• 제목/요약/키워드: Facilities Security

Search Result 763, Processing Time 0.022 seconds

Integrated Security Management Framework for Secure Networking

  • Jo, Su-Hyung;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2174-2177
    • /
    • 2003
  • Internet is exposed to network attacks as Internet has a security weakness. Network attacks which are virus, system intrusion, and deny of service, put Internet in the risk of hacking, so the damage of public organization and banking facilities are more increased. So, it is necessary that the security technologies about intrusion detection and controlling attacks minimize the damage of hacking. Router is the network device of managing traffic between Internets or Intranets. The damage of router attack causes the problem of the entire network. The security technology about router is necessary to defend Internet against network attacks. Router has the need of access control and security skills that prevent from illegal attacks. We developed integrated security management framework for secure networking and kernel-level security engine that filters the network packets, detects the network intrusion, and reports the network intrusion. The security engine on the router protects router or gateway from the network attacks and provides secure networking environments. It manages the network with security policy and handles the network attacks dynamically.

  • PDF

A Study on the Application of Private Security in Assembly and Demonstration Sites Using SNS Emotional Language Analysis

  • Kunhee, Kim;Cheolyeung, Jang
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.1-7
    • /
    • 2022
  • The purpose of this study is to review the appropriateness of deploying private security guards using SMS emotional language analysis at the current assembly and demonstration sites, which rely only on the police force, and to suggest a plan. Therefore, it is intended to contribute to suppressing the problems at the assembly and demonstration sites and present a new paradigm for responding to the assembly and demonstration sites based on the study's results. First, it is necessary to prepare a legal basis for the deployment of private security guards in the 'Security Services Industry Act' and 'Assembly and a Demonstration Act'. Second, there is a need for a 'security company selection criteria' for selecting security companies with a lot of experience, such as collective civil petition sites and security for national critical facilities (special security services). Third, it is necessary to prepare financial resources for the deployment of private security guards. This study is expected to serve as a new cornerstone for effective management of assembly and demonstration sites through mutual complementation of the police and private security.

A Study on a Survey of Actual Conditions of Children Play Space's Safety Management within Commercial Facilities;Focused on five-place large-scale distribution stores in Seoul (상업시설 내 어린이 놀이공간의 안전관리에 관한 실태조사 연구;서울지역 대형 유통매장 5곳을 대상으로)

  • Hong, Yoon-Mi;Kim, Ji-Soo;Byun, Dae-Jung
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.4
    • /
    • pp.66-74
    • /
    • 2008
  • A form of consumption has been changed to a form of pursuing rather qualitative sides than quantitative sides according to an improvement of the living level followed by an increase in national income and to an increase in women's advance to society in modern society. The above change had a lot of effects on children play space, a subsidiary means within commercial facilities. However, partial children play facilities have steady children injury cases by a lack of safety management facilities. Therefore, the study investigated indoor children play facilities installed in large-scale distribution stores as department stores and discount stores out of commercial facilities in Seoul. The study investigated actual conditions and collected picture data with a checklist drawn up on the basis of the safety management standard for three months from April, 2008 to June, 2008 by visiting five places under cooperation. The purpose of the study was to grasp actual conditions of safety management of play space within commercial facilities through the contents and picture data of the investigated checklist and to offer basic data in the side of safety management of commercial facilities and various indoor children play spaces by proposing security measures for the problems.

A Study on Facility Information System using GIS and Semantic Web in Underground Space

  • Cui, Yulan;Hwang, Hyun-Suk;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.12
    • /
    • pp.1843-1854
    • /
    • 2010
  • The utilization of underground space has recently increased with the complication of road, the rise of the land price, and the development of green technology. Underground space ranges from classical excavations to subway, underground cities, and shopping malls where there are crowds of people. At this time, government has spent a lot of money in installing various types of safety facilities for preparations of increasing potential disasters. Therefore, an effective facility management system is required. In this paper, we propose an information retrieval process to effectively extract the facilities' information based on the ontology and spatial analysis in underground space. The ontology-based searching supports hierarchical and associated results as well as knowledge sharing with hierarchy concepts. The spatial analysis based searching has "Buffer" and "Near" functions to operate on a map without understanding any property of the facility information.

