• Title/Summary/Keyword: Industrial Technology Security

Search Result 720, Processing Time 0.027 seconds

A Study on New High-Technology Protection System Model Using The Social Engineering Techniques (사회공학 가법을 이용한 새로운 첨단기술보호시스템 모텔에 관한연구)

  • Park, Ji-Hyung
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.3-11
    • /
    • 2011
  • Today the protection of high-tech is one of the most important requirements to survive in competition between companies or countries. In these circumstances, government's industrial security activities have been transformed into independent activities of the private center. So, Company has introduced a high-tech security system for the sake of Technology protect. But, Several Security Incident have occurred in recent years, and so New security measures became necessary. In this study, I will suggest a new high-technology protection system model Using the social engineering techniques to analyze security threats.

Information security auditing Framework in Industrial control system (산업제어시스템 정보보안 감리 프레임워크 연구)

  • Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.139-148
    • /
    • 2008
  • Information technology have led to change the automation of large industrial control system as well as business system and environments. Industrial control system(ICS) is vital components of most nation's critical infrastructures such as electricity, natural gas, water, waste treatment, transportation and communication that are based of national security, safety of citizen and development of national economy According to the change of business environment, organizational management pushed integration all of the system include MIS and ICS. This situation led to use standard information technologies for ICS, this transition has been to expose ICS to the same vulnerabilities and threats that plague business system. Recently government obliged owners of the public information system to audit for safety, efficiency and effectiveness, and also obliged the owners of national infrastructure to improve their system security as a result of vulnerability analysis. But there doesn't prepare a security architecture and information security auditing framework of ICS fur auditing. In this paper, I suggested the security architecture and information security auditing framework for ICS in order to prepare the base of industrial system security auditing.

Implementation of Speaker Verification Security System Using DSP Processor(TMS320C32) (DSP Processor(TMS320C32)를 이용한 화자인증 보안시스템의 구현)

  • Haam, Young-Jun;Kwon, Hyuk-Jae;Choi, Soo-Young;Jeong, lk-Joo
    • Journal of Industrial Technology
    • /
    • v.21 no.B
    • /
    • pp.107-116
    • /
    • 2001
  • The speech includes various kinds of information : language information, speaker's information, affectivity, hygienic condition, utterance environment etc. when a person communicates with others. All technologies to utilize in real life processing this speech are called the speech technology. The speech technology contains speaker's information that among them and it includes a speech which is known as a speaker recognition. DTW(Dynamic Time Warping) is the speaker recognition technology that seeks the pattern of standard speech signal and the similarity degree in an inputted speech signal using dynamic programming. ln this study, using TMS320C32 DSP processor, we are to embody this DTW and to construct a security system.

  • PDF

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

Technological Trends in Intelligent Cyber Range (지능형 사이버 훈련장의 기술 동향)

  • Yu, J.H.;Koo, K.J.;Kim, I.K.;Moon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.4
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

A Study on Evaluation Criteria and Procedures for Measuring Radiation Leakage of Aviation Security Equipment (항공보안장비 방사선 누출량 측정을 위한 평가 기준 및 절차에 관한 연구)

  • Kihyun Kim;Ye-Eun Jeong;Ye-Jun Kim;Yong Soo Kim
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.3
    • /
    • pp.435-444
    • /
    • 2023
  • Purpose: To attain advanced performance certification, safety aspects along with functionality and performance are essential. Hence, this study suggests radiation leakage assessment methods for aviation security equipment during its performance certification. Methods: Detection technology guided the choice of radiation leakage assessment targets. We then detailed measurement and evaluation methods based on equipment type and operation mode. Equipment was categorized as container or box types for establishing measurement procedures. Results: We've developed specific radiation leakage assessment procedures for different types of aviation security equipment, crucial for ensuring airport safety. Using these procedures allows efficient evaluation of compliance with radiation leakage standards. Conclusion: The suggested radiation leakage assessment method aims to enhance aviation security and reliability. Future research will focus on identifying risks in novel aviation security equipment detection technologies and establishing safety standards.

Integration Facility Management: Interface Coordination in Process Management

  • Laksmana, Dimas Indra;Wijayaningtyas, Maranatha;Indriani, Sri;Kiswandono, Kiswandono
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.319-323
    • /
    • 2022
  • The information research system continues to be developed and directed at leading research National Institute of Technology (ITN) Malang in accordance with the Research Strategic Plan of ITN Malang. One of them is a computer system in a complete integrated facility management activity, such as this research scheme. The purpose of this research is to combine and integrate people, places, product, processes and technology. All of them are integrate existing organizational factors into a more effective, simplifying of complex processes, identifying and scheduling, notes, decision makers and more. This research was conducted in stages by design with a structured model stage for 3 (three) years (focus on humans, products and processes), research on Integration Facility Management: Interface Coordination in human resources and product management have been completed on 2019 and 2020. While the focus of research this year is to obtain an integrated facility management Interface Coordination in Process Management.

A Study on Measurements of IT Security Service Quality : Feasibility of Quantitative Measures (IT 보안 서비스 품질의 측정 방법에 관한 연구 : 정량 지표의 사용 가능성)

  • Kyung, Ji Hoon;Kim, Chong Su
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.30-38
    • /
    • 2015
  • IT security service provides customers with the capability of protecting the networked information asset and infrastructures, and the scope of security service is expanding from a technology-intensive task to a comprehensive protection system for IT environment. To improve the quality of this service, a research model which help assess the quality is required. Several research models have been proposed and used in various service areas, but few cases are found for IT security service. In this work, a research model for the IT security quality has been proposed, based on research models such as SERVQUAL and E-S-QUAL. With the proposed model, factors which affect the service quality and the best quality measure have been identified. And the feasibility of using quantitative measures for quality has been examined. For analysis, structural equation modeling and various statistical methods such as principal component analysis were used. The result shows that satisfaction is the most significant measure affected by the proposed quality factors. Two quality factors, fulfillment and empathy, are the main determinants of the service quality. This leads to a strategy of quality improvement based on factors of emotion and perception, not of technology. The quantitative measures are considered as promising alternative measures, when combined with other measures. In order to design reliable quantitative measures, more work should be done on target processing time and users' expectation. It is hoped that work of this research will provide efficient tools and methods to improve the quality of IT security service and help future research works for other IT service areas.