• 제목/요약/키워드: Security Inspection

Search Result 223, Processing Time 0.033 seconds

Development of Test Software Program for Detection Array Module Signal Processing System (Array 검출모듈 신호처리 System의 Test Software Program 개발)

  • Park, Ge-O;Sung, So-Young;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.379-382
    • /
    • 2017
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. In addition, it is necessary to localize the Array Detection System, which is a core component of the container search machine, to cope with the 100% pre-inspection of the container scheduled for 2018 in the United States. In this paper, we propose a test software program developed by using TI-RTOS (Texas Instruments - Real Time Operating System) with a test digital signal processing board which is developed self development.

  • PDF

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.

A Study on the Surface Damage Detection Method of the Main Tower of a Special Bridge Using Drones and A.I. (드론과 A.I.를 이용한 특수교 주탑부 표면 손상 탐지 방법 연구)

  • Sungjin Lee;Bongchul Joo;Jungho Kim;Taehee Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.129-136
    • /
    • 2023
  • A special offshore bridge with a high pylon has special structural features.Special offshore bridges have inspection blind spots that are difficult to visually inspect. To solve this problem, safety inspection methods using drones are being studied. In this study, image data of the pylon of a special offshore bridge was acquired using a drone. In addition, an artificial intelligence algorithm was developed to detect damage to the pylon surface. The AI algorithm utilized a deep learning network with different structures. The algorithm applied the stacking ensemble learning method to build a model that formed the ensemble and collect the results.

An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification (실증검증을 통한 N/A 점검항목이 보안 수준 결과에 미치는 영향에 관한 연구)

  • Lee, Jun Ho;Sung, Kyung Sang;Oh, Hea Seok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.271-276
    • /
    • 2014
  • This study analyzed that N/A check items affect the results of the security level degree, when performing vulnerability analysis evaluation. For this, we were used vulnerability analysis evaluation range, check items and quantitative calculation method. Furthermore, were applied grade and weight for the importance of the items. In addition, because technology develop rapidly, the institution is always exposed risk. therefore, this study was carried out empirical analysis by applying RAL(Risk Acceptabel Level). According to the analyzed result N/A check items factors affecting the level of security has been proven. In other words, this study found that we shall exclude inspection items irrelevant to the institution characteristics, when perform vulnerability analysis evaluation. In this study suggested that security level evaluation shall performed, after that exclude items irrelevant to the institution characteristics based on empirical verification. And also, it proposed that model research is required for establish check items for which analysis-evaluate vulnerability based on empirical verification.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

The Improvement Method of "Question and Research Guides" Training for Private Security (민간경비원의 질문.검색 요령 교육훈련에 관한 개선방안)

  • Kim, Chang-Ho;Oh, Jae-Hwan
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.43-66
    • /
    • 2009
  • For the quality improvement on private security industry, the quality of personnel in private security should be advanced through the systematic training. If the personnel in private security provide an advanced service in applying knowledge and technique to the field when in training, they can obtain the reliability from people. With the point of this side, practical and systematic training is essential to the restoration on the private security industry. The personnel of private security face many people in the field. So they must work with an active concept that can prevent additional crime from behavior suspicions through scientific observation method and systematic inquiry method rather than negative work with providing a friendly service in the field. For conducting this concept, therefore, this study suggested the improvement training program of "Question and Research Guides" from new employee training on existing private security. The scientific observation standard is specifically suggested from the study 'people watching' of Professor Morris, D. and an act contact question from lead technique that US FBI, police, and inspection institute are taking through the feature of human act and 'METT' that is the program for emotion capture training through human minute look is going to be applied on "Question and Research Guides" training. This will provide the educational mood for students with the training content that is available for the practical training program and the real work, and will help to restore the private security industry with obtaining people's reliability through the scientific work and advanced field treatment.

