• 제목/요약/키워드: Physical protection system

검색결과 212건 처리시간 0.024초

SystemC를 이용한 OpenCableTM Copy Protection Module의 Physical Layer 설계 (A Design Of Physical Layer For OpenCable Copy Protection Module Using SystemC)

  • 이정호;이숙윤;조준동
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2004년도 춘계학술발표대회
    • /
    • pp.157-160
    • /
    • 2004
  • 본 논문은 미국 차세대 디지털 케이블 방송 표준 규격인 오픈케이블($OpenCable^{TM}$)의 수신제한 모듈인 CableCard의 Physical Layer를 SystemC의 TLM(Transaction Level Modeling)과 RTL(Register-Transfer Level) 모델링 기법으로 설계하였다. 본 논문에서 설계한 CableCard의 Physical Layer는 PCMCIA Interface, Command Inteface 그리고 MPEG-2 TS Interface 로 구성된다. CableCard가 전원이 인가될 때, 카드 초기화를 위하여 동작하는 PCMCIA 인터페이스는 16 비트 PC 카드 SRAM 타입으로 2MByte Memory와 100ns access time으로 동작할 수 있게 설계하였다. PCMCIA 카드 초기화 동작이 완료된 후, CableCard의 기능을 수행하기 위하여 두 개의 논리적 인터페이스가 정의되는데 하나는 MPEG-2 TS 인터페이스이고, 다른 하나는 호스트(셋톱박스)와 모듈 사이의 명령어들을 전달하는 명령어 인터페이스(Command Interface)이다. 명령어 인터페이스(Command Interface)는 셋톱박스의 CPU와 통신하기 위한 1KByte의 Data Channel과 OOB(Out-Of-Band) 통신을 위한 4KByte의 Extended Channel 로 구성되고, 최대 20Mbits/s까지 동작한다. 그리고 MPEG-2 TS는 100Mbits/s까지 동작을 수행할 수 있게 설계하였다. 설계한 코드를 실행한 후, Cadence사의 SimVision을 통해서 타이밍 시뮬레이션을 검증하였다.

  • PDF

GAMMA-SPECTROMETRY IN ENVIRONMENTAL MONITORING OF NUCLEAR POWER

  • Cechak, Tomas;Gerndt, Josef;Kluson, Jaroslav;Musilek, Ladislav;Thinova, Lenka
    • Journal of Radiation Protection and Research
    • /
    • 제26권3호
    • /
    • pp.203-206
    • /
    • 2001
  • The mathematical processing (unfolding) of pulse height spectra from a scintillation detector helps to calculate the photon fluence rate energy distribution in a measured photon field. The data processing is based on the knowledge of detection system response function and directional dependence respectively. The experimental results of the photon fields measurements in the vicinity of the spent fuel temporary storage and inside the storage hall are presented. The containers Castor 440 are used for temporary storing of the burnt up fuel assemblies in the Czech nuclear power plant Dukovany. A set of periodical measurements was performed in order to get basic information on the time dependence of the photon fields spatial distributions and spectral characteristics in the temporary storage hall and its vicinity. The photon fields were measured by the scintillation system. The obtained photon fields spatial distributions and spectral characteristics present the information on the radiation hazard in the storage.

  • PDF

경호기법에 입각한 경호무도의 학문적 접근 (A study on approach thesis of protection martial arts)

  • 박준석
    • 시큐리티연구
    • /
    • 제6호
    • /
    • pp.103-122
    • /
    • 2003
  • Protection sciences are new science. therefore, protection martial arts sciences are will studied be based on study of protection in order to supply high level by request. Moreover, It is reconstruction that protection martial arts masters education, systematic manage, certificate system, protection martial arts recognition certificate, protection martial arts equipment, practice of protection martial arts. Protection martial arts occurs on the unforeseen accident and body guarding, therefore martial arts concept of protection martial arts different general martial arts and sport. In order to develope of protection martial arts First, scientific thesis need of protection martial arts learning. Especially, aims of present protection martial arts is not protect oneself, protect the VIP to safely from all dangers is different thing with aims of general martial arts. Instinct that VIP protect rather than oneself should study and develop. Second, techniques and model of protection martial arts spread to who in connection with security service by systematic and organized. Preferentially, study of protection martial arts Techniques and model possible the protection martial arts learned society, found laboratory and endowed protection martial arts society organize and prevention for random of protection martial arts and must make the original protection martial arts. Third, protection martial arts official certificate and license system must organize in order to training and manage of protection martial art master, Match director(First Second), life physical director(First, Second, Third) is systematically manage by Ministry of Culture & Tourism Republic of Korea. Like this protection martial arts also classify the certificate by scholarship and experience. Fourth, In union to university, private security service company, public institution, police and system that possible leaning to protection martial arts certificate course important. In addition, destroy the commercial character of present martial arts and cultivate the pure martial arts mind, should develop to martial arts in order to improve the humanism and temperament of right body guard.

