• Title/Summary/Keyword: Security Area

Search Result 1,697, Processing Time 0.031 seconds

A Study on Vertiport Installation Standard of Drone Taxis(UAM) (드론택시(UAM)의 수직이착륙장(Vertiport) 설치기준 연구)

  • Choi, Ja-Seong;Lee, Seok-Hyun;Baek, Jeong-Seon;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.1
    • /
    • pp.74-81
    • /
    • 2021
  • UAM(Urban Air Mobility) systems have evolved in the form of helicopters in the 1960~1970s, tiltrotors in the 1980s, small aircraft transportation systems in the 2000s, and electric-powered Vertical Take-Off and Landing (eVTOL) in the 2010s; accordingly, the early heliport has evolved to its current form of a Vertiport. Vertical Takeoff and Landing Sites, Vertiports, are important factors for the successful introduction of UAM, along with the resolution of air traffic control (ATC), air security, and noise problems. However, there are no domestic or international installation standards and guidelines yet. Therefore, in this study, installation standards were prepared by referring to domestic and international case studies, ICAO standards, and MIT research papers. The study proposes to establish standards for Final Approach and Takeoff Area (FATO) as 1.5D, 1D for Touchdown and Lift-Off Area (TLOF), and 1.5D for Safety Area (SA). It also proposes to add "UAM Vertiport Installation Standards" to the 「Act on the Promotion and Foundation of Drone Utilization, Drone Act」.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Flooding Risk under Climate Change of Fast Growing Cities in Vietnam (베트남 급성장 도시지역의 기후변화 홍수재해 위험성 분석)

  • Kim, So Yoon;Lee, Byoung Jae;Lee, Jongso
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.1-9
    • /
    • 2020
  • Vietnamese cities have a high risk of flooding under climate change due to their geographical characteristics. In this situation, the urban area is expanding with rapid growth of urban population. However, the risk of flooding is increasing due to the increase in impermeable areas and insufficient infrastructure. This study analyzed the urban expansion trend at the national level in Vietnam for the past 10 years (2007-2017) by using the Urban Expansion Intensity Index. Also, this study selected Hue City as a region with a large impact of climate change and a rapid expansion and found the possibility of flooding in the urban expansion area. The result showed that cities have been expanded around major cities in the Red River Delta, Mekong Delta, and coastal areas. In the case of Hue City, the area with fast expansion rate has a higher expected flood area. It implies that the risk of flood disasters may increase if the urabn expansion is carried out without disaster prevention measures. It is expected that Korean urban disaster prevention policies such as urban climate change disaster vulnerability analysis system will be helpful in establishing urban plans considering climate change in the fast growing regions such as Vietnam.

Analysis of the Impact of Building Congested Area for Urban Flood Analysis (도심지 침수해석을 위한 건축물 밀집 지역 영향 분석)

  • Kim, Sung-Uk;Jun, Kye-Won;Lee, Seung-Hee;Pi, Wan-Seop
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.41-46
    • /
    • 2022
  • Recently, the scale of flood damage occurring in urban areas is increasing due to climate change and urbanization, so various flooding analysis techniques are needed. In the Sadangcheon Stream basin, which has been continuously flooded since 2010, a basic plan for improving drainage was established using XP-SWMM and measures to prevent flooding were proposed. However, in the process of inundation analysis, the analysis considering the city's buildings was not conducted, resulting in a problem that the degree of flooding damage tends to be overestimated. Therefore, in this study, XP-SWMM was used to compare and analyze cases where buildings were not considered and designated as inactive areas. As a result of the study, it was analyzed if the building was not considered, the flood damaged area was 271,100 m2 and the depth of submersion was 0.15 m, and if the building was considered inactive area, the flood damaged area was 172,900 m2 and the depth of submersion was 0.32 m that it is under-estimated about 36% and an flow velocity around the building increased from 1.62 m/s to 1.83 m/s about 1.12 times.

