• Title/Summary/Keyword: Leakage management

Search Result 668, Processing Time 0.033 seconds

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.

Development of Ministry of National Defense Architecture Framework(MND AF) (국방아키텍처프레임워크의 개발)

  • Choi, Nam-Yong;Jin, Jong-Hyeon;Song, Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.407-414
    • /
    • 2004
  • The US DoD architecture framework defines architecture Products according to three viewpoints : operational view, system view, and technical view. But, its coarse-grained development process causes leakage of the details In transforming among different views. It also uses different methods for architecture products development, so that the levels of those products are not consistent. So. we propose MND AF(Ministry of National Defense Architecture Framework) for military environment to solve those problems. We propose additional architecture products to achieve consistency, including “architecture disciplines definition description,”“organization-to-activity relationships matrix,” “system definition description,” and “technical reference model,” etc. We also propose the architecture development process in more detail through seven steps. In addition, we propose the applicability of those products to the life cycle processes of the acquisition management. MND AF can provide consistency and traceability of architecture products, provide the basis for sl·stem integration and interoperability. Also, architecture developers can construct architecture in a more effective and efficient way through MND AF.

A Study on the Quantitative Risk Assessment of Hydrogen-CNG Complex Refueling Station (수소-CNG 복합충전소 정량적 위험성평가에 관한 연구)

  • Kang, Seung-Kyu;Huh, Yun-Sil
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.1
    • /
    • pp.41-48
    • /
    • 2020
  • This study performed a quantitative risk assessment for hydrogen-CNG complex refueling stations. Individual and societal risks were calculated by deriving accident scenarios that could occur at hydrogen and CNG refueling stations and by considering the frequency of accidents occurring for each scenario. As a result of the risk assessment, societal risk levels were within the acceptable range. However, individual risk has occurred outside the allowable range in some areas. To identify and manage risk components, high risk components were discovered through risk contribution analysis. High risks at the hydrogen-CNG complex refueling station were large leakage from CNG storage containers, compressors, and control panels. The sum of these risks contributed to approximately 88% of the overall risk of the fueling station. Therefore, periodic and intensive safety management should be performed for these high-risk elements.

Clinical Analysis of Spontaneous Pneumothorax -Comparison of VATS Versus Limited Thoracotomy- (자연기흉에서 비디오흉강경과 개흉술에 의한 기포제거술의 비교)

  • 이서원;이계선;정진악;금동윤;안정태;이재원
    • Journal of Chest Surgery
    • /
    • v.31 no.4
    • /
    • pp.369-373
    • /
    • 1998
  • The bullectomy through the limited transaxillary thoracotomy and video-assisted thoracic surgery(VATS) had been used in operative management of spontaneous pneumothorax from Jan. 1994 to July 1997. The study comprised a retrospective review of 42 cases which were treated by limited thoracotomy, and 61 cases treated by video-assisted thoracoscopic sugery. We retrospectively reviewed annual incidnce of bullectomy. Analysis of video-assised thoracoscopic surgery and open bullectomy including age, sex, operative sites, surgical indications, associated diseases, operative time, posoperatve complications and hospital courses. There was no significant difference for operation time in two groups, 98.3${\pm}$38.4 minutes in thoracotomy and 95.7${\pm}$31.5 minutes in VATS. Prolonged air leakage over 7 days was observed in 8 cases from thoracotomy group, 4 cases from VATS group. 3 cases of recurrent pneumothorax were found from VATS group, but no recurrence was occurred from open bullectomy group. There were significant differences in postoperative hospital stay (8.0${\pm}$3.9 day in thoracotomy vs 5.9${\pm}$2.4day in VATS(P=0.001)), and indwelling period of chest tube after operation( 5.8${\pm}$3.0day in thoracotomy vs 4.0${\pm}$2.0day in VATS(P=0.0006)).

  • PDF

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

Development of Gas Leak Detecting System Based on Quantum Technology (양자기술기반 가스 누출 감지 시스템 개발)

  • Kwon, Oh Sung;Park, Min Young;Ban, Changwoo
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.5
    • /
    • pp.57-62
    • /
    • 2021
  • Gas is an energy source widely used in general households and industrial sites, and is also a process material widely used in petrochemical and semiconductor processes. However, while it is easy to use, it can cause large-scale human damage due to leakage, explosion, and human inhalation. Therefore, a gas facility safety management solution that can be safely used at home and industrial sites is essential. In particular, the need to develop advanced gas safety solutions is emerging as gas facilities are aging. In this paper, a technology was developed to measure the presence and concentration of gas leaks from a distance by irradiating photons, the minimum energy unit that can no longer be divided into gas facilities, and analyzing the number of reflected photons. This overcomes technical limitations such as short detection distance and inability to detect fine leaks, which are the limitations of conventional electric/chemical gas sensors or infrared-based gas leak detectors.

Characteristics of the Infection of Tilletia laevis Kuhn (syn. Tilletia foetida (Wallr.) Liro.) in Compatible Wheat

  • Ren, Zhaoyu;Zhang, Wei;Wang, Mengke;Gao, Haifeng;Shen, Huimin;Wang, Chunping;Liu, Taiguo;Chen, Wanquan;Gao, Li
    • The Plant Pathology Journal
    • /
    • v.37 no.5
    • /
    • pp.437-445
    • /
    • 2021
  • Tilletia laevis Kuhn (syn. Tilletia foetida (Wallr.) Liro.) causes wheat common bunt, which is one of the most devastating plant diseases in the world. Common bunt can result in a reduction of 80% or even a total loss of wheat production. In this study, the characteristics of T. laevis infection in compatible wheat plants were defined based on the combination of scanning electron microscopy, transmission electron microscopy and laser scanning confocal microscopy. We found T. laevis could lead to the abnormal growth of wheat tissues and cells, such as leakage of chloroplasts, deformities, disordered arrangements of mesophyll cells and also thickening of the cell wall of mesophyll cells in leaf tissue. What's more, T. laevis teliospores were found in the roots, stems, flag leaves, and glumes of infected wheat plants instead of just in the ovaries, as previously reported. The abnormal characteristics caused by T. laevis may be used for early detection of this pathogen instead of molecular markers in addition to providing theoretical insights into T. laevis and wheat interactions for breeding of common bunt resistance.

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

Numerical Web Model for Quality Management of Concrete based on Compressive Strength (압축강도 기반의 콘크리트 품질관리를 위한 웹 전산모델 개발)

  • Lee, Goon-Jae;Kim, Hak-Young;Lee, Hye-Jin;Hwang, Seung-Hyeon;Yang, Keun-Hyeok
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.3
    • /
    • pp.195-202
    • /
    • 2021
  • Concrete quality is mainly managed through the reliable prediction and control of compressive strength. Although related industries have established a relevant datasets based on the mixture proportions and compressive strength gain, whereas they have not been shared due to various reasons including technology leakage. Consequently, the costs and efforts for quality control have been wasted excessively. This study aimed to develop a web-based numerical model, which would present diverse optimal values including concrete strength prediction to the user, and to establish a sustainable database (DB) collection system by inducing the data entered by the user to be collected for the DB. The system handles the overall technology related to the concrete. Particularly, it predicts compressive strength at a mean accuracy of 89.2% by applying the artificial neural network method, modeled based on extensive DBs.