• Title/Summary/Keyword: Facilities Security

Search Result 763, Processing Time 0.026 seconds

A Study on the Safety Regulation Revision for Urban Transit Vehicles (도시철도차량의 안전기준 강화에 관한 연구)

  • Lee Woo-Dong;Shin Jeong-Ryol;Kim Gil-Dong;Han Suk-Youn;Park Kee-Jun;Hong Jai-Sung;Ahn Tai-Ki;Lee Ho-Yong;Kim Jong-Wook
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.322-326
    • /
    • 2003
  • Dae-gu subway accident raise whole points in connection with safety facilities and operating of national urban transit system like rolling stocks, facilities, management of human. Rolling stock is made every effort for improvement of performance, guarantee of comfortableness, insurance of economical efficiency. But Security like safety of fire is not thoroughgoing enough. Especially, interior material has used although it is not prove its degree of safety. it is a main cause of Dae-gu subway accident. Safety regulation of urban transit vehicle that legislate for security in March 2000 does not applied manufacturing vehicles before in 2000. It has be prescribed in the regulations that incombustibles must be used. But detailed test standard related with incombustibles is not prescribe. Thus that regulation be required reinforcement of detailed test standard. Main cause of Dae-Gu subway accident is a fire in vehicle. However, many defects are found in infrastructure and operating vehicle of urban transit, such as inexperienced disposal of driver and CCC in early stage of the fire accident, unskilled opening and closing doors, insufficient escape facilities and safety facilities of a station house and tunnel, and incomplete communication system between vehicle and CTC, extraordinary step. Thus the aims of this study are prevention of urban transit accident, improvement plan of safety driving, and proposal of quick action plan through analysis of total faculty of vehicle.

  • PDF

A Study on the Validity and Utility of Urban Plan Facilities for Prevention of Disaster (재해예방을 위한 도시계획시설의 타당성과 효용성에 관한 연구)

  • Choi, Woong;Park, Jeong Yong;Kim, Young Gyun
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.1
    • /
    • pp.57-65
    • /
    • 2011
  • Studying the operation of urban control plan and control program of urban plan facilities to present development direction of urban plan in the future by performing multi-variate analysis, the research acquired the following conclusion. It is required to institutionally activate the inhabitants' participation by reflecting spontaneous participation and opinion of inhabitants to adminstration so that the effect of business can be maximized in the stage of establishing urban control plan. Furthermore, the participation of role dividing type is necessary to adjust and connect the interest of expert that has experience in practical business of overall urban plan, inhabitant and self-governing body. It is required to reduce the service supplied by government so as to enhance policy of plan-first and development last for facilities with high importance and utility such as road, park and water supply/sewage, etc as well as to seek control program that expands the participation of private sector for administration for which private service is possible.

  • PDF

Assessment of Universal Design for Seoullo 7017 in Seoul, Korea - Using a New Seven Universal Design Principles -

  • Yoo, Jieun;Kim, Jin-Oh
    • Journal of recreation and landscape
    • /
    • v.12 no.4
    • /
    • pp.35-44
    • /
    • 2018
  • The purpose of this research is to evaluate Seoullo 7017 based on Universal Design (UD) principles and guidelines. To derive UD principles applicable to the site context, we used the 2017 Seoul Universal Design Guideline and assessment index provided by the Universal Design Research Center and established 11 evaluation criteria. With respect to research methods, a literature review and on-site field survey were applied, through which we derived UD principles and evaluation criteria to identify UD problems. The 11 evaluation criteria consist of pedestrian space, facilities, access, main entrance, parking lots, trails, restrooms, convenience facilities, information facilities, rest areas, and playgrounds, and these were associated with UD principles for evaluation. As a result, the main entrance had the highest UD score, while parking lots had the lowest in terms of equity, safety, simplicity, and accessibility. Restrooms received a lower UD score because of poor conditions of security and alert systems. Rest areas were found to be uncomfortable for disabled people. With respect to the internal trails, we found the lack of braille block and irregular placement of planting pots made blind people uncomfortable when walking. In terms of UD principles, flexibility received the highest score, followed by amenity, equity, simplicity, tolerance, accessibility, and safety. Flexibility received the highest score, owing to the provision of proper information about convenience facilities and trails, while safety received the lowest, based on poor access to parking lots, inadequate paving materials and colors, and a lack of 24-hour security systems. We hope this research contributes to improving the universal design, so that people are not discriminated against in the use of the park in terms of age, sex, or physical disability. We expect the study to help facilitate empirical studies to verify UD principles and provide improved quality of UD for Seoullo 7017.

