• 제목/요약/키워드: Security Elements

검색결과 548건 처리시간 0.029초

방재 및 감재주택을 위한 건축 계획 요소의 설정 (Architectural Design Elements for Hazard-Resistant and Reduction House)

  • 김형언
    • KIEAE Journal
    • /
    • 제16권6호
    • /
    • pp.77-82
    • /
    • 2016
  • Purpose: Almost every research carried out in our country against the natural disaster is focused on the temporary facilities such as temporary housing, emergency shelter and as a result, it is very hard to find out researches on the ordinary houses which installed integrated systems of hazard-resistant against the natural disaster. Method: To conduct this research, categorizing process for design, structural, environmental and installation elements found in the Hazard-Resistant and Reduction House built for sale in Japan was performed. Result: In this study, several design concepts and subordinate items are recommended for hazard-resistant housing. First, design concept of 'Preparedness' which means security and access to the storage storing goods especially food & beverage for the emergencies is needed. The subordinate items consist of security of stocking space, diversified and circular storage system, and safety storage system. Second, design concept of 'Security' which means security of physical safety space and rapid recovery to returning to daily life against natural disaster is needed. The subordinate items consist of many items including not only structure and facilities but also architectural design method. And finally, design concept of 'Maintenance, Support and Return' which means minimizing the physical and psychological damages and support safety and physical conditions of the victims from the impact of the disaster to returning to daily life is needed. The subordinate items consist of high efficiency insulation/airtightness design, microclimate design, combination of photovoltaic system and storage battery, non-power appliance system against the power failure, storing system for drinking water, rainwater storing and utilization system.

미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구 (A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S.)

  • 송선욱
    • 통상정보연구
    • /
    • 제10권4호
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

기상변화요인과 범죄발생의 관계분석 (Anslysis of Relationship between Reasons for Mereorological Change and Crime)

  • 김종민;김민수;유승재;이동휘
    • 융합보안논문지
    • /
    • 제12권6호
    • /
    • pp.107-113
    • /
    • 2012
  • 본 연구는 강력 5대범죄(살인, 강도, 강간, 절도, 폭력)와 기상변화의 요소(날씨, 기온, 강수량, 풍속, 습도)의 상관관계에 대해 검토하였다. 본 연구에서 사용된 데이터들은 포털사이트를 통해 2010년 1월 1일부터 2012년 10월 19일까지 발생건수와 기상청에서 기록한 해당일의 기상변화의 요소들을 자료로 사용하였다. 이 데이터를 토대로 범죄와 기상변화 요소들과의 상관관계를 분석하기 위해 SPSS 12.0을 활용하였고, 분석을 통해 범죄에 대해 상관관계의 여부를 알 수 있었다. 이 분석결과를 바탕으로 이 분야의 연구에 중요한 선행연구가 될 것이라 판단된다.

북한의 사이버공격과 대응방안에 관한 연구 (A Study on North Korea's Cyber Attacks and Countermeasures)

  • 정민경;임종인;권헌영
    • 한국IT서비스학회지
    • /
    • 제15권1호
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

고위험 테러시대 선박보안시스템 구축을 위한 기초 연구 (A Basic Study on Development of Merchant Ship's Security System in High-Risk Terrorism)

  • 이은방
    • 해양환경안전학회:학술대회논문집
    • /
    • 해양환경안전학회 2003년도 춘계학술발표회
    • /
    • pp.17-22
    • /
    • 2003
  • With the terrorist attacks on 11 September 2001, the ships and their crews' safety and security have become a major issue in the maritime industries. In high-risk terrorism. not only ship owners and port authorities but also crew members on board should take precautions in the conduct of their business. In this paper, the vulnerability and essential elements in overall security of merchant ship are analyzed with a discussion in depth of the concept and principles of maritime security management. Author proposes ship's security model to reduce security risk and to minimize damage as a basic study for designing security system for merchant ship.