PCA Ruling on South China Sea : Implications for Region (필리핀 vs. 중국 간 남중국해 사건 중재판정의 동아시아 역내 함의)

  • Park, Young-Gil
    • Strategy21
    • /
    • s.40
    • /
    • pp.131-143
    • /
    • 2016
  • On 12 July 2016, China's maritime claim to most of the South China Sea (SCS) based on the so-called nine-dash line was rejected by the Arbitral Tribunal, constituted under Annex VII to the UN Convention on the Law of the Sea (UNCLOS) concerning issues in the South China Sea including the legality of the so-called "nine-dashed line", the status of certain maritime features and their corresponding maritime entitlements, together with the lawfulness of certain actions by China which the Philppines, in a case brought in 2013, alleged were violations. As having the Tribunal determined that China's claim had no legal grounds in UNCLOS, thus undermining China's claims, and establishing that China has no exclusive legal rights to control the area roughly the size of India. There are some major implications from the Tribunal's ruling in the Arbitration award. These include implications on: how to delimit the maritime boundary in disputed waters, how to promote maritime confidence-building measures, how to safeguard maritime safety and security, and how to promote the rule of law in the SCS. Since its application of UNCLOS in East Asia, it has been obvious that the only way to resolve maritime disputes in the region is to build strong maritime cooperative partnerships under the auspices of the rule of law.

Proposed of Intrusion detection model using the Mobile agent (이동에이전트를 이용한 침입탐지 모델의 제안)

  • 황인선;박경우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of internet. Therefore, Intrusion detection system has been an active research area to reduce the risk from intruders. A number of advantages of using mobile agent computing paradigms have been Proposed. These advantages include : overcoming network latency, reducing network load, executing asynchronously and autonomously, adapting dynamically, and operating in heterogeneous environments. Many information security models have been proposed to mitigate agent-to-agent. agent-to-platform, and platform-to-agent element risks . In these paper, We have an object which is that through intrusion detection system development, the mobile agent is managed and through the analysis of performance data. the best environment is served.

  • PDF

New concept of Wireless LAN service for Wireless home network (무선 홈 네트워크 구축을 위한 신개념 무선랜 서비스)

  • Kim, Wan-Ki;Ki, Ho-Young;Lee, Hang-Su;Woo, Jong-Myoung;Hong, Sung-Yong
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2005.11a
    • /
    • pp.385-390
    • /
    • 2005
  • In this paper, we studied a new concept of wireless LAN service. Current service for wireless LAN has some weak points such as occuring a frequency shadowed area, high cost for setting a number of APs, electromagnetic interference by means of a large output transmission and weak security issues. To reduce those problems, we proposed setting antennas which are from one AP for each rooms, and designed a suitable antenna. After that we measured a PMA(Propagation Measurement & Analysis). Experimental results showed that a new concept of wireless LAN service is excellent to resolve interference and weak security issues by minimizing external propagation of a building.

  • PDF

The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment (모바일 환경에서 개인정보 유출 방지를 위한 개선 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.

Development of Portable Hybrid Water Purifier System (재난·재해용 포터블 하이브리드 정수시스템 개발)

  • Ryu, Ji-Hyeob;Choi, Rang-Kyu;Park, Hun
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.2
    • /
    • pp.47-55
    • /
    • 2010
  • It was developing of portable hybrid water purification system for clean water production in the disaster area. because there are no way to supply a drinking water to the victims of calamity. currently, the government has been supplying bottled water to victims. but it is a limit to the reserves. It is composed of a filter, a feed pump, a solar-cell, a controller, and a case and is possible supplying a drinking water not to limit time and a place. Field test was carried out to developed portable water purification system and the purified water was satisfied a criterion for a drinking water.

  • PDF

A Study on the Job and Need Satisfactions of Elementary School Foodservice Employees in Seoul Area (서울지역 초등학교 급식종사원의 직무 및 욕구만족도에 관한 연구)

  • 장서영;한명주
    • Korean journal of food and cookery science
    • /
    • v.18 no.6
    • /
    • pp.625-631
    • /
    • 2002
  • The objectives of this study were to determine the degree of job satisfaction and need satisfaction of school foodservice employees, and the relationship between Job in General(JIG) and need satisfaction. The six demographic items, the Job Descriptive Index(JDI) and JIG scale, and Need Satisfaction Questionnaire(NSQ) were used to evaluate job satisfaction and need satisfaction of school foodservice employees. The results of this study showed that the employees were satisfied with co-workers(2.52), then supervision(2.48), work(1.86), promotion(0.72) and pay(0.51) in decreasing order. Older employees(Age$\geq$40) tended to be more satisfied in JIG(p=0.0620) than younger employees(20$\leq$Age$\leq$39). Employees were satisfied in social needs, then autonomy needs, self-actualization needs, esteem needs, security heeds in decreasing order. There were no significant differences between demographic factors and five need categories. When the employees were classified by their scores on JIG, Group I having the lowest score tended to be less satisfied(p=0.0627) in security needs than Group II and Group III. The information of study could be useful for foodservice managers in job design to increase the productivity.