• Title/Summary/Keyword: 새로운 점검체계

Search Result 38, Processing Time 0.027 seconds

A Development of Weapon System Test Set's Display Using an Ecological Interface Design Methodology (생태학적 인터페이스 디자인(EID) 기법을 활용한 무기체계점검장비(WSTS) 디스플레이 개발)

  • Park, Jae-Eun;Seo, Yang-Woo;Kim, Ko-Kyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.6
    • /
    • pp.4147-4157
    • /
    • 2015
  • The weapon system has developed by adding various functions because of the warfare change. And, an weapon system test set (WSTS) that is used to test and judge the condition of weapon system also deal with a lot of complex information. However, almost WSTS is developed on the basis of developer-centric. Because of it, it is hard to make a result by apprehending information on WSTS's display. Thus, I proposed a new display of WSTS by adapting the Ecological Interface Design(EID) Methodology to reduce operator's cognitive workload and assure safe testing. WSTS's Display is developed through Information Requirement and Work Domain Model as a result of Work Domain Analysis. The most powerful thing in the new display is that operator can identify his testing and status of WSTS directly. I expect that it reduces operator's cognitive workload and helps safe testing.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

A Study on the Preparedness of Port State Control for the Enforcement of NIR (NIR의 도입에 따른 항만국통제 대응방안)

  • Kim, Chu-Hyong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.63-64
    • /
    • 2014
  • NIR(New Inspection Regime, hereinafter NIR) relating to the PSC(Port State Contorl, hereinafter PSC) has implemented in Asia-Pacific region under Tokyo-MOU from last January 2014. The most noticable difference between NIR and existing TF(Target Factor, hereinafter TF) is to evaluate company performance and to conduct PSC with flexible inspection interval on the basis of Ship Risk Profile; High Risk Ship, Standard Risk Ship and Low Risk Ship.

  • PDF

Storage Reliability Prediction Model for Missile subjected to Non-periodic Test and Periodic Inspection excluding Overlapped Failures (수시점검 및 정기검사 시 고장의 중복을 배제한 유도탄 저장신뢰도 예측 모델)

  • Jo, Boram;Ahn, Jangkeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.599-604
    • /
    • 2018
  • For missile systems, sustaining high reliability and ensuring economical maintenance are very important. In the Republic of Korea, for most missiles, periodic inspection is mandatory for missiles in the field. Every fixed number of years, they are returned to the ordnance depot to be tested and repaired if faults are found. Almost all missiles have a built-in test (BIT) capability. With the BIT, faulty missiles can be isolated anytime during operations or storage in the launchers. So the reliability and the maintenance costs of the missiles greatly depend on the length of the inspection cycle and the BIT/inspection quality. In this paper, we suggest a model for predicting the storage reliability of missiles subjected to non-periodic tests and periodic inspections, excluding overlapping failures. Some numerical examples are given. This model will be useful for determining the length of the periodic inspection cycle.

A Study on the Preparedness of Port State Control for the Enforcement of NIR (NIR의 도입에 따른 항만국통제 대응방안에 관한 소고)

  • Kim, Chu-Hyong
    • Journal of Navigation and Port Research
    • /
    • v.38 no.2
    • /
    • pp.141-146
    • /
    • 2014
  • NIR(New Inspection Regime, hereinafter NIR) relating to the PSC(Port State Contorl, hereinafter PSC) has implemented in Asia-Pacific region under Tokyo-MOU from last January 2014. The most noticable difference between NIR and existing TF(Target Factor, hereinafter TF) is to evaluate company performance and to conduct PSC with flexible inspection interval on the basis of Ship Risk Profile; High Risk Ship, Standard Risk Ship and Low Risk Ship. Particularly deficiencies related to ISM Code, more than 5 deficiencies and detention record have a serious effect on the evaluation of Ship Risk Profile. Therefore ship and company are requested to ensure proper implementation of Safety Management System for the changed PSC tendency. Also RO(Recognized Organization, hereinafter RO) and Administration respectively should take suitable actions different to previous measures, such as implementation of cooperation and support system between vessel and company, changing subject and object for avoiding Mannerism in SMS audit, strengthening supervision on RO by Administration and establishment of private-public Partnership network.

