• Title/Summary/Keyword: security manual

Search Result 120, Processing Time 0.025 seconds

Comparison of Field Monitoring System in case of Automatic and Manual Type Executed in Urban Deep Excavation Site (도심지 대규모 굴착공사에서 수행된 자동계측과 수동계측의 비교 사례)

  • Kim, Tae-Seob;Chung, Won-Hong;Kim, Hyun-Mo;Kim, Woong-Kyu;Jung, Chang-Won
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.03a
    • /
    • pp.1216-1223
    • /
    • 2008
  • Displacement control of earth retaining wall is recognized as the most important item for insuring the stability of ground in urban deep excavation site near by major structure such as subway etc. The field monitoring system is classified by two types as manual system and automatic system. The application case of latter type of field monitoring is increased because real time measurement is possible in automatic system and that is correspondent with the recent constructional trend. Though the automatic monitoring system is more useful and advanced than manual monitoring system, accuracy of the system is not verified sufficiently. It was examined that the reliance of automatic monitoring system in this paper through the comparison of monitoring result obtained three urban excavation site in which the each type of monitoring system was executed concurrently. Result of the examination is that the two types of monitoring system is generally alike in view of monitoring result, so the engineering reliance of automatic system was confirmed in case site. This task was researched in restricted case site, it is expected more precise analysis from security of more data monitored and progressive study.

  • PDF

Structure and Challenges of a Security Policy on Small and Medium Enterprises

  • Almeida, Fernando;Carvalho, Ines;Cruz, Fabio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.747-763
    • /
    • 2018
  • Information Technology (IT) plays an increasingly important role for small and medium-sized enterprises. It has become fundamental for these companies to protect information and IT assets in relation to risks and threats that have grown in recent years. This study aims to understand the importance and structure of an information security policy, using a quantitative study that intends to identify the most important and least relevant elements of an information security policy document. The findings of this study reveal that the top three most important elements in the structure of a security policy are the asset management, security risk management and define the scope of the policy. On the other side, the three least relevant elements include the executive summary, contacts and manual inspection. Additionally, the study reveals that the importance given to each element of the security policy is slightly changed according to the sectors of activity. The elements that show the greatest variability are the review process, executive summary and penalties. On the other side, the purpose of the policy and the asset management present a stable importance for all sectors of activity.

A study on method of setting up the defense integrated security system (군 통합보안시스템 구축 방안 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.575-584
    • /
    • 2012
  • A established military security tast based on existing manual and off-line needs the change and development to support effective and systematic task performance according to environment change of informational and scientific project in the military. Therefore this study suggests to set up the standard model of the defense integrated security system to automate and informationize major defense security task based on actual and problem in the area of major defense of security task and case analysis of these in America, England and other countries. The standard model consist of unit systems were made up integrated security system, security management system, man entrance system, vehicle entrance system, high-tech guard system, terror prevention system and the security accident analysis system, and this suggested model based on possible technology and system. If this model is apply to each real military unit, we will expect the development of defense security.

The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.

  • Lee, Kyung-bok;Lim, Jong-in
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.857-880
    • /
    • 2016
  • Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration. Moreover, we examine the significance of the event considering international norms, while applying the Tallinn Manual. Based on our analyses, we discuss implications for the cybersecurity of CI in South Korea, after which we propose a framework for strengthening cybersecurity in order to protect CI. Then, we discuss the direction of national policies.

Development of a Manual for Simulation Training in Preparation for the Fall Disasters of Urban Residential Housing Construction Works and Apply (도시형 생활주택신축공사의 추락재해 발생대비 모의훈련 실시 매뉴얼 개발 및 적용)

  • Kim, Sung Soo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.3
    • /
    • pp.39-49
    • /
    • 2021
  • According to the recent "Status of Industrial Accidents at the End of December 2020" released by the Ministry of Employment and Labor, each industry is subject to industrial accidents. The number of accident deaths by construction industry, accident deaths by accident type fell, and accident deaths by workplace size were 5 to 49, indicating that most accident deaths occurred due to falling accidents at small construction sites. Therefore, urban living houses are small construction sites, and the probability of falling accidents is very high. Fall simulation training for disaster occurrence is conducted mainly by large construction ordering organizations in the public sector, and it is the first case in Korea that a housing construction company has conducted at a small construction site. This study analyzed and presented the definition, construction characteristics, and safety management status of urban living houses, and developed and spread an emergency relief procedure manual in the event of a fall accident to minimize deaths.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

