• Title/Summary/Keyword: Security Navigation

Search Result 373, Processing Time 0.028 seconds

Factors Affecting the Security Ability of Port Logistics Organization Members (항만물류조직구성원들의 보안능력에 영향을 미치는 요인)

  • Kang, Da-Yeon
    • Journal of Navigation and Port Research
    • /
    • v.43 no.3
    • /
    • pp.179-185
    • /
    • 2019
  • Currently, despite having active movements related to port logistics security, there is lack of awareness, education, and security systems related to port technology. Before implementing port logistics security, a mutual authentication agreement should be reached through the establishment of an integrated network that can share port logistics security information in real time. In order to achieve port competitiveness and strengthen logistics service, establishment of national strategy for logistics security is necessary. However, there is an urgent need to raise the security consciousness among the port logistics organization members and enhance the information security ability which is a crucial feature of the port logistics organization. Therefore, the objective of this study is to analyze the factors affecting the information security capacity of port logistics organization members. Even though the analysis rejected the hypothesis that security regulations affect security awareness, the security activities and security awareness were significantly correlated. It also has a positive impact on the relationship between security norms and security abilities, and security awareness and security abilities.

Maritime Cyber Security Status and Establishment of Maritime Cyber Security System (해사 사이버보안 동향 분석 및 해사 사이버보안 시스템 구축)

  • Ahn, Jong-Woo;Lim, Jeoung-Kyu;Park, Kae-Myoung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.29-32
    • /
    • 2019
  • The development of Information and Communication Technology facilitates exchange of information and communication between system in ships or between ships and land facilities, thereby improving the efficiency of their work. However, these changes in the working environment of companies and ships increased the likelihood of cyber security incidents occurance like unauthorized access to company and ship systems or infection of malicious code, which results in significant safety, environmental and business damage to company and ships. Therefore, a cyber-risk-based approach was required to identify and respond to an increasing cyber threats. In this paper, the analysis of maritime cyber security status and guidelines for establishment of maritime cyber security system are provided.

  • PDF

Database of Navigational Environment Parameters (Water Depth, Sediment Type and Marine Managed Areas) to Support Ships in an Emergency

  • Kim, Tae-Ho;Yang, Chan-Su
    • Journal of Navigation and Port Research
    • /
    • v.43 no.5
    • /
    • pp.302-309
    • /
    • 2019
  • This study introduces the navigational environment database(DB) compiling water depth, sediment type and marine managed areas (MMAs) in coastal waters of South Korea. The water depth and sediment data were constructed by combining their sparse points of electronic navigation chart and survey data with high spatial resolution using the inverse distance weighting and natural neighbor interpolation method included in ArcGIS. The MMAs were integrated based on all shapefiles provided by several government agencies using ArcGIS because the areas should be used in an emergency case of ship. To test the validity of the constructed DB, we conducted a test application for grounding and anchoring zones using a ship accident case. The result revealed each area of possible grounding candidates and anchorages is calculated and displayed properly, excluding obstacle places.

The Analysis of KASS Operational Mitigation Methods and Continuity Cases Based on ICAO Standards (ICAO 표준 기반 KASS 운영 상 완화조치 및 연속성 사례 분석)

  • Yun-Jung Choi;Dong-Hwan Bae;Hyo-Jung Yoon;Donghwan Yoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.2
    • /
    • pp.131-136
    • /
    • 2024
  • This paper deal with a method for calculating the continuity of Korea Augmentation Satellite System (KASS), which was completed in Korea in December 2023, and a plan to respond in the event that a continuity hazard situation occurs during operation. For this purpose, the International Civil Aviation Organization (ICAO) Satellite Based Augmentation System (SBAS) continuity standards, Wide Area Augmentation System (WAAS), and European Geostationary Navigation Overlay Service (EGNOS) continuity cases are examined in this paper. According to the measures recommended by the ICAO, when the number of continuity risks exceeds a certain level and the level drops drastically, various mitigation operations by country are implemented. Through this, if KASS does not meet ICAO continuity standards in the future, such measures can be referred to. In addition, this paper computes the short-term KASS continuity during the test broadcast period. Although continuity does not meet the ICAO standards, although this test period is too short, further meaningful analysis in the future is required. Additionally, this paper carried out an analysis of the timing and period to systematically calculate the meaningful value of continuity.