  • PDF

NSA IDS System PP와 국가기관용 IDS PP 가정사항 비교분석 (Comparison & Analysis of Intrusion Detection System System Protection Profile of NSA and MIC)

  • 김남기;박종오;김지영
    • 융합보안논문지
    • /
    • 제3권2호
    • /
    • pp.57-65
    • /
    • 2003
  • 보호프로파일은(Protection Profile)은 특정형태의 제품군이 지녀야 할 보안 목적을 사용자 그룹에서 요구한 명세서이며 보호프로파일의 가정사항은 TOE(Target Of Evaluation)의 물리적, 인적, 네트워크적 관점을 포함하는 사용 환경과 TOE의 사용제한, 잠재적인 자산 가치, 추가적인 적용의 관점을 포함하는 TOE 사용 방법상의 내용을 기술한 것이다. 본 논문에서는 NSA(National Security Agency) 침입탐지 시스템 보호프로파일과 국가기관용 침입탐지 시스템 보호프로파일의 가정사항 항목을 비교 분석하였다.

  • PDF

슬링(sling) 시스템을 이용한 요부 안정화 운동 (Lumbar stabilization exercises using the sling system)

  • 김선엽;권재확
    • 대한정형도수물리치료학회지
    • /
    • 제7권2호
    • /
    • pp.23-39
    • /
    • 2001
  • Dysfunction of the anterior and dorsal muscles of the trunk have been studied in relation to low back pain of many years. Many muscles of the trunk are capable of contributing to the stabilization and protection of the lumbar spine, recent evidence has suggested that transversus abdominis may be critically involved and has been the focus of rehabilitation. The delay in onset of contraction of trunk muscles associated with movement of the upper or lower limb in patients with low back pain indicates a significant deficit in the automatic motor command for control of disturbance to the spine. The function of transversus abdominis has been largely ignored in the evaluation of spinal stabilization and protection. The most essential stabilizing muscles for the lumbar column are the transversus abdominis and the multifidus. Sling exercise therapy(SET) concept consists of a system of diagnosis and treatment. The system of diagnosis involves testing the muscle's tolerance through progressive loading in open and close kinetic chains. The SET system contains elements such as relaxation, increasing the range of movement, traction, training the stabilizing musculature, sensorimotor exercises, training in open and close kinetic chains, dynamic training of the mobilizing musculature, cardiovasc+ular exercises, group exercise, personal exercise at home. Sensorimotor training is an essential element of the SET concept. The emphasis is on closed kinetic chain exercises on an unstable surface, thereby achieving optimum stimulation of the sensorimotor apparatus.

