• Title/Summary/Keyword: R&D 정보보호

Search Result 89, Processing Time 0.028 seconds

A Formal Verification Technique for PLC Programs Implemented with Function Block Diagrams (함수 블록 다이어그램으로 구현된 PLC 프로그램에 대한 정형 검증 기법)

  • Jee, Eun-Kyoung;Jeon, Seung-Jae;Cha, Sung-Deok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.211-215
    • /
    • 2009
  • As Programmable Logic Controllers (PLCs) are increasingly used to implement safety critical systems such as nuclear instrumentation & control system, formal verification for PLC based programs is becoming essential. This paper proposes a formal verification technique for PLC program implemented with function block diagram (FBD). In order to verify an FBD program, we translate an FBD program into a Verilog model and perform model checking using SMV model checker We developed a tool, FBD Verifier, which translates FBD programs into Verilog models automatically and supports efficient and intuitive visual analysis of a counterexample. With the proposed approach and the tool, we verified large FBD programs implementing reactor protection system of Korea Nuclear Instrumentation and Control System R&D Center (KNICS) successfully.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

The research of transmission delay reduction for selectively encrypted video transmission scheme on real-time video streaming (실시간 비디오 스트리밍 서비스를 위한 선별적 비디오 암호화 방법의 전송지연 저감 연구)

  • Yoon, Yohann;Go, Kyungmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.4
    • /
    • pp.581-587
    • /
    • 2021
  • Real-time video streaming scheme for multimedia content delivery and remote conference services is one of technologies that are significantly sensitive to data transmission delay. Recently, because of COVID-19, real-time video streaming contents for the services are significantly increased such as personal broadcasting and remote school class. In order to support the services, there is a growing emphasis on low transmission delay and secure content delivery, respectively. Therefore, our research proposed a packet aggregation algorithm to reduce the transmission delay of selectively encrypted video transmission for real-time video streaming services. Through the application of the proposed algorithm, the selectively encrypted video framework can control the amount of MPEG-2 TS packets for low latency transmission with a consideration of packet priorities. Evaluation results on testbed show that the application of the proposed algorithm to the video framework can reduce approximately 11% of the transmission delay for high and low resolution video.

A Study on the Application of Modularization Technique to Standard Security Policy to Protect Information Assets and the Securement of Confidentiality and Integrity (정보자산 보호를 위한 표준 보안정책 모듈화 기법 적용과 기밀성 및 무결성 확보를 위한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.111-118
    • /
    • 2019
  • For the security of a vast amount of information, it has been started to diagnose the site as a way of operating and managing the information owned by a company holding assets, to establish indexes to check the actual status and all kinds of standards to obtain security, and also to classify the information assets based on that. This has been extended to many different areas including policies to operate and manage information assets, services, the management of owned devices as physical assets, and also the management of logical assets for application software and platforms. Some of these information assets are already being operated in reality as new technology in new areas, for example, Internet of Things. Of course, a variety of electronic devices like Smart Home are being used in ordinary families, and unlike in the past, these devices generate a series of information life cycles such as accumulating and processing information. Moreover, as even distribution is now being realized, we are facing a task to secure the stability of information assets and also information that assets are holding. The purpose of this study is to suggest and apply standard security policy by moduling methods for information assets owned by companies and even families and obtain the enhancement of confidentiality as well as integrity.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

Industrial Technology Leak Detection System on the Dark Web (다크웹 환경에서 산업기술 유출 탐지 시스템)

  • Young Jae, Kong;Hang Bae, Chang
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.46-53
    • /
    • 2022
  • Today, due to the 4th industrial revolution and extensive R&D funding, domestic companies have begun to possess world-class industrial technologies and have grown into important assets. The national government has designated it as a "national core technology" in order to protect companies' critical industrial technologies. Particularly, technology leaks in the shipbuilding, display, and semiconductor industries can result in a significant loss of competitiveness not only at the company level but also at the national level. Every year, there are more insider leaks, ransomware attacks, and attempts to steal industrial technology through industrial spy. The stolen industrial technology is then traded covertly on the dark web. In this paper, we propose a system for detecting industrial technology leaks in the dark web environment. The proposed model first builds a database through dark web crawling using information collected from the OSINT environment. Afterwards, keywords for industrial technology leakage are extracted using the KeyBERT model, and signs of industrial technology leakage in the dark web environment are proposed as quantitative figures. Finally, based on the identified industrial technology leakage sites in the dark web environment, the possibility of secondary leakage is detected through the PageRank algorithm. The proposed method accepted for the collection of 27,317 unique dark web domains and the extraction of 15,028 nuclear energy-related keywords from 100 nuclear power patents. 12 dark web sites identified as a result of detecting secondary leaks based on the highest nuclear leak dark web sites.

