• Title/Summary/Keyword: Facilities Security

Search Result 763, Processing Time 0.028 seconds

A Study on Unified Security Management System for remote data acquisition of New and Renewable Energy Facilities (신.재생에너지 발전설비의 원격 데이터 수집을 위한 통합 보안 관리시스템에 관한 연구)

  • Kim, Hyoung-Ju;Lim, Jung-Yol
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.186-193
    • /
    • 2009
  • Development and diffusion of a new and renewable energy are acutely required at domestic energy actualities to be inferior as industrialization is accelerated, and use of information electric appliance is increased rapidly. For the diessemination and practical use of new and renewable energy, this paper presents an unified security management system that is efficiently able to acquire operational status date and control distributed generation facilities. Also, the unified security management system is suggested to protect gathered operational status date from unpredictable problems such as computer virus, spy ware, and any other network problems.

  • PDF

Architectural Design Elements for Hazard-Resistant and Reduction House (방재 및 감재주택을 위한 건축 계획 요소의 설정)

  • Kim, Hyeong-Eon
    • KIEAE Journal
    • /
    • v.16 no.6
    • /
    • pp.77-82
    • /
    • 2016
  • Purpose: Almost every research carried out in our country against the natural disaster is focused on the temporary facilities such as temporary housing, emergency shelter and as a result, it is very hard to find out researches on the ordinary houses which installed integrated systems of hazard-resistant against the natural disaster. Method: To conduct this research, categorizing process for design, structural, environmental and installation elements found in the Hazard-Resistant and Reduction House built for sale in Japan was performed. Result: In this study, several design concepts and subordinate items are recommended for hazard-resistant housing. First, design concept of 'Preparedness' which means security and access to the storage storing goods especially food & beverage for the emergencies is needed. The subordinate items consist of security of stocking space, diversified and circular storage system, and safety storage system. Second, design concept of 'Security' which means security of physical safety space and rapid recovery to returning to daily life against natural disaster is needed. The subordinate items consist of many items including not only structure and facilities but also architectural design method. And finally, design concept of 'Maintenance, Support and Return' which means minimizing the physical and psychological damages and support safety and physical conditions of the victims from the impact of the disaster to returning to daily life is needed. The subordinate items consist of high efficiency insulation/airtightness design, microclimate design, combination of photovoltaic system and storage battery, non-power appliance system against the power failure, storing system for drinking water, rainwater storing and utilization system.

Analysing Current state of Identifying Critical digital assets And Cyber security control for Nuclear Facility (원자력발전소의 필수디지털 자산 식별 및 보안 조치 현황 분석)

  • Kim, Sangwoo;Shin, Ick-Hyun;Kwon, Kook Heui;Byun, Ye eun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.264-266
    • /
    • 2015
  • Currently as cyber threats grow up targeting nuclear power plants(NPP), licensees must guarantee that computer and information systems of nuclear facilities can be adequately protected against cyber attack. Especially critical system that cause illegal transfer of nuclear material and adverse impact to public safety need protecting. In this paper, we surveying the cyber threat examples targeted at NPP, and taxonomy the method of cyber security for NPPs in korea through analyzing the methodology to identify critical system and address cyber security controls for nuclear facilities.

  • PDF

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

A Study on Convergence Security of National Infrastructure (국가 인프라 시설의 융합보안 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.341-342
    • /
    • 2017
  • Control and development systems such as air traffic control systems, road traffic systems, and Korea Hydro &Nuclear Power are the infrastructure facilities of the country, and if the malicious hacking attacks proceed, the damage is beyond imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social problems. In this study, we analyze the environment of the development control system and analyze the status of the convergence security research, which is a recent issue, and propose a strategy system for stabilizing various power generation control systems and propose countermeasures. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control.

  • PDF

Protective plan by the drone development in Major National Facilities (무인항공기 발전에 따른 국가중요시설 보호방안)

  • Cho, Min Sang;Shin, Seung Gyoon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.3-9
    • /
    • 2015
  • With the development of technology, small UAVs are used in various forms. From military UAV to the Amazon drone, the UAVs are applied to increasing fields for its merits which can replace human work more fast and precisely than what human used to do. Yet, the use and development of UAVs cannot be embraced indiscreetly. There exist negative aspects along with its convenience and positive use. In military use, for instance, the use of UAV can handle dangerous missions in place of human beings but at the same time, it can be very threatening weapons that put people in danger of being attacked at unknown time and places. Therefore, this study discusses the safety measures for major national facilities. Through theoretical understanding of UAVs and major national facilities, the study explores into key concepts and reviewed the cases that threatened our nation's safety. The study also makes suggestions on the policies of the use of UAV to secure national safety.

Thinking multiculturality in the age of hybrid threats: Converging cyber and physical security in Akkuyu nuclear power plant

  • Bicakci, A. Salih;Evren, Ayhan Gucuyener
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2467-2474
    • /
    • 2022
  • Nuclear Power Plants (NPPs) are the most protected facilities among all critical infrastructures (CIs). In addition to physical security, cyber security becomes a significant concern for NPPs since swift digitalization and overreliance on computer-based systems in the facility operations transformed NPPs into targets for cyber/physical attacks. Despite technical competencies, humans are still the central component of a resilient NPP to develop an effective nuclear security culture. Turkey is one of the newcomers in the nuclear energy industry, and Turkish Akkuyu NPP has a unique model owned by an international consortium. Since Turkey has limited experience in nuclear energy industry, specific multinational and multicultural characteristics of Turkish Akkuyu NPP also requires further research in terms of the Facility's prospective nuclear security. Yet, the link between "national cultures" and "nuclear security" is underestimated in nuclear security studies. By relying on Hofstede's national culture framework, our research aims to address this gap and explore possible implications of cross-national cultural differences on nuclear security. To cope with security challenges in the age of hybrid threats, we propose a security management model which addresses the need for cyber-physical security integration to cultivate a robust nuclear security culture in a multicultural working environment.