• Title/Summary/Keyword: Comprehensive Security

Search Result 464, Processing Time 0.022 seconds

An Evaluative Study of the Operational Safety of High-Speed Railway Stations Based on IEM-Fuzzy Comprehensive Assessment Theory

  • Wang, Li;Jin, Chunling;Xu, Chongqi
    • Journal of Information Processing Systems
    • /
    • v.16 no.5
    • /
    • pp.1064-1073
    • /
    • 2020
  • The general situation of system composition and safety management of high-speed railway terminal is investigated and a comprehensive evaluation index system of operational security is established on the basis of railway laws and regulations and previous research results to evaluate the operational security management of the high-speed railway terminal objectively and scientifically. Index weight is determined by introducing interval eigenvalue method (IEM), which aims to reduce the dependence of judgment matrix on consistency test and improve judgment accuracy. Operational security status of a high-speed railway terminal in northwest China is analyzed using the traditional model of fuzzy comprehensive evaluation, and a general technique idea and references for the operational security evaluation of the high-speed railway terminal are provided. IEM is introduced to determine the weight of each index, overcomes shortcomings of traditional analytic hierarchy process (AHP) method, and improves the accuracy and scientificity of the comprehensive evaluation. Risk factors, such as terrorist attacks, bad weather, and building fires, are intentionally avoided in the selection of evaluation indicators due to the complexity of risk factors in the operation of high-speed railway passenger stations and limitation of the length of the paper. However, such risk factors should be considered in the follow-up studies.

Comprehensive Security and Crisis & Emergency Management for Protecting Critical Infrastructure

  • Lee, Jae-Enn
    • International Journal of Contents
    • /
    • v.5 no.3
    • /
    • pp.71-78
    • /
    • 2009
  • Recently, interest has heightened over 'critical infrastructures' and their reliability in the face of potential terrorist attack. Assault on any of the critical infrastructures as transportation, power, water, telecommunications, and financial services, entails great consequences for their users as well as the other interdependent critical infrastructures. How to protect our vital critical infrastructures is the key question in this paper. The purpose of this article is to suggest the implications for crisis and emergency management to protect the critical infrastructures in our society. For achieving the purpose, we examined the concept of comprehensive security, national crisis, and critical infrastructure and, using the holistic approach, we examined the comprehensive emergency management for suggesting the implications for establishing the critical infrastructure protection system; building up the high reliability organization, organizing and partnering, assessing the risk, preparing first responders, working with private owners of critical infrastructures, working with communities, improving the administrative capacity.

Security for CALS Implementation (CALS의 단계별 구현을 위한 보안기술)

  • 김중인;김석우
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.51-67
    • /
    • 1996
  • Recently the interests in NII, CALS/EC, and security are rapidly increasing. However, only one of the security issues for CALS implementation, i.e., the security for EDI implementation, has been presented in the literature. No comprehensive discussion about CALS security including other CALS applications exists. This paper intends to present such a comprehensive analysis for the security requirements and standards for the well-recognized two-phase CALS implementation. We present a framework for CALS security encompassing security protocols and systems that are arranged into the framework in terms of the CALS implementation phases, application systems, and communication modes. This framework is followed by brief descriptions of the security services and mechanisms for each CALS application.

  • PDF

A Comprehensive Survey of TPM for Defense Systems

  • Cheol Ryu;Jae-Ho Lee;Do-Hyung Kim;Hyung-Seok Lee;Young-Sae Kim;Jin-Hee Han;Jeong-nyeo Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1953-1967
    • /
    • 2024
  • Lately, there has been a notable surge in the defense industry's efforts to develop highly advanced intelligent systems. These systems encompass sophisticated computing platforms that boast an impressive level of autonomy. However, it's important to acknowledge that these very systems are not impervious to vulnerabilities stemming from both hardware and software tampering. Within the context of this discourse, our focus of the survey is directed towards the hardware security module. This component stands out for its capability to offer a significantly heightened level of protection when compared to conventional software-based techniques. Through the lens of this paper, we embark on a comprehensive survey of Trusted Platform Module (TPM), a hardware security module, shedding light on its potential to fortify the defense against threats that emerge from various vectors of attack.

Detection Mechanism on Vehicular Adhoc Networks (VANETs) A Comprehensive Survey

  • Shobana, Gopalakrishnan;Arockia, Xavier Annie R.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.294-303
    • /
    • 2021
  • VANET is an upcoming technology with an encouraging prospect as well as great challenges, specifically in its security. This paper intends to survey such probable attacks and the correlating detection mechanisms that are introduced in the literature. Accordingly, administering security and protecting the owner's privacy has become a primary argument in VANETs. To furnish stronger security and preserve privacy, one should recognize the various probable attacks on the network and the essence of their behavior. This paper presents a comprehensive survey on diversified attacks and the recommended unfolding by the various researchers which concentrate on security services and the corresponding countermeasures to make VANET communications more secure.

