• Title/Summary/Keyword: Security and Safety

Search Result 2,149, Processing Time 0.03 seconds

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

Innovation and Improvement of National Emergency Management System in Korea - Focused on All-Hazard Approach - (국가 재난관리 체계의 혁신과 발전방향: 모든 위험 접근법을 중심으로)

  • Kang, Uk;Park, Jun-Seok;Jo, Jun-Teak
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.7-35
    • /
    • 2015
  • The Ministry of Public Safety and Security was established in order to handle all sorts of disasters because of Sewol ferry tragedy and the fundamental reform on the emergency management system will be performed. The establishment of the Ministry of Public Safety and Security is considered as the landmark for the emergency management when it is compared to those in the United States and Japan in terms of the size and the authority. However, there are many tasks to be done for the settlement of the Ministry of Public Safety and Security. More specifically, a real and substantial plan should be prepared because the organization was established without blueprints or detailed implementation plan. This study suggests that all-hazard approach which is the one of the disaster management principles should be applied when the substantial plan is prepared. All possible hazard should be analyzed, assessed, and prioritized. In addition, Based on the results, the effective policies should be established with the consideration of Korean context.

  • PDF

Implications of Multi-swarm Events Safety Management of Foreign Police (외국경찰의 대규모 행사 안전관리로 본 시사점)

  • Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.462-469
    • /
    • 2016
  • This study researched police intervention to ensure the safety of Multi-swarm events. And this study researched best practices of foreign countries. This study propose a solution. It used the situation to police intervention and domestic Multi-swarm events leading research and safety management systems. Safety management for multi-swarm events did ministry of public safety and security, local government, police department, fire department etc. Activities of Safety management for multi-swarm events was checked the risk level, safety management, safety planning and training, safety management in accordance with the Manual. But, safety management of police had Manual maintenance is necessary for the police forces and take advantage of, it is necessary to clarify the mission, it is necessary to configure the risk of a step-by-step checklist for police safety tips in detail. This study for solve the problem proposed the United States, United Kingdom, Germany, France, Australia, the case of the Japanese.

The impact of security and privacy risk on smart car safety and trust (보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향)

  • Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.9-19
    • /
    • 2023
  • Smart cars, which incorporate information and communication technologies (ICT) to improve driving safety and convenience for drivers, have recently emerged. However, the increasing risk of automotive cybersecurity due to the vulnerability of electronic control units (ECUs) and automotive networks, which are essential for realizing the autonomous driving functions of smart cars, is a major obstacle to the widespread adoption of smart cars. Although there have been only a few real-world cases of smart car hacking, drivers' concerns about the security of smart cars can have a negative impact on their proliferation. Therefore, it is important to understand the risk factors perceived by drivers and the trust in smart cars formed through them in order to promote the future diffusion of smart cars. This study examines the risk factors that affect the formation of trust in smart cars, focusing on security and privacy, and analyzes how these factors affect safety perceptions and trust in smart cars.

Design of protocol for RFID/USN security (RFID/USN 보안을 위한 프로토콜 설계)

  • Park, Sang-Hyun;Park, Sang-Min;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.

Development of the framework for quantitative cyber risk assessment in nuclear facilities

  • Kwang-Seop Son;Jae-Gu Song;Jung-Woon Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2034-2046
    • /
    • 2023
  • Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quantitatively assess cyber risks. However, this can be challenging due to limited historical data on threats and customized Critical Digital Assets (CDAs) in nuclear facilities. Previous works have focused on identifying data flows, the assets where the data is stored and processed, which means that the methods are heavily biased towards information security concerns. Additionally, in nuclear facilities, cyber threats need to be analyzed from a safety perspective. In this study, we use the system theoretic process analysis to identify system-level threat scenarios that could violate safety constraints. Instead of quantifying the likelihood of exploiting vulnerabilities, we quantify Security Control Measures (SCMs) against the identified threat scenarios. We classify the system and CDAs into four consequence-based classes, as presented in NEI 13-10, to analyze the adversary impact on CDAs. This allows for the ranking of identified threat scenarios according to the quantified SCMs. The proposed framework enables stakeholders to more effectively and accurately rank cyber risks, as well as establish security and response strategies.

