• Title/Summary/Keyword: 설계 기준 위협

Search Result 61, Processing Time 0.028 seconds

Chemical/Biological/Radiological Protective Facility Entering Time Estimation Simulation with Procedure Analysis (화생방 방호시설의 행동 절차 분석을 통한 진입 소요시간 예측 시뮬레이션)

  • Park, Sun Ho;Lee, Hyun-Soo;Park, Moonseo;Kim, Sooyoung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.5
    • /
    • pp.40-48
    • /
    • 2014
  • As CBR(Chemical, Biological, and Radiological) attack increases, the importance of CBR protective facilities is being emphasized. When CBR warfare emerges, a task force team, who exist outside of CBR protective facility, should enter the CBR protective facility through neutralizing process in CCA(Contamination Control Area) and TFA(Toxic Free Area). If a bottleneck occurs in the process or zones, the task force team cannot enter the CBR protective facility efficiently and may cause inefficiency in its operation performance or result in casualties. The current design criteria of the CBR protective facility is only limited to ventilation system and it does not consider how much time it takes to enter the facility. Therefore, this research aims to propose the entering time estimation model with discrete event simulation. To make the simulation model, the procedure performed through CCA and TFA is defined and segmented. The actual time of the procedure are measured and adapted for the simulation model. After running the simulation model, variables effecting the entering time are selected for alternatives with adjustments. This entering time estimation model for CBR protective facility is expected to help take time into consideration during the designing phase of CBR protective facility and help CBR protective facility managers to plan facility operation in a more realistic approach.

A Study on the Concept of Operations and Improvement of the Design Methodology for the Physical Protection System of the National Infrastructure - Focused on Nuclear Power Plants - (국가기반시설 물리적 방호체계 운영개념 및 설계방법 개선방안 연구: 원자력발전소를 중심으로)

  • Na, Seog-Jong;Sung, Ha-Yan;Choi, Sun-Hee
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.9-38
    • /
    • 2019
  • As the scales & density of the Korean national infrastructures have been increased, they will be identified as rich and attractive potential targets for intensified North Korea's attack in the rear region and terrorism attack. In addition, due to changes in security environment such as drone threats and lack of security forces under the 52-hour workweek law, I think that it is the proper time point to reevaluate the effectiveness and appropriateness of the current physical protection system and its shift to a new system. In this study, the direction and improvement of the perimeter physical protection systems of the national infrastructures are to be studied from the viewpoints of its concepts of operations and design methodology, focusing on the nuclear power plant. The reason why we focus on nuclear power plants is because they cause wide-range and long-term damages caused by radioactive materials disperal and pollution, along with short-term damage caused by the interruption of electricity generation in the event of damage to nuclear power plants. With the aim of extracting improvement directions, as we will comprehensively review domestic research trends and domestic·overseas related laws, and consider Korea's specificity, we try to reframe the concept of operation - systematization, mobilization and flexibility -, and establish criteria on system change. In order to improve the technical performance of the new perimeter physical protection system, we study on high-fidelity·multi-methodology based integrated design methodology, breaking from individual silo-type design methods, and I suggest improvement of government procurement, its expansion to export business and other national infrastructure.

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

A Design on Security Governance Framework for Industry Convergence Environment (산업융합환경을 위한 보안 거버넌스 프레임워크 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.33-40
    • /
    • 2015
  • According to arriving convergence environment which can create new value-added converged between industry and ICT technology, It has made economic growth and improve the quality of life. However this convergence environment provide not only advantage but also various security problems resulting from generating converged security threats. For resolving this security problem, we need to approach to security problem in the integrated view not the fragmentary view which cover only technical approach. So This study developed security governance framework which can manage trustful security governance in multidimensional view which cover strategy, managerial/operational and technical view. Therefore this framework can construct trustful security management system which can help top management team to engage in security management directly and organizational member to perform security activities and have responsibility for themselves as suggesting single standard for security management.

Humidity Change Rate Analysis for Various Waterproofing Method in Underground Structures During Winter Season (지하 구조물 동절기 온도조건에서의 방수공법별 습도 변화량 분석)

  • An, Ki-Won;Lee, Yeon-Sil;Lee, Jung-Hoon;Song, Je-Young;Oh, Sang-Keun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.1
    • /
    • pp.118-125
    • /
    • 2016
  • This paper proposes the appropriate waterproofing methods for underground structures after applying different types of waterproofing materials on the concrete test specimens and selecting the best results out of humidity testing in winter conditions. Results of the testing showed that the underground structures absolutely require relevant waterproofing application based on the environmental conditions; when applied with interior waterproofing, the results showed that the concrete maintained high level of humidity and reinforcing steel within the concrete layer corroded. However, when applied with exterior waterproofing, it was shown that the waterproofing layer prevent direct contact with water and concrete, thereby protecting the concrete structure and improving overall durability. It follows that during underground structure construction, exterior waterproofing methods are have shown by an effective method for improving the durability as well as providing a comfortable interior environment for users.

