• Title/Summary/Keyword: Security Concepts

Search Result 264, Processing Time 0.03 seconds

A Critical Review of Industrial Security Concepts (산업보안 개념의 비판적 고찰)

  • Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.287-303
    • /
    • 2017
  • Industrial security research has shown a rapid increase over the past decade. With the establishment of the Korean Association for Industrial Security in 2008 and the establishment of the departments of industrial security in recent years, academic interests and research on industrial security are also spreading at a rapid pace. Although academic interest and research have grown in quantitative terms, research on theoretical fields that are the basis of academic systematization is extremely limited. There is a focus on the issue of specific issues and practical solutions without worrying about the theoretical basis including conceptualization. Therefore, in most studies, the concept of industrial security remains at the level of accepting the concept applied in the previous research. Most industrial security research focuses on the specific topic of 'industrial technology protection' because it considers the concept of industrial security to be reduced to industrial technology protection. Although industrial security is composed of a wide range of fields, recognizing a specific field as an entirety of industrial security appears to be a serious problem. As a result, the concept of industrial security in industrial security research is being used ambiguously, incorrectly, and conveniently. It is necessary to accurately and recognize the concept of industrial security based on logical clarity and empirical feasibility.

  • PDF

A Combined Bulk Electric System Reliability Framework Using Adequacy and Static Security Indices

  • Billinton, Roy;Wangdee, Wijarn
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.4
    • /
    • pp.414-422
    • /
    • 2006
  • Deterministic techniques have been applied in power system planning for many years and there is a growing interest in combining these techniques with probabilistic considerations to assess the increased system stress due to the restructured electricity environment. The overall reliability framework proposed in this paper incorporates the deterministic N-1 criterion in a probabilistic framework, and results in the joint inclusion of both adequacy and security considerations in system planning. The combined framework is achieved using system well-being analysis and traditional adequacy assessment. System well-being analysis is used to quantify the degree of N-1 security and N-1 insecurity in terms of probabilities and frequencies. Traditional adequacy assessment is Incorporated to quantify the magnitude of the severity and consequences associated with system failure. The concepts are illustrated by application to two test systems. The results based on the overall reliability analysis framework indicate that adequacy indices are adversely affected by a generation deficient environment and security indices are adversely affected by a transmission deficient environment. The combined adequacy and security framework presented in this paper can assist system planners to realize the overall benefits associated with system modifications based on the degree of adequacy and security, and therefore facilitate the decision making process.

Security Threats and Countermeasures according to the Environmental Changes of Smart Work (스마트워크 환경 변화에 따른 보안위협과 대응방안)

  • Lee, Kyung-Bok;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.29-40
    • /
    • 2011
  • This research suggests the effective countermeasures for the security threats on 'Smart Work 2.0'. It is important to discuss the Smart Work 2.0 security issues and threats at the point of evolving form Smart Work 1.0 into 2.0. In this research, first, the security issues, threats and countermeasures of telecommunication working, mobile office and smart work center are discussed. Second, we explore the security issues derived from co-working or creativity as major concepts of Smart Work 2.0.

Future Development of Republic of Korea NCAGS (한국형 선박통제의 발전방향에 관한 연구)

  • Kim, Sung Hae;Jung, Hyo Sup
    • Strategy21
    • /
    • s.44
    • /
    • pp.352-376
    • /
    • 2018
  • Through this research, the current state of naval coordination and guidance of shipping is reviewed whereupon which a suggestion is made for a novel role which satisfies the needs of the people and the country asked of the Navy. Taking into consideration the dynamic security environment, the developing relationship between the two nations on the Korean peninsula, and the influence that the Republic of Korea has on maritime security, it is made more urgent that the Navy takes a proactive course of action in terms of naval coordination and guidance of shipping. The current form of Korean naval coordination and guidance of shipping is adapted from the logical and flexible concepts of NCAPS and NCAGS and is one of many tasks that the Republic of Korea Navy must perform. However, when the Republic of Korea Navy develops blue-water capabilities with the ambitions of protecting its people and their way of life, naval coordination and guidance of shipping could potentially become one of the primary functions of the Republic of Korea Navy that the it must champion. Already, there are indications that foreign navies are, through many developments and commitment towards naval coordination and guidance of shipping, protecting its people and states' interests wherever is necessary. In the case of Chile, its Navy has taken the helm of naval coordination and guidance of shipping and has integrated various maritime organizations including the coast guard and the National Customs Service for the sake of maintaining regional maritime security, showing immediate force if necessary. Presently, as the Republic of Korea Navy looks to be a global naval power, it is important that a reprioritization of the Navy's mission is undertaken, all the while sustaining military readiness posture on the Northern Limit Line. It cannot be any more emphasized how crucial thorough military readiness posture is as a natural stance against the enemy. That being said, contributing towards international maritime security is consistent with the nation's standing. It is a fact that maritime security has been conceptualized and developed merely as a study within the Ministry of Maritime Affairs and Fisheries, the Republic of Korea Navy, and other governmental organizations, forces, and academia. Naval cooperation and guidance of shipping suggested by this research as a practical operational field is a concrete solution to what once was an abstract concept. To stand firm on its status as a maritime nation, the Republic of Korea must establish a Maritime Security Organization within its Navy and develop the appropriate doctrines. Attaining experts, developing doctrines, and cultivating the capability to deploy maritime forces will allow for the Republic of Korea to execute a primary role in keeping international maritime security and naval coordination and guidance of shipping. To fully achieve its latent potential necessitates the Republic of Korea Navy to expedite the introduction of naval coordination and guidance of shipping concepts and to establish the appropriate doctrines, operation plans, and organizations.

