• 제목/요약/키워드: critical infrastructure

검색결과 484건 처리시간 0.027초

A Study on the Security Architecture of CALS System (CALS체계의 정보보호 구조 연구)

  • 남길현
    • The Journal of Society for e-Business Studies
    • /
    • 제4권2호
    • /
    • pp.197-208
    • /
    • 1999
  • With developing computer and communication technologies, the concept of CALS system has been popular not only to military but also to commercial industries. The security problem is one of the most critical issues to construct CALS infrastructure. The CALS system needs some security functions such that data confidentiality, integrity, authenticity, availability, and non-repudiation. This paper proposes a security architecture model in CALS. The security architecture model is composed of 5 submodels such that network security model, authentication and key management model, operation and audit model, integrated database security model, and risk analysis model.

  • PDF

Applications of Information Technology for Knowledge Management Implementations

  • 홍순구;홍석기;이상식;김종원
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 한국정보시스템학회 2001년도 추계학술대회 발표논문집:차세대 전상거래 시대의 비즈니스전략
    • /
    • pp.285-290
    • /
    • 2001
  • The borderless global economy has accentuated the importance of knowledge as the most critical source of competitive advantage. Thus, knowledge management has become a strategic mandate for most world-class organizations. A key enabler for implementing an effective knowledge management system is advanced information technology. Strategies for developing an enterprise-wide knowledge management system Infrastructure with embedded information technology are discussed. In particular, this paper discusses the concept of a knowledge management life cycle- -knowledge capture, knowledge development, knowledge sharing, and knowledge utilization, and how applications of new information technology support each step of the knowledge management practices within and between organizations is suggested.

  • PDF

Analyses of Security Model and Design of Protocol for Wireless Ad-Hoc Network (무선 Ad-Hoc 망의 프로토콜 설계 및 보안 모델 해석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.860-863
    • /
    • 2005
  • Ad-Hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of Ad-Hoc networks are in military, tractical and other security sensitive operations, where the environment is hostile. Hence, security is a critical issue. In this paper, we ahve identified certain misbehaviors caused by mallicious node for reactive routing protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the networks

  • PDF

Defending Against Today's Advanced Persistent Threats (최신 APT 해킹공격에 대한 방어)

  • Marpaung, Jonathan A.P.;Lee, HoonJae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2012년도 추계학술발표대회
    • /
    • pp.954-957
    • /
    • 2012
  • Recent high profile attacks have brought the attention of governments, corporations, and the general public towards the dangers posed by Advanced Persistent Threats. This paper provides an analysis of the attack vectors employed by these actors by studying several recent attacks. We present recommendations on how to best defend against these threats by better classification of critical information infrastructure and assets, people protection, penetration tests, access control, security monitoring, and patch management.

Differential Bandwidth Allocation Method using Upstream Bandwidth Wavelength Division of EPON (상향트래픽 파장분할 EPON에서 우선순위 큐를 고려한 차등대역폭 할당방법)

  • Seo, Chang-Jin;Jang, Yong-Suk
    • Journal of Digital Convergence
    • /
    • 제10권4호
    • /
    • pp.265-270
    • /
    • 2012
  • The subscriber access network is cause of the bottleneck phenomenon because equipment and infrastructure were not originally designed for busty high-bandwidth traffic between MAN(Metro Area Network) and LAN(Local Area Network). Whether riding on shorter copper drops or optical fiber, Ethernet is emerging as the future broadband protocol of choice, offering plug and play simplicity, and low cost. EPON(Ethernet Passive Optical Network) combines point-to-multipoint optical infrastructure with low-cost high-bandwidth Ethernet. The future broadband access network will be a combination of point-to-point and point-to-multipoint Ethernet, optimized for transporting IP data, as well as time critical voice and video. EPON is being considered as a novel communications infrastructure for next-generation broadband access network for the convergence of low-cost Ethernet equipment and low-cost fiber infrastructure. But, EPON has a problem with duplex multimedia services. It is the insufficiency of bandwidth for upstream. Because all ONUs use a shared transmission media for upstream. In this paper, we addressed the problem of upstream bandwidth in EPONs. We presented a wavelength division EPON supporting QoS in the differentiated services framework.

A Study on the State Policy for the Development of National Information Infrastructure (국가정보화 추진정책에 관한연구 - 초고속정보통신망기반의 구축을 중심으로 -)

  • 정충식
    • Journal of the Korea Society of Computer and Information
    • /
    • 제1권1호
    • /
    • pp.7-24
    • /
    • 1996
  • In the emerging information society. a well-established national Information network plays a crucial role In enhancing economic efficiency and creating national wealth. Most of the advanced nations In the world are putting forward government-driven projects for the construction of their national Information Infrastructures. strategically focusing on the development of key technologies and Industrial essential for their Infrastructures. Development of the NII (National Infrastructure) can help unleash an Information revolution that will change forever the way people 1ive, work. and interact with each other. Nonetheless. the present Information Infrastructure In Korea loaves a lot to be Improved In order to realize the vision of Information society. The establishment of the KII (korea Information Infrastructure) does not merely mean the construction of physical network that enables the transmission of various modes of information such as voice, data, and image. It further implies the creation of a new kind of social overhead capital, ranging from the establishment of social and cultural which are conductive to seamless flow of information. For the successful implementation of the KII, it is critical to build the public consensus on the importance and necessity of informatization. At the same time, careful consideration should be given to the institutional factors such as timely and adequate supply of specialized personnel, the updating of policy and regulations, and the strengthening of interntional cooperation.

