• Title/Summary/Keyword: Cyber Safety

Search Result 270, Processing Time 0.022 seconds

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack (사이버공격에 대비한 심층방호 특성을 만족하는 단방향 광통신 구조 설계)

  • Jeong, Kwang Il;Lee, Joon Ku;Park, Geun Ok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.561-568
    • /
    • 2013
  • Instrumentation and control system in nuclear power plant performs protecting, controling and monitoring safety operation of Nuclear Power Plant. As cyber attack to the control equipment of instrumentation and control system can cause reactor shutdown and radiation release, it is required to design the instrumentation and control system considering cyber security in accordance with regulatory guides and industrial standards. In this paper, we proposed a design method of uni-directional communication structure which is required in the design of defense-in-depth model according to regulatory guides and industrial standards and we implemented a communication board with the proposed method. This communication board was tested in various test environments and test items and we concluded it can provide uni-directional communication structure required to design of defense-in-depth model against cyber attack by analyzing the results. The proposed method and implemented communication board were applied in the design of SMART (system-integrated modular advanced reactor) I&C (instrumentation and control) systems.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

Hacking attack and vulnerabilities in vehicle and smart key RF communication (차량과 스마트키 RF통신에 대한 해킹 공격 및 취약점에 대한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1052-1057
    • /
    • 2020
  • With the development of new ICT technology, smart keys for vehicles are terminals with ICT technology. Therefore, when the vehicle and the smart key communicate with RF, a cyber hacking attack is possible. Cyber-attacks on smart keys can pose a threat to vehicle theft and vehicle control. Therefore, it is necessary to study hacking attacks and vulnerabilities of smart keys for autonomous vehicles. In this paper, we analyze the cyber attack case of RF communication for vehicles and smart keys. In addition, a real RF cyber attack on the smart key is performed, and the vulnerability of radio wave replication in the same frequency band is found. In this paper, we analyze the vulnerability of RF communication between vehicles and smart keys, and propose a countermeasure against cyber security. In the future, plans to strengthen cyber attacks and security through the popularization of autonomous vehicles will become basic data to protect human and vehicle safety.

A Study on the Safety of Carbon Manufacturing By-product Gas Emissions (카본제조 부생가스 배출 안전성에 관한 연구)

  • Joo, Jong-Yul;Jeong Phil-Hoon;Kim, Sang-Gil;Sung-Eun, Lee
    • Journal of the Korea Safety Management & Science
    • /
    • v.26 no.1
    • /
    • pp.99-106
    • /
    • 2024
  • In the event of an emergency such as facility shutdown during process operation, the by-product gas must be urgently discharged to the vent stack to prevent leakage, fire, and explosion. At this time, the explosion drop value of the released by-product gas is calculated using ISO 10156 formula, which is 27.7 vol%. Therefore, it does not correspond to flammable gas because it is less than 13% of the explosion drop value, which is the standard for flammable gas defined by the Occupational Safety and Health Act, and since the explosion drop value is high, it can be seen that the risk of fire explosion is low even if it is discharged urgently with the vent stock. As a result of calculating the range of explosion hazard sites for hydrogen gas discharged to the Bent Stack according to KS C IEC 60079-10-1, 23 meters were calculated. Since hydrogen is lighter than air, electromechanical devices should not be installed within 23 meters of the upper portion of the Bent Stack, and if it is not possible, an explosion-proof electromechanical device suitable for type 1 of dangerous place should be installed. In addition, the height of the stack should be at least 5 meters so that the diffusion of by-product gas is facilitated in case of emergency discharge, and it should be installed so that there are no obstacles around it.

Effects of Safety Climate on Safety Behavior and Safety Performances in Logistics : Mediating Effects of Safety Knowledge and Safety Motivation (물류 안전 분위기가 물류 안전행동 및 물류 안전성과에 미치는 영향 : 물류 안전지식과 물류 안전동기의 매개효과)

  • Young-Min Kim
    • Korea Trade Review
    • /
    • v.45 no.1
    • /
    • pp.259-277
    • /
    • 2020
  • The purpose of this study is to analyze the relationship between logistics safety climate, logistics safety behavior, and logistics safety performance and the mediating effects of safety knowledge and safety motivation, and to suggest its strategic implications for the improvement of the logistics safety performance. Based on previous researches related to logistics safety, safety climate, safety knowledge, safety motivation, safety behavior and safety performance, research models and hypotheses were set up and questionnaires were conducted. For the hypothesis test, reliability analysis and validity analysis, confirmatory factor analysis, structural equation model analysis, and bootstrapping were applied. As a result of the empirical analysis, the logistics safety climate had a significant positive effect on logistics safety knowledge, logistics safety motivation, and logistics safety behavior, whereas logistics safety knowledge and logistics safety motivation had a meaningful positive effect on logistics safety behavior. Further, logistics safety behavior was found to have a significant positive effect on logistics safety performance. Safety behavior had a significant mediating effect, but safety knowledge and safety motivation did not. However, logistics safety climate, logistics safety knowledge, and logistics safety motivation did not have a significant effect on logistics safety performance.