A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'- (포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 -)

  • Kim Tai Jin
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.115-126
    • /
    • 2022
  • This study studied the working relationship between national crisis management and national defense elements from a comprehensive security perspective. The elements of national defense are presented in the Integrated Defense Act. Therefore, by presenting the principles, problems, and alternatives of integrated defense, the study was conducted with the aim of protecting the lives and property of the people in the event of a national crisis and strengthen national security. As a theoretical background, an analysis frame was envisioned based on the four stages of crisis management in the 'Comprehensive Crisis Management Model' and the 'Basic Guidelines for National Crisis Management'. Through this, four domestic and foreign case studies were conducted. As a result of the study, it can be confirmed that related laws, organizations, and public awareness must be provided in order for the national defense elements at each stage of national crisis management to work well. For the completeness of national crisis management, it was suggested that the enactment of the Framework Act on National Crisis Management, the establishment of an integrated defense plan, linked training, C4I for communication, strengthening the capabilities of local government heads, and national defense elements of firefighters.

A study on security oversight framework for Korean Nuclear Facility regulations

  • So Eun Shin;Heung Gyu Park;Ha Neul Na;Young Suk Bang;Yong Suk Lee
    • Nuclear Engineering and Technology
    • /
    • v.56 no.2
    • /
    • pp.426-436
    • /
    • 2024
  • Nuclear security has been emphasized to ensure the safety of the environment and humans, as well as to protect nuclear materials and facilities from malicious attacks. With increasing utilization of nuclear energy and emerging potential threats, there has been a renewed focus on nuclear security. Korea has made efforts to enhance the regulatory oversight processes, both for general and specific legislative systems. While Korea has demonstrated effective nuclear security activities, continuous efforts are necessary to maintain a high level of security and to improve regulatory efficiency in alignment with international standards. In this study, the comprehensive regulatory oversight framework for the security of Korean nuclear facilities has been investigated. For reference, the U.S. regulatory oversight frameworks for nuclear facilities, with a focus on nuclear security, and the motivations of changes in regulatory oversight framework have been identified. By comparing these regulatory programs and frameworks, insights and considerations for enhancing nuclear security regulations have been identified. A comprehensive security inspection program tailored for the Korean regulatory oversight framework has been proposed, and has been preliminarily applied to hypothetical conditions for further discussion.

A Development of Comprehensive Framework for Continuous Information Security (기업의 지속적 정보보안 강화를 위한 접근법 개발)

  • Jeong, Tae-Seok;Yim, Myun-Seong;Lee, Jae-Beom
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.1-10
    • /
    • 2012
  • The growth in computer use has ushered increased concerns of information security throughout the world. Historically, researchers interested in the security of information systems have long investigated extensively themselves with building technological countermeasures in order to prevent several information security problems. However, due to infusion of more procedures and logical or physical devices within the information environment, no system can be completely secure. Therefore, keeping IT environment safe demands a more comprehensive understanding of the phenomenon, which requires broadening information security far beyond the technical aspects. This study is aimed at proposing a information security framework from holistic view.

A Study on the Change of the Trump Administration's Alliance Policy (트럼프 행정부의 동맹정책 변화에 관한 연구)

  • Choi, Won Sang;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.55-66
    • /
    • 2019
  • For the past 66 years, the Korea-U.S. alliance has been a typical asymmetric alliance in which the U.S. supports South Korea's security during the Cold War and South Korea gives some of its policy autonomy to the U.S. But Lee Myung-bak government military alliance the 'comprehensive strategic alliance' of the character, 'value of alliance', Park Geun-hye ' a global, 'Frontier of cooperation', the government.'reciprocal, comprehensive alliance' Moon Jae-in, the government and partnerships developed with ' euroui the development of national security strategy said. The purpose of this study is to explore ways to build a reciprocal and comprehensive Korea-U.S. alliance for the development of the Korea-U.S. alliance policy in order to ensure South Korea's policy autonomy following changes in the Trump administration's alliance policy. The results of the research show the need for Korea to participate in the U.S.-led 'India-Pacific Strategy' continue diplomatic efforts for the mutual economic benefits of the two countries and strengthen public diplomacy in order to build the Korea-U.S. alliance in a reciprocal and comprehensive manner.

A Study on Evaluation Technique of Network Security System (네트워크 보안시스템 보안성 평가 연구)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.33-39
    • /
    • 2009
  • The problems of current network security system, separated by a single element is checked. To improve this, this thesis is to find vulnerabilities in the network security systems, and network security systems, security equipment, organic to make sure each works is a comprehensive review. Automation also offers a way to check it, it was implemented.

  • PDF