• Title/Summary/Keyword: Industrial Facilities Security

Search Result 81, Processing Time 0.037 seconds

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

An Analysis on the Impacts of High-Tech Complex on Neighborhood Housing Price (첨단산업단지가 주변지역 주택가격에 미치는 영향요인 분석)

  • Park, Dong-Wong;Lee, Joo-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4543-4550
    • /
    • 2012
  • The purpose of this paper is to suggest the improvement method to achieve the interactive development effect between high-tech industrial complex and its surrounding areas. For this reason, this paper has conducted an empirical analysis to find out relevant comprehensive factors, affecting nearby housing prices from such plans, especially by reviewing 'Seoul Digital Industrial Complex.' This paper is truly differentiated from previous research by adding a new perspective 'diverse location characteristics', as it focuses not only on 'high-tech facility' characteristics, but also on 'urban function facilities', including 'transportation facilities', 'amenity facilities', 'security facilities', etc. Then, SPSS Version 18.0 was utilized to conduct the multiple regression analysis with the accumulated relevant data and several results were drawn out as following: Firstly, 'deterioration level', 'brand of apartment', etc. are found to be major influencing factors. Secondly, 'educational facilities', 'transportation facilities', 'Cultural & Sports facilities', 'Amenity facilities', etc. are found in the sector of 'location characteristic'. Lastly, 'leading companies within the industrial complex', were also found, affecting nearby housing prices. Therefore, when a housing development project is planned to grant the interactive development effect to high-tech industrial complex and its surrounding housing areas, it is necessary to consider variety factors, such as comprehensive location characteristics and housing complex characteristics, and also proper housing policy measures should be devised in accordance with the actual demand of employees and their dependant family members.

A Study on the Comparison between 「SECURITY SERVICES INDUSTRY ACT」 and 「ACT ON THE PROTECTION, ETC. OF TEMPORARY AGENCY WORKERS」 among Security Guards (「경비업법」상 경비원과 「파견근로자보호 등에 관한 법률」상 경비원의 비교에 관한 연구)

  • Noh, Jin Keo;Choi, Kyung Cheol;Lee, Young Ho
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.143-167
    • /
    • 2018
  • According to the Security Services Industry Act security guards are not just workers but security-related service workers complementing the lack of police force and specializing in protecting of national important facilities, industrial facilities and apartment houses. Nevertheless, confusing or mixing the security service workers in "Security Services Industry Act" with the guards in the "Act on the Protection etc. of Temporary Agency Workers" lead to a constant debate about the scope of work of security guards. In the case of security service workers in "Security Services Industry Act" there is a strict limitations on security service worker's qualification such as strict reasons for disqualification, a need to pass training for new workers and qualification training, a need to report to the competent chief police officer if the security guard has placed or unplaced by the security service company. It distinguishes security service workers in "Security Services Industry Act" from the guards in the "Act on the Protection etc. of Temporary Agency Workers" and acknowledges the occupation of security service worker as a professional service worker. Therefore, security service workers in "Security Services Industry Act" shouldn't be obliged to do any other work than security work. If it is required to do other work than security work contract by the "Security Services Industry Act" doesn't apply but need to use a security guard according to "Act on the Protection etc. of Temporary Agency Workers" or hire a security guard on the employment contract. In this way, when security service workers in "Security Services Industry Act" are recognized as professional security related workers, the entire security industry can ultimately develop.

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.11
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

SPSF : Smart Plant Safety Framework based on Reliable-Secure USN (차세대 USN기반의 스마트 플랜트안전 프레임워크 개발)

  • Jung, Ji-Eun;Song, Byung-Hun;Lee, Hyung-Su
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.102-106
    • /
    • 2010
  • Recently process industries from oil and gas procedures and mining companies to manufactures of chemicals, foods, and beverages has been exploring the USN (Ubiquitous Sensor Networks) technology to improve safety of production processes. However, to apply the USN technology in the large-scale plant industry, reliability and security issues are not fully addressed yet, and the absence of the industrial sensor networking standard causes a compatibility problem with legacy equipment and systems. Although this situation, process industry such as energy plants are looking for the secure wireless plant solution to provide detailed, accurate safety monitoring from previously hard-reach, unaccordable area. In this paper, SPSF (Smart Plant Safety Framework based on Reliable-Secure USN) is suggested to fulfill the requirements of high-risk industrial environments for highly secure, reliable data collection and plant monitoring that is resistant to interference. The SPSF consists of three main layers: 1) Smart Safety Sensing Layer, 2) Smart Safety Network Layers, 3) Plant Network System Layer.