  • PDF

Spalling Reduction Methods of Ultra High-Strength Reinforced Concrete Columns (초고강도 콘크리트 기둥의 폭렬저감방안에 관한 실험적 연구)

  • Shin, Sung-Woo;Yoo, Suk-Hyeong;Kim, In-Ki
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.10 no.5
    • /
    • pp.171-178
    • /
    • 2006
  • It was presented that the spalling of high strength concrete exposed to high temperature could be reduced by using polypropylene fiber. However, as the concrete strength increase, the demanded quantity of PP fiber increase and this results in the loss of workability of ultra high strength concrete. The silica fume which is essentially mixed in ultra high strength concrete decrease the permeability of concrete, and this will increase the degree of spalling. In this study the effect of silica fume on the spalling of ultra high strength concrete and the fire resisting efficiency of PP fiber and poly vinyl alchol, instead of PP fiber, for the security of workability were experimentally examined.

Mobile NDT Inspection System Using Ultrasonic (초음파를 이용한 모바일 비파괴 검사 시스템)

  • Kwon, Seong-Geun;Lee, Suk-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.105-111
    • /
    • 2016
  • In order to inspect the quality of spot welding, inefficient destructive test and NDT (non destructive testing) utilizing expensive foreign ultrasonic inspection are being conducted in the automobile production lines, but NDT will be difficult to be used in the domestic automobile production due to complexity of the waveform analysis and lack of mobility. In this paper, NDT system inspecting the quality of spot welding based on mobile network is proposed to complement drawbacks of the conventional inefficient destructive testing and NDT inspecting the quality of spot welding. Regardless of daily condition of NDT tester, the proposed NDT system can determine the quality of spot welding automatically and transmit the information of NDT quality to smart devices of field workers in real-time so that convenience of NDT and productivity of automobile production will be improved. Several specimens with a variety of welding quality was produced to evaluate the performance of the proposed mobile ultrasonic NDT system and the conventional foreign equipment, through this experiments, the proposed mobile ultrasonic NDT system indicate the superior properties compared to the conventional equipment in terms of convenience, productivity, and economic.

A Study on the Safety and Improvement of Small Theatres in Korea (소규모 공연장 안전실태 및 개선방안에 대한 연구)

  • Park, Yong Gyu;Kim, Dong Kyun;Park, Jin Kyu;Kim, Kyung Hoon
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.6
    • /
    • pp.22-27
    • /
    • 2014
  • The market of performance arts industry such as concert, musical and opera etc is now expanding in Korea. However, the inadequate safety management in theatres often causes some accidents. The guarantee of safety in theatres is very important since the accidents in theaters can lead to many casualties and serious property damages. In particular, the small theatres which have no obligation of safety inspection by law are very vulnerable to safety mattes. This study has done the research into the improvement of safety in small theaters through the inspection and analysis of their safety status. For the purpose, this study has inspected and analyzed the safety status of small theaters over 120 in the field of theater management and operation, fire protection, electrical facilities, ceiling structure and etc. Moreover, this study had investigated the law and technical standards related to theatre safety. This study shows that the essentials to make sure of the safety in small theaters are (1) the education to improve the sense of security of people who work in theaters (2) the training to strengthen the operating skills of the facilities in theaters (3) the cooperation and support of the related organization such as technical research center, central and local government.

e-Passport Integrated Authentication Mechanisms with Improved Efficiency (효율성이 강화된 전자여권 통합 인증 메커니즘)

  • Lee, Dong-Bum;Go, Woong;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.53-63
    • /
    • 2009
  • e-Passport system is new type of emigration and immigration control system and it is a research to introduce the e-Passport Authentication Protocol with Improved Efficiency is lively proceeded over the entire world. The e-Passport's chip has a biometric information and personal identification information, Radio Frequency Identification(RFID) technology is used for communication with the Inspection System(IS). However, the feature of the RFID system may bring about various security threats such as eavesdropping, data forgeries, data alternation, cloning, biometric data-leakage. Therefore, in this paper, we analyse the e-Passport system's authentication protocol to protect vulnerability and proposed e-Passport system's authentication protocol reduce computation. Also, we compared their efficiency.

  • PDF