• Title/Summary/Keyword: 안전 관리 네트워크 시스템

Search Result 364, Processing Time 0.028 seconds

A Study on Rethinking the Operating of Counter-terrorism Systems in South Korea (한국 대테러시스템 운영의 재모색)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.153-170
    • /
    • 2017
  • The purpose of this study is to rediscover the operation of anti-terrorism system focusing on the system approach and crisis management approach for counter terrorism in Korea. According to the results of this study, it is required to establish a link between open systems and integrative system focusing on functional linkage of counter-terrorism systems, and cooperative measures with private sectors in the dimension of governance activation. Further, it is necessary to prepare legal foundations for the cooperation with private sectors and then promote open consciousness transformation through the partnership with private security for anti-terrorism activities. In addition, in its preventive stage, it is required to prepare legal systems related to biochemical terrorism for stronger regulations through crisis-managerial approach. Next, in its preparatory stage, it is necessary to prepare education and enact named Terror Prevention Day for increasing terror safety consciousness, and then extend citizen reporting reward systems to enable citizens to participate and become interested voluntarily in terror prevention. Also, it is essential to establish the substantial training system for preparing for terror occurrence. Moreover, in its response stage, it is urgent to construct networks between related institutions to manage field and spot responses with integrative management systems through information sharing. Furthermore, in its restoration stage, it is indispensible to prepare long-term management systems for injured persons and families of the deceased from terror incidents.

  • PDF

A Web-Based Data Backup Method (웹 기반의 데이터 백업 방안)

  • Lee Bong-Seob;Han Kun-Hee;Choi Shin-Hyeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.6
    • /
    • pp.486-490
    • /
    • 2005
  • The web is used widely and the users of the majority are depending to get the information on web, the necessity of the data management by web is increasing. The sudden system failure frequently occurs from network environment, we must protect data from this danger. In this paper, we present web based data management method, which is composed of two type backup and restoration. This method support data management through web browser and provides systematic, efficient and stable data management on web.

  • PDF

User Authentication and Secure Data Communication Based on Mobile Phone for Medical Sensor Network (의료 센서 네트워크에서 휴대폰을 이용한 사용자 인증 및 안전한 데이터 통신 방안)

  • Kim, Jee-Hyun;Doh, In-Shil;Park, Jung-Min;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.19-28
    • /
    • 2012
  • Wireless sensor network provides services anytime and anywhere they are requested. Especially, medical sensor network based on biosensors is applied a lot to biotechnology and medical engineering. In medical sensor network, people can make their health checked at home free from temporal and spatial constraints. In ubiquitous healthcare environment, people can get instant help even in the emergency, and in hospital, patients can be taken care of efficiently. In this environment, health and life related data are delivered, and the privacy and security of personal data are very important. In this paper, we propose user authentication and data communication mechanism in two modes, normal and urgent situation using cellular phone. Through our proposal, data can be transferred in quick and secure manner.

Analyses of Total Information Security Infrastructure of School Affairs Information System for Secure Ubiquitous-Campus (안전한 Ubiquitous-Campus를 위한 학사정보시스템의 종합정보보안 체계 구축에 관한 분석)

  • Kim, Jung-Tae;Lee, Jun-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.287-291
    • /
    • 2006
  • E-learning has increased on importance as people realize that the use of technology can improve the teaming process. Consequently, new learning environments have been developed. However, in general they are oriented to address a specific e-learning functionality. Therefore, in most of the cases, they are not developed to interoperate with other e-learning tools, which makes the creation of a fully functional e-learning environment more difficult. We analyses of total information security infrastructure of school affairs information system for secure ubiquitous campus.

  • PDF

A Study on Vulnerability Analysis and Countermeasure for Gas SCADA (가스 SCADA 시스템 보안 취약성 분석 및 대책에 관한 연구)

  • Kim, Yun-Eui;Youn, Chun-Kyun;Lee, Hyun-Kwan;Kim, Young-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2029-2032
    • /
    • 2003
  • 이 연구는 국가 기간산업망인 전력. 철도, 가스, 항공 통의 SCADA(Supervisory Control And Data Acquisition) 시스템 보안을 목적으로 현재 운영중인 가스 SCADA에 대해 시스템, 네트워크, 관리방법에 대해 보안 취약성 평가분석 및 모의해킹을 실시하고 취약분야별 대응방안을 제시하였다. 또한 이들의 결과를 종합하여 Gap 분석을 실시함으로써 사이버 테러 린 해킹 등에 보다 안전한 시스템을 구축하기 위한 방안을 제시하였다.

