• Title/Summary/Keyword: National Critical Infrastructure

Search Result 168, Processing Time 0.029 seconds

A Study on Optimized Placement of Green-Gray Infrastructure for Effective Flood Mitigation (효과적인 도시 홍수 저감을 위한 그린-그레이 인프라 위치 설정에 관한 연구)

  • Bae, Chae-Young;Lee, Dong-Kun
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.6
    • /
    • pp.65-75
    • /
    • 2022
  • Urban flood management(UFM) strategy ought to consider the connections and interactions between existing and new infrastructures to manage stormwater and improve the capacity to treat water. It is also important to demonstrate strategies that can be implemented to reduce the flow at flooding sources and minimize flood risk at critical locations. Although the general theory of spatial impact is popular, modeling guidelines that can provide information for implementation in real-world plans are still lacking. Under such background, this study conducted a modeling research based on an actual target site to confirm the hypothesis that it is appropriate to install green infrastructure(GI) in the source area and to take structural protection measures in the impact area, as summarized in previous studies. The results of the study proved the hypothesis, but the results were different from the hypothesis depending on which hydrological performance indicators were targeted. This study will contribute to demonstrating the effectiveness of strategies that can be implemented to reduce the flow at flooding sources and minimize the risk of flooding in critical locations in terms of spatial planning and regeneration.

A Preliminary Study on State Responsibility for Establishment and Protection of Information and Telecommunication Infrastructure in COVID-19 Pandemic (코로나19 사태에서 국가의 정보통신기반 구축·보호 책임에 대한 시론적 고찰)

  • Park, Sangdon
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.49-54
    • /
    • 2020
  • COVID-19 pandemic is an opportunity to recognize the necessity of information and telecommunications infrastructure which is base of information and telecommunication. This paper discusses the importance of information and telecommunications infrastructure in COVID-19 pandemic and overview proper institutional measures to fulfill state responsibility for establishment and protection of the infrastructure through documentary survey and normative study with juristic consideration. Information and telecommunications infrastructure has critical functions to respond to the pandemic and is one of the key to make digital transformation. A state is responsible for establishment and protection of Information and telecommunications infrastructure. Institutional measures have significance for the state responsibility and they are formed by not only statute but also constitution with making state object provision for establishment and protection of Information and telecommunications infrastructure. This paper shows premise and direction of further studies on related individual legislation.

Trends and Implications of Cybersecurity Policies in Major Countries (주요국 사이버보안 정책 동향 및 시사점)

  • J.S. Lee;S.M. Choi;C.M. Ahn;Y. Yoo
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.58-69
    • /
    • 2023
  • Cyberspace is emerging as a critical domain requiring national-level governance and international cooperation owing to its potential financial and societal impacts. This research aims to investigate the cybersecurity policies from major countries for understanding with comprehensive perspectives. Global trends emphasize a comprehensive command-centered approach, with top leadership directing cybersecurity policies. Key policy areas include security across technology ecosystems, protection of critical infrastructure, and software supply chain security. Investment is being focused on zero-trust architectures, software bills, and new technologies like artificial intelligence. For countries like Korea, immediate response and adaptation to these trends are crucial to develop and enforce national cybersecurity policies.

The US National Ecological Observatory Network and the Global Biodiversity Framework: national research infrastructure with a global reach

  • Katherine M. Thibault;Christine M, Laney;Kelsey M. Yule;Nico M. Franz;Paula M. Mabee
    • Journal of Ecology and Environment
    • /
    • v.47 no.4
    • /
    • pp.219-227
    • /
    • 2023
  • The US National Science Foundation's National Ecological Observatory Network (NEON) is a continental-scale program intended to provide open data, samples, and infrastructure to understand changing ecosystems for a period of 30 years. NEON collects co-located measurements of drivers of environmental change and biological responses, using standardized methods at 81 field sites to systematically sample variability and trends to enable inferences at regional to continental scales. Alongside key atmospheric and environmental variables, NEON measures the biodiversity of many taxa, including microbes, plants, and animals, and collects samples from these organisms for long-term archiving and research use. Here we review the composition and use of NEON resources to date as a whole and specific to biodiversity as an exemplar of the potential of national research infrastructure to contribute to globally relevant outcomes. Since NEON initiated full operations in 2019, NEON has produced, on average, 1.4 M records and over 32 TB of data per year across more than 180 data products, with 85 products that include taxonomic or other organismal information relevant to biodiversity science. NEON has also collected and curated more than 503,000 samples and specimens spanning all taxonomic domains of life, with up to 100,000 more to be added annually. Various metrics of use, including web portal visitation, data download and sample use requests, and scientific publications, reveal substantial interest from the global community in NEON. More than 47,000 unique IP addresses from around the world visit NEON's web portals each month, requesting on average 1.8 TB of data, and over 200 researchers have engaged in sample use requests from the NEON Biorepository. Through its many global partnerships, particularly with the Global Biodiversity Information Facility, NEON resources have been used in more than 900 scientific publications to date, with many using biodiversity data and samples. These outcomes demonstrate that the data and samples provided by NEON, situated in a broader network of national research infrastructures, are critical to scientists, conservation practitioners, and policy makers. They enable effective approaches to meeting global targets, such as those captured in the Kunming-Montreal Global Biodiversity Framework.

