• Title/Summary/Keyword: Security limits

Search Result 162, Processing Time 0.027 seconds

Evaluation for Incheon International Airport security: passenger satisfaction and significance, using IPA method (IPA기법을 활용한 인천국제공항 이용객의 항공보안서비스 만족도와 중요도 평가)

  • Byeon, A-Reum;Choi, Jin-Young;Choi, Youn-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.2
    • /
    • pp.77-82
    • /
    • 2017
  • Currently the international flight passenger visit at Incheon International Airport increased 12.4% compared to January 2017. Such increase affects on the congestion of an airport and the security check is one of the most congested area. There is a prejudice that airport security is not related to the airport service and is only a type of control that limits the quality of service. However, considering the huge impact that airport security agents have on passenger move within the airport, trustworthy, fast and kind service at airport security check is one of the most important part of airport service quality improvement. This research is an importance performance analysis of Incheon International Airport security service passenger satisfaction and its significance using IPA method. This research will contribute to the improvement of airport operation and service quality, by proving the relation between airport security and service.

Collaborative security response by interworking between multiple security solutions (보안 솔루션의 상호 연동을 통한 실시간 협력 대응 방안 연구)

  • Kim, JiHoon;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.69-79
    • /
    • 2013
  • Recently, many enterprises are suffering from advanced types of malware and their variants including intelligent malware that can evade the current security systems. This addresses the fact that current security systems have limits on protecting advanced and intelligent security threats. To enhance the overall level of security, first of all, it needs to increase detection ratio of each security solution within a security system. In addition, it is also necessary to implement internetworking between multiple security solutions to increase detection ratio and response speed. In this paper, we suggest a collaborative security response method to overcome the limitations of the previous Internet service security solutions. The proposed method can show an enhanced result to respond to intelligent security threats.

UPFC Device: Optimal Location and Parameter Setting to Reduce Losses in Electric-Power Systems Using a Genetic-algorithm Method

  • Mezaache, Mohamed;Chikhi, Khaled;Fetha, Cherif
    • Transactions on Electrical and Electronic Materials
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2016
  • Ensuring the secure operation of power systems has become an important and critical matter during the present time, along with the development of large, complex and load-increasing systems. Security constraints such as the thermal limits of transmission lines and bus-voltage limits must be satisfied under all of a system’s operational conditions. An alternative solution to improve the security of a power system is the employment of Flexible Alternating-Current Transmission Systems (FACTS). FACTS devices can reduce the flows of heavily loaded lines, maintain the bus voltages at desired levels, and improve the stability of a power network. The Unified Power Flow Controller (UPFC) is a versatile FACTS device that can independently or simultaneously control the active power, the reactive power and the bus voltage; however, to achieve such functionality, it is very important to determine the optimal location of the UPFC device, with the appropriate parameter setting, in the power system. In this paper, a genetic algorithm (GA) method is applied to determine the optimal location of the UPFC device in a network for the enhancement of the power-system loadability and the minimization of the active power loss in the transmission line. To verify our approach, simulations were performed on the IEEE 14 Bus, 30 Bus, and 57 Bus test systems. The proposed work was implemented in the MATLAB platform.

A Study on Intrusion Alert Redustion Method for IDS Management (침입탐지 시스템 관리를 위한 침입경보 축약기법 적용에 관한 연구)

  • Kim, Seok-Hun;Jeong, Jin-Young;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.1-6
    • /
    • 2005
  • Today the malicious approach and information threat against a network system increase and, the demage about this spread to persnal user from company. The product which provides only unit security function like an infiltration detection system and an infiltration interception system reached the limits about the composition infiltration which is being turn out dispersion anger and intelligence anger Necessity of integrated security civil official is raising its head using various security product about infiltration detection, confrontation and reverse tracking of hacker. Because of the quantity to be many analysis of the event which is transmitted from the various security product and infiltration alarm, analysis is difficult. So server is becoming the charge of their side. Consequently the dissertation will research the method to axis infiltration alarm data to solve like this problem.

