• Title/Summary/Keyword: network protection system

Search Result 545, Processing Time 0.028 seconds

The Research for Cyber Security Experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1137-1142
    • /
    • 2017
  • Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.

A Study on Distance Relay of Transmission UPFC Using Artificial Neural Network (신경회로망을 이용한 UPFC가 연계된 송전선로의 거리계전기에 관한 연구)

  • Lee, Jun-Kyong;Park, Jeong-Ho;Lee, Seung-Hyuk;Kim, Jin-O
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.6
    • /
    • pp.37-44
    • /
    • 2004
  • This paper represents a new approach for the protective relay of power transmission lines using a Artificial Neural Network(ANN). A different fault m transmission lines need to be detected classified and located accurately and cleared as fast as possible. However, The protection range of the distance relay is always designed on the basis of fixed settings, and unfortunately these approach do not have the ability to adapt dynamically to the system operating condition. ANN is suitable for the adaptive relaying and the detection of complex faults. The backpropagation algerian based multi-layer protection is utilized for the teaming process. It allows to make control to various protection functions. As expected, the simulation result demonstrate that this approach is useful and satisfactory.

A Study on Vulnerability Analysis Methodology for Composite Security Product Evaluation (합성형 정보보호제품 평가를 위한 취약성 분석 방법 개발에 관한 연구)

  • Kim, Seok-Soo;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.19-24
    • /
    • 2008
  • Common Criteria is a standard to estimate safety of information protection product such as network-level firewall system and intrusion detection system. Recently, CC version is changed from CC v.2.3 to CC v.3.1. CC v.3.1 estimation methodology requires a secured dictionary accomodation preparation for information protection product. In this research, progressed CC v3 base composition product test and research about vulnerability analysis method. Further, this paper presents specific plan sorting composition style information protection product examination methodology to existing principle and detailed methodology.

  • PDF

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.

A study of communication-based protection coordination for networked distribution system (네트워크 배전계통용 통신기반 보호협조에 관한 연구)

  • Kim, WooHyun;Chae, WooKyu;Hwang, SungWook;Lee, HakJu
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.8 no.1
    • /
    • pp.43-48
    • /
    • 2022
  • Although the distribution system has been structured as complicated as a mesh in the past, the connection points for each line are always kept open, so that it is operated as a radial distribution system (RDS). For RDS, the line utilization rate is determined according to the maximum load on the line, and the utilization rate is usually kept low. In addition, when a fault occurs in the RDS, a power outage of about 3 to 5 minutes occurs until the fault section is separated, and the healthy section is transferred to another line. To improve the disadvantages of the RDS, research on the construction of a networked distribution system (NDS) that linking multiple lines is in progress. Compared to the RDS, the NDS has advantages such as increased facility utilization, load leveling, self-healing, increased capacity connected to distributed generator, and resolution of terminal voltage drop. However, when a fault occurs in the network distribution system, fault current can flow in from all connected lines, and the direction of fault current varies depending on the fault point, so a high-precision fault current direction determination method and high-speed communication are required. Therefore, in this paper, we propose an accurate fault current direction determination method by comparing the peak value polarity of the fault current in the event of a fault, and a communication-based protection coordination method using this method.

Consideration for defense preparedness against non-traditional security threats (focused on the threat of infectious diseases) (비전통 위협에 대한 국방 업무수행체계 유지방안 (감염병 위협 중심으로))

  • Kwon, Hyukjin;Shin, Donggyu;Shin, Youngjoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.105-112
    • /
    • 2022
  • The national defense requires uninterrupted decision-making, even under direct or indirect impacts on non-traditional threats such as infectious diseases. Since all work utilizes the information system, it is very important to ensure the availability of the information system. In particular, in terms of security management, defense work is being performed by dividing the network into a national defense network and a commercial Internet network. This study suggests a work execution plan that takes into account the efficiency of work performed on the Internet and the effectiveness of security through effective defense information system operation. It is necessary to minimize the network contact point between the national defense network and the commercial Internet, and to select a high-priority one among various tasks and operate it efficiently. For this purpose, actual cases were investigated for "A" institution and characteristics were presented. Through the targeted tasks and operation plans to improve the effectiveness of defense tasks and ensure security, presented in this paper, it will be possible to increase the availability of task performance even in non-traditional threats such as infectious diseases.

