• 제목/요약/키워드: Managing Security

검색결과 342건 처리시간 0.031초

우리나라의 생물테러 대비 및 대응방안 (The Strategic Plan for Preparedness and Response to Bioterrorism in Korea)

  • 황현순
    • Journal of Preventive Medicine and Public Health
    • /
    • 제41권4호
    • /
    • pp.209-213
    • /
    • 2008
  • Following the Anthrax bioterrorism attacks in the US in 2001, the Korean government established comprehensive countermeasures against bioterrorism. These measures included the government assuming management of all infectious agents that cause diseases, including smallpox, anthrax, plaque, botulism, and the causative agents of viral hemorrhagic fevers (ebola fever, marburg fever, and lassa fever) for national security. In addition, the Korean government is reinforcing the ability to prepare and respond to bioterrorism. Some of the measures being implemented include revising the laws and guidelines that apply to the use of infectious agents, the construction and operation of dual surveillance systems for bioterrorism, stockpiling and managing products necessary to respond to an emergency (smallpox vaccine, antibiotics, etc.) and vigorously training emergency room staff and heath workers to ensure they can respond appropriately. In addition, the government's measures include improved public relations, building and maintaining international cooperation, and developing new vaccines and drugs for treatments of infectious agents used to create bioweapons.

계통 안전성을 고려한 원자력발전의 부하추종 요건연구 (A Study on Requirement of Nuclear Power Plant Load Following Operation Condition Considering Power System Security)

  • 이현철;백영식;이근준
    • 전기학회논문지
    • /
    • 제61권11호
    • /
    • pp.1565-1570
    • /
    • 2012
  • Nuclear power generation is increasing domestic power supply ratio by lower CO2 emission and fuel prices. Currently, nuclear power generator has been operated with maximum power output. Therefore, nuclear power generator could be no effect to managing the reactive power reserve on power system. The reactive power reserve is calculated to the difference between maximum facility and operation generation capacity of the power system. This paper was proposed that load following of nuclear power is control by using 15-bus power system model. In the simulation result, power system is shown to safety state by operating load following of nuclear power generator. This method has be improved the supplied reliability through economic and efficient operation.

DDoS Correspondence Index for Evaluating Performance Management

  • Kim, Hyung-Won;Lee, Nam-Yong;Kim, Jong-Bae
    • Journal of information and communication convergence engineering
    • /
    • 제8권6호
    • /
    • pp.618-622
    • /
    • 2010
  • The damages from DDoS attacks are increasing as DDoS attacks are taking various forms. This has resulted not only in decreased reliability of organizations and corporations but also in the threat of national security. Organizations and corporations are making significant efforts in developing a system through which they can appropriately correspond to DDoS attacks. However, the studies on objective index for evaluating the performance of DDoS correspondence are lacking. The majority of the existing studies have been on the information protection & management system on a large scale. Accordingly, the scope of this thesis will be limited to DDoS correspondence to propose correspondence index for quantitatively measuring and managing them. The statistical techniques such as SMART technique and factor analysis will be utilized accordingly.

An ARP-disabled network system for neutralizing ARP-based attack

  • Battulga, Davaadorj;Jang, Rhong-Ho;Nyang, Dae-Hun
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2016년도 추계학술발표대회
    • /
    • pp.234-237
    • /
    • 2016
  • Address Resolution Protocol (ARP) is used for mapping a network address to physical address in many network technologies. However, since ARP protocol has no security feature, it always abused by attackers for performing ARP-based attacks. Researchers presented many technologies to improve ARP protocol, but most of them require a high implementation cost or scarify the network performance for using ARP protocol securely. In this paper, we present an ARP-disabled network system to neutralize the ARP-based attacks. "ARP-disabled" means suppress the ARP messages like request, response and broadcast messages, but not the ARP table. In our system, ARP tables are used for managing static ARP entries without prior knowledge (e.g. IP, MAC list of client devices). This is possible because the MAC address was designed to be derived from IP address. In general, our system is safe from the ARP-based attacks even the attacker has a strong power. Moreover, we saved network bandwidth by disabling the ARP messages.

빅데이터 센싱 객체 메타데이터 관리 (Managing Metadata of Big Data Sensing Objects)

  • 정동원;이석훈;정현준;전근환;온병원;김영갑
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2016년도 추계학술발표대회
    • /
    • pp.804-807
    • /
    • 2016
  • 빅데이터 분야에 대한 다양한 연구가 활발하게 진행됨에 따라 표준화에 대한 요구가 증가하고 있다. 이러한 요구를 충족하기 위해 최근 ISO/IEC JTC 1 산하 표준화 위원회를 중심으로 빅데이터 표준화에 대한 연구가 활발하게 진행되고 있다. 그러나 아직까지 구체적인 기술 측면에서의 표준화는 미비한 상황이다. 이 논문에서는 기존 표준화 연구 내용을 간략하게 조망하고 빅데이터 센싱 객체 관리 측면에서의 표준화 방안에 대하여 논의한다. 이 논문은 향후 빅데이터 분야, 특히 빅데이터를 생성하는 센싱 객체의 규범적인 관리를 위한 표준 개발에 기여할 것으로 기대된다.