  • PDF

Theoretical Background and Critical Discussion about Securitzation Trend of Cyber Threat (사이버 위협의 안보화 동향에 대한 이론적 배경과 비판적 논의)

  • Lee, Kwangho;Lee, Swengkyu;Kim, Hokil
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.99-105
    • /
    • 2019
  • In this study present the theoretical background and major trends in which cyber threats are securitization through the discourse process. In particular, this study explained based on the theory of Copenhagen school, which is critical of the security of cyber threats. And presented the security of non-traditional threats and the security of emerging security issues, which explained the process of security for cyber threats, based on existing research, and explained the limitations to this. And tried to provide a cautious point of view that the militarization phenomenon of cyber threats that is currently displayed is a phenomenon that is displayed through the combination of technical discourse and military discourse. Through this study, we aim to show the military the limits of universal solution presentation and the borderline perspective of militarization based on objective insights into the cyber threat security process.

An Access Control using SPKI Certificate in Web Environment (웹 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.11-19
    • /
    • 2006
  • Web service is giving an equal privilege to all user for sharing their resources. Under this situation, a lot of vulnerability against the various attacks through the Internet is possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

  • PDF

To Neutralize the Security Systems, Infringement Actions by the Administrator on the Computer Networks (시스템 보안을 무력화 시키는 전산관리자의 시스템 침해 행위 연구)

  • Roo, kyong-ha;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.165-168
    • /
    • 2012
  • In this paper, to remind ourselves that exist in the world what kind of security system is also difficult to defend a system with computerized access system representative of infringement that, Computerized personnel act of infringement cases, and thus the extent of the damage and the severity Revisited, Furthermore, technical measures beyond the limits of the technical security measures in line computerized rights management representative and for infringement prevention measures in Human Resource Management through its own alternative to find.

  • PDF

The Correlation Between The Right To Medical Secrecy And The Employer's Right To Receive Information On The Employee's Health State

  • Yuryk, Olha;Stashkevich, Anatoly;Chornyi, Ruslan;Chorna, Zhanna;Kronivets, Tеtiana;Valakh, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.103-107
    • /
    • 2021
  • The article analyzes the theoretical aspects of the relationship between the right to medical secrecy and the employer's right to receive information on the employee's state of health, resulting in a more complete description of the implementation of the right to medical secrecy and the employer's right to information on the employee's health state and the possibilities of protecting violated rights. The limits of permissible restrictions on the right to secrecy of health in terms of ensuring the person's performance of their job function have been clarified.

A Study on security policy for vitalizing financial company cloud (금융회사 클라우드 활성화를 위한 보안 정책 연구)

  • Im, Je-sang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.4
    • /
    • pp.199-205
    • /
    • 2017
  • As cloud computing can utilize the proper allocation of system resources, it can be expected to have great benefits in terms of maintaining availability and reducing costs when a cloud is applied to a financial company's computer system. Although some provisions of the Financial Supervisory Regulation were revised in October 2016, this is limited to non-critical information processing systems, limits are remain whitch the application of cloud computing to the whole computer system of financial companies including electronic financial systems. In this paper, cloud security requirements are studied for the application of financial company's computational infrastructure system.

Effects of Security Lighting Lamps on Discomfort Glare to Indoor Occupants

  • Lee, Yoon Jeong;Kim, Jeong Tai
    • KIEAE Journal
    • /
    • v.15 no.4
    • /
    • pp.21-28
    • /
    • 2015
  • Purpose: Although security lights are used to secure pedestrian visibility and safety at nighttime, they can generate light trespass in the neighboring residential space. To prevent this, standards for acceptance limits on vertical illuminance and light pollution by the windows of residential buildings are presented. Method: This study thus representatively selected three types of lamps and, through an evaluation and analysis of the physical and subjective discomfort glare per lamp, proposed a discomfort glare index for each lamp. The evaluation and analysis according to the lamps were conducted through experiments. The variables were the security lights' lamps (NH 100W, MH 70W, LED 50W), installation angles ($0^{\circ}$, $20^{\circ}$), and installation distances (3m, 5m, 7m, 9m). Result: According to the results of the discomfort glare evaluation depending on the angles and distances of the security lights, the following minimum standards are proposed: for NH 100W, a discomfort glare index of 30 and an installation distance of 4m; for MH 70W, a discomfort glare index of 32 and an installation distance of 4m; and, for LED 50W, a discomfort glare index of 31 and an installation distance of 6m, respectively. In addition, this paper recommends the use of MH 70W, when the road width is 4m-6m, and LED 50W, when the road width is over 6m, respectively.