  • PDF

Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall

  • Moo, Jee Hoon;Chirayath, Sunil S.;Cho, Sung Gook
    • Nuclear Engineering and Technology
    • /
    • 제54권6호
    • /
    • pp.2135-2146
    • /
    • 2022
  • A nuclear energy facility is one of the most critical facilities to be safely protected during and after operation because the physical destruction of its barriers by an external attack could release radioactivity into the environment and can cause harmful effects. The barrier walls of nuclear energy facilities should be sufficiently robust to protect essential facilities from external attack or sabotage. Physical protection system (PPS) vulnerability assessment of a typical small nuclear research reactor was carried out by simulating an external attack with a tri-nitro toluene (TNT) shaped charge and results are presented. The reinforced concrete (RC) barrier wall of the research reactor located at a distance of 50 m from a TNT-shaped charge was the target of external attack. For the purpose of the impact assessment of the RC barrier wall, a finite element method (FEM) is utilized to simulate the destruction condition. The study results showed that a hole-size of diameter 342 mm at the front side and 364 mm at the back side was created on the RC barrier wall as a result of a 143.35 kg TNT-shaped charge. This aperture would be large enough to let at least one person can pass through at a time. For the purpose of the PPS vulnerability assessment, an Estimate of Adversary Sequence Interruption (EASI) model was used, which enabled the determination of most vulnerable path to the target with a probability of interruption equal to 0.43. The study showed that the RC barrier wall is vulnerable to a TNT-shaped charge impact, which could in turn reduce the effectiveness of the PPS.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

정보보호 통제활동이 조직유효성에 미치는 영향 : 정보활용의 조절효과를 중심으로 (The Effect of Information Protection Control Activities on Organizational Effectiveness : Mediating Effects of Information Application)

  • 정구헌;정승렬
    • 지능정보연구
    • /
    • 제17권1호
    • /
    • pp.71-90
    • /
    • 2011
  • 본 연구는 정보보호의 통제활동(물리적 보안, 관리적 보안, 기술적 보안)이 조직유효성에 미치는 영향과 정보 활용의 조절효과를 실증적으로 분석하는데 목적을 갖고 연구하였는데 그 결과를 요약하면 다음과 같다. 첫째, 정보보호 통제활동(물리적 보안, 기술적 보안, 관리적 보안)이 조직유효성에 미치는 영향을 검증한 결과 물리적 보안, 기술적 보안, 관리적 보안요인이 조직유효성에 통계적으로 유의한 정(+)의 영향을 미치는 것으로 나타났다(p < .01). 둘째, 정보보호 통제활동(물리적 보안, 기술적 보안, 관리적 보안)이 정보 활용에 미치는 영향을 검증한 결과 기술적 보안, 관리적 보안요인이 정보 활용에 통계적으로 유의한 정(+)의 영향을 미치는 것으로 나타났다(p < .01). 셋째, 조직유효성에 영향을 미치는 정보보호 통제활동(물리적 보안, 기술적 보안, 관리적 보안)이 정보 활용에 의해 조절되는지를 검증하기 위해 정보보호 통제활동(물리적 보안, 기술적 보안, 관리적 보안)과 정보 활용의 상호작용 변수를 추가적으로 투입한 모델의 설명력은 50.6%로 4.1%가 추가적으로 증가하였고, 추가적으로 투입된 상호작용 변수들 중에는 물리적 보안과 정보 활용의 상호작용 요인(${\beta}$ = .148, p < .01), 관리적 보안과 정보 활용의 상호작용 요인(${\beta}$ = .196, p < .01)이 통계적으로 유의미한 것으로 나타나(p < .01), 정보 활용은 통제활동 중 물리적 보안, 관리적 보안요인과 조직유효성 간의 관계를 조절하는 것으로 시사해 주었다. 이상의 결과를 볼 때, 정보보호를 위한 내부 통제활동으로서 물리적, 기술적, 관리적 요인이 정보활용 정도에 따라 조직유효성에 매우 유의적인 영향을 미치는 주요 기제임을 입증시켜 주었다. 이는 정보보호 통제활동에 있어서 물리적, 기술적, 관리적 보안요인이 모두 효율적으로 잘 수행될수록 정보활용 또한 높고 효율적으로 통제되고 정보활용이 조절 되는 것으로 나타내 이들 세 가지 요인 모두 유용한 정보활용을 위한 변수임을 실증해 주었다. 이 실증된 정보활용의 조절정도나 난이도에 따른 정보보호를 위한 조직효율성에서 종사자의 내부 고객만족과 정보관리의 효율, 위험리스크 감소에 매우 유의적인 성과를 나타내 주는 촉진기제로서 작용함을 시사한 것이라 볼 수 있다.

차세대 사이버 보안 동향 (The Trends of Next Generation Cyber Security)

  • Lee, Daesung
    • 한국정보통신학회논문지
    • /
    • 제23권11호
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.