• Title/Summary/Keyword: Industrial Facilities Security

Search Result 81, Processing Time 0.031 seconds

Utilizing Abandoned Mines in Regional Development: Feasibility of Underground Data Centers and Public Sports Facilities (폐광지역발전을 위한 폐광산 활용방안 연구: 지하 데이터센터 및 공공체육시설로의 운용성 평가)

  • Hyeong-Geol Kim;Ganghui Kim;Sanghyun Bin;Won-Sik Woo;Jongmun Cha;Chang-Uk Hyun
    • The Journal of Engineering Geology
    • /
    • v.33 no.4
    • /
    • pp.737-753
    • /
    • 2023
  • Abandoned mines represent unused space resulting from resource use and changes in industrial environments. Efforts are underway to repurpose such underground spaces, leveraging their unique attributes of temperature stability, shading, and security. This study aimed to assess the feasibility of operating high-demand data centers and public sports facilities as potential recycling options for abandoned mine spaces. The status of data centers located in abandoned mines abroad was examined, including their operational technology capitalizing on the advantages of underground spaces. Considering the varying sizes of underground spaces in different types of abandoned mine in South Korea, the suitability of installing facilities for 12 different sports was evaluated for potential contributions to the health and welfare of local residents. The utilization of abandoned mine spaces as data centers and public sports facilities is expected to not only recycle industrial heritage but also to allow new development opportunities for local communities.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

A Study on the Circular Multi-Family Housing for Designing Local Identity (지역성 구현을 위한 집합주택 원형 주거동의 표현 특성 연구)

  • Moon, Eun-Mi
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.4
    • /
    • pp.121-129
    • /
    • 2013
  • This study was aimed at determining the characteristics of circular multi-family housing under the assumption that the shape of a residential building affects local identity. A total of six case studies were included in this study, three case studies on idle historical industrial facilities turned into residential buildings and another three on multi-family housing located in newly developed residential complexes. The study drew its conclusions as follows. First, the design of circular multi-family housing was intended to maximize security and defense from the outside in older times. This was later developed as the terrace house style with geometric urban squares designed under the urban planning of the Baroque period. This evolved high-density housing with a courtyard in the center offering a green open space, with the aim of restoring a sense of humanity. Second, the six case studies on circular multi-family housing were analyzed from the viewpoint of each factor of local identity, including historical and cultural, landscape, and community. Third, the historical and cultural elements of circular multi-family housing are found in some unused historical industrial facilities remodeled into residential buildings. They provide new capabilities and shapes desired by society at a given time, while maintaining familiar styles and elements of history, integrating a legacy of the past into the present. Fourth, circular multi-family housing with unique shapes and structures often become landmarks of a region with their distinctive appearance against a uniform urban environment and the monotonous scenery of residential complexes. They also show a high level of visual awareness with the distinctive shapes made possible when new elements are added to a historical exterior. Finally, circular multi-family housing with courtyards in the center prompt social contact between inhabitants, especially with dormitories and rental houses for the low-income bracket, which provide a small individual units with high use common space. Circular multi-family housing are planned in a manner similar to a small village or a city. They are designed to enhance sense of community, allocating various public amenities and provide cultural and commercial spaces on the ground floor and courtyard areas.

A Study on Caregiver's Perception of Restraints (요양보호사의 억제대 사용에 대한 인식)

  • Kang, Hye-kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.452-458
    • /
    • 2016
  • This is a descriptive study on visiting caregivers' perception of restraint use. Data were collected from 113 caregivers working at long-term facilities using a structured questionnaire from Feb to March 2016. The caregivers' perception of restraint use was the medium score. The items they considered the most important reasons for the restraints was "Protecting an older person from falling out of bed", which was primarily intended to prevent accidents of the elderly. The score of the knowledge of restraint use was 11.23 points out of 18 and those affected were more than 50 years of age. The attitude score to the use restraints was 9.19, and caregivers thought it should be possible to refrain from using restraints. Work experience of 3 years or less were higher. The perception of using restraints is affected by the knowledge and attitudes of restraint use. This is very important for the elderly in long-term care facilities and is related to health and human rights. Therefore, it is important to provide continuous education related to the use of restraints and regulations on their management.