Political consideration issues for the exclusive possession protection and localization of TETRA system in Korea (TETRA시스템의 국산화율 제고를 위한 정책적 접근방안)

  • Moon, Hun-Il;Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.221-227
    • /
    • 2008
  • The integrated command radio network construction with the business which differs makes the business of the regional BCP responsible agencies which are being scattered and the emergency rescue agencies control effectively. The namely specific authorizations are quick, the decision-making and the solar radiation which are accurate the possibility the rescue work which is disordered becoming accomplished in order to be, integrated command network construction are demanded from misfortune site. Foe the maintenance and an efficient management of the function which is case different meaning permanent and continuous will construct the integrated command network the upgrade which system is continuous necessary, becomes.

  • PDF

Analysis of Jini 2.0 Security for Home Network (홈네트워크를 위한 Jini 2.0 Security 분석)

  • 이윤경;한종욱;김도우;주홍일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.717-720
    • /
    • 2004
  • Jini is a middle ware supposed in Sun Microsystems. The goal of lil is the establishment of dynamic distributed system, which can share information and control of other Jini technology-enabled services or devices in the same Jini system. Jini is one of the best middleware together UPnP and HAVi. Hone network security, soch as privacy protection, crime prevention, and etc, is very important. So Jini 2.0 adds security mechanism in 11. 2003. This paper describes the analysis of Jini 2.0 security mechanism, and home network security.

  • PDF

Design and Implementation of Fully Automated Solar Powered Irrigation System

  • Mohammad Fawzi Al Ajlouni;Essam Ali Al-Nuaimy;Salman Abdul-Rassak Sultan;Ali Hammod AbdulHussein Twaij;Al Smadi Takialddin
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.197-205
    • /
    • 2024
  • This paper presents a fully automated stand-alone irrigation system with GSM (Global System for Mobile Communication) module. Solar energy is utilized to power the system and it is aimed to conserve water by reducing water losses. The system is based on a DC water pump that draws energy from solar panels along with automated water flow control using a moisture sensor. It is also fitted with alert and protection system that consists of an ultrasonic sensor and GSM messages sender that transmits signals showing the levels of the water in the reservoir and the battery charge. The control system is designed to stop the water pump from pumping water either when the battery level drops to equal or less than 10% of its full charge, or when the water level becomes less than 10 cm high in the reservoir. The experimental results revealed that the system is appropriate to use in remote areas with water scarcity and away from the national grid.

The Protecton of Privacy on Secondary Use of Personal Health Imformation (의료기관 개인건강정보의 이차적 이용)

  • Kim, Jang-Han
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.1
    • /
    • pp.117-143
    • /
    • 2010
  • Along with the development of digital technologies, the information obtained during the medical procedures was working as a source of valuable assets. Especially, the secondary use of personal health information gives the ordeal to privacy protection problems. In korea, the usage of personal medical information is basically regulated by the several laws in view of general and administrative Act like Medicine Act, Public institutions' personal information protection Act, Information-Network Act etc. There is no specific health information protection Act. Health information exchange program for the blood donor referral related with teratogenic drugs and contagious disease and medical treatment reporting system for income tax convenience are the two examples of recently occurred secondary use of health information in Korea. Basically the secondary use of protected health information is depend on the risk-benefit analysis. But to accomplish the minimal invasion to privacy, we need to consider collection limitation principle first. If the expected results were attained with alternative method which is less privacy invasive, we could consider the present method is unconstitutional due to the violation of proportionality rule.

  • PDF