• Title/Summary/Keyword: Security equipment

Search Result 603, Processing Time 0.023 seconds

Study on Technical trend of physical security and future service (물리보안의 기술동향과 미래 서비스에 대한연구)

  • Shin, Byoung-Kon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.159-166
    • /
    • 2010
  • From public insecurity, access of wealth, alteration of population structure, and changes of security recognition, physical security has been continuously developed and changed. In these days, typical systems for physical security are unmanned security system using telephone network and security equipment, image recognition system using DVR and camera, and access control system by finger print recognition and RFID cards. However, physical security system is broadening its domain towards ICT based convergence with networked camera, biometrics, individual authentication, and LBS services. This paper proposes main technical trends and various security convergences for future physical security services by classifying the security categories into 3 parts; Individual security for personal protection, IT Convergence for large buildings, and Homeland Security for omni-directional security.

Possibility of Information Leakage through Analysis of Chinese Antivirus Software (중국 안티바이러스 제품 분석을 통한 정보유출 가능성 연구)

  • Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1369-1374
    • /
    • 2021
  • Recently, controversy has been raised over the security and safety of Chinese-made network equipment (Huawei 5G), apps (TikTok, etc.). In particular, according to the results of the Ministry of Defense investigation in 2020, malicious codes were found in CCTVs made in China that were delivered as military surveillance equipment used as a coast guard system, and specific information was remotely transmitted to a Chinese server. The safety issues of these Chinese security products can be questioned as being systematically led by the state rather than by companies or individuals. In this paper, we perform network and process level analysis of 360 Total Security(360 TS), a Chinese antivirus software. In addition, it compares and analyzes the domestic cloud-based vaccine V3 Lite product. Through this, the safety of Chinese security solutions is checked and information leakage and risks are suggested.

Utilization of Technical Resources in the Emergency Recovery Process of Flood Damage of Local Governments (지방자치단체의 홍수피해 응급복구 과정에서의 기술자원 활용방안)

  • Heo, Sun Bum;Cho, Won Cheol;Lee, Tae Shik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.7-12
    • /
    • 2012
  • This study analyzed appropriate equipment combination for emergency recovery after flood disasters and proposed an alternative approach for economic and rapid emergency recovery based on the utilization of human resources who have practical experience in construction business and in equipment operation. The current countermeasures and response to flood disaster including emergency procedures and methodologies are investigated and related legal framework was also analyzed. Currently, some emergency recovery works are over payed and delayed due to unclear and inefficient processes on equipment and human resources mobilization during and after flood disasters, particularly in local governments. Best practices in mobilizing equipment and human resources were compiled, theoretical foundation was investigated and analyzed, and improved emergency recovery schemes were proposed for effective flood disaster countermeasures in local government. Prioritization in equipment and human resources mobilization was also proposed considering equipment transportation distance and accessability to disaster sites. This study also proposed improved ways to utilize experts in local areas in supporting community emergency response volunteers for disaster risk management.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

Material Discrimination Using X-Ray and Neutron

  • Jaehyun Lee;Jinhyung Park;Jae Yeon Park;Moonsik Chae;Jungho Mun;Jong Hyun Jung
    • Journal of Radiation Protection and Research
    • /
    • v.48 no.4
    • /
    • pp.167-174
    • /
    • 2023
  • Background: A nondestructive test is commonly used to inspect the surface defects and internal structure of an object without any physical damage. X-rays generated from an electron accelerator or a tube are one of the methods used for nondestructive testing. The high penetration of X-rays through materials with low atomic numbers makes it difficult to discriminate between these materials using X-ray imaging. The interaction characteristics of neutrons with materials can supplement the limitations of X-ray imaging in material discrimination. Materials and Methods: The radiation image acquisition process for air-cargo security inspection equipment using X-rays and neutrons was simulated using a GEometry ANd Tracking (Geant4) simulation toolkit. Radiation images of phantoms composed of 13 materials were obtained, and the R-value, representing the attenuation ratio of neutrons and gamma rays in a material, was calculated from these images. Results and Discussion: The R-values were calculated from the simulated X-ray and neutron images for each phantom and compared with those obtained in the experiments. The R-values obtained from the experiments were higher than those obtained from the simulations. The difference can be due to the following two causes. The first reason is that there are various facilities or equipment in the experimental environment that scatter neutrons, unlike the simulation. The other is the difference in the neutron signal processing. In the simulation, the neutron signal is the sum of the number of neutrons entering the detector. However, in the experiment, the neutron signal was obtained by superimposing the intensities of the neutron signals. Neutron detectors also detect gamma rays, and the neutron signal cannot be clearly distinguished in the process of separating the two types of radiation. Despite these differences, the two results showed similar trends and the viability of using simulation-based radiation images, particularly in the field of security screening. With further research, the simulation-based radiation images can replace ones from experiments and be used in the related fields. Conclusion: The Korea Atomic Energy Research Institute has developed air-cargo security inspection equipment using neutrons and X-rays. Using this equipment, radiation images and R-values for various materials were obtained. The equipment was reconstructed, and the R-values were obtained for 13 materials using the Geant4 simulation toolkit. The R-values calculated by experiment and simulation show similar trends. Therefore, we confirmed the feasibility of using the simulation-based radiation image.