Automatic Configuration Method for the IKE Protocol based on X.509

  • Zhao, Zhen;Ko, Kwang-Sun;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.917-920
    • /
    • 2008
  • The Internet Key Exchange (IKE) protocol is most widely used as a security key exchange protocol on the Internet. Security policies used by the IKE protocol must be configured in advance, however the complex options and manual settings cause inconvenience. This paper proposes an automatic configuration method for the IKE protocol based on X.509 certificate. Security policies are embedded in the certificate, read, and added into the IKE configuration file by a negotiation assistant module in order to achieve automatic IKE configuration. Our proposed method reduces the complexity of configuration process and improves the adaptability of the IKE protocol.

Implications of Multi-swarm Events Safety Management of Foreign Police (외국경찰의 대규모 행사 안전관리로 본 시사점)

  • Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.462-469
    • /
    • 2016
  • This study researched police intervention to ensure the safety of Multi-swarm events. And this study researched best practices of foreign countries. This study propose a solution. It used the situation to police intervention and domestic Multi-swarm events leading research and safety management systems. Safety management for multi-swarm events did ministry of public safety and security, local government, police department, fire department etc. Activities of Safety management for multi-swarm events was checked the risk level, safety management, safety planning and training, safety management in accordance with the Manual. But, safety management of police had Manual maintenance is necessary for the police forces and take advantage of, it is necessary to clarify the mission, it is necessary to configure the risk of a step-by-step checklist for police safety tips in detail. This study for solve the problem proposed the United States, United Kingdom, Germany, France, Australia, the case of the Japanese.

A study on the improvement of work and training to make better Korean 119 dispatcher's response ability (119 상황 접수 요원의 대응능력 향상을 위한 업무 및 훈련 개선방안 연구)

  • Kim, Tae-hwan;Kim, Jung-Gon;Woo, Nam-kyu;Kim, Je-hyun
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.550-561
    • /
    • 2017
  • This paper deals with the improving issues and methods for 119 dispatcher's work and training manual in order to improve their emergency response ability in Korea. Firstly, it was investigated and compared on manuals and training methods for the reception of emergency calls between South Korea and the USA. And then, specific improvement methods were considered by questionnaire for 95 dispatchers who work at 119 communication center in Gyeonggi-do in the basis of surveys. As a result, people and equipment related to 119 have been continuously upgraded, however, their work depend on their personal experiences and capabilities but because of the insufficient pretraining for the dispatchers. Also, the manpower is still insufficient overall compared to the work. Therefore, it is necessary to secure the expertise of the dispatchers through the systematic training program and proper training and test standards for 119 dispatchers, and to prevent errors in the logic of the situation and systematize their work by standardizing the response work and arranging appropriate manpower.

A Case Study on the Field Monitoring of the Deep Rock Excavation Site in Urban Area on Severe Unbalanced Pressure Condition (편토압이 심한 도심지 대심도 암반굴착공사에서의 계측사례)

  • Kim, Tae-Seob;Kim, Woong-Kyu;Jung, Chang-Won;Han, Chul-Hee
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.10a
    • /
    • pp.1259-1267
    • /
    • 2008
  • One of the most important item for insuring the stability of ground in urban deep excavation site near by major structure such as subway is displacement control of earth retaining wall. The field monitoring system is classified by two types as manual system and automatic system. The application case of latter type of field monitoring is increased because real time measurement is possible in automatic system and that is correspondent with the recent constructional trend. Though the automatic monitoring system is more useful and advanced than manual monitoring system, accuracy of the system is not verified sufficiently. It was examined that the reliance of automatic monitoring system in this paper through the comparison of monitoring result obtained one of deep urban excavation site in which the each type of monitoring system was executed concurrently. Result of the examination is that the two types of monitoring system is generally alike in view of monitoring result, so the engineering reliance of automatic system was confirmed in case site. This study was researched in restricted one case site, so it is expected more precise analysis from security of more data monitored and progressive study.

  • PDF