• Title/Summary/Keyword: security inspection

Search Result 222, Processing Time 0.023 seconds

Facility Maintenance Management System Using a Mobile Application (모바일 어플리케이션을 이용한 시설물 유지관리 시스템)

  • Joo, Young-Do
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1145-1151
    • /
    • 2012
  • Recently, the demand for mobile system is growing owing to the spread of smart phones to enable the real-time business process. This paper proposes the real-time facility maintenance management system using an android-based mobile application to apply to the facility defect/maintenance field for the apartment building complex. The proposed system model aims to develop the comprehensive management system to integrate the web and mobile system to lead to the realization of mobile office. The security measures required in the mobile system are technically analyzed and implemented on the system.

Improvement of the Media Coverage for Marine Crime Prevention (해양범죄예방을 위한 언론보도의 개선방안)

  • Roh, Ho-Rae;Lim, Seok-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.2
    • /
    • pp.448-457
    • /
    • 2013
  • The media is an effective means of preventing crime. It can be known to members of the media presiding over the most widely and rapidly. Because of this, the mass media is a good way to prevent such crime. Related to general crime, marine crime will have unique characteristics and about Crimes reported by the media, it is also true. The results of this study are as follows. Firstly, it is required that the more accurate present article must be published and reported. Secondly, for more accurate presentation of measure, there is a need to enhance professional training for reporters. Thirdly, the marine weather report is the most important political purpose of considering marine crime prevention. Forthly, marine crime is likely to be a lack of evidence. Therefore, in order to supplement the lack of evidence maritime security agency should be utilized for a news source.qualification Fifthly, the need for regular inspection of the articles is requested. Sixthly, for judicial control maintenance of the media related laws should be strengthened. Finally, the arbitration institution for media rights should be established under the Korea Ministry of Land Infrastructure and Transport. This is practical action for marine crime prevention.

Embedding a Signature to Pictures under Wavelet Transformation (웨이브렛변환을 이용한 영상으로의 서명데이터 삽입)

  • Do, Jae-Su
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.83-89
    • /
    • 2007
  • This paper is to suggest the method of embedding a signature to pictures secretly under the orthogonal wavelet transform which represents pictures as multi-resolution representations. As it is focused upon the differential output under the multi-resolution representation of pictures, this method can embed bit series to pictures. In doing so, it can compound approximately 6K byte of information with gray-level image $256{\times}256$. The method can include not only the database which designates copyright of pictures but also the author and usage of pictures, and the information of the picture itself. Therefore, this method can easily discriminate the inspection of picture database.

  • PDF

A Study on the Active Traceback Scheme Respond ing to a Security Incident (침해사고 대응을 위한 능동적 역추적 기법에 관한 연구)

  • Park Myung Chan;Park Young Shin;Choi Yong Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.27-34
    • /
    • 2005
  • Current security reinforcement systems are Passive defense system that only blocks filter to all traffic from the attacker. So, Those are weak re-attack and Stepping Stones attack because active response about attacker is lacking. Also, present techniques of traceback need much time and manpower by log information collection and trace through the personal inspection and active response is lacking. In this paper, We propose technique for TCP connection traceback that can apply in present internet and trace to inserted marking on IP header to correspond re-attack and Stepping Stones attack. Therefore, Proposed technique is unnecessary correction of existing network component and can reduce size of marked information and overhead of resources.

  • PDF

Distribute Parallel Crawler Design and Implementation (분산형 병렬 크롤러 설계 및 구현)

  • Jang, Hyun Ho;jeon, kyung-sik;Lee, HooKi
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.21-28
    • /
    • 2019
  • As the number of websites managed by organizations or organizations increases, so does the number of web application servers and containers. In checking the status of the web service of the web application server and the container, it is very difficult for the person to check the status of the web service after accessing the physical server at the remote site through the terminal or using other accessible software It. Previous research on crawler-related research is hard to find any reference to the processing of data from crawling. Data loss occurs when the crawler accesses the database and stores the data. In this paper, we propose a method to store the inspection data according to crawl - based web application server management without losing data.