A Study on Application Methodology of SPDL Based on IEC 62443 Applicable to SME Environment (중소기업환경에서 적용 가능한 IEC 62443 기반의 개발 보안 생애주기 프로세스 적용 방안 연구)

  • Jin, Jung Ha;Park, SangSeon;Kim, Jun Tae;Han, Keunhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.6
    • /
    • pp.193-204
    • /
    • 2022
  • In a smart factory environment in a small and medium-sized enterprise (SME) environment, sensors and actuators operating on actual manufacturing lines, programmable logic controllers (PLCs) to manage them, human-machine interface (HMI) to control and manage such PLCs, and consists of operational technology server to manage PLCs and HMI again. PLC and HMI, which are in charge of control automation, perform direct connection with OT servers, application systems for factory operation, robots for on-site automation, and production facilities, so the development of security technology in a smart factory environment is demanded. However, smart factories in the SME environment are often composed of systems that used to operate in closed environments in the past, so there exist a vulnerable part to security in the current environment where they operate in conjunction with the outside through the Internet. In order to achieve the internalization of smart factory security in this SME environment, it is necessary to establish a process according to the IEC 62443-4-1 Secure Product Development Life cycle at the stage of smart factory SW and HW development. In addition, it is necessary to introduce a suitable development methodology that considers IEC 62443-4-2 Component security requirements and IEC 62443-3 System security requirements. Therefore, this paper proposes an application plan for the IEC 62443 based development security process to provide security internalization to smart factories in an SME environment.

A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection (ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구)

  • Seonghwan Park;Minseok Kim;Eunseo Baek;Junghoon Park
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.36-47
    • /
    • 2023
  • Industrial Control System(ICS), which controls facilities at major industrial sites, is increasingly connected to other systems through networks. With this integration and the development of intelligent attacks that can lead to a single external intrusion as a whole system paralysis, the risk and impact of security on industrial control systems are increasing. As a result, research on how to protect and detect cyber attacks is actively underway, and deep learning models in the form of unsupervised learning have achieved a lot, and many abnormal detection technologies based on deep learning are being introduced. In this study, we emphasize the application of preprocessing methodologies to enhance the anomaly detection performance of deep learning models on time series data. The results demonstrate the effectiveness of a Wavelet Transform (WT)-based noise reduction methodology as a preprocessing technique for deep learning-based anomaly detection. Particularly, by incorporating sensor characteristics through clustering, the differential application of the Dual-Tree Complex Wavelet Transform proves to be the most effective approach in improving the detection performance of cyber attacks.

An Exploratory Study on Block chain based IoT Edge Devices for Plant Operations & Maintenance(O&M) (플랜트 O&M을 위한 블록체인 기반 IoT Edge 장치의 적용에 관한 탐색적 연구)

  • Ryu, Yangsun;Park, Changwoo;Lim, Yongtaek
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.1
    • /
    • pp.34-42
    • /
    • 2019
  • Receiving great attention of IoT and 4th industrial revolution, the necessity comes to the fore of the plant system which aims making it smart and effective. Smart Factory is the key realm of IoT to apply with the concept to optimize the entire process and it presents a new and flexible production paradigm based on the collected data from numerous sensors installed in a plant. Especially, the wireless sensor network technology is receiving attention as the key technology of Smart Factory, researches to interface those technology is actively in progress. In addition, IoT devices for plant industry security and high reliable network protocols are under development to cope with high-risk plant facilities. In the meanwhile, Blockchain can support high security and reliability because of the hash and hash algorithm in its core structure and transaction as well as the shared ledger among all nodes and immutability of data. With the reason, this research presents Blockchain as a method to preserve security and reliability of the wireless communication technology. In regard to that, it establishes some of key concepts of the possibility on the blockchain based IoT Edge devices for Plant O&M (Operations and Maintenance), and fulfills performance verification with test devices to present key indicator data such as transaction elapsed time and CPU consumption rate.

Machine Learning-Based Malicious URL Detection Technique (머신러닝 기반 악성 URL 탐지 기법)

  • Han, Chae-rim;Yun, Su-hyun;Han, Myeong-jin;Lee, Il-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.555-564
    • /
    • 2022
  • Recently, cyberattacks are using hacking techniques utilizing intelligent and advanced malicious codes for non-face-to-face environments such as telecommuting, telemedicine, and automatic industrial facilities, and the damage is increasing. Traditional information protection systems, such as anti-virus, are a method of detecting known malicious URLs based on signature patterns, so unknown malicious URLs cannot be detected. In addition, the conventional static analysis-based malicious URL detection method is vulnerable to dynamic loading and cryptographic attacks. This study proposes a technique for efficiently detecting malicious URLs by dynamically learning malicious URL data. In the proposed detection technique, malicious codes are classified using machine learning-based feature selection algorithms, and the accuracy is improved by removing obfuscation elements after preprocessing using Weighted Euclidean Distance(WED). According to the experimental results, the proposed machine learning-based malicious URL detection technique shows an accuracy of 89.17%, which is improved by 2.82% compared to the conventional method.