  • PDF

SET기반 전자상거래의 보안위협요소 분석 및 대응 방안에 관한 연구 (A Study on the Security Vulnerabilities and Defense Mechanism for SET-based Electronic Commerce)

  • 김상균;강성호
    • 한국전자거래학회지
    • /
    • 제4권2호
    • /
    • pp.59-79
    • /
    • 1999
  • In order to construct a successful electronic commerce system, three main essential factors must be satisfied to obtain the best effective outcomes. The three main essential factors are as follows : economic factor, effectiveness factor and convenient factor. In order to understand the role of these three factors, one must have some insight knowledge about security to assist him to implement these three factors in his construction of an electronic commerce system. This paper analyses a implementation mechanism of security systems based on the SET 1.0 standard for electronic commerce systems, thus providing an effective plan for the construction of a security system in the SET-based electronic commerce field. This paper helps to analyse the elements of security vulnerabilities in the SET 1.0 standard implementation and also helps to understand the SET 1.0 protocol.

  • PDF

State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents

  • Kryshtanovych, Myroslav;Britchenko, Igor;Losonczi, Peter;Baranovska, Tetiana;Lukashevska, Ulyana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.33-38
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.

개발 전주기 사이버보안 관점에서의 해상 사이버보안 형식 승인과 RMF 비교 연구 (A Comparative Study on Type Approval of Maritime Cyber Security and RMF in the View of System Development Lifecycle)

  • 이수원;황세영;홍진아;김병진
    • 정보보호학회논문지
    • /
    • 제32권2호
    • /
    • pp.279-287
    • /
    • 2022
  • 최근 사이버 위협이 고도화되고 해킹기술이 발달함에 따라 자동차, 선박 등 다양한 분야에서 사이버보안이 강조되고 있다. 이러한 추세에 따라 여러 산업 분야에서 기자재 및 시스템에 대한 사이버보안을 요구하고 있으며, 이에 관련된 인증 및 제도가 구체화 되고 있다. 본 논문에서는 산업 분야의 사이버보안 형식승인이 RMF와 같이 명시적으로 개발 단계별로 구분하지는 않으나, 시스템 개발 전주기에 사이버보안 요소가 반영되어야 한다는 공통요소가 있다는 전제하에 RMF와 비교하였다. 비교 대상으로 해상 사이버보안 형식승인을 선정하였으며, 이는 공식적인 사이버보안 형식승인의 예로 국내 유일의 국제 선박검사 기관인 한국선급의 형식승인을 예로 비교한 것이지 산업 분야의 사이버보안 형식승인을 대표한다는 의미는 아니다. 비교 결과 해상 사이버보안 형식승인 획득 절차는 RMF와 같이 개발 단계별로 구분하지 않지만, RMF와 같이 개발 전단계에 대해 사이버보안 요소 적용해야 하는 절차상의 공통점과 단계별 결과물에 대한 유사성을 확인하였다. 이에 따라 해상 사이버보안 형식승인 획득과정을 통해 개발된 시스템은 개발 전주기에 사이버보안 요소가 적용되었다고 판단할 수 있는 가능성을 확인하였다.

가상화폐 거래소의 인증 및 보안 방식 (The Authentication and Security of Virtual Currency Exchange)

  • 김도관
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2018년도 춘계학술대회
    • /
    • pp.119-121
    • /
    • 2018
  • 가상화폐에 대한 투자가 활발한 가운데 가상화폐 거래소에서의 인증방식과 보안 방식을 점검할 필요성이 제기된다. 이에 본 연구에서는 가상화폐 거래소의 인증과 보안 방식을 점검하고자 한다.

  • PDF

안전한 운영 체제를 위한 보안 요소 설계 (The Design of the Security Elements for Secure Operating System)

  • 윤이중;홍주영;김석우;김대호
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1991년도 학술발표논문집
    • /
    • pp.229-238
    • /
    • 1991
  • 정보 처리가 자동화 됨에 따라 ,종래의 문서 처리에서 적용되었던 보안 개념을 지원하는 안전한 컴퓨터 시스템에 대한 요구가 증가되고 있다. 본 연구에서는 안전한 컴퓨터 시스템을 수학적으로 정의하고 증명한 BLP모델을 고찰하고, 그 각 요소들을 실제 시스템에 적용시 해석 방법과 시스템 요소들과의 대응 관계 및 액세스 제어 메카니즘을 제시하고자 한다.

  • PDF