• Title/Summary/Keyword: Public safety and security

Search Result 438, Processing Time 0.029 seconds

A Study on the Video Privacy Protective Mechanism (영상 프라이버시 보호 메커니즘에 관한 연구)

  • Kim, Minsu;Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.49-55
    • /
    • 2017
  • In case of security of IoT-based areas in ICBM industry, the anxiety about safety goes to extremes in public and national safety area, so that the demand for security service related to disaster/safety management is increasing. Like this, as a security service for safety, CCTVs are installed/operated for the purpose of maintenance of public order and crime prevention. Especially, as the recorded images are presented as crucial evidences of crimes, they are rapidly increasing. However, as adverse effects of CCTVs, it is highly possible to unintentionally leak personal information in the process of performing the original purpose, or to violate someone's privacy in case when such technologies are abused. Therefore, it would be necessary to have researches on the multilaterally-combined mechanism for the protection of image privacy.

Innovation and Improvement of National Emergency Management System in Korea - Focused on All-Hazard Approach - (국가 재난관리 체계의 혁신과 발전방향: 모든 위험 접근법을 중심으로)

  • Kang, Uk;Park, Jun-Seok;Jo, Jun-Teak
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.7-35
    • /
    • 2015
  • The Ministry of Public Safety and Security was established in order to handle all sorts of disasters because of Sewol ferry tragedy and the fundamental reform on the emergency management system will be performed. The establishment of the Ministry of Public Safety and Security is considered as the landmark for the emergency management when it is compared to those in the United States and Japan in terms of the size and the authority. However, there are many tasks to be done for the settlement of the Ministry of Public Safety and Security. More specifically, a real and substantial plan should be prepared because the organization was established without blueprints or detailed implementation plan. This study suggests that all-hazard approach which is the one of the disaster management principles should be applied when the substantial plan is prepared. All possible hazard should be analyzed, assessed, and prioritized. In addition, Based on the results, the effective policies should be established with the consideration of Korean context.

  • PDF

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

  • Park, Jaekwan;Suh, Yongsuk
    • Nuclear Engineering and Technology
    • /
    • v.46 no.1
    • /
    • pp.47-54
    • /
    • 2014
  • The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

An Study on Radiation Application and Public Safety (방사선이용과 공공안전)

  • 류재수;양맹호
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2003.11a
    • /
    • pp.369-386
    • /
    • 2003
  • Radiation technologies are being utilized in a wide range of daily modern life and provide the public with valuable benefits through applications in fields of medical, industrial, agricultural, and science & engineering research. On the other hand, there is a high possibility that radioactive materials can be used for malevolent purposes such as dirty bombs. The International community, therefore, has made efforts to improve the security of radioactive sources aimed at protecting the public from radiological terrorism. The paper investigated high-risk radioactive sources which could be used as dirty bombs. The paper reviewed the possibility of radiological weapon attacks and analyzed international trends to enhance security of radioactive sources. This study also proposed our countermeasures to reduce the threat of radiological terrorism and to properly respond to the radiological emergency caused by the radiological weapon attack.

  • PDF

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

A Model of Artificial Intelligence in Cyber Security of SCADA to Enhance Public Safety in UAE

  • Omar Abdulrahmanal Alattas Alhashmi;Mohd Faizal Abdullah;Raihana Syahirah Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.173-182
    • /
    • 2023
  • The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries.

Public Perception and Communication Patterns Pertaining to Nuclear Power in Korea: Focusing on the Transition Period from Pro-nuclear to De-nuclear Policy

  • Eunok Han;Yoonseok Choi
    • Journal of Radiation Protection and Research
    • /
    • v.47 no.4
    • /
    • pp.226-236
    • /
    • 2022
  • Background: An effective communication strategy for reducing conflicts in South Korea has been designed through the analysis of public perception and communication variables on nuclear power under the conditions of rapidly changing nuclear power policies. Materials and Methods: This study conducted both qualitative research through group discussions based on social psychology and quantitative research through surveys. Results and Discussion: Nuclear power plant (NPP) area residents in favor of nuclear power indicated higher levels of communication, safety perception, and contribution than those against it. NPP area residents trusted the civilian expert groups (18.3%) and local government (17.3%) the most, while metropolitan city residents trusted the Nuclear Safety and Security Commission and the Korea Institute of Nuclear Safety (20.7%) the most. In determining nuclear power policy, both the NPP area residents (18.1%) and metropolitan city residents (17.1%) prioritized safety, health, and the environment. While metropolitan city residents thought that energy security and economic growth (16.4%) were important, NPP area residents thought the current issue of spent fuel rods (14.1%) to be important. Conclusion: It is necessary for the nuclear power industry to have and actively implement communication and conflict resolution strategies based on the patterns obtained in the study results.