  • PDF

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

LoRa LPWAN-based Wireless Measurement Sensor Installation and Maintenance Plan (LoRa LPWAN 기반의 무선 계측센서 설치 및 유지관리 방안)

  • Kim, Jong-Hoon;Park, Won-Joo;Park Sang-Hyun, Jin-Oh
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.1
    • /
    • pp.55-61
    • /
    • 2020
  • Social infrastructure facilities that have been under construction since the country's high-growth period are undergoing rapid aging, and, thus, safety assessments of large structures such as bridge tunnels, which can be directly linked to large-scale casualties in the event of an accident, are necessary. It is difficult to construct economical and efficient wireless smart sensor networks that improve structural health monitoring (SHM) because the existing wire sensors have a short signal reach. However, low-power wide-area networks (LPWANs) are becoming popular within the Internet of Things, and enable economical and efficient SHM. In this study, the technology trends of a wireless measuring sensor based on LoRa LPWANs were investigated, and an installation and maintenance plan for this type of sensor is proposed.

Estimation of irrigation return flow in agricultural reservoirs using EPA-SWMM (EPA-SWMM 모델을 활용한 관개회귀수량 추정)

  • Ji-Hyeon Shin;Won-Ho Nam;Dong-Hyun Yoon;In-Kyun Jung;Kwang-Ya Lee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.50-50
    • /
    • 2023
  • 농업용수는 우리나라 수자원 사용량 중 약 61%를 차지하고 있으며, 효율적인 수자원 관리를 위한 핵심적인 관리목표 중 하나이다. 논으로 공급되는 관개용수는 필지에서의 증발산량 및 침투량과 용배수로를 통한 자연적 및 인위적인 배수량으로 소비된다. 관개회귀수량 (irrigation return flow)은 관개를 통해 농경지에 공급된 수량 중 증발산에 의해 소비되지 않고 침투 또는 배수 등을 통해 하천으로 회귀되는 수량이다. 관개회귀수량 및 회귀율은 농업용수 물순환 관리에 중요한 역할을 하며, 관개용수 사용량 결정, 합리적인 용수의 공급과 수요 관리계획 및 수질 관리계획 등에 중요한 요소로 작용한다. 하지만, 기상, 작물, 토양 등의 물리적 요소와 농업용수 공급량, 물꼬 조절, 담수심 관리 방식 등 인위적 요소의 영향을 동시에 받기 때문에 그 기작이 복잡한 특징을 갖는다. 따라서, 합리적인 수자원 개발 계획 및 관리를 위해 정확한 관개회귀수량 추정 연구가 필수적이다. 본 연구에서는 전국 4대강 (한강, 금강, 낙동강, 영산강·섬진강) 권역 중심의 9개 대상지구를 선정하였으며, EPA-SWMM (Environmental Protection Agency-Storm Water Management Model) 모델 기반 수로 네트워크 모의를 활용한 수원공 단위 관개회귀수량을 산정하고자 한다. EPA-SWMM 모의 시 공급량은 농업기반시설관리시스템 (Rural Infrastructure Management System, RIMS) 저수율 자료와 수원공 단위용수량을 활용하였으며, 모의결과 시점부 공급량 및 배수량과 강수량, 증발산량 및 침투량을 활용하여 신속회귀수량과 지연회귀수량을 추정하였다. 본 연구 결과는 최적 농업용수 공급방안에 대한 기초자료 구축에 활용 가능할 것으로 사료된다.

  • PDF

Development of Infrastructure automatic alert populating system in Geotechincal Monitoring field (지반 분야에서의 시설물 안전위험 자동화 상황전파 시스템 개발)

  • Jung, Jea-Hyen;Kim, Yong-Su;Han, Sang-Jea
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.933-939
    • /
    • 2010
  • Gathering information and systemization of infrastructure disaster management is to reduce uncertainties in making decisions and maximize the number of alternations for reasonable decision making. The key object is the progress report & propagation automation system based on sensors, which is major for providing objective data to realize and support decision makings and delivering decision to a certain area, department, manager and other people rapidly. Collecting, reviewing and database of existing progress report & propagation manual in order to achieve networking of safety management on major social infrastructure of the nation, materialization of field-oriented intelligent business process by developing mobile safety management command transmission device and integrating it into facility safety management network.

  • PDF

Development of Security Audit Agent for the Safety in School Network (학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발)

  • Park, Jong-O;Lee, Chul-Hyun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2002
  • Internet has being grown explosively in recent years, hence it becomes easy to search and access information. But it is happening frequently to access illegally into the systems and data, there are many damage caused by them. So, it is very important that we construct security plan for the systems and data. It is not exception on school network being diffused to all schools. But, we have weakness about security to manage server and network safely. So it is causing much anxieties. In this paper, we searched security points make sure of safety of school network, and developed security audit agent helping management of security. Through simple registration process, this agent is able to audit basic and important security problems about not only server systems but also pc systems, and notify to administrator automatically. It is expected to provide efficiency in managing school network.

  • PDF