• Title/Summary/Keyword: Leakage Prevention System

Search Result 123, Processing Time 0.027 seconds

A Study on DLP System for Preventing Internal Information Leakage (내부정보유출방지를 위한 DLP시스템 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.121-126
    • /
    • 2018
  • The development of modern ICT and network technologies has made the business environment smart.and under such circumstances, a great deal of data is being generated, stored and used. The important information that becomes an energy source for corporate management creates economic profit and value and is also utilized as a basis for strong influence. Therefore, important information must ensure its availability and convenience while ensuring confidentiality and integrity, which is the basic objective of information protection. However, most companies are seeing more and more incidents of serious damage due to the leakage of important internal information. In this study, we deal with the Data Loss Prevention (DLP) technologies and solutions to prevent internal information leakage and establish stable data security and information protection management.

  • PDF

A Study on Development of Open-Phase Protector Having Leakage Current Generation and Incapable Operation Prevention at Open-Phase Accident (결상 시 누전전류 발생과 오동작 방지 기능을 갖는 결상보호기 개발에 관한 연구)

  • Kwak, Dong-Kurl
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.1
    • /
    • pp.182-187
    • /
    • 2015
  • In the three-phase power system, when any one-phase or two-phases is open-phase, the unbalanced current flows and the single-phase power supplies to three-phase loads. Specially, motor coil and transformer coil receive over-current. As a result, great damage as well as electrical fire can occur to the power system. In order to improve these problems, this paper proposes that an open-phase detection device is designed by a new algorithm using electric potential difference between the resultant voltage of neutral point and ground, and a control circuit topology of open-phase protector is composed of highly efficient semiconductor devices. It improves response speed and reliability. The control algorithm circuit also operates the cut-off of a conventional residual current protective device (RCD) which flows an enforced leakage current to ground wire at open-phase accident. Furthermore, time delay circuit is added to prevent the incapable operation of open-phase protector about instantaneous open-phase not open-phase fault. The time delay circuit improves more reliability.

Study on the Multi-measuring Method for Evaluation of Internal Leak of Power Plant Valve (발전용 밸브누설 평가를 위한 다중계측 연구)

  • Lee, S.G.;Park, S.K.;Park, J.H.;Kim, K.H.;Kim, Y.B.
    • Journal of Power System Engineering
    • /
    • v.11 no.3
    • /
    • pp.35-40
    • /
    • 2007
  • Leak would happen because of the damage of high temperature and high-pressure valve in nuclear power plant. condition based prevention maintenance is essential by using the suitable method based on local condition. Energy loss prevention can prevent from an accurate test, Local actually and ability. The methods of test for high energy fluid leak at present are analysis of ${\Delta}T$, AE(Acoustic Emission) analysis, and thermal image. The result for test of secondary system in nuclear power plant Unit reveals that the AE occurred clearly in leakage situation, but thermal image didn't occur. It is identified that leak is occurred when the orifice located front and back of valve operates. It shows that making a impatient judgment by using the single method if it is leakage is containing uncertainty. So we think that using the Multi-Measuring method is more sound judgment than single-measuring method.

  • PDF

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

Perception differences between users and policy-makers on technology protection support system for small and medium-sized businesses (중소기업 기술보호지원제도에 대한 이용자와 정책담당자의 인식차이 분석)

  • Park, Sanghoon;Cho, Namwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.37-48
    • /
    • 2017
  • As the risk of technical leakage is increasing, technology protection support systems for small and medium-sized businesses have gained attention. This paper analyzed the perception gap of the user and policy-maker regarding technology protection support systems. First, to identify key elements of technology protection support systems and construct measurement factors, interviews with experts are conducted. Then, surveys are conducted to analyze the perception differences between the users and policy-makers. Factor analysis and ANOVA have been utilized to analyze survey results. The result shows that the perception gaps exist in the following areas: management system, cost reduction, copyright protection, customer satisfaction, leakage prevention, and awareness. To enhance the effectiveness of technology protection support systems, this paper suggests technology protection support systems should be customized in terms of the company's size and type of busines.