Research on Realtime Mornitoring System for Construction Equipment Price (건설기계가격 상시관리시스템 도입방안에 관한 연구)

  • Ahn, Bang-Ryul;Tae, Yong-Ho
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2014.05a
    • /
    • pp.50-51
    • /
    • 2014
  • Although price of construction equipment affects overall cost of a construction projects, the cycle of updating them presented in the Poom-Saem in Korea is more than six years. Recently there is a demand of using the 'Standard Market Price of Construction Equipment', published by the ministry of Security and Public Administration, for estimating equipment operating and ownership cost. It is urgent to introduce an advanced system for updating the prices which can timely reflect market changes.

  • PDF

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

An Efficient Distributed Parallel Processing Method in Security Constrained Optimal Power Flow (상정사고를 고려하는 최적 조류 계산의 분산 병렬 처리 기법에 관한 연구)

  • Kim, Jin-Ho;Hur, Don;Park, Jong-Keun;Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.997-999
    • /
    • 1998
  • An operationally secure power system is one low probability of blackout or equipment damage. The power system is needed to maintain a designated security level at minimum operating cost. The inclusions of security make power system problem complex. But, because security and optimality are normally conflicting requirement, the separate treatments of both are inappropriate. So, a unified hierarchical formulation is needed. In this paper, the overview of security constrained optimal power flow (SCOPF) is presented and an introduction of parallel distributed formulation to SCOPF is also presented.

  • PDF

Aviation Security Equipments Certification System in Korea: Suggestions for Improvement (항공보안장비 성능인증제의 고도화 방안에 관한 연구)

  • Lee, Wonjoo;Yu, Sangwoo;Park, Soohong;Kim, Kyunghoon;Ha, Dasom;Seoll, Eunsuk;Han, Soojin;Park, Seoha;Lee, Jisu;Kim, Chanhwi;Kang, Jingu;Lee, Kiyoung
    • Journal of Korean Society for Quality Management
    • /
    • v.48 no.3
    • /
    • pp.395-408
    • /
    • 2020
  • Purpose: This study was performed for advancement of aviation security equipments certification system. Methods: We investigated aviation security equipments certification-related registrations and the latest research trends of explosive detection technologies. Based on the literature studies, we draw the critical issues of the aviation security equipment certification system and suggested improvement direction. Results: We found some inaccuracies of the definition of explosive trace detection equipments, accreditation review committee, and performance evaluation test method. These problems should be modified to suit being practical. Conclusion: The present results would be useful for basic data for modifying aviation security equipments certification systems.

A Smart Security Equipment and An application for Sexual Offense Prevent GPS device (스마트 보안장비와 성범죄 예방 GPS 애플리케이션)

  • Kim, Dong-Je;Jo, Sung-Gu
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.27-49
    • /
    • 2012
  • "Do not ask crimes", such as "child sexual abuse" and according to the known through media reports, the people's fear and worry increasingly severe become and the damage increasing day by day and is Still unable to find effective countermeasures that national security policy is a reality. In this study, the result was the development of new security equipment for the purpose of the research team to the solution of the problem of domestic policing these sexual offenses prevention of GPS applications and existing smartphone to suit the era of 20 million development in the online and offline sales and is proposed to complement the problems of the samdanbong multifunction smart samdanbong. First, the function will be applied according to the trend due to the increase of heinous crime, both online and offline sales surge in self-defense products that are being sold on the market, finding problems samdanbong of smart multifunctional smart samdanbong the actual crime and the corresponding effective products were planning to have a secure management system, through a legal review on the current law. Second, sexual offenses, such as Internet use, travel, residential location, and management of sexual offenses Felon Felon's daily life strictly sexual offenses prevention of GPS applications to the characteristics of the sexual offenses scrutinized nearly enough to the frequency of recurrence of 50% is high, look at the case of foreign proposed the streets of sex offenders and the development of applications that can be checked in real-time by considering the basic characteristics to manage.

  • PDF