• Title/Summary/Keyword: Facilities Security

Search Result 763, Processing Time 0.03 seconds

Security Issues in SCADA Network (SCADA 네트워크 보안 이슈)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.46-47
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) system has been used fur remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks. SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism. Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, we introduce recent security issue of SCADA network and propose the application of encryption method to Korea SCADA network.

  • PDF

Study on the Terror with Laser Weapons (레이저무기의 테러위협에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.385-405
    • /
    • 2000
  • In the Present thesis, at temps were to study with the study on the terror with laser weapons. Chapter I which sets out purpose, scope and method. Chapter II concerns the general definition of laser weapons. Chapter III explain at length overview about development of laser weapons. Chapter IV suggest the terror with laser weapons and the counterplan against it. It is followed by concluding observation made in chapter V. To we operated security systems effectively, these need to be regulated according to a security measures organizations, laser facilities and equipments, laser plan and protective force, laser operations and so forth.

  • PDF

Prior Task to Prepare for International Terrorism: Focusing on Multiple-use Facilities (국제테러리즘 대비를 위한 선결과제 : 다중이용시설을 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.89-93
    • /
    • 2018
  • As terrorist organizations like ISIL and Al-Qaeda attack multiple-use facilities such as subways and department stores that many unknown citizens are using, the fear and anxiety are expanding. If international terrorism occurs in Korea, it may attack multiple-use facilities. Therefore, we need to have countermeasures against the attack. However, as the concept of multiple-use facilities has multi-faceted meanings and the scope is wide, there is a limitation in the preparation for international terrorism. In this study, it was tried to find the solution through reviewing the multiple-use facilities related laws. First of all, as the multiple-use facilities related laws were legislated by government organizations according to the necessities, the concept and scope are very inclusive. Therefore, it is possible to have controversies on the scope of the review related to anti-terrorism. Next, the department responsible for the international terrorism is not clear, which can make issue of rights and responsibility. To overcome such limitations, this study tried to set the concept and scope of multiple-use facilities and discussed the issue of the responsible department.

  • PDF

A Study on the Service Area Planning of Elderly Care Facilities (노인요양시설 서비스 공간 계획에 관한 연구)

  • Choi, Jong-In;Lee, Nak-Woon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.14 no.4
    • /
    • pp.11-20
    • /
    • 2008
  • The demand of the care facilities for the elderly will be increased, because of the social changes which desire well organized medical treatment service. However, they have been illogically administrating such as preparing service at living space because of lacking places which provide living service. So the side of administration, it is necessary to have a security and improvement in that kind of needed place. The studies of elderly care facilities have been placing too much emphasis on the living space of the residential facilities and their welfare facilities compare with the service providing place which is ignored just as a part of the living space. This study focus on a situation of elderly care facilities and analyze a service space using in facilities, so it can be applied to service place plan for the future.

  • PDF

A Study on the ITS integrated airport security system (ITS 통합 공항 보안시스템에 관한 고찰)

  • Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.339-344
    • /
    • 2013
  • Airport security activities to ensure the airport's facilities and assets from crime, such as theft, to prevent. security systems that support these activities efficiently so you can be called. security center systems, CCTV systems, access control systems, intrusion detection systems, security communication systems, warning broadcasting system, network security systems, perimeter intrusion detection systems, search systems, and information security systems for the security system will be examined.

The Study on the Security Requirement at Aeronautical Telecommunication Network (항공통신망에서의 보안 요구사항에 관한 연구)

  • Kim, Do-Woo;Lee, Seoung-Hyeon;Lee, Deok-Gyu;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.628-631
    • /
    • 2008
  • The information transfer between the ground facilities and the ground facilities and exchange are necessary for an aircraft and ground facilities so that it is safe, it is economic, an aircraft tan operate an aircraft to the high efficiency until it arrives at the destination location from the stand-by for the fly. Presently, by using the AFTN which is closed network, a communication is made. However, by applying the leading edge communication technology, the aeronautical telecommunication network of the next generation is constructed and it is planning to be managed. Due to this, the ground facilities connected to the foreign network has the security vulnerability by an attack. Therefore, the vulnerability analysis for the safe operational environment build-up at the aeronautical telecommunication network and sorority requirement research are needed.

