• Title/Summary/Keyword: Protection profile

Search Result 188, Processing Time 0.023 seconds

RADIATION SAFETY STUDIES AT TOHOKU UNIVERSITY CYRIC

  • Yamadera M. Baba A.;Miura T.;Aoki T.;Hagiwara M.;Kawata N.
    • Journal of Radiation Protection and Research
    • /
    • v.26 no.3
    • /
    • pp.231-236
    • /
    • 2001
  • A brief introduction is presented on the radiation safety studies at Tohoku University Cyclotron & Radioisotope Center. Studies on two subject are described; (1) measurement of the thick target neutron yield and radioisotope production / activation cross section for ten's of MeV neutrons and ions using K=110 Tohoku University cyclotron to provide basicdata for accelerator shielding, and (2) development of techniques for high sensitive radiation detection and profile measurement using an Imaging Plate which is a high sensitive two-dimensional radiation sensor. Application of the Imaging Plate techniques to localization of very weak radioactivity and to neutron profile measurement is described.

  • PDF

A Assumptions Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 가정문장 생성방법)

  • Ko Jeong-Ho;Lee Gang-Soo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.17-31
    • /
    • 2004
  • This paper presents a new assumptions statement generation method for developing TOE security environment section of PP. We surveyed on guides on the assumption statement in CC scheme, and collected and analyzed hundred of assumption statements which are in 26 certified and published real PPs and CC Toolbox/PKB. The CC Toolbox/PKB is included a class of pre-defined assumption statements. From the result of the survey, we developed a new generic assumption statement list, and proposed a assumption derivation method by using the list.

  • PDF

A Study of Protection Profile and Analysis of Related Standard for Internet Banking Systems (인터넷 뱅킹 시스템 관련 표준 분석 및 보호프로파일 개발에 관한 연구)

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.223-232
    • /
    • 2010
  • Due to the advance of Internet, offline services are expanded into online services and a financial transaction company provides online services using internet baning systems. However, security problems of the internet banking systems are caused by a lack of security for developing the internet banking systems. Although the financial transaction company has applied existing internal and external standards, ISO 20022, ISO/IEC 27001, ISO/IEC 9789, ISO/IEC 9796, Common Criteria, etc., there are still vulnerabilities. Because the standards lack in a consideration of security requirements of the internet banking system. This paper is intended to explain existing standards and discusses a reason that the standards have not full assurance of security when the internet baning system is applied by single standard. Moreover we make an analysis of a security functions for the internet baning systems and then selects the security requirements. In this paper, we suggest a new protection profile of the internet baning systems using Common Criteria V.3.1 from the analysis mentioned above.

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.

Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1 (DCU 보안요구사항 분석 및 CC v3.1 기반의 보호프로파일 개발)

  • Cho, Youngjun;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.1001-1011
    • /
    • 2014
  • Smart Grid Devices could have security vulnerabilities that have legacy communication networks because of the fact that Smart Grid employs bi-directional communications and adopted a variety of communication interface. Consequently, it is required to build concrete response processes and to minimize the damage of the cyber attacks including security evaluation and certification methods. DCU is designed to collect meter data from numerous smart meter and send to utility's server so DCU installed between smart meter and utility's server. For this reason, If DCU compromised by attacker then attacker could use DCU to launching point for and attack on other devices. However, DCU's security evaluation and certification techniques do not suffice to be deployed in smart grid infrastructure. This work development DCU protection profile based on CC, it is expected that provide some assistance to DCU manufacturer for development of DCU security target and to DCU operator for help safety management of DCU.

A Security Policy Statements Generation Method for Development of Protection Profile (PP 개발을 위한 보안정책 문장 생성방법)

  • 고정호;이강수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.13-28
    • /
    • 2003
  • The Protection Profile(PP) is a common security function and detailed statement of assurance requirements in a specific class of Information Technology security products such as firewall and smart card. The parts of TOE security environment in the PP have to be described about assumption, treat and security policy through analyzing purpose of TOE. In this paper, we present a new security policy derivation among TOE security environment parts in the PP. Our survey guides the organizational security policy statements in CC scheme through collected and analyzed hundred of real policy statements from certified and published real PPs and CC Toolbox/PKB that is included security policy statements for DoD. From the result of the survey, we present a new generic organizational policy statements list and propose a organizational security policy derivation method by using the list.

Development of Protection Profile for Malware App Analysis Tool (악성 앱 분석 도구 보호프로파일 개발)

  • Jung, Jae-eun;Jung, Soo-bin;Gho, Sang-seok;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.374-376
    • /
    • 2022
  • The Malware App Analysis Tool is a system that analyzes Android-based apps by the AI-based algorithm defined in the tool and detects whether malware code is included. Currently, as the spred of smartphones is activated, crimes using malware apps have increased, and accordingly, security for malware apps is required. Android operating systems used in smartphones have a share of more than 70% and are open-source-based, so not only will there be many vulnerabilities and malware, but also more damage to malware apps, increasing demand for tools to detect and analyze malware apps. However, this paper is proposed because there are many difficulties in designing and developing a malware app analysis tool because the security functional requirements for the malware app analysis tool are not clearly specified. Through the developed protection profile, technology can be improved based on the design and development of malware app analysis tools, safety can be secured by minimizing damage to malware apps, and furthermore, trust in malware app analysis tools can be guaranted through common criteria.

  • PDF

A Special Protection Scheme Against a Local Low-Voltage Problem and Zone 3 Protection in the KEPCO System

  • Yun, Ki-Seob;Lee, Byong-Jun;Song, Hwa-Chang
    • Journal of Electrical Engineering and Technology
    • /
    • v.2 no.3
    • /
    • pp.294-299
    • /
    • 2007
  • This paper presents a special protection scheme, which was established in the KEPCO (Korea Electric Power Corporation) system, against a critically low voltage profile in a part of the system after a double-circuit tower outage. Without establishing the scheme, the outage triggers the operation of a zone 3 relay and trips the component. This sequence of events possibly leads to a blackout of the local system. The scheme consists of an inter-substation communication network using PITR (Protective Integrated Transmitter and Receiver) for acquisition of the substations' data, and under-voltage load shedding devices. This paper describes the procedure for determining the load shedding in the scheme and the experiences of the implementation.

Latent Profile Analysis of High School Students' Fire Safety Awareness

  • Lee, Soon-Beom;Kim, Eun-Mi;Kong, Ha-Sung
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.124-133
    • /
    • 2021
  • The purpose of this study is to analyze the types of latent profiles of high school students' fire safety awareness and to identify the characteristics of related variables. For this purpose, a survey was conducted from March 22 to May 25, 2021 for 1054 high school students (male; 569, female; 485) in 3 cities, in Jeollabuk-do. The latent profile was analyzed using a scale consisting of 4 sub-factors: 'fire prevention', 'fire preparedness', 'indirect fire response', and 'direct fire response'. It was checked whether there were differences according to the inter-individual differences of the latent group. As a result of the analysis, fire safety awareness of high school students was classified into three latent profiles. The three groups were named 'High Perception Type', 'Moderate Perception Type', and 'Low Perception Type' according to their types. In fire safety awareness, there is a significant difference in the individual differences according to the gender and academic achievement of the latent profile. These results are meaningful as the first study to analyze the latent profile of high school students' fire safety awareness, and it is also meaningful to provide a useful basis for the contents and methods of customized fire safety education by identifying the tendencies of spontaneous groups and their fire safety awareness.