Cybertrap : Unknown Attack Detection System based on Virtual Honeynet (Cybertrap : 가상 허니넷 기반 신종공격 탐지시스템)

  • Kang, Dae-Kwon;Hyun, Mu-Yong;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.863-871
    • /
    • 2013
  • Recently application of open protocols and external network linkage to the national critical infrastructure has been growing with the development of information and communication technologies. This trend could mean that the national critical infrastructure is exposed to cyber attacks and can be seriously jeopardized when it gets remotely operated or controlled by viruses, crackers, or cyber terrorists. In this paper virtual Honeynet model which can reduce installation and operation resource problems of Honeynet system is proposed. It maintains the merits of Honeynet system and adapts the virtualization technology. Also, virtual Honeynet model that can minimize operating cost is proposed with data analysis and collecting technique based on the verification of attack intention and focus-oriented analysis technique. With the proposed model, new type of attack detection system based on virtual Honeynet, that is Cybertrap, is designed and implemented with the host and data collecting technique based on the verification of attack intention and the network attack pattern visualization technique. To test proposed system we establish test-bed and evaluate the functionality and performance through series of experiments.

DMRUT-MCDS: Discovery Relationships in the Cyber-Physical Integrated Network

  • Lu, Hongliang;Cao, Jiannong;Zhu, Weiping;Jiao, Xianlong;Lv, Shaohe;Wang, Xiaodong
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.558-567
    • /
    • 2015
  • In recent years, we have seen a proliferation of mobile-network-enabled smart objects, such as smart-phones and smart-watches, that form a cyber-physical integrated network to connect the cyber and physical worlds through the capabilities of sensing, communicating, and computing. Discovery of the relationship between smart objects is a critical and nontrivial task in cyber-physical integrated network applications. Aiming to find the most stable relationship in the heterogeneous and dynamic cyber-physical network, we propose a distributed and efficient relationship-discovery algorithm, called dynamically maximizing remaining unchanged time with minimum connected dominant set (DMRUT-MCDS) for constructing a backbone with the smallest scale infrastructure. In our proposed algorithm, the impact of the duration of the relationship is considered in order to balance the size and sustain time of the infrastructure. The performance of our algorithm is studied through extensive simulations and the results show that DMRUT-MCDS performs well in different distribution networks.

Systems Approach to Sociotechnical Systems - Cyber Security (사회기술적 시스템의 시스템보안과 시스템엔지니어링)

  • Han, Myeong Deok
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.10 no.1
    • /
    • pp.65-71
    • /
    • 2014
  • As one member of the Korea Society of Systems Engineering (KOSSE) and especially as a member of Sociotechnical Systems session of the KOSSE, I tried to contribute somehow to the activity of KOSSE to help development of better Korea systems. This report is a brief discussion of the need for KOSSE activity in the Cyber Security area especially for the protection of national critical infrastructure systems from cyber terror.

A Computationally Inexpensive Radio Propagation Model for Vehicular Communication on Flyovers and Inside Underpasses

  • Ahsan Qureshi, Muhammad;Mostajeran, Ehsan;Noor, Rafidah Md;Shamim, Azra;Ke, Chih-Heng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4123-4144
    • /
    • 2016
  • Vehicular Ad Hoc Networks (VANETs) utilize radio propagation models (RPMs) to predict path loss in vehicular environment. Modern urban vehicular environment contains road infrastructure units that include road tunnels, straight roads, curved roads flyovers and underpasses. Different RPMs were proposed in the past to predict path loss, but modern road infrastructure units especially flyovers and underpasses are neglected previously. Most of the existing RPMs are computationally complex and ignore some of the critical features such as impact of infrastructure units on the signal propagation and the effect of both static and moving radio obstacles on signal attenuation. Therefore, the existing RPMs are incapable of predicting path loss in flyovers and underpass accurately. This paper proposes an RPM to predict path loss for vehicular communication on flyovers and inside underpasses that considers both the static and moving radio obstacles while requiring only marginal overhead. The proposed RPM is validated based upon the field measurements in 5 GHz frequency band. A close agreement is found between the measured and predicted values of path loss.

신규 가입자망 기술의 경제성 평가를 위한 망 구조모형과 그 응용

  • 류태규;이정동;김태유
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2000.11a
    • /
    • pp.45-67
    • /
    • 2000
  • Broadband access technologies plays an important role in the national information infrastructure. In the evolution path of the information infrastructure, the relative economics of alternative access technology is the most critical determining factor. In this paper, we discuss the economics of local loop access technologies of existing technologies, such as, ADSL, HFC, and new PLC. To do this, we suggest appropriate configuration of access network system and its associated numerical equations. To modelize access network system and drive the numerical equations, we consider the DS (Double Star) and the T&B (Tree & Brench) architecture and analyse the adequate block diagram of each access system for each technology We introduce the density of subscriber as a key variable and the equation of allocating optimal number of cell in a service area. We analyze the relative economics of local loop architecture in two different situations, that is, urban and rural. From the empirical implementation, we found that for the case of urban area, where the cost of cable and infrastructure is not necessary, there is not much difference in the cost per one subscriber. However, for the case of rural region, we found that there is remarkable difference in the cost per one subscriber among technologies. Therefore we conclude that the economics of local loop architecture is depend on the density of subscriber and existing network infrastructures. we hope that this paper contribute to the optimal technology selection of consmer, technology Providers, and government.

  • PDF

Design of Infrastructure to Analyze Big Data (빅데이터 분석을 위한 인프라 설계)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.202-204
    • /
    • 2013
  • Nowadays, owing to the development of hardware, most of enterprises should operate and manage bigger amount of data than they used to do in the past. For this reason, the enterprises ceaselessly and urgently need systemized tools, platforms, and analysis methodologies in order to collect, store, and handle explosively increasing data. In this paper, we firstly understand key elements of Big Data, and secondly define critical factors for Big Data application with these elements. Thirdly, we research on various analysis techniques for Big Data analysis. Lastly, we propose an infrastructure to analyze bid data.

  • PDF