• Title/Summary/Keyword: Industrial Security Management

Search Result 595, Processing Time 0.024 seconds

The Modeling of Management Data and Drones Recommendation for Military Operation Support Mission (군 작전지원 임무 수행을 위한 드론 추천 및 관리 데이터 모델링)

  • Park, Keun-Seog;cheon, Sang-pil;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.133-140
    • /
    • 2018
  • As the core technology of the 4th Industrial Revolution is applied to drone, the potential for growth in the field of unmanned aerial vehicles is very large, and the utilization of civilian & military fields in the domestic & foreign is increasing rapidly. Because application areas of drone in the civilian field is various, it is excellent in terms of cost effectiveness and high value in utilization when it is used for military operation support mission. Especially, in the case of the Air Force, it is expected that military usage effectiveness will be high if drone replaces various air operations support missions such as aircraft inspection, supply of military supplies, base security. We find out the missions that can utilize drones for military operations support and propose the recommendation and data management plan accordingly. We recommend the most suitable drones and equipment that perform similar missions in the private sector and propose the data modeling of relational database.

  • PDF

An Evaluation of Multi-Reservoir Operation Weighting Coefficients Using Fuzzy DEA taking into account Inflow Variability (유입량의 변동성을 고려한 Fuzzy DEA 기반의 댐 군 연계운영 가중치 대안 평가)

  • Kim, Yong-Ki;Kim, Jae-Hee;Kim, Sheung-Kown
    • IE interfaces
    • /
    • v.24 no.3
    • /
    • pp.220-230
    • /
    • 2011
  • The multi-reservoir operation problem for efficient utilization of water resources involves conflicting objectives, and the problem can be solved by varying weight coefficient on objective functions. Accordingly, decision makers need to choose appropriate weight coefficients balancing the trade-offs among multiple objectives. Although the appropriateness of the weight coefficients may depend on the total amount of water inflow, reservoir operating policy may not be changed to a certain degree for different hydrological conditions on inflow. Therefore, we propose to use fuzzy Data Envelopment Analysis (DEA) to rank the weight coefficients in consideration of the inflow variation. In this approach, we generate a set of Paretooptimal solutions by applying different weight coefficients on Coordinated Multi-reservoir Operating Model. Then, we rank the Pareto-optimal solutions or the corresponding weight coefficients by using Fuzzy DEA model. With the proposed approach, we can suggest the best weight coefficients that can produce the appropriate Pareto-optimal solution considering the uncertainty of inflow, whereas the general DEA model cannot pinpoint the best weight coefficients.

The consistency properties for management of RBAC relationship informations on the LMUX server environments (리눅스 서버 환경에서 RBAC 관계정보 관리를 위한 일관성 특성)

  • 오석균;김성열
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.05a
    • /
    • pp.91-96
    • /
    • 1999
  • Role-Based Access Control(RBAC) is an access control mechanism that reduce the cost of administering access control policies. The Admin Tool developed for RBAC Model manages relationship informations of user and role. In order to maintain the consistency of the information for these relationships, a set of properties defining consistency of the relationship informations is required. When it will be designed security systems applying RBAC policy on the Linux server system environments, this paper described consistency properties of relationship informations for information management of user and role relationships. It leads us to the development of minimal set obtainable the equivalent results of consistency properties for a more efficient Admin Tool implementation.

  • PDF

Optimal Layout of Vehicle Pedals Depending on the Types and Positions of Vehicle Pedals (페달 종류 및 위치에 따른 최적 페달 레이아웃 설정)

  • Choi, Jeong-Pil;Jung, Eui-S.;Jeong, Seong-Wook;Jeong, Seong-Wook
    • Journal of the Ergonomics Society of Korea
    • /
    • v.26 no.4
    • /
    • pp.91-101
    • /
    • 2007
  • The purpose of this study is to propose an optimal layout for the accelerator and brake pedals in sedan and SUV, and also to compare the pendant-type pedal with organ-type pedal. 12 male subjects participated in the experiment, the subjects were divided into 3 groups according to height percentile(under 50%ile, 50%ile to 75%ile, over 75%ile). Independent variables were seat height (H30), X and Y coordinates of the center of accelerator and brake pedals and the x and y relative distance between two pedals. Dependent variable was subjective ratings for lower body discomfort. The response surface methodology using a central composite design was employed to develop a prediction model for lower body discomfort of each pedal. It is noticeable that the lateral position of the accelerator in all groups was not statistically significant. The optimal locations of both pedals were found to be distinct according to the percentile of subjects. X distance from accelerator to brake of both-type pedals is similar. But Y distance from accelerator to brake of organ-type is less about 2-3cm than that of pedant-type.