Future of Maritime Safety and Security Administration in Korea

  • Lee, Sang-Jib
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1997.10a
    • /
    • pp.13-33
    • /
    • 1997
  • The Ministry of Maritime affairs and Fisheries embarked on Oct. 8, 1996, incorporating most of the previously fragmented maritime administrations into one single institution. But the maritime administrative functions related to safety and security missions have not yet been merged into a synergetic whole, with versatile multi-functional systems working so effectively that better services to the public might be excepted. Enhancing administrative capabilities to meet future demands with limited resources requires that these missions be integrated into one institution and an enterprising management system be adopted to overcome bureaupathologies, such as complacency and inertness of administration.

  • PDF

Management and Security of User in Linux Server (리눅스 서버의 사용자 관리 및 보안)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.587-594
    • /
    • 2015
  • Open operating system, Linux is the traditional Web, E-mail, DNS, FTP server, as well as being used in Cloud and Big data infrastructure. In addition, Linux is also used like a desktop or mobile devices, smart TV and cars. In particular, stepping up to the IoT era at this time is expected to be greater proportion occupied by Linux. As the use of Linux has increased security has emerged as an important factor. User management is core of Linux system security. In this paper, Classifying Linux user and analyzed the role of the user-specific file. Finally, we analyzed the linux management technologies and useful user security tools.

Group Key Management Mechanism for Secure Device in AMI Environment (AMI 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 메커니즘)

  • Jang, Yu-Jong;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.4
    • /
    • pp.679-686
    • /
    • 2012
  • Many researches have proposed key management schemes for Smartgrid System. However, previous studies lack the proper considerations for availability and device security. In this paper, we build up cryptographic security improvement for robust Smartgrid Systems. In addition, we propose a public-key management and hash function architecture for robust Smartgrid Systems which supports reduces the number of key and Secure Device in AMI network environments.

Requirements analysis of high-speed recording and playback capabilities in the vessel traffic control system (해상교통관제시스템에서 고속 배속을 지원하기 위한 녹화재생 기능 요구사항 분석)

  • Oh, Seung-Hee;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.10a
    • /
    • pp.125-127
    • /
    • 2013
  • 해상교통관제시스템(Vessel Traffic System: VTS)에서는 해상 사건/사고를 사후 확인하거나 해상 교통량 확인을 위해 사용하기 위한 목적으로 VTS에서 발생하는 데이터를 저장 및 관리한다. 특정 지역에 대한 장시간 교통량 확인에서는 녹화된 재생 데이터를 고속 배속으로 실행시켜 살펴보는 것이 시간 단축에 큰 도움이 된다. 그런데 일반 영상이 아닌 VTS 서브 시스템간 주고 받은 메시지와 영상이 포함된 VTS 녹화재생에서는 고속 배속을 지원하는데 자연스럽지 않은 문제점이 발생하고 있다. 따라서 본 논문에서는 VTS 녹화재생 기능이 고속 배속을 지원하기 위해 필요한 요구사항을 분석한다.

  • PDF

A Study on The Managing Practices in SLM for Multimedia System (멀티미디어 시스템 정보보호수준관리를 위한 관리형 프랙티스에 관한 연구)

  • Kim, Tai-Hoon;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.673-680
    • /
    • 2008
  • Multimedia system security can be categorized into groups such as protection of multimedia asset itself and protection of multimedia systems which can process multimedia asset. Divided consideration for these two factors will not hurt the importance of security management. In this paper, managing practices for keeping security level of multimedia systems are induced and categorized.

  • PDF

A Study on System Development for Ship's Integrated Safety and Security

  • Yoon, Daeg-Wun;Kim, Cheol-Seung
    • Journal of Navigation and Port Research
    • /
    • v.35 no.2
    • /
    • pp.131-136
    • /
    • 2011
  • As the faithful performance of ISPS of IMO, nowadays actually applicable an integrated safety and security system in and out of vessel should be organized in views of seafarers. Therefore, this paper is aimed to design a fundamental system for ship's integrated safety and security. The system of integrated grabbing will affect efficiently in any maritime field of material and human flow. Therefore this research will be expected to affect economical side by securing all the risk of maritime issues. In addition to the passenger ship and merchant vessel, it is applicable to other public and private vessels either. As a result of this paper, the system designed collecting various data through integrating the system including RFID reader, PIR sensor, and CMOS camera by putting an individual number into each unit that could be control at easy.