• Title/Summary/Keyword: Safety Threats

Search Result 262, Processing Time 0.021 seconds

A study of the threats towards the flight crew (민간항공사의 운항승무원에 영향을 주는 위협관리에 관한 연구)

  • Choi, Jin-Kook;Kim, Chil-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.2
    • /
    • pp.54-59
    • /
    • 2010
  • The flight deck crew must manage complexity during daily flight operations. The Airline may obtain data regarding threats and errors through LOSA(Line Operations Safety Audits) on normal flights as predictive safety tool in Safety Management System of the Airline to actively improve the systems such as SOP(Standard Operation Procedure), training, evaluation and the TEM(Threat and Error Management) for the flight deck crew. The flight deck crew make errors when they fail managing threats. The crew mismanage around ten percent of threats and commit errors. The major mismanaged threats are aircraft malfunction, ATC(Air Traffic Communication), and wether threats. The effective countermeasures of TEM for manageing threats are leadership, workload management, monitor & cross check, Vigilance, communication environment and cooperation of the crew. It is important that organizations must monitor for the hazards of threats and improve system for the safer TEM environments.

The Operational Time pressure and TEM (운항시간 압력 및 Threat과 Error 관리)

  • Choe, Jin-Guk;An, Gyeong-Su;Jeong, Won-Gyeong;Kim, Chil-Yeong
    • 한국항공운항학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.61-65
    • /
    • 2006
  • The flight deck crew are under the operational time pressure in the cockpit. The crew tend to make errors when they face the threats of operational time pressure because they are in a rush. The flight deck crew can reduce threats and errors which existing within the airlines by using threat and error management when the crew know these threats and errors. The airlines can implement meaningful safety management system by analyzing into the useful information for to identify the hazard and manage the risk to reduce these threats and errors since aircrafts accidents can be fatal.With the threats and errors that were found regard to operational time pressures, company may implements safety change process to improve the safety systematically and the crew can manage the threats and errors more effectively.

  • PDF

Cybersecurity Threats and Responses of Safety Systems in NPPs (원전 안전계통의 사이버보안 위협 및 대응)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.99-109
    • /
    • 2020
  • In the past, conservative concepts have been applied in terms of the characteristic of nuclear power plants(NPPs), resulting in analog-based equipment and closed networks. However, as digital technology has recently been applied to the design, digital-based facilities and communication networks have been used in nuclear power plants, increasing the risk of cybersecurity than using analog-based facilities. Nuclear power plant facilities are divided into a safety system and a non-safety system. It is essential to identify the difference and cope with cybersecurity threats to the safety system according to its characteristics. In this paper, we examine the cybersecurity regulatory guidelines for safety systems in nuclear power plant facilities. Also, we analyze cybersecurity threats to a programmable logic controller of the safety system and suggest cybersecurity requirements be applied to it to respond to the threats. By implementing security functions suitable for the programmable logic controller according to the suggested cybersecurity requirements, regulatory guidelines can be satisfied, and security functions can be extended according to other system requirements. Also, it can effectively cope with cybersecurity attacks that may occur during the operation of nuclear power plants.

A Study on the Countermeasure of the Security Threats for Coastal Passenger Ships (연안여객선의 보안위협 대응방안에 관한 연구)

  • Ju, Jong-Kwang;Lee, Eun-Kang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.3
    • /
    • pp.199-206
    • /
    • 2007
  • In analyzing the security threats and their management system and making questions on security awareness to the concerned parties in the field of coastal passenger ship, we draw its security vulnerability and the features of security threats. The countermeasures and security system are proposed in order to response the diverse security threats and to set up the security culture of coastal passenger ship.

  • PDF

Introduction of Requirements and Regulatory Guide on Cyber Security of I&C Systems in Nuclear Facilities (원전 계측제어시스템의 사이버보안 요구사항)

  • Kang, Young-Doo;Jeong, Choong-Heui;Chong, Kil-To
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.209-210
    • /
    • 2008
  • In the case of unauthorized individuals, systems and entities or process threatening the instrumentation and control systems of nuclear facilities using the intrinsic vulnerabilities of digital based technologies, those systems may lose their own required functions. The loss of required functions of the critical systems of nuclear facilities may seriously affect the safety of nuclear facilities. Consequently, digital instrumentation and control systems, which perform functions important to safety, should be designed and operated to respond to cyber threats capitalizing on the vulnerabilities of digital based technologies. To make it possible, the developers and licensees of nuclear facilities should perform appropriate cyber security program throughout the whole life cycle of digital instrumentation and control systems. Under the goal of securing the safety of nuclear facilities, this paper presents the KINS' regulatory position on cyber security program to remove the cyber threats that exploit the vulnerabilities of digital instrumentation and control systems and to mitigate the effect of such threats. Presented regulatory position includes establishing the cyber security policy and plan, analyzing and classifying the cyber threats and cyber security assessment of digital instrumentation and control systems.