Improvement of Outdoor Spaces for the Children's Safety in Public Rental Housing (어린이 안전을 위한 공공임대주택단지 외부공간 환경개선에 관한 연구)

  • Min, Young Hee;Ha, Mi-Kyoung;Byun, Gi-Dong
    • Journal of the Korean housing association
    • /
    • v.26 no.4
    • /
    • pp.95-104
    • /
    • 2015
  • Public rental housing in Korea has been initially provided for residential stability of low-income household focusing on solving quantitative insufficiency since 1980s. In the process of early stage of designing and planning public rental housing, qualitative aspects of considering children were not primary concern. This study aims to analyze the priority of environmental improvement of outdoor spaces for children's safety in public rental housing. First, literature review was performed in the reference of local residential safety guidelines, Universal Design, and CPTED guidelines. In each guidelines, common safety planning factors for children were extracted within different types of outdoor spaces. Second, based on literature analysis, residents evaluated importance and satisfaction level by different safety types, outdoor space type, and environmental planning factors. In results, residents evaluated high importance and showed low satisfaction for crime and traffic safety. Through IPA, facilities and parking space was evaluated where improvement is needed for the first priority, and planning factors were mostly concerned with surveillance and safety management system. Result shows general concern of public rental housing residents, about weak facility management and security system, and about socially isolated environment which heightened the fear of crime safety. Overall, poor maintenance of the complex environment and decrepit facilities are constantly raising risk of safety accidents especially for children. Considering residents' concern, environmental improvement should be considered in perspective of not only physical repair, but also facility management and security system.

Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed

  • Shin, Jinsoo;Choi, Jong-Gyun;Lee, Jung-Woon;Lee, Cheol-Kwon;Song, Jae-Gu;Son, Jun-Young
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3319-3326
    • /
    • 2021
  • As a form of industrial control systems (ICS), nuclear instrumentation and control (I&C) systems have been digitalized increasingly. This has raised in turn cyber security concerns. Cyber security for ICS is important because cyber-attacks against ICS can cause not only equipment damage and loss of production but also personal and public safety hazards unlike in general IT environments. Numerous risk analyses have been carried out to enhance the safety of ICS and recently, many studies related to the cyber security of ICS are being conducted. Many existing risk analyses and cyber security studies have considered safety and cyber security separately. However, both safety and cyber security perspectives should be considered when analyzing risks for complex and critical ICS facilities such as nuclear power plants (NPPs). In this paper, the STPA-SafeSec methodology is selected to consider both safety and security perspectives when performing a risk analysis for NPPs in order to assess impacts on the safety by cyber-attacks against the digital I&C systems. The STPA-SafeSec methodology was applied to a test-bed system that simulates a condensate water (CD) system in an NPP. The process of the application up to the development of mitigation strategies is described in detail.

Analysis of Public Notice of NSSC and Field Application Case Regarding Security of Radioisotopes (원자력안전위원회 방사성동위원소 보안관련 고시 및 현장 적용 사례 분)

  • Lee, Hyun-Jin;Lee, Jin-Woo;Jeong, Gyo-Seong;Lee, Sang-bong;Kim, Chong-Yeal
    • Journal of Radiation Industry
    • /
    • v.12 no.4
    • /
    • pp.303-310
    • /
    • 2018
  • Since Roentgen discovered X-rays, radiation sources have been utilized for many areas such as agriculture, industry, medicine and fundamental chemical research. As a result, human society has gained lots of benefits. However, if a radioactive material is used for the malicious purpose, it causes serious consequences to humanity and environment. Consequently, international organizations including International Atomic energy Agency (IAEA) have been emphasizing establishment and implementation of security management to prevent sabotage and illicit trafficking of radioactive materials. For this reason, the rule of technical standards of radiation safety management was revised and the public notice of security management regarding radioisotope was legislated in 2015 by Nuclear Safety and Security Commission (NSSC). Several radioactive sources which have to be regulated under the above rule and the public notice have been utilized in Advanced Radiation Technology Institute (ARTI) of Korea Atomic Energy Research Institute (KAERI). In order to control them properly, security management system such as access control and physical protection has been adapted since 2015. In this paper, we have analyzed the public notice of NSSC and its field application case. Based on the results, we are going to draw improvement on the public notice of NSSC and security system.