A Study on Smart EDR System Security Development (Smart EDR 시스템구축을 위한 보안전략과 발전방안)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.41-47
    • /
    • 2020
  • In the corporate information system environment, detecting and controlling suspicious behaviors occurring at the end point of the actual business application is the most important area to secure the organization's business environment. In order to accurately detect and block threats from inside and outside, it is necessary to be able to monitor all areas of all terminals in the organization and collect relevant information. In other words, in order to maintain a secure business environment of a corporate organization from the constant challenge of malicious code, everything that occurs in a business terminal such as a PC beyond detection and defense-based client security based on known patterns, signatures, policies, and rules that have been universalized in the past. The introduction of an EDR solution to enable identification and monitoring is now an essential element of security. In this study, we will look at the essential functions required for EDR solutions, and also study the design and development plans of smart EDR systems based on active and proactive detection of security threats.

A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment (캠퍼스 환경에서 적응적인 정보보안을 위한 통합 보안정책의 설계)

  • Ko, Bong-Koo;Park, Jong-Seon;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.617-624
    • /
    • 2014
  • A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.

A Research on the improvement of domestic IoT security certification system (국내 IoT 보안인증 제도 개선 연구)

  • Lee, Yongpil;Suh, YungJin;Lee, SangGeol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.79-92
    • /
    • 2021
  • In a society where ICT technology is converged, the use of various network-connected devices such as IoT is spreading. Network-connected devices are inevitably exposed to the threat of hacking such as information leakage, and countermeasures need to be prepared to respond. Security certification system for IoT devices has been introduced to promote security of IoT products, and for this purpose, legalization and standardization of certification standards and methods are in progress. In line with this, in Korea, as the Information and Communication Network Act was revised in 2020, ICT convergence devices connected to the network were newly defined as "information and communication network connected devices," and the basis for the security certification system is being established. We summarized related domestic and foreign trends and suggest specific considerations for implementing the security certification system for IoT devices in South Korea.

Analysis of solar power generation efficiency through spatiotemporal analysis of solar radiation on the Korean Peninsula using GK2A (천리안2위성을 활용한 한반도 일사량의 시공간적 분석을 통한 태양광 발전 효율 분석)

  • Hwang, Seunghyun;Baik, Jongjin;Kim, Hyeonjoon;Byun, Jongyun;Cha, Hoyoung;Jun, Changhyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.457-457
    • /
    • 2022
  • 최근 기후변화로 인한 위기가 인류의 생존을 위협하면서 전 지구적으로 기후변화에 대응하기 위한 탄소 중립 대책을 모색하고 있으며, 지속가능한 신재생에너지에 대해 주목하고 있다. 산업통상자원부는 2034년까지 총 발전량 중 신재생에너지의 비율을 25.8%까지 증가시키는 것을 목표로 신재생에너지의 발전 비율을 증가시키기 위한 다양한 노력을 기울이고 있다. 특히, 신재생에너지 중 가장 많은 비중을 차지하고 있는 태양광 발전은 비교적 광범위한 부지를 필요로 하고 있으며, 환경 및 지형적 영향이 크게 작용하는 만큼 발전 시설 부지 선정 및 운용 계획을 위한 면밀한 분석이 필수적이다. 그러나, 태양광 발전 활용 계획을 수립하기 위해 고려할 수 있는 지상 관측 일사량 및 일조량 데이터는 상당히 제한적이며 관측 밀도가 조밀하지 않다는 한계점이 있다. 본 연구에서는 천리안위성의 후속으로 발사된 천리안2위성의 산출물인 일사량 데이터를 활용하여 한반도 영역에서의 일사량에 대한 시·공간적 분석을 수행하였으며, 이를 기반으로 각 지역적 특성을 파악하고, 토지 피복 유형에 따른 태양광 발전의 효율 정도를 분석·평가하였다. 본 연구의 결과는 계측 지역 및 미계측 지역에서의 시공간적인 태양광 에너지의 효율성에 대한 정보를 제공함에 따라 태양광 발전을 위한 관련 시설물들의 최적 설치 위치 및 규모 등에 대한 설계 기준 마련에 활용될 수 있을 것으로 판단된다.

  • PDF