Effective Concepts of Harmonious Management of Production Systems

  • Arutiunian, Iryna;Poltavets, Maryna;Аchacha, Maryna;Bondar, Olena;Pavlov, Fedir;Gerasymenko, Oleksandr;Kulinich, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.141-144
    • /
    • 2021
  • Modern concepts of management of construction production systems require solving the problems of harmonization of the distribution of structural elements on the way to overcoming global destabilization processes. An effective ratio of functional subsystems of production in an environment of mutual influence create sustainable opportunities for production management and contribute to the logical development of the system as a whole in achieving the main goal of harmonious management. The purpose of the study is to develop the concept of effective management of production systems in construction with the harmonious formation of organizational structures. The results of the study allowed to reveal the harmonization approach in improving the interaction of structural elements of production and accelerating their functional sensitivity to changes in the environment. Harmonious production system more effectively adapts to the diversity of interests, goals and actions at all levels of management of different subsystems in any environment.

Pedagogical Analysis Of The Phenomenon Of Digital Competence

  • Yovenko, Larysa;Novakivska, Lyudmyla;Sanivskyi, Oleksandr;Sherman, Mykhailo;Vysochan, Lesia;Hnedko, Natalia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.7-10
    • /
    • 2021
  • The article analyzes and concretizes the understanding of the differences between the concepts of competence / competence according to the criterion general - personal. Based on the identified characteristics of competence (completed personal quality, activity character, educational result, successful implementation of professional and educational activities), the concept of competence as an integrative dynamic quality of a person, manifested in effective activity in a specific area, is defined. The structure of the IC has been substantiated, including motivational and value; information technology; communicative and reflective components. The content of the named IC components is disclosed. The article analyzes the essence of the characteristics of basic concepts (competence / competence), consideration of information competence in the research of famous scientists in order to concretize the studied phenomenon; concretization of the identified pedagogical conditions in educational process.

Conflict Resolution: Analysis of the Existing Theories and Resolution Strategies in Relation to Face Recognition

  • A. A. Alabi;B. S. Afolabi;B. I. Akhigbe;A. A. Ayoade
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.166-176
    • /
    • 2023
  • A scenario known as conflict in face recognition may arise as a result of some disparity-related issues (such as expression, distortion, occlusion and others) leading to a compromise of someone's identity or contradiction of the intended message. However, addressing this requires the determination and application of appropriate procedures among the various conflict theories both in terms of concepts as well as resolution strategies. Theories such as Marxist, Game theory (Prisoner's dilemma, Penny matching, Chicken problem), Lanchester theory and Information theory were analyzed in relation to facial images conflict and these were made possible by trying to provide answers to selected questions as far as resolving facial conflict is concerned. It has been observed that the scenarios presented in the Marxist theory agree with the form of resolution expected in the analysis of conflict and its related issues as they relate to face recognition. The study observed that the issue of conflict in facial images can better be analyzed using the concept introduced by the Marxist theory in relation to the Information theory. This is as a result of its resolution strategy which tends to seek a form of balance as result as opposed to the win or lose case scenarios applied in other concepts. This was also consolidated by making reference to the main mechanisms and result scenario applicable in Information theory.

State-Based Behavior Modeling in Software and Systems Engineering

  • Sabah Al-Fedaghi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.21-32
    • /
    • 2023
  • The design of complex man-made systems mostly involves a conceptual modeling phase; therefore, it is important to ensure an appropriate analysis method for these models. A key concept for such analysis is the development of a diagramming technique (e.g., UML) because diagrams can describe entities and processes and emphasize important aspects of the systems being described. The analysis also includes an examination of ontological concepts such as states and events, which are used as a basis for the modeling process. Studying fundamental concepts allows us to understand more deeply the relationship between these concepts and modeling frameworks. In this paper, we critically analyze the classic definition of a state utilizing the Thinging machine (TM) model. States in state machine diagrams are considered the appropriate basis for modeling system behavioral aspects. Despite its wide application in hardware design, the integration of a state machine model into a software system's modeling requirements increased the difficulty of graphical representation (e.g., integration between structural and behavioral diagrams). To understand such a problem, in this paper, we project (create an equivalent representation of) states in TM machines. As a case study, we re-modeled a state machine of an assembly line system in a TM. Additionally, we added possible triggers (transitions) of the given states to the TM representation. The outcome is a complicated picture of assembly line behavior. Therefore, as an alternative solution, we re-modeled the assembly line based solely on the TM. This new model presents a clear contrast between state-based modeling of assembly line behavior and the TM approach. The TM modeling seems more systematic than its counterpart, the state machine, and its notions are well defined. In a TM, states are just compound events. A model of a more complex system than the one in the assembly line has strengthened such a conclusion.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

The Unit Commitment Using the Sensitivity Factor of Security Constrained Optimal Power Flow (SC-OPF의 민감도 계수를 이용한 발전기 기동.정지계획)

  • Kim, Kwang-Mo;Chung, Koo-Hyung;Han, Seok-Man;Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.416-417
    • /
    • 2006
  • The recent movement to deregulated and competitive electricity market requires new concepts against existing central dispatch in the system operation and planning. As power systems tend to be operated more closely to their ultimate ratings, the role of SCOPF(Security Constrained Optimal Power Flow) is changed. This paper deals with the proper Unit Commitment condition changed according to the conditions or configuration of power system. This goal of is paper is to obtain proper security and Optimal UC condition through the efficient usage of the sensitivity Factor against critical contingencies. The proposed mechanism has been tested on a sample system and results show more secure conditions against critical contingencies.

  • PDF