  • PDF

The Basic Study on Risk and Threat Issues in Domestic Smart Factories (국내 스마트공장의 위험과 위협에 대한 기초 연구)

  • Kwon, Young-Guk;Kwon, Jae-Beom
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.4
    • /
    • pp.1-9
    • /
    • 2021
  • This study examines the trends of domestic and foreign smart industries and discusses safety and security issues. Based on the actual situation survey and interview of the smart factory, we would like to examine the perspectives on risks and threats. We will examine safety and health issues related to new harmful and risk factors that may occur in smart factories and suggest institutional development directions for future safety and health. First, a safety and health-related work environment for smart factory workers is investigated and interviews are conducted. Second, we investigate new risk factors and threats to prevent industrial accidents for workers in smart factories. The purpose of this study is to examine what are the new risk factors in the smart factory. In addition, we will try to find reasonable improvement measures by finding out the risks and threats of smart factories through case studies in advanced countries, on-site interviews and surveys.

Molecular Characterization of an Isolate of Bean Common Mosaic Virus First Identified in Gardenia Using Metatranscriptome and Small RNA Sequencing

  • Zhong-Tian Xu;Hai-Tao Weng;Jian-Ping Chen;Chuan-Xi Zhang;Jun-Min Li;Yi-Yuan Li
    • The Plant Pathology Journal
    • /
    • v.40 no.1
    • /
    • pp.73-82
    • /
    • 2024
  • Gardenia (Gardenia jasminoides) is a popular and economically vital plant known for its ornamental and medicinal properties. Despite its widespread cultivation, there has been no documentation of plant viruses on gardenia yet. In the present study, gardenia leaves exhibiting symptoms of plant viral diseases were sampled and sequenced by both metatranscriptome and small RNA sequencing. As a consequence, bean common mosaic virus (BCMV) was identified in gardenia for the first time and named BCMV-gardenia. The full genome sequence of BCMV-gardenia is 10,054 nucleotides (nt) in length (excluding the poly (A) at the 3' termini), encoding a large polyprotein of 3,222 amino acids. Sequence analysis showed that the N-termini of the polyprotein encoded by BCMV-gardenia is less conserved when compared to other BCMV isolates, whereas the C-termini is the most conserved. Maximum likelihood phylogenetic analysis showed that BCMVgardenia was clustered closely with other BCMV isolates identified outside the leguminous plants. Our results indicated that the majority of BCMV-gardenia virus-derived small interfering RNAs (vsiRNAs) were 21 nt and 22 nt, with 21 nt being more abundant. The first nucleotide at the 5' termini of vsiRNAs derived from BCMV-gardenia preferred U and A. The ratio of vsiRNAs derived from sense (51.1%) and antisense (48.9%) strands is approaching, and the distribution of vsiRNAs along the viral genome is generally even, with some hot spots forming in local regions. Our findings could provide new insights into the diversity, evolution, and host expansion of BCMV and contribute to the prevention and treatment of this virus.

Comparative analysis of liver transcriptome reveals adaptive responses to hypoxia environmental condition in Tibetan chicken

  • Yongqing Cao;Tao Zeng;Wei Han;Xueying Ma;Tiantian Gu;Li Chen;Yong Tian;Wenwu Xu;Jianmei Yin;Guohui Li;Lizhi Lu;Shuangbao Gun
    • Animal Bioscience
    • /
    • v.37 no.1
    • /
    • pp.28-38
    • /
    • 2024
  • Objective: Tibetan chickens, which have unique adaptations to extreme high-altitude environments, exhibit phenotypic and physiological characteristics that are distinct from those of lowland chickens. However, the mechanisms underlying hypoxic adaptation in the liver of chickens remain unknown. Methods: RNA-sequencing (RNA-Seq) technology was used to assess the differentially expressed genes (DEGs) involved in hypoxia adaptation in highland chickens (native Tibetan chicken [HT]) and lowland chickens (Langshan chicken [LS], Beijing You chicken [BJ], Qingyuan Partridge chicken [QY], and Chahua chicken [CH]). Results: A total of 352 co-DEGs were specifically screened between HT and four native lowland chicken breeds. Gene ontology and Kyoto encyclopedia of genes and genomes enrichment analyses indicated that these co-DEGs were widely involved in lipid metabolism processes, such as the peroxisome proliferator-activated receptors (PPAR) signaling pathway, fatty acid degradation, fatty acid metabolism and fatty acid biosynthesis. To further determine the relationship from the 352 co-DEGs, protein-protein interaction network was carried out and identified eight genes (ACSL1, CPT1A, ACOX1, PPARC1A, SCD, ACSBG2, ACACA, and FASN) as the potential regulating genes that are responsible for the altitude difference between the HT and other four lowland chicken breeds. Conclusion: This study provides novel insights into the molecular mechanisms regulating hypoxia adaptation via lipid metabolism in Tibetan chickens and other highland animals.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

Methodology of Cyber Security Assessment in the Smart Grid

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.495-501
    • /
    • 2017
  • The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.