• Title/Summary/Keyword: 보안 관리기

Search Result 167, Processing Time 0.027 seconds

스마트공장 표준화 동향과 시스템 구조

  • Cha, Seok-Geun
    • The Magazine of the IEIE
    • /
    • v.43 no.6
    • /
    • pp.31-37
    • /
    • 2016
  • 스마트 팩토리는 시시각각 변화하는 생산현장의 생산정보 4M1E(Man, Machine, Material, Method, Energy)생산자원을 실시간으로 통합하여 생산 관리를 무대기시간, 무재고, 무고장, 무불량일 발생할 수 있는 핵심성과지표 (KPI: Key Performance Indication)를 통하여 생산현장을 연속개선을 추진하는 것이 핵심이다. 본고에서는 스마트 제조업에 필요한 IT융합 국제표준화 동향으로 사이버 보안기술, Object Process Methodology기반 생산자원 통합기술, 실시간 이벤트기반 구조화 기술, 공통 생산정보화 플랫폼 서비스기술, 생산정보화 표준기능 및 국제표준동향과 한국형 중소제조업 스마트공장 적용 참조 모델에 대하여 알아본다.

Development of Remote Supervision System for Guam Lamps by Way of Leakage Current(Igr) Detection Method (보안등 전거설비의 Igr 누설전류 검출 및 원격감시장치 개발)

  • Choi, Myeong-Il;Kim, Young-Seok;Kim, Chong-Min;Bang, Sun-Bae
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.6
    • /
    • pp.75-80
    • /
    • 2010
  • The present study presented the implementation of a remote control/supervision system for guard lamps used in public illumination with little endeavor by far for safe management, which makes possible to supervise the state and to control the functions remotely including electric safety elements. Especially, the developed system adopts the measurement algorithm for detecting resistive leakage current(Igr) flowing based on the phase difference checkable for sensing at a monitor, being allowable for monitoring at MMI and transmitter for data transmittance. To verify reliability about the algorithm to accurately detect Igr leakage current, the laboratory-based functional test was performed.

DoS Attack at Access Point Using Python (파이썬을 이용한 무선 공유기 DoS 공격)

  • Ji, Byoung-Kyu;Moon, Bong-Kyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.192-195
    • /
    • 2017
  • 최근 무선 네트워크의 발달로 카페나 대학교, 지하철 등 대부분 공간에서 무선 공유기를 통해 WIFI 서비스가 제공되고 있다. 무선 공유기는 IEEE의 표준 프로토콜인 802.11을 사용하는데, 이 프로토콜의 상용화된 버전인 802.11n의 관리 프레임은 암호화되어 있지 않아 쉽게 악용될 수 있다. 이는 Rogue AP, 비밀번호 크래킹 등 다른 공격으로의 발판이 될 수 있으며 이에 따라 보안에 위협이 될 수 있다. 본 논문에서는 파이썬을 이용해 이러한 취약점에 대해 공격하는 과정을 분석하고 이를 통해 발생할 수 있는 취약점과 대책에 대해 논의할 것이다.

Context-based Dynamic Access Control Model for u-healthcare and its Application (u-헬스케어를 위한 상황기반 동적접근 제어 모델 및 응용)

  • Jeong, Chang-Won;Kim, Dong-Ho;Joo, Su-Chong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.493-506
    • /
    • 2008
  • In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.

A Study on Activation Characteristics Generated by 9 MeV Electron Linear Accelerator for Container Security Inspection (컨테이너 보안 검색용 9 MeV 전자 선형가속기에서 발생한 방사화 특성평가에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-Hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.5
    • /
    • pp.563-575
    • /
    • 2020
  • The purpose of this study is to evaluate the activation characteristics that occur in a linear accelerator for container security inspection. In the computer simulation design, first, the targets consisted of a tungsten (Z=74) single material target and a tungsten (Z=74) and copper (Z=29) composite target. Second, the fan beam collimator was composed of a single material of lead (Z=82) and a composite material of tungsten (Z-74) and lead (Z=82) depending on the material. Final, the concrete in the room where the linear accelerator was located contained magnetite type and impurities. In the research method, first, the optical neutron flux was calculated using the MCNP6 code as a F4 Tally for the linear accelerator and structure. Second, the photoneutron flux calculated from the MCNP6 code was applied to FISPACT-II to evaluate the activation product. Final, the decommissioning evaluation was conducted through the specific activity of the activation product. As a result, first, it was the most common in photoneutron targets, followed by a collimator and a concrete 10 cm deep. Second, activation products were produced as by-products of W-181 in tungsten targets and collimator, and Co-60, Ni-63, Cs-134, Eu-152, Eu-154 nuclides in impurity-containing concrete. Final, it was found that the tungsten target satisfies the permissible concentration for self-disposal after 90 days upon decommissioning. These results could be confirmed that the photoneutron yield and degree of activation at 9 MeV energy were insignificant. However, it is thought that W-181 generated from the tungsten target and collimator of the linear accelerator may affect the exposure when disassembled for repair. Therefore, this study presents basic data on the management of activated parts of a linear accelerator for container security inspection. In addition, When decommissioning the linear accelerator for container security inspection, it is expected that it can be used to prove the standard that permissible concentration of self-disposal.