A Study on the Curriculum of Department Security Secretarial Programs in Korea University (국내 대학 경호비서학과의 교육과정 특성에 관한 연구 - 4년제 대학을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.1-21
    • /
    • 2007
  • This study aims to analysis and measure on the curriculum of security programs in Korean university as the private security system. Civil security demand social safety life by the police protection and private security system. The private security or the civil guards shows rapid growth by the social development and improve the quality of life. But the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. Then the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyze current situation of civil body and security guard training industry and to seek an educational model. For that, we examine in 'Do the professional training organizations meet social demand for the body and security guards'? And, 'What kind of training has to be provide for the body and security guards'? and 'What the qualifications of the trainers'? Then, 'What are the differences in training courses between private organizations and universities'? 'Is there differences in the job placement among the trainers of private organizations and universities'? etc.. Conclusion, the social demand common curriculum for the body and security guard will be drawn from the analysis of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. Then we have to a standard curriculum for the successful training education system to provide social security.

  • PDF

Effects of Local Governments Social Security Network on Safety life satisfaction - Mediating effect of regional disorder - (CPTED와 지자체 안전교육이 지역 무질서 및 안전생활 만족도에 미치는 영향: 지역 무질서의 매개효과)

  • Kang, hyeon;Kim, hyun-ho
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.77-99
    • /
    • 2018
  • This study is designed to examine the relationship between the social safety net and the 'satisfaction level of safety life' conducted by local governments and to examine the effects of anarchy on the indicators. To do this, 300 people were sampled using the random sample method in the metropolitan area using the population of residents in the metropolitan area in 2017, and a total of 276 copies were extracted except 24 copies in the final analysis. Regression analysis and path analysis were conducted through structural equation modeling. Bootstrapping was performed to investigate the significance of the mediator effect. In summary, 'CPTED' has a positive effect on 'disorder' and 'safety life satisfaction', but 'municipal safety education' has a positive effect on 'safety life satisfaction' Respectively. 'Local disorder' has a negative effect on 'safety life satisfaction'. As a result of path analysis, the same effect was found. In order to examine mediating effect, bootstrapping showed that regional disorder was mediated only in 'CPTED' and 'safety life'. This result suggests that there is a need for change in the safety education of the community and it supports the precedent study that it is an effective means of safety net for the safety life of the CPTED community in the community. It is one of the nation's most important policies to prepare measures for the safety of the people. The local governments should also ensure the safety of local residents. In this study, the relationship between the local safety net and the disorder and safety life satisfaction was investigated.

Explosive loading of multi storey RC buildings: Dynamic response and progressive collapse

  • Weerheijm, J.;Mediavilla, J.;van Doormaal, J.C.A.M.
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.193-212
    • /
    • 2009
  • The resilience of a city confronted with a terrorist bomb attack is the background of the paper. The resilience strongly depends on vital infrastructure and the physical protection of people. The protection buildings provide in case of an external explosion is one of the important elements in safety assessment. Besides the aspect of protection, buildings facilitate and enable many functions, e.g., offices, data storage, -handling and -transfer, energy supply, banks, shopping malls etc. When a building is damaged, the loss of functions is directly related to the location, amount of damage and the damage level. At TNO Defence, Security and Safety methods are developed to quantify the resilience of city infrastructure systems (Weerheijm et al. 2007b). In this framework, the dynamic response, damage levels and residual bearing capacity of multi-storey RC buildings is studied. The current paper addresses the aspects of dynamic response and progressive collapse, as well as the proposed method to relate the structural damage to a volume-damage parameter, which can be linked to the loss of functionality. After a general introduction to the research programme and progressive collapse, the study of the dynamic response and damage due to blast loading for a single RC element is described. Shock tube experiments on plates are used as a reference to study the possibilities of engineering methods and an explicit finite element code to quantify the response and residual bearing capacity. Next the dynamic response and progressive collapse of a multi storey RC building is studied numerically, using a number of models. Conclusions are drawn on the ability to predict initial blast damage and progressive collapse. Finally the link between the structural damage of a building and its loss of functionality is described, which is essential input for the envisaged method to quantify the resilience of city infrastructure.