A Funding Source Decision on Corporate Bond - Private Placements vs Public Bond - (기업의 회사채 조달방법 선택에 관한 연구 - 사모사채와 공모사채 발행을 중심으로 -)

  • An, Seung-Cheol;Lee, Sang-Whi;Jang, Seung-Wook
    • The Korean Journal of Financial Management
    • /
    • v.21 no.2
    • /
    • pp.99-123
    • /
    • 2004
  • We focus in this study on incremental financing decisions and estimate a logit model for the probability a firm will choose a private placement over a public bond issue. We hypothesize that information asymmetry, financial risk, agent cost, and proprietary information may affect a firm's choice between public debt and private placements. We find that as the size of firm increases, the probability of choosing a private placement declines significantly. The age of the firm, however, is not a significant factor affecting the firm's choice between public and privately-placed bond. The coefficients on the firm's leverage and non-investment grade dummy are significantly positive, meaning firms with high financial risk and credit risk select private placements. The findings regarding agency-related variables, PER and Tobin's Q, are somewhat complex. We find significant evidence that firms with high PER prefer private placements to public bonds, suggesting that borrowers with options to engage in asset substitution or underinvestment are more likely to choose private placements. The coefficient of Tobin's Q is negative, but not significant, which weakly support the hold-up hypothesis. When we construct an interaction term on the Tobin's Q with a non-investment rating dummy, however, the Tobin's Q interaction term becomes positive and significant. Thus, high Tobin's Q firms with a speculative rating are significantly more likely to choose a private placement, regardless of the potential hold-up problems. The ratio of R&D to sales, proxy for proprietary information, is positively significant. This result can be interpreted as evidence in favor of a role for proprietary information in the debt sourcing decision process for these firms.

  • PDF

Evaluation of the environmental and ecological value indicators for railway development area selection (철도개발지 선정을 위한 환경·생태적 가치 지표 평가)

  • Kim, Min-kyeong;Kim, Dong Yeob
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.2
    • /
    • pp.105-113
    • /
    • 2017
  • Recently mountain tourism has been promoted and introduction of railroads with utilizing mountain resources is being planned. With the government policies to increase the share of eco-friendly transportation on railroad, national double-tracking of single rail and improvement projects are on going. However, the eco-friendly railroad policy suggests the environmental impact assessment items only on air quality, water quality, geographical/geological features, fauna/flora, natural/environmental resources, noise/ vibration, and recreation/landscape. And for fauna/flora and natural/environmental resources, confirming the presence of environmental protection zone is enough to satisfy legal requirement. This study suggested to evaluate environmental/ecological values with quantitative data. Evaluation indices and evaluation items have been selected to provide the data. Each of the subject map and railroad network was overlapped. The study selected naturalness and diversity as major indicators and calculated weight values of the items under the indicators, which are to be usd for the selection of the sites for railway development. This assessment method could be applied to the environmentally friendly construction of railroads in the future.

A Study on the Development Strategy of the Foods Package Design (식품 패키지디자인 개발 전략에 관한 연구)

  • Choi, Jeong-Gye;Lee, Sang-Youn
    • The Korean Journal of Franchise Management
    • /
    • v.2 no.2
    • /
    • pp.45-69
    • /
    • 2011
  • A basic function of packaging is preservability, delivery, subdivision, aesthetic and serviceability on packaging. Originally, the function and necessity of packaging is on preservability, but today it is expending before. then packaging is focusing on sales promotion. Although it is hard to say production itself, it could does when it is made. also, it is important for product to be goods when packaging and its materials are identification on matching each other. The role of packaging design is a core factor that satisfy consumer a various of needs and wants. In the past, the role of food packaging design is just preservability and delivery on product. but then, nawaday it is asked a various role. Not only present products have to get inherency but also have added value. That is, advanced technologies, information, and richness from materials which are diversity for coming a extention of choice. currently, food packaging design shouldn't have stayed on just packaging which cover beautiful. Packaging design is a symbolic sign. It is importance for manager to do R&D, producing, and distribution, also for consumer who use and buy the product whether manager and consumer think package design is a main mediation. This day, food design pay attention to be asking consumer's a number of sensitivity. It is the reason that the package is importance and exist. This article is to examine preservability, delivery, subdivision, aesthetic, serviceability, and environmental orientation in order to develop and show a method and theories to find package design in food industry the reason that why sales promotion and its profit increase. Consequently, draw on the function of package design effects the benefit on product is distribution. Green Design on the food packages by combining recycled and biodegradable food packages for the development of practices and long life to the look of the food package design practices.