A Study on An Architecture of the Security improved Document DRM for preventing Information Leakage in Military Information System Environment (국방 정보시스템 환경에서 정보유출 방지를 위한 보안성이 강화된 문서 DRM 설계에 관한 연구)

  • Eom, Jung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.41-49
    • /
    • 2011
  • We designed a security improved document DRM for protecting document based military information which is transmitted in the military information system environment. The user should be could not access document which not related to his/her role and duty, and must view the only document appropriate for his/her role and security level according to the security level of document. We improved the security of document DRM by adding to the access control module in DRM server. Our system allows operation mode authorizations for the document, considering the user's role & security level and the security level of document. And it prevents indiscriminate access to the document and damage the confidentiality and integrity of information.

Development of electric safety control system for incapable operation of ELB and MCB using the low voltage distribution line (저압 배전선로의 누전 및 배선용 차단기의 오동작 방지를 위한 전기안전 제어장치 개발)

  • Kwak, Dong-Kurl;Shin, Mi-Young;Jung, Do-Young;Kim, Hyo-Jin;Baek, Seong-Hyun;Choi, Byung-Seub
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.371-372
    • /
    • 2007
  • The major causes of electrical fire are classified to short circuit fault, overload fault, electric leakage and electric contact failure. The occurrence factor of the fire is electric arc or spark accompanied with electrical faults. Residual Current Protective Device (RCD), that is Earth Leakage Circuit Breaker(ELB) and Molded_case Circuit Breaker (MCB), of high sensitivity type used at low voltage wiring cuts off earth leakage and overload, but the RCD can't cut off electric arc or spark to be a major factor of electrical fire. As the RCDs which are applied low voltage distribution panel are prescribed to rated breaking time about 30[ms] (KS C 4613), the RCDs can't perceive to the periodic electric arc or spark of more short wavelength level. To be improved on such problem, this research development is proposed to a auxiliary control apparatus for RCD trip on electric arc or spark due to electrical fire. Some experimental results of the proposed apparatus is confirmed to the validity of the analytical results.

  • PDF

Development of a Novel Real-Time Monitoring System Algorithm for Fire Prevention (화재예방을 위한 실시간 모니터링 시스템의 알고리즘 개발)

  • Kim, Byeong-Jo;Kim, Jae-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.5
    • /
    • pp.47-53
    • /
    • 2014
  • Despite the automatic fire alarm system, according to the national fire data system of national emergency management agency, the fires account for 40,932 incidents, 2,184 injuries and about 430 billion won in property losses in 2013. Since the conventional automatic fire alarm system has several weaknesses related to electrical signal such as noise, surge, lighting, etc. Most fires are mainly caused by electrical faults, mechanical problem, chemical, carelessness and natural. The electrical faults such as line to ground fault, line to line fault, electrical leakage and arc are one of the major problems in fire. This paper describes the development of a novel real-time fire monitoring system algorithm including fault detection function which puts the existing optic smoke and heat detectors for fire detection with current and voltage sensors in order to utility fault monitoring using high accuracy DAQ measurement system with LabVIEW program. The fire detection and electrical fault monitoring with a proposed a new detection algorithm are implemented under several test. The fire detection and monitoring system operates according to the proposed algorithm well.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

A USB DLP Scheme for Preventing Loss of Internal Confidential Files (내부 기밀파일 유출 방지를 위한 USB DLP 기법)

  • Shin, Gyu Jin;Jung, Gu Hyun;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2333-2340
    • /
    • 2017
  • Recently industry is suffering severe losses of important internal information, and most of the leaks result from the insiders. Thus, various technological counter measures are being studied in order to protect private organization information. In this paper, among various internal information leakage path protection mechanisms, we propose a technique for preventing files which are defined as confidential from being copied or moved through USB. The implemented confidential file loss prevention system is composed of both signature insert manager and confidential file detect manager. The signature insert manager allows a system administrator to insert a special pattern specifying a classified confidential file, while the confidential file detect manager protects confidential file leakage when a user attempts to move or copy a confidential file to the USB memory. This results would be contributed to reducing the damage caused by leakage of confidential files outside of the company via USB.