• Title/Summary/Keyword: 관제업무

Search Result 191, Processing Time 0.023 seconds

VTS 기능비교를 통한 개선 방안 도출

  • Kim, Man-Cheol;Kim, Bong-Seok;Ryu, Si-Ryang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.06a
    • /
    • pp.526-528
    • /
    • 2012
  • 우리나라 VTS 운영 시스템 중 Norcontrol 장비와 Vissim 장비의 기능 비교를 통해 장 단점을 분석하고 개선 방안을 도출함으로써 관제사가 보다 편리하고 쉽게 기능을 사용하여 해상교통관제업무에 활용할 수 있도록 하기 위함.

  • PDF

The Little Prince & VTS/VTSOs

  • Kim, Ju-Seong;Yeo, Un-Gi
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2011.06a
    • /
    • pp.150-152
    • /
    • 2011
  • 해상교통관제는 선박통항의 안전과 항만의 효율성 증대 및 해양환경의 보호에 막중한 기여를 하고 있다. 그러나 시스템과 설비에 대한 투자와 관심의 집중에 비하여 인적요소에 대한 연구와 교육이 다소 소홀하기 쉬운 것이 사실이다. 이에 우리에게도 이미 익숙하고 대중적인 책인 '어린왕자'를 통하여 VTS와 VTS운영자에 대한 인적요인에 대한 접근을 시도함으로써 해상교통관제사가 범하기 쉬운 오류 유형을 밝혀내고자 하였다. 아울러 해상교통관제사에게 필요한 업무적, 사회적 기술을 도출하여 보았다.

  • PDF

How to Define a Data Leakage Scenario Based on Relationships Between Work Activities (업무 활동간 연관 관계를 이용한 데이터 유출 시나리오 정의 방법)

  • Seo, Min Ji;Kim, Myung Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.292-294
    • /
    • 2017
  • 기업에서 보유하는 기밀 정보가 내부 직원에 의해 유출되는 사고가 빈번하게 발생하고 있다. 기업에서 데이터를 유출하려는 내부 직원을 탐지하기 위하여 보안 로그를 분석해주는 보안 관제 시스템을 사용하고 있으나, 보안 관제 시스템은 관리자가 지정하는 기준에 대해 보안 로그를 분석하기 때문에 새로운 유형의 데이터 유출 사고가 발생하였을 때 제대로 데이터 유출을 탐지할 수 없는 문제점을 가진다. 따라서 본 논문에서는 내부 직원의 업무활동에서 발생하는 보안 로그 리스트에 연관 분석을 적용하여 새롭게 데이터 유출 탐지 시나리오를 작성하여 기존의 시스템이 가진 문제점을 해결할 수 있는 방법을 소개한다. 연관 분석을 활용하여 정의한 데이터 유출 탐지 시나리오를 활용한 결과, 결과적으로 데이터 유출 탐지 성능이 향상되었다.

Analysis of Threat Information Priorities for Effective Security Monitoring & Control (효과적인 보안관제를 위한 위협정보 우선순위 도출)

  • Kang, DaYeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.5
    • /
    • pp.69-77
    • /
    • 2021
  • This study aims to identify security-based threat information for an organization. This is because protecting the threat for IT systems plays an important role for an corporate's intangible assets. Security monitoring systems determine and consequently respond threats by analyzing them in a real time situation, focusing on events and logs generated by security protection programs. The security monitoring task derives priority by dividing threat information into reputation information and analysis information. Reputation information consisted of Hash, URL, IP, and Domain, while, analysis information consisted of E-mail, CMD-Line, CVE, and attack trend information. As a result, the priority of reputation information was relatively high, and it is meaningful to increase accuracy and responsiveness to the threat information.

