• Title/Summary/Keyword: Protection and Management System

Search Result 1,284, Processing Time 0.025 seconds

Cultural Property in the territory of the North Korea considered from 'the law of the Democratic People's Republic of Korea on Protection of Cultural Property' (「문화유물보호법」을 통해 본 북한의 문화유산)

  • JI, Byong-Mok
    • Korean Journal of Heritage: History & Science
    • /
    • v.36
    • /
    • pp.39-67
    • /
    • 2003
  • In this paper we examine cultural properties of the North Korea from 'the law of the Democratic People's Republic of Korea on Protection of Cultural Property". This law was adopted the Resolution of the Standing Committee of the Supreme People's Assembly of DPR of Korea in 1994. For our study, some other laws or rules established after the end of Japanese colonial occupation (1910-1945) in North Korea were examined. The policy on protection and conservation of cultural property in North Korea seems to have taken place a relatively rapid. The purpose of this law is to carry out the policy with a view to contributing to establishment of strict system and order for protection and management of cultural property, to their preservation in original state, to their proper inheritance and development, and to enhancement of national pride and confidence among the people. This law consists of 6 chapters (52 articles): (1) Fundamentals of the law on protection of cultural property, (2) Archaeological excavation and collection of cultural relics, (3) Evaluation and registration of cultural property, (4) Preservation and management of cultural property, (5) Restoration of cultural property, and (6) Guidance and control of cultural property protection. Nevertheless, it is difficult to find the evidence of efforts to exploit the cultural properties from an academic point of view in North Korea since the late 1980s.

Design and Implementation of Secure Web System with Cookies Protection Function (쿠키보호기능을 제공하는 안전한 웹 시스템의 설계 및 구현)

  • Choi, Eun-Bok;Choi, Hyang-Chang;Lee, Hyeong-Ok
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.934-943
    • /
    • 2004
  • In this paper, we propose cookie protection-key management system for cookie protection and maintain separate cookie protection-key of each user. We provide integrity, confidentiality, and user authentication of cookie by using registered cookie protection-key and applying encryption techniques. And, we use the technique for hiding the URL of an internal document to a user to minimize the problem of its exposure. When this system is applied to the intranet of an enterprise, it will be able to provide a security to cookie and minimize the problem of internal document exposure by an internal user.

  • PDF

Computer-Assisted System for Accident Analysis and Mul-function Protection in Industrial Robot (산업용 로보트의 사고분석과 오동작 방지를 위한 Computer-Assisted System)

  • 김병석
    • Journal of the Korean Society of Safety
    • /
    • v.8 no.4
    • /
    • pp.61-64
    • /
    • 1993
  • Until now, Industrial robotic sa(ety problems are not considered as a indust rial safety problems. In order to reduce industrial robotic safety problem, analyzing problem, risk control, and developing industrial robotic standard s are necessary. In this study, SAFEMIR(Safety Management for Industrial Robotic) is developed for preventing mul-function in industrial robotics. This system is consisted of Da ta Base Management System Module and Expert System Module which Is a part of Articial In telligence. Borland C++ and Foxpro 2.0 are used for implementing this system.

  • PDF

A Development of Power System Protection Database Management System for Computerized Integrated Environment (계통 보호 종합 전산화를 위한 데이터베이스 관리 시스템 개발)

  • Jung, B.K.;Lee, S.J.;Choi, M.S.;Kang, S.H.;Kim, H.P.;Lee, W.H.;Choi, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 1999.07c
    • /
    • pp.1475-1477
    • /
    • 1999
  • The setting of protective relays, which is critical to the system security, requires a huge volume of data and a lot of repetitive calculations. Therefore computerization of this process, named PROSET2000 is in progress in KEPCO. PROSET2000 is based on a power system protection database. The database must accomodate a variety of protective device data efficiently, which need be viewed and updated with ease. This paper suggests several database management functions for PROSET2000.