A study on Detecting the Safety helmet wearing using YOLOv5-S model and transfer learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.302-309
    • /
    • 2022
  • Occupational safety accidents are caused by various factors, and it is difficult to predict when and why they occur, and it is directly related to the lives of workers, so the interest in safety accidents is increasing every year. Therefore, in order to reduce safety accidents at industrial fields, workers are required to wear personal protective equipment. In this paper, we proposes a method to automatically check whether workers are wearing safety helmets among the protective equipment in the industrial field. It detects whether or not the helmet is worn using YOLOv5, a computer vision-based deep learning object detection algorithm. We transfer learning the s model among Yolov5 models with different learning rates and epochs, evaluate the performance, and select the optimal model. The selected model showed a performance of 0.959 mAP.

Changes in and Tasks for the Safety Management System for Port Workers: The Special Act on Port Safety (「항만안전특별법」 시행으로 인한 항만근로자 안전관리의 변화와 과제)

  • Miju, Kim;Seokhwan, Kim
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.4
    • /
    • pp.449-455
    • /
    • 2022
  • Objectives: In order to provide basic data for future researchers, this study aims to explore future tasks after reviewing the changes in port safety management due to the enforcement of the Special Act on Port Safety. Methods: The provisions of the Special Act on Port Safety were analyzed and the latest literature related to port safety management was reviewed. Results: There are two major changes that have stemmed from the Special Act on Port Safety: 1. The scope of application for port participants has been expanded, safety education has been made compulsory, and safety management plans have been established and implemented for each business site. 2. The government is operating a port safety consultative body for each port and has hired one port safety inspector for each of the eleven local maritime and fisheries offices across the country. Future tasks include elaboration of port safety accident statistics, strengthening shipping companies' responsibility for stevedore safety, the unification of contracts, and government interest and support for port safety facilities. Conclusions: The primary feature of the Special Act on Port Safety is the emphasis on autonomous safety management by participants in port transportation. In addition, the enactment of the special law has allowed the Ministry of Maritime Affairs and Fisheries to actively intervene in port loading and unloading safety.

Regulatory Requirements Analysis for Development of Nuclear Power Plants Cyber Security Vulnerability Inspection Tool (원전 사이버 보안 취약점 점검 도구 개발을 위한 규제요건 분석)

  • Kim, Seung-Hyun;Lim, Su-Chang;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.725-730
    • /
    • 2017
  • The use of general IT resources in the Instrumentation and Control system(I&C) for the safety of Nuclear Power Plants(NPPs) is increasing. As a result, potential security vulnerabilities of existing IT resources may cause cyber attack to NPPs, which may cause serious consequences not only to shutdown of NPPs but also to national disasters. In order to respond to this, domestic nuclear regulatory agencies are developing guidelines for regulating nuclear cyber security regulations and expanding the range of regulatory targets. However, it is necessary to take measures to cope with not only general security problems of NPPs but also attacks specific to NPPs. In this paper, we select 42 items related to the vulnerability inspection in the contents defined in R.G.5.71 and classify it into 5 types. If the vulnerability inspection tool is developed based on the proposed analysis, it will be possible to improve the inspection efficiency of the cyber security vulnerability of the NPPs.

A Study on Models for Strengthening Infrastructure Protection through Analysis of Cyber Intrusions (침해사고 분석을 통한 기반시설 보호 강화 모델 연구)

  • Yoon, Oh Jun;Han, Bok Dong;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.29-36
    • /
    • 2015
  • The hacking threats made against the Korea Hydro & Nuclear Power(KNDP) and the leakage of critical information on nuclear power safety raised the public awareness on the importance of protecting and managing national infrastructure necessary for sustaining the state and society. Cyber security activities and relevant institutions in the ROK, however, are still insufficient, because of which there is a possibility that similar incidents would reoccur and cause serious damages. Hence, a grave and direct threat is posed to the national security of the ROK. In this thesis, I would like to give my analysis and assessment on the recent cyber intrusions against infrastructure at home and abroad, measures established in response and their implementation, and the deficiency of the existing infrastructure protection system ; and lastly propose measures to reinforce infrastructure protection of the ROK.