G-Pedigree and G-code System of RFID-based Development for Forward & Reverse Logistics Management (순물류와 역물류 관리에 적합한 RFID 기반의 G-Pedigree 시스템과 G-code 체계 개발)

  • Hwang, Bo-Hyun;Yun, Jong-Ho;Choi, Myung-Ryul
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.112-118
    • /
    • 2010
  • This paper propose G-code and G-Pedigree system that are development based on the e-Pedigree and EPC, and RFID solutions for logistics management is proposed. The proposed G-Pedigree system to include the forward logistics and reverse logistics all logistics and management systems are appropriate for the event, with security features, security and accessibility of critical data was strengthened. The proposed G-code systems and the EPC code of the existing RFID readers, tags can be applied to, the more you can manage the logistics-related information.

  • PDF

Status and Improvement Plans for Sidewalk Safety Facilities (Barrier) in Child Protection Area (어린이보호구역 내 보도안전시설(방호울타리) 설치 현황 및 개선 방안)

  • Bong-Chul Joo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.137-145
    • /
    • 2023
  • Accidents involving deaths of children and pedestrians continue to occur in child protection zones, also known as school zones. Over the three years from 2019 to 2021, 11 child deaths occurred in school zones in Korea. In December 2022, a fatal accident occurred among an elementary school student in a school zone near an elementary school in Gangnam-gu, Seoul. In April 2023, an accident occurred in which an elementary school student died in a school zone near Seo-gu Middle School in Daejeon and an elementary school in Yeongdo-gu, Busan. Until recently, child deaths continued to occur on sidewalks in child protection zones. It is time to closely review the status of safety facilities installed in school zones and related regulations. We investigated and analyzed the current status of safety facilities and related regulations installed on sidewalks in child protection zones in Korea, and identified matters necessary for institutional improvement regarding safety facilities for sidewalks in child protection zones.

An Intelligent Machine Learning Inspired Optimization Algorithm to Enhance Secured Data Transmission in IoT Cloud Ecosystem

  • Ankam, Sreejyothsna;Reddy, N.Sudhakar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.83-90
    • /
    • 2022
  • Traditional Cloud Computing would be unable to safely host IoT data due to its high latency as the number of IoT sensors and physical devices accommodated on the Internet grows by the day. Because of the difficulty of processing all IoT large data on Cloud facilities, there hasn't been enough research done on automating the security of all components in the IoT-Cloud ecosystem that deal with big data and real-time jobs. It's difficult, for example, to build an automatic, secure data transfer from the IoT layer to the cloud layer, which incorporates a large number of scattered devices. Addressing this issue this article presents an intelligent algorithm that deals with enhancing security aspects in IoT cloud ecosystem using butterfly optimization algorithm.

A study on IoT platform for private electrical facilities management (수용가 전력설비 관리를 위한 사물인터넷 플랫폼 연구)

  • Jang, Kyung-Bae
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.103-110
    • /
    • 2019
  • In this paper, we suggested how the Internet of Things (IoT) technology could be applied to an internet platform that is used for managing the customer's power grid efficiently. For an internet platform with efficient management, analysis is done by several sections; communication method, and its protocol, and also security element. From this analysis, with currently used sensors, we have presented a development method for the sensor to server data reliable communication solution and data management server with a security solution. Moreover, this paper suggests a communication module that could be used for a power grid management platform, protocol and security algorithm and also a way to build a server for managing those systems and modules.

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

A Study on the Development of Convergence Security with the Changes in Security Environments (시큐리티 환경변화에 따른 융합보안의 대두와 물리보안업체의 대응)

  • Ahn, Hwang-Kwon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.31-40
    • /
    • 2011
  • As new technologies emerge and threats become increasingly complex and unpredictable, security professionals who are living in the age of information face an increasingly complex array of challenges. In recent, virtually all organizations with physical and IT assets protect those assets in a variety of methods. There are physical systems to protect facilities and their contents from unlawful trespassing. It is important to note that the integration of physical and IT security is to be required: When done correctly, the integration starts with laws, strategies, policies and procedures. Integration of physical and IT security systems is done not for its own sake but in support of security policies and procedures. Significant security improvements can be made by integrating physical and IT security management without necessarily integrating physical and logical electronic security systems. Up to now, the private security industries of the Republic of Korea have been operated and developed by the separation of physical security and industrial security. However, considering the fast changing security environments, physical security companies should turn their attention to security convergence field to cope with the new trends in the security matters. At the same time, governmental supports on the improvement of various laws, regulations and policies in such a way to meet the realistic needs of the industries should be followed.