  • PDF

Cybersecurity Threats and Responses of Safety Systems in NPPs (원전 안전계통의 사이버보안 위협 및 대응)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.99-109
    • /
    • 2020
  • In the past, conservative concepts have been applied in terms of the characteristic of nuclear power plants(NPPs), resulting in analog-based equipment and closed networks. However, as digital technology has recently been applied to the design, digital-based facilities and communication networks have been used in nuclear power plants, increasing the risk of cybersecurity than using analog-based facilities. Nuclear power plant facilities are divided into a safety system and a non-safety system. It is essential to identify the difference and cope with cybersecurity threats to the safety system according to its characteristics. In this paper, we examine the cybersecurity regulatory guidelines for safety systems in nuclear power plant facilities. Also, we analyze cybersecurity threats to a programmable logic controller of the safety system and suggest cybersecurity requirements be applied to it to respond to the threats. By implementing security functions suitable for the programmable logic controller according to the suggested cybersecurity requirements, regulatory guidelines can be satisfied, and security functions can be extended according to other system requirements. Also, it can effectively cope with cybersecurity attacks that may occur during the operation of nuclear power plants.

A Study on Residents' Satisfaction Degree of Differentiated Elements in Outdoor Space of Apartment Housing (아파트 옥외공간 차별화 요소에 대한 주민 만족도 분석에 관한 연구)

  • 서주환;김도경;최성숙;김대환
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.27 no.3
    • /
    • pp.98-108
    • /
    • 1999
  • The purpose of this research is to help outdoor space planning reflected real needs of apartment residents in the differentiation elements of outdoor space, by using USC trade-off game in three apartment complexes in Seoul. This game method was used to evaluate their preference, reliability of preference degree, satisfaction degree, requirement elements such as improvement, sacrifice, maintenance of present condition, and payment possibility for improving and maintaining present condition, in addition to their preference and payment possibility of differentiation of outdoor space in the apartment complex in the future. From the statical analysis, we found the following results: 1. Reliability of preference degree was valid, inasmuch as the first elements they preferred were the almost same as the last things. 2. Elements of preference were pedestrian ways, pedestrian security facilities, various athletic facilities, and variety and high-class facilities in a play ground. 3. Satisfaction degree of differentiation elements of outdoor space was low not only in total complexes but also in each complex. As a result of analysis, these elements were not satisfied with residents. 4. Most of the differentiation elements of outdoor space in three apartment complexes, except planting traditional trees, were required to improve and maintain present condition. The cost to improve and maintain these elements able to pay by them was about 2.18 million won. Through this result, these elements were not options but prerequisites for planning outdoor space in apartment complexes. 5. In the future preference elements of differentiation of outdoor space in apartment complexes were pedestrian and jogging ways, places with water, various athletic places and facilities, multi-function resting places, green spaces in experiences, pedestrian security facilities, various athletic facilities, variety and high-class facilities in a play ground, and payment possibility for these elements was about 3.20 million won.

  • PDF

Legal Implications of the ISPS Code on Contract of Carriage by Sea (국제해상보안규정(ISPS Code)의 시행이 해상법에 미칠 영향)

  • Yang, Jung-Ho;Myung, Chang-Sig
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.37
    • /
    • pp.217-250
    • /
    • 2008
  • The International Ship and Port Facility Security (ISPS) Code which was developed as the main response of the shipping sector to the miserable event of 11 September 2001 came into effect on 1 July 2004. The ISPS Code designed to detect and eliminate security threats affecting ships and port facilities used in international trade will significantly impact not only on the management and operation of the shipping industry but also on maritime law despite the fact that it is the regulatory framework of public law. It is expected that implementing the ISPS Code will contribute to reinforcement of maritime security on the one hand. However, on the other hand, more intensified security inspection and control measures of port states will also cause delay and additional costs which cause uncertainty in allocating security risk and cost between the contracting parties. Therefore, it is desire to insert new security clause dealing with main security issues or adapt existing clauses to new shipping environments to minimize disputes.

  • PDF

Guideline on Security Measures and Implementation of Power System Utilizing AI Technology (인공지능을 적용한 전력 시스템을 위한 보안 가이드라인)

  • Choi, Inji;Jang, Minhae;Choi, Moonsuk
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.4
    • /
    • pp.399-404
    • /
    • 2020
  • There are many attempts to apply AI technology to diagnose facilities or improve the work efficiency of the power industry. The emergence of new machine learning technologies, such as deep learning, is accelerating the digital transformation of the power sector. The problem is that traditional power systems face security risks when adopting state-of-the-art AI systems. This adoption has convergence characteristics and reveals new cybersecurity threats and vulnerabilities to the power system. This paper deals with the security measures and implementations of the power system using machine learning. Through building a commercial facility operations forecasting system using machine learning technology utilizing power big data, this paper identifies and addresses security vulnerabilities that must compensated to protect customer information and power system safety. Furthermore, it provides security guidelines by generalizing security measures to be considered when applying AI.