  • PDF

A Study on New High-Technology Protection System Model Using The Social Engineering Techniques (사회공학 가법을 이용한 새로운 첨단기술보호시스템 모텔에 관한연구)

  • Park, Ji-Hyung
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.3-11
    • /
    • 2011
  • Today the protection of high-tech is one of the most important requirements to survive in competition between companies or countries. In these circumstances, government's industrial security activities have been transformed into independent activities of the private center. So, Company has introduced a high-tech security system for the sake of Technology protect. But, Several Security Incident have occurred in recent years, and so New security measures became necessary. In this study, I will suggest a new high-technology protection system model Using the social engineering techniques to analyze security threats.

The Development of a Flood Protection System for Pad Transformers Using Pneumatic Pressure in Areas Prone to Floods

  • Kim, Gi-Hyun;Lee, Jae-Yong;Bae, Suk-Myong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.3
    • /
    • pp.27-32
    • /
    • 2010
  • The inundation of substation and ground power equipment breaks out every summer season in low-lying downtown areas and low-lying shores by torrential rain, typhoons and tsunamis. It has, in turn, caused replacement, social and economic costs for blackouts. For activity management regarding flood damage we produced a flood protection system which using the Pad transformer as a basic frame and is developed using pneumatic pressure. We tested safety concerns including insulation resistance and current leakage first for water tank flooding and, second, by an empirical test through supplying 22.9[kV]. We estimate that costs associated with flooding and power failure can be diminished by these advances toward creating a more reliable system.

A study on the paradigm shift in National crisis management system and its functional, structural improvements : Focused on the construction of elite civil defense force (국가위기관리체계의 패러다임 변화와 기능 및 구조적 개선방안에 관한 연구 : 정예민방위대 구축을 중심으로)

  • Lee, Mi-Jeong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.137-161
    • /
    • 2012
  • There are some common and broad trends in National crisis management system around the world. This article considers that paradigm theoretically. 1) a shift from civil defense to civil protection, 2) 10 principles in sustainable National crisis management system, 3) the collaborative governance of crisis management. Some civil defense problems in National crisis management system are as follows; 1) obscurity of organizational identity through twofold function in civil defense, 2) ineffective organization in civil defense and disaster management system, 3) weakness of competencies in local government, 4) overlook of actual condition in communities and civil defense resources. This article suggests that to provide retired and active private security practitioners, retired law enforcement personnel, and retired military personnel to form a elite civil defense force and to find creative ways to address this pervasive threat which one reasonable and affordable solution would be for the government to take advantage of an existing resource.

  • PDF

The Effectiveness of Information Protection and Improvement Plan Based on SMEs Consulting Case

  • Kim, Jae-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.201-208
    • /
    • 2019
  • In the phono-sapiens era of the intelligence information society, most business activities are increasingly dependent on networks and information systems. SMEs, which occupy the majority of Korean companies, are increasingly possessing the value and technology of their information assets, and their ability to protect core technologies that are the driving force of corporate growth will be the most important competitiveness of enterprises. Accordingly, the Ministry of Science and ICT and the Korea Internet & Security Agency(KISA) provides a foundation for minimizing the damage from cyber threats such as hacking and information leakage by evaluating the current information protection level of SMEs and enhancing information protection capability by supporting a high level of customized information protection consulting. In this study, we analyze the effectiveness of information protection based on the results of KISA SMEs consulting. In addition, by identifying problems and limitations derived from SMEs information protection consulting results, SMEs should propose measures to improve information security of SMEs that can manage information protection management system more efficiently and effectively.

The development of On-Line Cathodic Protection Monitoring System (지중 금속구조물의 전기방식 원격감시시스템 개발)

  • 임헌호;정성우;하희천
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2001.05a
    • /
    • pp.213-218
    • /
    • 2001
  • These days, corrosion condition of a underground objects is measured by the electric potential between the subject and ground. But this method is implemented by means of manual work with analog voltmeter, which is uneconomic and inefficient. So, We developed real-time On-Line cathodic protection monitoring system that is able to detect corrosion potential conditions of metal objects or various steel structures in the ground continuously, display them with the graphic screen, construct a database, and analyze them simultaneously. Since the data of corrosion and corrosion protection of all underground objects is processed automatically, not manually in this system, It is possible to reduce the manipulated error, and perform precise safety management, maintenance and inspection. As as result, this system can not only guarantee long-life operation, reduction of manpower and cost, but prevent large accidents in advance.

  • PDF

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.