Comparative Study of Security Services Industry Act and Police Assigned to Special Guard Act - Focused on special guards and police assigned to special guard duty - (경비업법과 청원경찰법의 비교 연구 특수경비원과 청원경찰을 중심으로)

  • Noh, Jin-keo;Lee, Young-ho;Choi, Kyung-cheol
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.177-203
    • /
    • 2018
  • Police Assigned to Special Guard Act was legislated in 1962 to solve issues regarding the protection of various staple industrial installations, and in 2001, the Security Services Industry Act was revised to establish an effective security system for important national facilities. Thereby the Special Guards System was instituted. The current law has two parts, with the Police Assigned to Special Guard System and Special Guards System, and many scholars have actively discussed the appropriateness of the integration of both systems to solve problems caused by a bimodal system. However, in spite of these discussions taking place in the academic world, the idea of unification lost its power when the guarantee of status regulation was established for the police assigned to special guard. Strictly speaking, police assigned to special guard is a self-guard, and a special guard is a contractual guard. So, both of them have pros and cons. Thus, it would be desirable to give a legal, constitutional guarantee for both systems by strengthening each of them and making up for the weakness of each of them rather than trying to unify police assigned to special guard and special guard. To begin this process, we need to revise unreasonable legal provisions of Security Services Industry Act and Police Assigned to Special Guard Act as below. First, since the actual responsibilities of special guards and police assigned to special guard duty are the same, we need to make the facilities which they use equal. Second, legal provisions need to be revised so that a special guard may perform the duties of a police officer, according to the Act on the Performance of Duties by Police Officers, within the facility that needs to be secured in order to prevent any vacancy in the guarding of an important national facility. Third, disqualifications for the special guards need to be revised to be the same as the disqualifications for the police assigned to special guard duty. Fourth, it is reasonable to unify the training institution for special guards and for police assigned to special guard duty, and it should be the training institution for police. On-the-job education for a security guard needs to be altered to more than 4 hours every month just like the one for police assigned to special guard duty. Fifth, for a special guard, it is not right to limit the conditions in their using weapons to 'use of weapon or explosives' only. If one possesses 'dangerous objects such as weapon, deadly weapon, and so on' and resists, a special guard should be able to use their weapon against that person. Thus, this legal provision should be revised. Sixth, penalty, range of fines, and so on for police assigned to special guard duty need to be revised to be the same as the ones for a special guard. If we revise these legal provisions, we can correct the unreasonable parts of Security Services Industry Act and Police Assigned to Special Guard Act without unifying them. Through these revisions, special guards and police assigned to special guard duty may develop the civilian guard industry wholesomely under the law, and the civilians would have a wider range of options to choose from to receive high quality security service.

A Review on Recent Debate on Proposals of Amendment of the Article of Prohibition of Inhouse-Contract for Harmful Work in the Industrial Safety and Health Act (유해작업 사내도급 금지와 관련된 논란 및 개정방안에 관한 고찰)

  • Park, Doo Yong
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.24 no.1
    • /
    • pp.1-13
    • /
    • 2014
  • Objectives: The purpose of this study is to review the debate on the Article 28(Prohibition of Inhouse-Contract for Harmful Work) of the Industrial Safety and Health Law. Methods: Literatures and recent debate for prohibition and permission of inhouse-contract for harmful work were reviewed. Proposals of revision for the Article 28 of the Industrial Safety and Health Law were also reviewed. Results: It was not found reasonable to revise the Article 28 based on increased fatal accidents or diseases in the electroplating work and heavy metals handling works that are currently listed in the Presidential Decree under the law as the harmful works. Regulation types of prohibition or authorization for any harmful work shall have inherently poor coverage since the scope of application is extremely limited. Contractors for maintenance and repair of chemical facilities may not be included in the scope of application if the harmful works are defined as chemical handling works. If harmful works are prohibited, the contractor workers may loose their jobs. Therefore, it is necessary to consider balancing job security and occupational safety and health safety. Conclusions: Various limitations were found in the Article 28 and the proposals to revise it. Currently in-house subcontracting is widely spread in the workplace. Therefore, it may be inappropriate to set one or two Article such as the Article 28 and 29 to protect in-house subcontract workers from injury and illness. It is believed that it needs fundamental redirection and new approach with new paradigm to impose occupational safety and health duty to prime contractors.