Network Classification of P2P Traffic with Various Classification Methods (다양한 분류기법을 이용한 네트워크상의 P2P 데이터 분류실험)

  • Han, Seokwan;Hwang, Jinsoo
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Security has become an issue due to the rapid increases in internet traffic data network. Especially P2P traffic data poses a great challenge to network systems administrators. Preemptive measures are necessary for network quality of service(QoS) and efficient resource management like blocking suspicious traffic data. Deep packet inspection(DPI) is the most exact way to detect an intrusion but it may pose a private security problem that requires time. We used several machine learning methods to compare the performance in classifying network traffic data accurately over time. The Random Forest method shows an excellent performance in both accuracy and time.

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

Detecting anomaly packet based on neural network (신경회로망을 이용한 비정상적인 패킷탐지)

  • 이장헌;김성옥
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.105-117
    • /
    • 2001
  • As we live in the 21st century, so called the "Information Age", network has become a basic establishment. However, we have found the different face that it also has been used as a tool of a unauthorized outflow and destruction of information. In recent years, beginner could easily get a hacking and weakness reference tools from internet. The menace of the situation has increased; the intellectual diverse offensive technique has become increasingly dangerous. The purpose of the thesis is to detect a abnormal packet for networking offense. In order to detect the packet, it gathers the packets and create inspection information that tells abnormality by using probability of special quality, then decision of intrusion is made by using a neural network.l network.

A Study on the Reform of the Police in Korea: Focused on Institutional Approach

  • Kim, Taek;Jung, In Whan
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.120-126
    • /
    • 2022
  • As part of the police reform, the current government is trying to establish a police bureau under the Ministry of Public Administration and Security and improve the personnel management of the police. Like the prosecution bureau under the Ministry of Justice, the main goal of the police is to establish a police support bureau in the Ministry of Public Administration and Security to have personnel, budget, disciplinary action, and inspection. However, the government's control of police rights was opposed mainly by the "Police Workplace Council," which is like a police union, and even police officials agreed with it, and the opposition was severe. It is becoming a form of struggle between the government and police organizations. As a police major, I don't want to side with anyone and support the police. However, I thought about what democratic control of the police should be with, considered what the police reform plan is, and analyzed the legal and institutional aspects of the current police, and expressed the following issues. First, this paper is as follows: First, we considered what the democratic control of the police was. Second, We focused on reform measures such as the personnel system and institutional approach. Third, I presented my argument on what the police reform plan is.

Security Problem of National Major Facility's Parking Lot and its Improvement Method -Focused on Doonchi(Waterside) Parking Lot of National (국가중요시설의 주차장 보안의 문제점과 개선방안: 국회둔치주차장을 중심으로)

  • Lee, Sang-Hun;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.61-87
    • /
    • 2017
  • National Assembly is a constitutional institution that is required to first consult the will of the people and it should do its effort continuously so that security of citizens using parking lot would be enhanced at the same time while improving parking service in order to increase customer satisfaction of the people. Under this recognition, in this study, Doonchi parking lot of National Assembly under consigned management was first reviewed in a perspective of criminal prevention through environmental design(CPTED) and particularly, fence installation and reinforcement work for securing 'territoriality' and operation of all round shooting camera and installation of No-trespassing warning board at entrance were suggested. Second, it was recommended to change independent control system in which CCTV security system of National Assembly Doonchi parking lot is operated separately from National Assembly safety situation room and integrate it with National Assembly safety situation room(revised to double safety system) and performance of CCTV camera was made to be increased to over 2m. In addition, video recording mode was converted to NVR mode for application to IP camera in the future and in order to avoid dead zone of security monitoring area and based on site inspection result, addition 3 places of newly installing CCTV were indicated. Third, it was recommended to introduce parking fare billing and management system through unmanned equipment in parking lot management and operation.(specialized management of professional parking service provider was reviewed). By doing so, risk of cash handling by charging personnel was removed by reducing current 7 working personnel to 3 and particularly, by converting parking lot management mode being operated temporarily from 9 A.M. to 9 P.M. at present to 24 hours operation mode and providing more specialized parking service, citizens visiting National Assembly were provided with convenience and image of National Assembly was also enhanced. This study was carried out in parallel with various literature and case studies, including data from the Office of the Defense Protection in the National Assembly.

  • PDF