  • PDF

Statistical calibration of safety factors for flexural stiffness of composite columns

  • Aslani, Farhad;Lloyd, Ryan;Uy, Brian;Kang, Won-Hee;Hicks, Stephen
    • Steel and Composite Structures
    • /
    • 제20권1호
    • /
    • pp.127-145
    • /
    • 2016
  • Composite column design is strongly influenced by the computation of the critical buckling load, which is very sensitive to the effective flexural stiffness (EI) of the column. Because of this, the behaviour of a composite column under lateral loading and its response to deflection is largely determined by the EI of the member. Thus, prediction models used for composite member design should accurately mirror this behaviour. However, EI varies due to several design parameters, and the implementation of high-strength materials, which are not considered by the current composite design codes of practice. The reliability of the design methods from six codes of practice (i.e., AS 5100, AS/NZS 2327, Eurocode 4, AISC 2010, ACI 318, and AIJ) for composite columns is studied in this paper. Also, the reliability of these codes of practice against a serviceability limit state criterion are estimated based on the combined use of the test-based statistical procedure proposed by Johnson and Huang (1997) and Monte Carlo simulations. The composite columns database includes 100 tests of circular concrete-filled tubes, rectangular concrete-filled tubes, and concrete-encased steel composite columns. A summary of the reliability analysis procedure and the evaluated reliability indices are provided. The reasons for the reliability analysis results are discussed to provide useful insight and supporting information for a possible revision of available codes of practice.

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • 제7권3호
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

The Aggregate Production Efficiency of IT Investment: a Non-Linear Approach

  • Repkine, Alexandre
    • Proceedings of the Technology Innovation Conference
    • /
    • 기술경영경제학회 2002년도 제20회 동계학술발표회 논문집
    • /
    • pp.59-89
    • /
    • 2002
  • The rapid diffusion of information and telecommunication (IT) technologies during the recent decennia produced fundamental changes in the economic activity at a global level, resulting in what became coined as the "new economy". However, empirical evidence on the contribution of IT equipment to growth and productivity is at best mixed, with the more or less consistent results on the positive link between the two relating to the United States in the 1990-s. Although the empirical literature on the link between IT investment and economic performance employs a wide variety of methodologies, the overwhelming majority of the studies appears to be employing the assumption of linearity of the IT-performance relationship and predominantly explores the direct nature thereof. In this study we relax both these assumptions and find that the indirect, or aggregate productive efficiency, effects of IT investment are as important as are the direct ones The estimated non-linear nature of the indirect relationship between IT investment intensity and productive efficiency accommodates the concepts of critical mass and complementary (infrastructure) capital offered in the literature. Our key finding is that the world economy′s average level of IT investment intensity remained below the estimated critical mass. Since in this study we developed a methodology that allows one to explicitly measure the critical mass of IT investment intensity, its individual estimation at a country or industrialsector level may help evaluate the extent to which IT investment activity has to be encouraged or discouraged.

  • PDF

International Construction Joint Ventures with Developing Countries: Singapore's Case for Risk Assessment and Allocation

  • Hwang, Bon-Gang;Zhao, Xianbo;Chin, Eileen Wei Yan
    • International conference on construction engineering and project management
    • /
    • The 6th International Conference on Construction Engineering and Project Management
    • /
    • pp.435-439
    • /
    • 2015
  • It is important for Singaporean companies to manage the multifaceted risks when forming international construction joint ventures (ICJVs) with developing countries. The objectives of this study are to assess the risks associated with Singaporean ICJVs with developing countries, and investigate the risk allocation preferences in these ICJVs. To fulfill these objectives, a literature review was carried out and a questionnaire survey was performed with 38 professionals. The survey results reported "political instability" as the most critical risk, and market level risks were less critical than country and project level risks. Additionally, the results showed agreement on the risk ranking between building and infrastructure ICJVs, despite significant differences in the criticalities of five risks. Furthermore, five risks were preferably allocated to host and foreign partners, respectively, while 13 risks could be shared among partners. As few studies have explored the risk allocation preferences in ICJVs, this study expands the literature. Also, the identification of the risks allows other companies to customize their own lists of critical risks, while the preferred risk allocation provides valuable information for companies from various countries that intend to form ICJVs with developing countries. Thus, this study contributes to the global body of knowledge relating to ICJVs.

  • PDF