• Title/Summary/Keyword: Leakage Prevention System

Search Result 123, Processing Time 0.029 seconds

Improvement of Cooling Water Quality by Corrosion and Scale Inhibitor (부식 및 스케일 억제제에 의한 냉각수 수질향상)

  • Jo, Kwan-Hyung;Woo, Dal-Sik;Hwang, Byung-Gi
    • Journal of Environmental Science International
    • /
    • v.18 no.2
    • /
    • pp.187-195
    • /
    • 2009
  • This study was investigated to control the corrosion and scale at the cooling water system in steel works. Laboratory and field tests were performed for the indirect cooling water system of plate mill. Throughout the experiment, various factors such as leakage of pipes, heating rate and capacity, and the reaction between existing and substitute inhibitors were carefully monitored. The results showed that the harmful effect of high temperature could be minimized, and satisfactory corrosion/scale controls were effectively achieved using inhibitor, even at the increased temperature of $80^{\circ}C$. The batch and field tests in the gas scrubbing cooling water system of blast furnace and cooling water system of corex plant indicated that the new inhibitor was more effective for the prevention of corrosion and scale than the existing one.

The Remote Wireless Corrosion Monitoring System for Water Pipeline (상수도 배관용 무선 원격 부식모니터링 시스템)

  • Ha, Tae-Hyeon;Bae, Jeong-Hyo;Lee, Hyeon-Gu;Ha, Yun-Cheol;Kim, Dae-Gyeong
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.637-640
    • /
    • 2003
  • The owner of water pipeline has a burden of responsibility for the protection of corrosion and the prevention against leakage of water. So, they have been installed a CP(Cathodic Protection) System in oder to protect corrosion. And they also have been measured and analyzed the data about P/S(Pipe to Soil) potential of water pipeline. The P/S potential is basic data of evaluation for water pipeline corrosion. In this paper, results of development about remote wireless corrosion monitoring system for water pipe line are presented briefly.

  • PDF

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario (단일 정보유출 시나리오를 이용한 개별 보안솔루션 로그 분석 방법)

  • Park, Jang-Su;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.65-72
    • /
    • 2015
  • According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies' technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company's assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario's logs, and applying a monitoring system to each scenario.

Numerical Study on Characteristics of Gas Leakage in an Underground Combined Cycle Power Plant (지하 복합발전 플랜트 내부의 가스 누출 특성에 대한 수치해석 연구)

  • Bang, Joo Won;Sung, Kun Hyuk;Ryou, Hong Sun;Lee, Seong Hyuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.594-600
    • /
    • 2016
  • The present study numerically investigated the gas leakage characteristics in a simplified underground combined cycle power plant. The effect of obstacles near a crack location on the gas concentration in the confined space was analyzed by using the lower flammable limit (LFL) of methane gas. When the jet flow was close to the vertical walls, the longitudinal leakage distance increased by about 60% (when an obstacles was present) compared to the case without any obstacle, because these obstacles prevented transverse flows. In addition, when an air filter was installed near to the trajectory of the gas flow, the longitudinal leakage distance was similar to the distance between the crack and obstacle, whereas the transverse leakage distance increased up to 8 times compared to the case without any obstacle. As the jet flow impacts on the obstacle and changes its direction, the gas flows recirculate. Therefore, it is necessary to consider the effect of the structure and facility locations on the trajectory of the jet flow to propose an accident prevention system in confined spaces.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

Watertightness Property Evaluation of Rain-Block System (개폐식 대공간 구조물에서 지붕 맞댐부 우수차단 시스템의 수밀성 평가에 관한 연구)

  • Kim, Yun-Ho;Baek, Ki-Youl;Kim, Jong-Su;Lee, Sun-Gyu;Oh, Sang-Keun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2010.05a
    • /
    • pp.13-16
    • /
    • 2010
  • This study is an Investigation on the Watertightness Properties of Rain-Block System on the Sliding-Roof Joint of Large-Span Membrane Structures. In this experimental, we test the watertightness performance of joint part of sliding door in roof of large span membrane structure(for pilot project) under environment of rain and wind. A shape of rain water blocking systems of joint part in sliding door verifies the defects and effects of water leakage prevention in precipitation with the wind conditions. For obtaining watertightness of large span membrane structures, it is necessary quality of joints and performance, and quality of membrane material of a retractable roof as well as a closed roof. Also, for obtaining quality in joints, it is essential to make a watertightness guideline for design of large-span membrane.

  • PDF

A Study on the Fire Risk of Black Box Wiring in Motor Vehicle (자동차의 블랙박스 와이어링 화재 위험성에 관한 연구)

  • Kang, Sin-Dong;Kim, Ju-Hee;Choi, Jun-Pyo;Kim, Jae-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.6
    • /
    • pp.22-28
    • /
    • 2017
  • According to the National Fire Data System (NFDS), more than 5,000 vehicle fires have occurred every year for the last 10 years. Vehicle fires are primarily caused by mechanical (breaking system and engine), electrical (wiring and battery), and chemical (oil and fuel gas leakage) problems. The electrical factor has increased with the installation of driver convenience equipment. For example, today, the black box is widely used to provide video data recording of motor vehicle accidents. The black box consists of a front camera, rear camera, and wires. The black box wires are directly connected to the junction box or fuse box from the start battery that operates to provide normal on power supplying for engine stop. It is extremely dangerous when the wires short circuit due to insulation aging, mechanical and electrical stress, etc. In this study, the black box wiring fire risk have been analyzed and investigated when the steady state and abnormal operations, and under the following conditions: wiring arrangements with a high temperature condition, insulation aging, poor contact, and short circuits. The results showed that black box wiring short circuits had a higher fire risk than the other fire hazard elements. To prevent fire hazards caused by black box wiring, the black boxes must be installed by qualified service personnel. Do not modify the wiring, remove the fuse and secure the wiring using cable ties or insulation tape.

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

A Study on Anomaly Detection Model using Worker Access Log in Manufacturing Terminal PC (제조공정 단말PC 작업자 접속 로그를 통한 이상 징후 탐지 모델 연구)

  • Ahn, Jong-seong;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.321-330
    • /
    • 2019
  • Prevention of corporate confidentiality leakage by insiders in enterprises is an essential task for the survival of enterprises. In order to prevent information leakage by insiders, companies have adopted security solutions, but there is a limit to effectively detect abnormal behavior of insiders with access privileges. In this study, we use the Unsupervised Learning algorithm of the machine learning technique to effectively and efficiently cluster the normal and abnormal access logs of the worker's work screen in the manufacturing information system, which includes the company's product manufacturing history and quality information. We propose an optimal feature selection model for anomaly detection by studying clustering methods.