  • PDF

Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed

  • Shin, Jinsoo;Choi, Jong-Gyun;Lee, Jung-Woon;Lee, Cheol-Kwon;Song, Jae-Gu;Son, Jun-Young
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3319-3326
    • /
    • 2021
  • As a form of industrial control systems (ICS), nuclear instrumentation and control (I&C) systems have been digitalized increasingly. This has raised in turn cyber security concerns. Cyber security for ICS is important because cyber-attacks against ICS can cause not only equipment damage and loss of production but also personal and public safety hazards unlike in general IT environments. Numerous risk analyses have been carried out to enhance the safety of ICS and recently, many studies related to the cyber security of ICS are being conducted. Many existing risk analyses and cyber security studies have considered safety and cyber security separately. However, both safety and cyber security perspectives should be considered when analyzing risks for complex and critical ICS facilities such as nuclear power plants (NPPs). In this paper, the STPA-SafeSec methodology is selected to consider both safety and security perspectives when performing a risk analysis for NPPs in order to assess impacts on the safety by cyber-attacks against the digital I&C systems. The STPA-SafeSec methodology was applied to a test-bed system that simulates a condensate water (CD) system in an NPP. The process of the application up to the development of mitigation strategies is described in detail.

A Study on the Telelecturing/Conferencing System (원격화상강의/회의 시스템에 관한 연구)

  • Joo, Young-Ju
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.5 no.2
    • /
    • pp.16-29
    • /
    • 1998
  • Bell Laboratory introduced the sound and visual system for the first time in 1927. Since then, the development of telecommunication technology made it possible for people located far away to communicate each other watching through the TV screen. Over the period different types of telelecturing systems have prospered in line with the development of telecommunication technology. Therefore, it is quite natural that telelecturing/conferending system attracts the attention of many people as a new way of educating people located in a long distance. In the industrial sector, telelecturing systems already come into wide use to save time and training and travelling expense. In this study, I examine the concept and characteristics of telelecturing/conferencing system and introduce different types telelecturing system developed in parallel with the development of communication technology. Then, I analyze how those merits of the telelecturing system can be applied to educational purpose. Finally, I propose and design ideal telelectuirng/conference facilities consisting of telelecturing rooms, bilateral movie system, seats, ceilings, color, TV screen, lighting, acoustics, humidities and temperature control, security system, projection system to maximize the educational purpose and effectiveness.

  • PDF

A Study on the Framework of Integrated Vulnerability Analysis of Domestic Nuclear Facilities (국내 원자력 시설 통합 취약점 분석 프레임워크 연구)

  • Mi-Joo Shin;Seong-su Yoon;Ieck-chae Euom
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Cyber attacks on national infrastructure, including large-scale power outages in Ukraine, have continued in recent years. As a result, ICS-CERT vulnerabilities have doubled compared to last year, and vulnerabilities to industrial control systems are increasing day by day. Most control system operators develop vulnerability countermeasures based on the vulnerability information sources provided by ICS-CERT in the United States. However, it is not applicable to the security of domestic control systems because it does not provide weaknesses in Korean manufacturers' products. Therefore, this study presents a vulnerability analysis framework that integrates CVE, CWE, CAPE, and CPE information related to the vulnerability based on ICS-CERT information (1843 cases). It also identifies assets of nuclear facilities by using CPE information and analyzes vulnerabilities using CVE and ICS-CERT. In the past, only 8% of ICS-CERT's vulnerability information was searched for information on any domestic nuclear facility during vulnerability analysis, but more than 70% of the vulnerability information could be searched using the proposed methodology.