the problem is? Lastly, this paper also suggests measures to alleviate the adverse effects of it.

  • PDF

Development of Web-based Sharing System for Inquiring Civil BIM Libraries Based on Standardized 2D Drawings (표준도 기반 BIM 라이브러리 검색지원을 위한 웹기반 공유시스템 개발)

  • Moon, Hyoun-Seok;Kim, Chang-Yoon;Cho, Guen-Ha;Ju, Ki-Beom
    • Journal of KIBIM
    • /
    • v.6 no.1
    • /
    • pp.25-32
    • /
    • 2016
  • In BIM environments for infrastructures, civil structures such as road, bridge and tunnel etc., created into 3D objects, integrated with their properties, securing BIM design productivity is very critical during 3D modeling. To solve this issue, configuring BIM libraries so that the users can utilize prefabricating in advance 3D objects that have been applying repeatedly during BIM design is essential so much. Current BIM libraries have made focused on Ready-Made for architectural facilities. However, establishing environment for delivering BIM library for civil facilities is very sparse. Accordingly, this study developed a web-based sharing system for delivering BIM library contents based on standardized drawing for civil area. To do this, we have analyzed core features and operation system of BIM library sharing system in domestic and overseas. Besides, functional requirements that are necessary for developing BIM library sharing system was derived, and through operation scenario configuration, the web-based system was developed according to the detailed mechanism. It is expected that this system can enhance BIM design productivity during library based modeling, and can be utilized as construction supporting tools that can help construction managers to make a design change.

Values of the Balanced Decision-Making between Supply Chain Partners

  • Kim, Jong-Joo;Kim, Bo-Won
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.890-894
    • /
    • 2005
  • Coordination between supply chain partners is viewed critical to effective supply chain management. In many situations such as mutual investments or developing infrastructures for their operations related with each other, the coordination issue arises. Depending on the bargaining power balance between them, it is determined who will be able to exert more influence in making decisions related with such coordination. We consider two cases of the decision-making structure in the context of a simple supply chain consisting of two players, i.e., (1) the first case in which a supply chain partner dominates the decision-making process and the other passively follows the dominant player's decision, and (2) the other case in which the two players share the decision-making process equally. We examine which of the cases is better for the companies and where comes the value of the better case. To answer the research questions, we set up an optimal control theory model and derive an analytical solution. The analysis outcome indicates that the shared decision-making in general produces better results for both companies in the supply chain, and the value of the shared decision-making comes from more effective resource utilization than the dominated case.

  • PDF