Concept & Implementation of Three-Layered Vessel Traffic Management System

  • Jung, Min;Song, Chae-Uk
    • 한국항해항만학회지
    • /
    • 제34권2호
    • /
    • pp.91-95
    • /
    • 2010
  • Recently IMO and IALA have developed the strategy of e-Navigation and the concepts of VTM to enhance the safety, efficiency and security of vessel traffic and protection of the marine environment. And current technical and functional trends require vessel traffic management systems to be improved so as to control vessel traffic not only in waters of harbour area, but also within EEZ waters. Under the consideration of these circumstances, a three-layered vessel traffic management system was proposed in this paper. The proposed system consists of three sub-systems, called Local VTS, Regional VTS and National VTS, and those sub-systems are designed respectively to be suitable for managing vessel traffic within their own jurisdiction waters.

ASSESSING AND ADDRESSING INCREASED STAKEHOLDER AND OPERATOR INFORMATION NEEDS IN NUCLEAR FUEL CYCLE FACILITIES: TWO CONCEPTS

  • Saltiel, David H.
    • Nuclear Engineering and Technology
    • /
    • 제39권6호
    • /
    • pp.691-696
    • /
    • 2007
  • Nuclear energy programs around the world increasingly find themselves at the nexus of potentially conflicting demands from both domestic and international stakeholders. On one side, the rapid growth in demand for electricity coupled with the goal of reducing carbon emissions calls for a significant expansion of nuclear energy. On the other, stakeholders are seeking ever greater safety, environmental, security, and nonproliferation assurances before consenting to the construction of new nuclear energy facilities. Satisfying the demand for clean energy supplies will require nuclear energy operators to find new and innovative ways to build confidence among stakeholders. This paper discusses two related concepts which can contribute to meeting the needs of key stakeholders in cost effective and efficient ways. Structured processes and tools for assessing stakeholder needs can build trust and confidence while facilitating the "designing-in" of information collection systems for new facilities to achieve maximum efficiency and effectiveness. Integrated approaches to monitoring facilities and managing the resulting data can provide stakeholders with continued confidence while offering operators additional facility and process information to improve performance.

Towards Fair and Secure e-Commerce Model In P2P Network

  • Jung Ji Won;Sur Chul;Rhee Kyung Hyune
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.47-51
    • /
    • 2004
  • In this paper we propose a fair and secure e-commerce model for P2P network, in which communication entities can buy and sell products by P2P contract. In particular, we focus on a fair transaction protocol that is based on a collaboration with distributed communication entities. This feature makes our model very attractive in P2P networking environment which does not depend on any central trusted authority for managing communication entities.

  • PDF

교육시설 재난사고 실태 분석에 따른 재난안전 평가 방향에 관한 연구 (A Study on the Disaster Safety Assessment on the Analysis of Educational Facilities due to Disasters)

  • 허병이;김성중
    • 교육녹색환경연구
    • /
    • 제11권3호
    • /
    • pp.25-35
    • /
    • 2012
  • Even though newly formed schools do struggle to strengthen their security in safety, existed schools have limitations for active response against natural disaster. From analyzing the results of accident cases and states in misfortune and the safety supervision of school facilities, it is said that damages by wind, flood and fire are typical types of disaster accidents. Also, according to the basic law of misfortune and the safety supervision, it emphasizes education, training, and actions that prevent from being a victim of natural disaster. In terms of these finding, establishing disaster safety organization, control system and having students an opportunity to learn how to response against disaster should be critical component in managing disaster safety of school facilities.

보안성이 취약한 사용자 계정 관리를 위한 웹 로그 분석기 (The Web Log Analyser for Managing User Account having Weak Security)

  • 박기홍;이진관
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2012년도 제46차 하계학술발표논문집 20권2호
    • /
    • pp.403-406
    • /
    • 2012
  • 인터넷이 확산과 더불어 보안의 문제도 증가하고 있다. 이로 인해 네트워크 보안과 서비스에 대한 관리자의 책임 또한 더욱더 중요시 되고 있다. 본 논문에서는 웹로그를 분석하여 웹호스팅 환경에서 장시간 사용되지 않아 보안성이 약한 사용자 계정을 관리자로 하여금 시스템 보안의 틈새를 찾고 이를 해결할 수 있는 방안을 제시하였다. 이를 위해 WLA(Web Log Analyzer)를 구현하여 웹서버가 수행될 때 기록되는 각각의 로그를 분석한다. 그 결과 웹호스팅을 사용한 계정 이름의 수를 포함한 UUL(Used User List)를 구축하고 일정기간 사용하지 않는 호스팅 서비스 이용자를 찾아내고, 관리할 수 있게 한다.

  • PDF