A Security Vulnerability Analysis for Printer Kiosks (무인 복합 출력기 솔루션의 취약성 분석)

  • Ji, Woojoong;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.165-174
    • /
    • 2019
  • They are frequently used today in public places such as street, subway, school or library. Since users can sometimes print documents that contain confidential data using Printer Kiosks, the devices should store and manage the documents securely. In this paper, we identify potential security threats in Printer Kiosks and suggest practical attack scenarios that can take place. To show the feasibility of suggested attack, we analyzed network traffic that were generated by the real Printer Kiosk device. As a result of our analysis, we have found that attackers can access other users' scanned files and access other users' documents from Printer Kiosk's home page. We confirmed that using our attack, we could retrieve other users' personal data.

Assessing Infinite Failure Software Reliability Model Using SPC (Statistical Process Control) (통계적 공정관리(SPC)를 이용한 무한고장 소프트웨어 신뢰성 모형에 대한 접근방법 연구)

  • Kim, Hee Cheul;Shin, Hyun Cheul
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.85-92
    • /
    • 2012
  • There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do asymptotic likelihood inference for software reliability models based on infinite failure model and non-homogeneous Poisson Processes (NHPP). For someone making a decision about when to market software, the conditional failure rate is an important variables. The finite failure model are used in a wide variety of practical situations. Their use in characterization problems, detection of outliers, linear estimation, study of system reliability, life-testing, survival analysis, data compression and many other fields can be seen from the many study. Statistical Process Control (SPC) can monitor the forecasting of software failure and there by contribute significantly to the improvement of software reliability. Control charts are widely used for software process control in the software industry. In this paper, we proposed a control mechanism based on NHPP using mean value function of log Poission, log-linear and Parto distribution.

A Case Study on Blasting at the Tunnel Excavation in an Adjacent Section of a Subway Station (지하철역 인접구간에서의 터널 발파굴착 사례)

  • Lee, Hyo;Kim, Jeoung-Hwan;Hwang, Nam-Sun
    • Explosives and Blasting
    • /
    • v.40 no.2
    • /
    • pp.25-34
    • /
    • 2022
  • Recently, there has been an increasing number of cases of improving constructability by using electronic detonators with precise delay time in tunnel blasting sites. This case is a case of conducting test blasting using with non-electric detonator and electronic detonator at the site of 『Seoul Metropolitan Area Express Railroad Route A Private Investment Project Section 00』 that requires careful management of vibration and noise. Although this site was designed with a non-electric detonator, it was attempted to improve the advance rate and control vibration and noise by mixing the non-electric detonator and the electronic detonator due to the decrease in the advance rate. As a result of the blasting, the target value was achieved with an advance rate of about 85% and a maximum measured value of vibration and noise is 0.215cm/sec and 73.22dB(A) which were measured below regulatory standards. As blasting works in downtown areas, it is necessary to designate measurement and management objects to continuously manage vibration and noise.

Development of an USN Based Integrated Open Server System for Disaster Prevention Management (USN 기반 개방형 방재관리 통합시스템 개발)

  • Lee, Jeong-Kyoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.929-932
    • /
    • 2007
  • The integrated prevention of disaster management system is collected prevention of disaster data from prevention of disaster relation other systems and smart sensor in USN. This system manages fire fighting facility effectively. The relation equipment which is used in existing and network using "Open Protocols" about under using the support system which is integrated effectively as the destroyer. It connects CCTV, the sensitivity environmental sensor, automatic fire detection equipment and security equipment and air flow equipment system using Internet. The System Server was collected monitoring data at the each equipment and processing by operational scenario. It will verified the effectiveness of operational scenario and integrated prevention of disaster management system

  • PDF

SNMP Key Security Mechanism Design using the PKI (SNMP환경에서 공개키 기반구조에 관한 설계)

  • Roh, Jeong-Hee;Moon, Jeong-Hwan;Lee, Chong-Eun;Lee, Jeong-Ki;Lee, Kwang;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.598-601
    • /
    • 2003
  • 초고속 통신망을 이용한 인터넷의 대중화와 더불어 인터넷을 기반으로 하는 SNMP가 활발해 지고 있다. SNMP에 있어서는 민감한 정보의 기밀성과 사용자 인중의 확보가 필수적이며, 이를 위해서는 전자서명 기술을 포함하고 있는 공개키 기반의 인증서 관리 체계의 확립이 선결되어야 한다. 본 논문에서는 인증, 기밀성 및 무결성 문제를 해결하기 위하여 PKI 기반 인증서의 생성, 관리 기능과 인증서를 상호 교환하여 매매 협상을 하는 에이전트 중재에 의한 보안 애플리케이션을 설계하고 이에 대하여 기술한다.

  • PDF