The effect on a job performance of the Education training satisfaction of Private Security (민간경비원의 교육훈련만족도가 직무수행에 미치는 영향)

  • Lee, Sae-Hwan;Lee, Seung-Chal;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.139-163
    • /
    • 2009
  • The purpose of this study is to build up the expert system with more subdivided qualifications and improved qualities with the development of the security industry. And also it is to analyze a survey measuring how satisfied they are with curriculum, teaching faculty, educational administration, facilities among 439 private guards completing a course in Korea private guard educational institution and registered in the National Police Agency in Seoul, Gyeonggi, Chungcheong, Gyeongsang, Jeolla province. For this, SPSS(Statistical Packages for Social Science) 15.0 Version was adapted to analyze and other analysis methods used for this study are like these: frequency, reliability analysis, regressive analysis, moderated multiple regression, post hoc test for categorizing the performance changes, looking into the characteristics, examining closely job performance, intention to quit one's job, and inquiring into the influence how satisfaction measurement at education training satisfaction makes on carrying out one's job. Firstly, The Effect Satisfaction at The Program has on Performing One's Duty With respect to job performance, curriculum, educational administration, teaching abilities have positive influences on it. On the other hand, with respect to quitting one's job, curriculum just makes positive effects on leaving one's work statistically. It indicates that systematic and effective curriculum, administration, teaching faculty or contents with high quality rather than just education facilities would make the task performance excellent and satisfaction at the program well in regards to making effects on the task performance. Secondly, The Effect Satisfaction at The Program has on Performing One's Duty with Social Supports Despite being the fact that statistically any strong correlation between curriculum and social supports, one between education facilities and social supports, one between teaching abilities and social supports, and one between educational administration and social supports do not have influences on carrying out job performance, it turns out that satisfaction at the program and social supports make positive effects on performing one's task. In conclusion, the entire social system and support need to be improved and some institutions appropriate for satisfaction at the program should be established as soon as possible.

  • PDF

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing (클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안)

  • Kim, Shi-in;Kim, In-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.885-895
    • /
    • 2019
  • As seen in recent cases of hacking in financial services, attackers are attempting to hacking trustee with poor security management, rather than directly hacking a financial company. As a result, the consignor is strengthening the security check and control of the trustee, but small trustee has difficulties to invest in information security with the lack of computer facilities and the excessive cost of security equipment. In this paper I investigate the vulnerability of personal information processing life cycle standards in order to enhance the security of small consignee that receive personal information form the credit card company. To solve the vulnerability the company should use litigation management system constructed on cloud computing service and install VPN to secure confidentiality and intergrity in data transfer section. Also, to enhance the security of users, it is suggested to protect personal credit information by installing PC firewall and output security on user PC.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Comparing Qualifications of Korea and US Information Security Consultants: Focused on Job Ads (한국과 미국의 정보보호 컨설턴트의 자격요건 비교: 구인광고를 중심으로)

  • Lim, Jae-Jung;Kim, Ha-Young;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1157-1166
    • /
    • 2017
  • Demand for information security consulting is increasing as the number of major information infrastructure facilities in the country is increasing and the subject of ISMS mandatory certification is expanded. The demand for manpower also increases, but the manpower to meet the needs of industry is scarce. In order to cultivate the manpower that meets the demand, the demand of the industry should be grasped first. Therefore, this study collected and analyzed job advertisements in Korea and the United States in order to grasp the needs of industry. This will contribute to the development of policy to cultivate human resources of consultants in accordance with the future demand of the enterprise, and ultimately it will be able to solve the quality disparity of security consulting personnel.

Technological Trends in Intelligent Cyber Range (지능형 사이버 훈련장의 기술 동향)

  • Yu, J.H.;Koo, K.J.;Kim, I.K.;Moon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.4
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.