정보보호관리체계 인증 제도 소개 및 추진 방향

  • 장상수;김학범;이홍섭
    • Review of KIISC
    • /
    • v.11 no.3
    • /
    • pp.1-15
    • /
    • 2001
  • 인터넷이 급속하게 확산되면서 그 동안 오프라인 환경에서만 가능하던 많은 일들을 사이버 상에서도 가능하게 해 준 반면에 해킹이나 바이러스 등 새로운 보안위협도 증가하게 되었다. 이제까지 국내기업이나 기관의 정보보호에 대한 투자는 기술적인 대응책 위주로 진행되어 왔으나 정보보호 관련 사고는 여전히 증가세를 보이고 있다. 이것은 기술적 대응만으로는 정보보호 관련 사고를 줄일 수 없다는 것을 나타내는 것이다. 최근 기업이나 조직에서는 산발적인 보안관리에서 종합적이고 체계적인 정보보호관리체계가 요구되고 있으며 이용자 보호 및 B2B, B2C간 전자상거래에 의한 상호 안전성, 신뢰성 등 사회적 요청과 전자정부 구현, 지식정보화 사회 기반 조성을 위한 국가적 요청 등 정보 보호관리에 관하여 제3자에 의한 독립적이고 객관적인 점검 및 평가를 통하여 적정 여부를 확인시켜주는 인증제도의 필요성이 대두되고 있다. 본 고에서는 국내외 정보보호관리체계 인증 제도의 동향 및 국내 실정에 맞는 바람직한 인 증제도 추진 방향과 향후 발전 방향에 대하여 살펴보고자 한다.

  • PDF

Advanced ePOST Service Architecture (차세대 ePOST 서비스 아키텍처)

  • 김동호;박정준;김진석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.409-411
    • /
    • 2004
  • 인터넷의 급속한 확산과 정보통신산업의 성장으로 개인 및 기업의 경영환경은 많은 변화를 가져왔으며, 우체국 서비스도 보다 향상된 품질을 요구하고 있다. 2000 년부터 시작된 우체국 전자상거래 사업인 인터넷우체국은 지속적인 서비스의 추가로 회원 및 매출액의 증가를 보이고 있으나, 보다 내실을 쌓기 위해서는 전반적인 서비스의 점검과 보다 체계적인 구조의 새로운 서비스 발굴을 필요로 하고 있다. 따라서 이 논문에서는 현행 인터넷 우체국의 현황을 분석하고 향후 서비스 아키텍처에 대하여 제시하고자 한다.

  • PDF

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

A Study of New High Temperature Grading for Modified and Unmodified Asphalt Binders (개질 및 비개질 아스팔트 바인더의 새로운 고온등급 연구)

  • Huh, Jung-Do;Cho, Gyu-Tae;Nam, Young-Kug
    • International Journal of Highway Engineering
    • /
    • v.3 no.2 s.8
    • /
    • pp.91-102
    • /
    • 2001
  • On the basis of several experiments peformed, Bahia et al. (1998) concluded that the current Superpave PG-grading system failed to characterize grading specification of fill modified binders. This conclusion motivates us to investigate the correct grating system suited for modified asphalt binders. The main concept of this development is originated from the relationship between rut depth and binder properties at high temperatures. A new grading system for modified asphalt binders suggested here somewhat resembles to the unmodified binder grading one developed by Huh et al. (2000). Thus, this investigation will provide a unified single theoretical equation of high temperature grading that can apply both to modified and unmodified binders, and will check its effectiveness with the laboratory and the field rut data reported by independent studies. Successful results observed may allow to construction of a correct grading system in the near future.

  • PDF