• Title/Summary/Keyword: Industrial Technology Leakage

Search Result 189, Processing Time 0.03 seconds

A Study on the Possibility of Blockchain Technology Adoption in the Logistics Industry (물류산업 내 블록체인 기술 도입 가능성 연구)

  • Kye, Dong Min;Hur, Sung Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.2
    • /
    • pp.116-131
    • /
    • 2022
  • With the recent progress of the 4th industrial revolution, the logistics industry is also making efforts to introduce smart logistics, and various attempts are being made to spread logistics informatization, which is the core of smart logistics. Among these, blockchain technology is considered as a technology that will contribute to the spread of logistics informatization and is being applied to various fields. Accordingly, in this study, to discuss the applicability of blockchain technology to the logistics industry, the characteristics of blockchain technology were defined, related cases were reviewed, and a survey was conducted on the possibility of application in the industry. Blockchain technology can be defined as having the characteristics of economic feasibility, speed, transparency in terms of work efficiency, and scalability, decentralization (decentralization), reliability (security) in terms of added value creation. It was confirmed that many are being introduced in the fields of distribution, finance, personal information, and public services. As a result of the survey on the logistics industry, it was confirmed that the level of informatization of the logistics industry had entered the stage of generating profits by using information, but the industry was passive in sharing and utilizing information due to concerns about information leakage. Nevertheless, the awareness and expectation of the need for informatization is high, and it is expected that the informatization of the logistics industry and realizing smart logistics based on it will advance one step further with the introduction of blockchain technology in the future.

Research on major technology trends in the field of financial security through Korea and foreign patent data analysis (국내외 특허 데이터 분석을 통한 금융보안 분야 주요 기술 동향 분석연구)

  • Chae, Ho-Kuen;Lee, Jooyeoun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.53-63
    • /
    • 2020
  • Electronic financial transactions are also actively increasing due to the rapid spread of information communication media such as the Internet, smart devices, and IoT, but as a derivative by-product, threats of financial security such as leakage of various personal information and hacking are also increasing. Therefore, the importance of financial security against this is increasing, but in Korea, financial security technology is relatively insufficient compared to advanced countries in the field of financial security, such as Active-X. Therefore, this study aims to present the major development direction in the domestic financial security field by comparing key technology trends with IPC classification frequency analysis, keyword frequency analysis, and keyword network analysis based on domestic and foreign financial security-related patent data. In conclusion, it seems that recent domestic and foreign trends have focused on the development of related technologies according to the development of smart device-based electronic financial services. Accordingly, it is intended to be used as the basis data for technology development of financial security by mapping the trend of financial security research trend and technology trend analysis through thesis data analysis that reflects the research of the preceding aspect as the technology of commercialization in the future.

A Study on the Stress Analysis of Oil Hydraulic Piston Pump with a Swash Plate Type (사판식 유압 피스톤 펌프의 응력해석에 관한 연구)

  • Jeong, Bong-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2424-2429
    • /
    • 2015
  • In an oil hydraulic piston pump, the cylinder block and valve plate in high speed relative sliding motion have the characteristics which should be extremely controlled for the optimization of leakage and friction losses, and pressure-resistance design of them is very important for high pressure performance. But the studies on the stress analysis of those parts have not been performed briskly. Therefore, in this paper, the stress and displacement distributions of the cylinder block and valve plate in the oil hydraulic piston pump with a swash plate type are discussed through the static stress analysis using CATIA V5. The stress and displacement of the cylinder block are more influenced by the axial pressure than by the radial pressure, and are larger by approximately 66% and 30%, respectively. The results show that a review of the material and shape of the valve plate is required.

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.

Comparison of key management systems across different industries (다양한 산업에서의 키 관리 시스템 비교 분석)

  • Woojoo Kwon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.55-61
    • /
    • 2024
  • As the digital environment becomes more complex and cyber attacks become more sophisticated, the importance of data protection is emerging. As various security threats such as data leakage, system intrusion, and authentication bypass increase, secure key management is emerging. Key Management System (KMS) manages the entire encryption key life cycle procedure and is used in various industries. There is a need for a key management system that considers requirements suitable for the environment of various industries including public and finance. The purpose of this paper is to derive the characteristics of the key management system for each industry by comparing and analyzing key management systems used in representative industries. As for the research method, information was collected through literature and technical document analysis and case analysis, and comparative analysis was conducted by industry sector. The results of this paper will be able to provide a practical guide when introducing or developing a key management system suitable for the industrial environment. The limitations are that the analyzed industrial field was insufficient and experimental verification was insufficient. Therefore, in future studies, we intend to conduct specific performance tests through experiments, including key management systems in various fields.

  • PDF

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

A Study on the Synthesis and Characterization of Polymerizable Bolaamphiphiles (중합성 Bolaamphiphile 분자의 합성과 특성에 관한 연구)

  • Jin, Ji Young;Ko, Seuk-Beum;Jeong, Myung Hee;Choi, Kyoung Hee;Lee, Youn-Sik
    • Applied Chemistry for Engineering
    • /
    • v.8 no.1
    • /
    • pp.59-66
    • /
    • 1997
  • Di(10-hemisuccinyloxy)decyl muconate(DDM) and di(6-hemisuccinyloxy)hexyl muconate(DHM) were synthesized, and showed a phase transition in an aqueous solution at 97 and $79^{\circ}C$, respectively. They did not form liposomes by themselves or even in the presence of cholesterol or dioleoylphosphatidylethanolamine(DOPE), but did form liposomes when they were mixed with phosphatidylcholine(PC). DHM molecules in liposome membranes were readily polymerized via 1,2-polymerization process on exposure to 254nm. Liposomes composed of DOPE/dioleoylphosphatidylcholine(DOPC)/DHM(3/3/1) were stable at neutral pH, but leaky at weakly acidic pH. The leakage of entrapped calcein from liposomes in phosphate-buffered saline (PBS, $37^{\circ}C$) of pH 4.8 and 5.8 was complete within 30 and 50 min, respectively. The release of toke entrapped calcein was increased with decreasing pH such that 50% and 100% of the calcein were released at pH near 5.5 and 5.0, respectively.

  • PDF

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

Study on the Current Safety Management Status and Safety Improvement of Gas Valve (가스밸브의 안전관리 현황 및 안전성 향상 연구 (모니터링을 중심으로))

  • Choe, Byeong-Gyu;Cha, Min-Chang;Kim, Jin-Jun
    • Journal of the Korean Institute of Gas
    • /
    • v.20 no.5
    • /
    • pp.57-63
    • /
    • 2016
  • Though a valve is a very important part in a system to control properly, it has potential failure caused by gap from valve stem to ball connection, and abrasion, crack, fixation causing operational trouble and accidents. 64% of the valve failure in the real case was the failure of airtightness and most accidents of leakage and explosion were occurred while fixing the failure. While there are no proper safety manual, maintenance procedure and regulation for industrial valves excluding safety valve, safety management for the valves is left to the discretion of the maintenance company. Strict maintenance that removes hazards and emergency response procedure are required to prevent and reduce the loss of accident. This study suggests safety enhancement measures through valve monitoring by investigating the status of use of valve and current maintenance. Enhancement of gas safety management can be acquired by a monitoring system that provides diagnosis for valve status, monitoring real-time gas leakage, management of entire cycle lifetime that can reduce maintenance cost.