• Title/Summary/Keyword: Security Industrial

Search Result 1,729, Processing Time 0.029 seconds

The Development of PC based Panel Working Security System using Industrial Ethernet (산업용 Ethernet을 이용한 PC기반 패널작업 보안시스템 구축)

  • Song, Myung-Hyun;Park, Kyu-Nam;Han, Dong-Gi;Woo, Hyeok-Jae;Youm, Gyu-Il
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.56 no.2
    • /
    • pp.99-103
    • /
    • 2007
  • In this paper, one type of a security system for panel working is suggested. The industrial Ethernet is used for open-close door control of the working panel and for monitoring the working panel is correct or not. Especially to upgrade the security system, a remote approval function of panel working by using the given approval number, a remote monitoring function for checking the approved panel is currently working or not, and an alarming function for keying the unapproved number or opening the disapproved panel, are added for preventing and reducing the intentional working error. Also the worker and working time are stored in PC automatically in exel file for detecting the working error. To show the possibility of suggested security system. two-working panel system is prepared and studied.

A Study on the Key Distribution Protocol for Secure P2P information Security Service (안전한 P2P 정보보호 서비스를 위한 키 분배 프로토콜에 관한 연구)

  • Lee, Jun Seok
    • Journal of Industrial Convergence
    • /
    • v.6 no.1
    • /
    • pp.57-72
    • /
    • 2008
  • In this study, general outline of P2P(peer to peer) application was analyzed dealing with security attacks and threats on the P2P environment. Information security service was studied to provide secure P2P service under the information threats. This study proposes two methods to provide secure information security service. One is a method to use personal firewall software on the peer. The other is a method to use key distribution protocol for confidentiality and integrity.

  • PDF

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

Development of Human Resources at universities for training of specialist in security industries - based on Departments related Security services - (경호·경비분야 전문인력양성을 위한 대학 인적자원개발 - 경호관련학과를 중심으로 -)

  • Kwon, Tae-Il
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.19-38
    • /
    • 2006
  • With rapid social change, security industries were diversified and universities related total security service were founded for training of specialist with a theory and practical affairs. Today, universities must provide an education which fits to job characteristics in rapidly changing society. Also students through this education must find their job properly. The purposes of this study, therefore, are to search a career selection of students majoring in total security service related departments and to study a role of universities for development of specialist related security industries. Revitalization plan of human resources for departments related security services are as follows ; roles of universities: a specialization of curriculum and a diversification of training method. 'academic-industrial cooperation', role of government: 'a legal and institutional policy on academic-industrial cooperation';. Universities, cooperations, government must cooperate mutually for development of specialist related security service field.

  • PDF

Traffic Analysis Architecture for Secure Industrial Control System (안전한 제어시스템 환경을 위한 트래픽 분석망 설계)

  • Lee, Eun-Ji;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1223-1234
    • /
    • 2016
  • The Industrial control system is adopted by various industry field and national infrastructure, therefore if it received cyber attack, the serious security problems can be occured in the public sector. For this reason, security requirements of the industrial control system have been proposed, in accordance with the security guidelines of the electronic control system, and it is operated by separate from the external and the internal network. Nevertheless, cyber attack by malware (such as Stuxnet) targeting to control system have been occurred continuously, and also the real-time detection of untrusted traffic is very difficult because there are some difficulty of keeping up with quickly evolving the advent of new-variant malicious codes. In this paper, we propose the traffic analysis architecture for providing secure industrial control system based on the analyzed the security threats, the security requirements, and our proposed architecture.

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

Security Architecture and Model in Aeronautical Communication Network (항공통신 네트워크에서 보안구조 및 모델)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.1
    • /
    • pp.122-127
    • /
    • 2009
  • In this paper, it is reviewed security architecture and proposed security model about secure aeronautical system, which is considering in the cynical research topics out of aeronautical traffic system. The reviewed contents is treated about security model fur domestic aeronautical system with international security technology trends in the basis of security technology related aeronautical services. In the security framework of aeronautical communication network, it is analyzed data link security technology between air and ground communication, and security architecture in according to aeronautical system, and presented security architecture of U information HUB model. The security architecture of U-information HUB includes the internetworking scope of airline, airport network, airplane network, and related government agency, etc.

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

A Study on the Strengthening of Smart Factory Security in OT (Operational Technology) Environment (OT(Operational Technology) 환경에서 스마트팩토리 보안 강화 방안에 관한 연구)

  • Young Ho Kim;Kwang-Kyu Seo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.123-128
    • /
    • 2024
  • Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.

  • PDF