• Title/Summary/Keyword: Security accident

Search Result 367, Processing Time 0.028 seconds

Research on Utilizing Method of CCTV System for Crime Prevention and Safety Accident Reduction (범죄예방 및 안전사고 감소를 위한 CCTV시스템의 활용방안에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • Recently, people in cities of developed countries are exposed to unfortified damages of crime and disaster due to urbanization, industrialization and information-oriented era caused by congestion of population in terms of hardware and various social pathology phenomena and frequent and large scale of disaster caused by crime and disorder, which occur in the course of going through nuclear family, a gap between rich and poor and aging society in terms of software. In this regard, demand for security upon individual life and property has been increased but the police that are responsible for the public security does not effectively reduce damage in life and property because their activities are mainly oriented in coping with security accidents more than prevention. Shortage of manpower and budget, retarded equipment, and heavy overwork are the reasons. In order to confront with this kind of situation, we should utilize CCTV system with the purpose of declining possible chances of crime, not for eliminating cause of crime as crime prevention activities to predict danger in advance as a way of prevention and we may expect a role of damage prevention by installing CCTV in places where security accident may possibly happen. In conclusion, there are invasion of privacy, misuse of the system, insufficiency of overall monitoring office management, lack of citizens' understanding and economical allotment of the system installation costs in installation of CCTV system. However. it is necessary to install the CCTV system for effective prevention of crime and prevention activities of security accidents and accurate PR of purposes of installing CCTV to local residents, establishing relevant laws about system misuse, allotment of equipment costs and fees by R&D of the system machinery, cost reduction method of storage, management and replacement, saving costs from co-operative attitude of government, and local autonomous entities and local residents should be involved.

  • PDF

A Study on the Profiling System in the Aviation Security (항공보안에서의 프로파일링 연구)

  • Hwang, Ho-Won;Lee, Kyu-Hang
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.155-175
    • /
    • 2007
  • As intellectual terror threats increase, we feel the limit in coping with those threats and the things we do are placing traditional X-ray machines & ETD and increasing aviation security staffs. In fact, even if air transportation system is the fast and most efficient transportation methods, it is true that there are many inconveniences to endure due to terror threats. In the name of security, even if we make a lot of efforts and time to screen both good-natured passengers, baggage, cargo and suspicious passengers, it is impossible to screen perfectly and it is not an efficient methods. Therefore, we introduce profiling system that reduce the effort to screen good-natured passengers but focus on screening dangerous passengers and baggages. Profiling system strengthens aviation security, using the concept "Selection & Concentration". Israel started to introduce manual profiling system in aviation security, which is interviewing suspicious passengers and it has been used in crime investigation since 1960. And it has been upgraded and diversified to CAPPS(Computer Assisted Passenger Screening Program) and SPOT(Screening Passenger by Observation). So, this theses is to study on the concept & kind of profiling and profiling methods adopted in airlines. Also it presents the method of introduction of profiling system in Korea and the necessity of making law on it.

  • PDF

Real-time Integrity for Vehicle Black Box System (차량용 블랙박스 시스템을 위한 실시간 무결성 보장기법)

  • Kim, Yun-Gyu;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.49-61
    • /
    • 2009
  • Recently, a great attention has been paid to a vehicle black box device in the auto markets since it provides an accident re-construction based on the data which contains audio, video, and some meaningful driving informations. It is expected that the device will get to promote around commercial vehicles and the market will greatly grow within a few years. Drivers who equips the device in their car believes that it can find the origin of an accident and help an objective judge. Unfortunately, the current one does not provide the integrity of the data stored in the device. That is the data can be forged or modified by outsider or insider adversary because it is just designed to keep the latest data produced by itself. This fact cause a great concern in car insurance and law enforcement, since the unprotected data cannot be trusted. To resolve the problem, in this paper, we propose a novel real-time integrity protection scheme for vehicle black box device. We also present the evaluation results by simulation using our software implementation.

Forensic study of autonomous vehicle using blockchain (블록체인을 이용한 자율주행 차량의 포렌식 연구)

  • Jang-Mook, Kang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.209-214
    • /
    • 2023
  • In the future, as autonomous vehicles become popular at home and abroad, the frequency of accidents involving autonomous vehicles is also expected to increase. In particular, when a fully autonomous vehicle is operated, various criminal/civil problems such as sexual violence, assault, and fraud between passengers may occur as well as the vehicle accident itself. In this case, forensics for accidents involving autonomous vehicles and accidents involving passengers in the vehicles are also about to change. This paper reviewed the types of security threats of autonomous vehicles, methods for maintaining the integrity of evidence data using blockchain technology, and research on digital forensics. Through this, it was possible to describe threats that would occur in autonomous vehicles using blockchain technology and forensic techniques for each type of accident in a scenario-type manner. Through this study, a block that helps forensics of self-driving vehicles before and after accidents by investigating forensic security technology of domestic and foreign websites to respond to vulnerabilities and attacks of autonomous vehicles, and research on block chain security of research institutes and information security companies. A chain method was proposed.