A Study on the Operation and System Improvement of Cyber Security Center (사이버보안관제센터 운영 및 제도 개선에 관한 연구)

  • Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.39-45
    • /
    • 2024
  • The purpose of security control in the public sector is to secure the safety of administrative services for the public by preventing resource loss or information infringement in information systems and information and communication networks. The security control system is a process that performs real-time detection, analysis, response, and reporting through system vulnerability analysis and security system detection pattern optimization. This study aims to objectively identify the current situation of the mismatch between the supply and demand of cyber security control centers currently in operation and specialized security control companies that can be entrusted to operate them, and to derive and propose practical and institutional improvement measures. Considering that the operation of security control centers in the public sector is expected to increase in the future, research on the practical supplementation required for the operation process of security control centers and the improvement of the designation system of security control specialized organizations has fundamental and timely significance, and it is an area that requires continuous research in terms of strategic industrialization.

Job Analysis and Aptitude Test System for the Safety-related Job Occupants in Railway Industries (직무분석에 기반한 철도안전업무종사자 업무적성평가제도)

  • Sin Taek-Hyeon;Guk Gwang-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.1663-1666
    • /
    • 2006
  • 현행 철도관련기관에 종사하는 안전업무종사자(기관사, 관제사 등)의 업무적성평가제도는 나름의 논리적 토대 하에 설계되어 안전업무종사자의 업무적성검증과 역량의 개발 및 보존에 기여하는 바가 크다. 그러나 한편 조직 내외적인 여러 요인으로 인해 사회, 기술, 가치관(욕구) 등의 제반 환경적 변화추세를 적시에 제도적으로 반영하는데 일정한 한계가 있을 수 있다. 본 논문에서는 이 같은 점을 고려하면서 특히 기관사를 대상으로 한 직무분석결과를 토대로 현행 업무적성평가제도와의 적합관계를 분석하여 바람직한 제도적 틀을 설계하기 위한 기초정보를 제시하려는데 그 목적이 있다.

  • PDF

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

Indoor Environment Monitoring and Controlling System design and implementation based on Internet of Things (사물인터넷 기반 실내 환경 관제시스템 설계 및 구현)

  • Park, Jae-Woon;Kim, Dae-Sik;Joo, Nak-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.2
    • /
    • pp.367-374
    • /
    • 2016
  • Recently, many people perform jobs including study and work within a common indoor space. Yet this space could have an adverse effect on operational efficiency as well as health because of many pollution factors. So maintaining a pleasant environment in the common space is important. In this thesis we study the integrated environment management system for better living conditions. This system analyzes and manages harmful environmental factors to make more pleasant environment in office, library or classroom. The proposed indoor environment management system will provide a pleasant environment by monitoring the indoor environment and driving the actuator in real time. In addition, it can be applicable to different types of indoor space to reach solutions to raise recognition of indoor environment pollution by people.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

Design of Disaster Control System based on 4S Kernel Component (4S 핵심 컴포넌트 기반의 재난재해 시스템 설계)

  • Joo, In-Hak;Lee, Seung-Yong;Oh, Byoung-Woo;Kim, Min-Soo
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.1 s.5
    • /
    • pp.27-36
    • /
    • 2001
  • The 4S represents four systems that are commonly related to spatial information: GIS, GNSS, SIIS, ITS. The 4S technology that integrates the four systems gets more and more interests recently. In this paper, we adopt component paradigm to 4S system, apply it to the disaster control field, and design a system based on component architecture. There are many application areas to which the 4S technology can be applied. but the disaster control system is one of the most typical fields. We apply 4S technology to the disaster control fields, including fire, flood, and typhoon. Because of the characteristics of disaster control system that handles large-volume map data, component-based 4S system will take considerable effects on the improvement of disaster control works. The core functions that are common to all disaster control fields are included in 4S kernel component because of the consideration of time performance. Remaining non-common functions are implemented as separate components named as work-specific components. In our suggested system, a vehicle named as 4S-Van collects real-time information on the spot of disaster and sends image and location information to control center via wireless transmission. The control center analyzes the information together with its own spatial database or map, which was not possible in the conventional disaster control works. The control center can get desired information by sending a request of re-transmission to 4S-Van. Such method of real-time transmission supported by on-the-spot information makes the current situation judgment, decision making, and order issuance more exact, effective, and timely. The suggested system and method are expected to bring remarkable improvement on disaster control works.

  • PDF