ERP Implementation of Small and Medium Business: Lessons from Secui.com (중소기업의 ERP 시스템 구축 : 시큐아이닷컴 사례)

  • Whang, Jae-Hoon;Kim, Jong-Sun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.5
    • /
    • pp.198-206
    • /
    • 2006
  • It is a time honored value proposition that in rapidly changing business environment, only proactive and active companies will survive. Enterprise resource planning(ERP) system has been a competitive necessity. However, small and medium companies in Korea still need practical guidelines regarding on successful ERP implementation, especially in process issue identification and business goal setting. This case study investigates how Secui.com as an information security company founded in 2000 implemented an ERP system from the strategic perspective. Also it proposes the guidelines of how to establish an information system infrastructure and realize the benefits of IS-based management by ERP implementation.

  • PDF

A Study on Survivability Management Model for Information Systems Over Internet (인터넷에서 정보시스템의 생존성 관리 모델)

  • Kim, Hwang-Rae;Park, Jin-Sub
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1185-1193
    • /
    • 2006
  • The next generation networked information system over unbounded internet is open to various network attacks and incidents, so many users suffer from damage and financial loss. In this paper we propose a survivability management model to evaluate the tradeoffs between the cost of defence mechanisms for information systems with weighted service and the resulting expected survivability after a network attack or occurrence of incidents. By varying the level of defence in the simulation, we examine how survivability changes according to the defense level. We derive a cost/survivability and weighted service/survivability curve that managers can use to decide on the appropriate level of defense for the network system of their organizations.

  • PDF

A Study on the Proper Inspection Cycle Plan Through Reliability Analysis of One-Shot System (One-Shot System의 신뢰도 분석을 통한 적정 점검주기 방안 연구)

  • June-Young Lim;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.1
    • /
    • pp.48-54
    • /
    • 2023
  • Guided missiles are a one-shot system that finishes their purpose after being used once, and due to the long-term storage until launch, the storage reliability is calculated during development, and performance is maintained through periodic inspections until the life cycle arrives. However, the reliability standards applied in the development of guided missiles were established by analyzing data accumulated by the United States during long-term operation in the country, and since they are different from our environment, the 00 guided missiles that have been deployed in the armed forces for more than 10 years under the premise that there is a difference from actual reliability. As a result of verifying the appropriateness of the current inspection cycle by analyzing the actual reliability of the missile, the necessity of changing the inspection period was derived because it was higher than the predicted reliability. It is proposed to build and utilize a lifespan management system that can systematically collect all data such as shooting and maintenance results by classification, and to establish a reliable reliability standard based on the accumulated data.

Identification of unfavorable clause and directionality through the analysis of legal system of autonomous driving vehiecle in Korea (국내 자율주행자동차 관련 법률 및 제도 분석과 한계점 도출 및 방향성 제안)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.38-44
    • /
    • 2019
  • As 4th industrial revolution era has come, autonomous driving vehiecle gets its attention for commercialization and development and thus its impact on society. To this end, several countries such as US, England and Germany are preparing their own legal systems to come up with commercialization of autonomous driving vehiecle. In this country, Korea is also developing autonomous driving vehiecle and looking forward its commercialization yet the legal system of Korea lacks of laws, regulations, rules, guidelines and so on. Hence, it is our intention to look into Korean legal system providing the analysis of current Korean legal system in detail. This paper also provides further directions to have balance between commercialization success and risk management in this country and, as a result creates a small step toward 4th industrial revolution society.

A Design of File Leakage Response System through Event Detection (이벤트 감지를 통한 파일 유출 대응 시스템 설계)

  • Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.7
    • /
    • pp.65-71
    • /
    • 2022
  • With the development of ICT, as the era of the 4th industrial revolution arrives, the amount of data is enormous, and as big data technologies emerge, technologies for processing, storing, and processing data are becoming important. In this paper, we propose a system that detects events through monitoring and judges them using hash values because the damage to important files in case of leakage in industries and public places is serious nationally and property. As a research method, an optional event method is used to compare the hash value registered in advance after performing the encryption operation in the event of a file leakage, and then determine whether it is an important file. Monitoring of specific events minimizes system load, analyzes the signature, and determines it to improve accuracy. Confidentiality is improved by comparing and determining hash values pre-registered in the database. For future research, research on security solutions to prevent file leakage through networks and various paths is needed.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.