Design and Implementation of the Intrusion Detection Data Web-based Management System on Heterogeneous Environments (이기종간 침입탐지 정보에 대한 웹기반 관리 시스템 설계)

  • Kim, Eun-Soo;Kim, Seok-Hun;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.65-74
    • /
    • 2005
  • The hacking accident is increasing repidly according to development of latest computer network and the method becomes various. But, to correspond to hacking, it is lot of difficulties to cope gear and security element between product because most radiant mercuries apply technology between individual digenomic species and It is real condition that great setup, equipment, manpower disturbance are enlarged to apply this. Designed and embody Site-Based executive system that can integrate security element about IDS information between digenomic species to solve these problem and correspond efficiently from hacking.

  • PDF

Analysis of the Application Method of Cyber Security Control to Develop Regulatory Requirement for Digital Assets in NPP (원전디지털자산 사이버보안 규제 요건 개발을 위한 보안조치 적용 방안에 대한 분석)

  • Kim, In-kyung;Byun, Ye-eun;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1077-1088
    • /
    • 2019
  • As the cyber threats of nuclear power plants become more necessary to systematically prepare against the cyber attack, the international community and the domestic government are urged to apply proper security controls for Critical Digital Assets (CDA) through cyber security regulatory guidelines. In this study, we suggests the application of security controls to develop the regulatory requirements of the graded approach through the analysis of domestic and foreign cyber security regulation guidelines and best practices for digital assets directly related to nuclear accidents. In order to apply the regulatory requirements based on the consequence(impact of infringement) of the regulated facility, which is a basic consideration of the graded approach, we will classify two methods and describe details of each method. By reanalyzing existing security controls, it is introduced that the method of demanding digital assets directly related to accident to enhance security controls required for existing CDA or develop additional security controls and requiring minimum security controls for CDA that are not directly related to accident.

A Study of Emergency Plan Making Programs for Personnel Handling Accident Precaution Chemicals (사고대비물질 취급자를 위한 비상대응계획 작성 프로그램 연구)

  • Kim, Sung Bum;Cho, Mun Sik;Park, Choon Hwa;Yoon, Yi;Hwang, Kyung Sup;Yang, Sang Yong
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.2
    • /
    • pp.27-32
    • /
    • 2010
  • Emergency preparedness plan (EPP) is the systematic management of activities that involve a material degree of risk of loss or other damage to the surroundings (people, property and environment), and the boundary of accident recovery plan (ARP). The main purpose of the program is to provide a safety management system to each facility in order to enable to prevent accident and to control accident immediately. The EPP includes not only typical safety-related documentations such as material safety data sheet (MSDS), standard operation procedure (SOP), emergency response plan(ERP). EPP is established basis of the preliminary safety analysis involving risk identification, assessment and prevention plans. The program is also helpful for government or related agencies to control a number of accidents in small-scale companies in the whole country.

  • PDF

A Study on the Improvement Measures of Drowning Accident in South Korea (물놀이 안전사고 개선방안에 관한 연구)

  • Kim, Jung-Gon;Lim, Hojung;Kim, Tae-Hwan;Lee, Dae-Sung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.153-164
    • /
    • 2019
  • Purpose: This paper aims to derive improvement measures, in terms of legal and technical aspects, which can reduce effectively the casualties caused by drowing accidents. Method: Firstly, we checked the status of drowing accident management and carried out the interview of field private safety guards. field private safety guards. In addition, surveys were conducted on safety personnel and managers. Based on survey results, we are lastly analyzed the specific problems and reviews the improvement measures from technical and legal aspects. Result: As an analytical result, it was considered that supplementary supporting tools such as CCTV, monitoring devices using IoT and artificial intelligence technologies were necessary to prevent drowning accident, and qualification with limited authority should be added to the private safety guard because of the lack of regulation. Conclusion: In order to manage water safety effectively, a comprehensive water safety management system should be established that integrates people and equipment through systemic education of security personnel, authorization of enforcement, and introduction of surveillance equipment.

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

A Study on Accident Prediction Models for Chemical Accidents Using the Logistic Regression Analysis Model (로지스틱회귀분석 모델을 활용한 화학사고 사상사고 예측모형 개발 연구)

  • Lee, Tae-Hyung;Park, Choon-Hwa;Park, Hyo-Hyeon;Kwak, Dae-Hoon
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.72-79
    • /
    • 2019
  • Through this study, we developed a model for predicting chemical accidents lead to casualties. The model was derived from the logistic regression analysis model and applied to the variables affecting the accident. The accident data used in the model was analyzed by studying the statistics of past chemical accidents, and applying independent variables that were statistically significant through data analysis, such as the type of accident, cause, place of occurrence, status of casualties, and type of chemical accident that caused the casualties. A significance of p < 0.05 was applied. The model developed in this study is meaningful for the prevention of casualties caused by chemical accidents and the establishment of safety systems in the workplace. The analysis using the model found that the most influential factor in the occurrence of casualty in accidents was chemical explosions. Therefore, there is an urgent need to prepare countermeasures to prevent chemical accidents, specifically explosions, from occurring in the workplace.