• Title/Summary/Keyword: Security Cooperation

Search Result 883, Processing Time 0.029 seconds

Development of Optical System for 50W LED Security Lamp (50W급 LED 보안등용 조명광학계 개발)

  • Jung, Byoung-Jo;Jang, Sung-Whan;Roh, Yong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.296-305
    • /
    • 2012
  • In this paper, we develop about glare phenomenon at security light caused by light source's straight characteristic, maintaining uniformity ratio of illuminance as high, have long light distribution not by symmetry of rotation but a single axis. we develop second lens for security light that lack of light distribution phenomenon at each of security light can be solved. Our developed light system design satisfies lighting standard of security light's and shape of lens is single lens. so our lens optimizes designing or analysis by using lighting design and interpretation program. Making a Mock-up to do real measure, we have intensity of illumination and maintaining uniformity ratio of illuminance measurement data.

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

Developmental Direction for East Asia Maritime Security Cooperation (동아시아 해양안보협력 발전방안)

  • Park, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1596-1606
    • /
    • 2016
  • Today the ocean is a treasure trove of the resources that prosperous country and the passage of the trade to lead the world economy. Due to the development of the latest science and technology, human activities are increasingly expanding into the ocean from land. Modern east Asian countries have also recognized the value of the ocean and competitively pursue their own interests at sea. For this reason, the conflict between the East Asian countries is rising. On the other hand, the means of International organizations and maritime security to resolve these issues are very limited. In order to solve this problem, we should reexamine the scope and agenda of the maritime security issues, and re-evaluate the process and results of the various security cooperation which have been implemented. If we solve these problems successfully, the troubled Asian waters will be changed to 'sea of peace and prosperity'.

Examination of NATO's Strategic Changes After the Russia-Ukraine War and Korea's Security Strategic Implications (러-우 전쟁 이후 NATO의 전략 변화와 한국의 안보전략적 함의 고찰)

  • Kim Hyun Jin;Bae Il Soo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.25-29
    • /
    • 2024
  • After the Russia-Ukraine War, NATO broke away from the peacekeeping strategy that it had maintained and declared that it would strengthen the multilateral security consultative body, pursue strategic stability, expand armaments, cooperate security, and strengthen dialogue and cooperation in the Indo-Pacific region. Changes in NATO's strategy directly and indirectly affect Korea's security environment. Only by clearly analyzing this and establishing policies and strategies to respond to it can the threat be suppressed and national interests protected. NATO designates China and Russia as threats. By using cooperation and solidarity with NATO as an opportunity, we will be able to strengthen security cooperation and alliances, develop and expand the defense industry market, and expand opportunities to participate in the Ukraine reconstruction project.

Development of Cyber Security Assessment Methodology for the Instrumentation & Control Systems in Nuclear Power Plants (원전 계측제어시스템에 대한 사이버보안성 평가 방법론 개발)

  • Kang, Young-Doo;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3451-3457
    • /
    • 2010
  • Cyber security assessment is the process of determining how effectively an entity being assessed meets specific cyber security objectives. Cyber security assessment helps to measure the degree of confidence one has and to identify that the managerial, technical and operational measures work as intended to protect the I&C systems and the information it processes. Recently, needs for cyber security on digitalized nuclear I&C systems are increased. However the overall cyber security program, including cyber security assessment, is not established on those systems. This paper presents the methodology of cyber security assessment which is appropriate for nuclear I&C systems. This methodology provides the qualitative assessments that may formulate recommendations to bridge the security risk gap through the incorporated criteria. This methodology may be useful to the nuclear organizations for assessing the weakness and strength of cyber security on nuclear I&C systems. It may be useful as an index to the developers, auditors, and regulators for reviewing the managerial, operational and technical cyber security controls, also.

Trends and Future Prospects for Transborder Regional Cooperation in Northeast Aisa (뉴스초점: 동북아 초국경적 지역협력의 동향 및 전망)

  • Lee, Sun
    • Journal of the Korean Professional Engineers Association
    • /
    • v.43 no.5
    • /
    • pp.25-30
    • /
    • 2010
  • The 2010 PCRD(Presidential Committee on Regional Development) International Conference aims at designing regional policies to enhance regional growth potential and inter-regional cooperation. Increasing economic interdependence in Northeast Asia in particular among the 3 countries of China, japan and Korea, requires enlightened territorial development policies of each country to accommodate the need for close cooperation and networking across the border. The security problem in the Korean peninsula requires the importance for earnest dialogue and discussion between neighbors about the common future of Northeast Asia. Cross-border cooperation and networking will contribute to enhancing regional stability and development in this era of borderless globalization.

  • PDF

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

A Design and Implementation of User Authentication System using Biometric Information (바이오 정보를 이용한 사용자 인증 시스템 설계 및 구현)

  • Lee, Hyung-Woo;Park, Yeong-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3548-3557
    • /
    • 2010
  • Security enhancement technologies are required to preventing phishing and pharming attacks on Internet banking. One-time password(OTP) should be used with certificate for enhancing user authentication and security performance. However, existing OTP technique is weak on MITM(Man-In-The-Middle) attack and synchnonization should be provided on OTP system. Therefore, more advanced mechanism such as combining biometic data with OTP can be suggested to enhancing security on authentication system. In this paper, we designed and implemented a multifactor authentication system using one-time biometric template to generate unique authentication data after adapting biometric transform on each user's biometric data.

A RFID Multi-Authentication Method for Logistics Systems (물류 시스템에 적합한 RFID 다중 인증방법)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.313-319
    • /
    • 2009
  • Recently the RFID system, which can recognize multiple tags simultaneously through wireless communication, is emerging as a new technology that can replace the barcode system. Furthermore, related industries are carrying out active research on tags and authentication protocols with guaranteed security that are widely applicable to logistics, distribution, etc. The present study proposes a protocol with enhanced security by introducing the concept of RBAC to the authentication protocol, and a method with lower security for effective mass authentication. The proposed method is advantageous in that it guarantees security against spoofing attack, traffic analysis, replay attack, etc. based on hash function.

An Ontology-based Context Aware Model for the Implementation of Integrated Security Control System (통합보안관제 시스템 구축을 위한 온톨로지 기반의 상황인식 모델)

  • Han, Kwang-Rok;Kim, Jeong-Bin;Sohn, Surg-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.6
    • /
    • pp.2246-2255
    • /
    • 2010
  • In this paper, we describe an ontology-based context aware model that collects context information from USN sensor and CCTV image and reasons about context in order to development an integrated security control system in the industrial environments. The context model represents autonomous and heterogeneous data as ontologies and recognizes the context through DL(description logic) inference in the smart computing environment. We expect that the integrated security control system can automatically detects the risk in the industrial field and reduces the safety and security incidents by applying this context model to the system.