• Title/Summary/Keyword: Port Security

Search Result 312, Processing Time 0.023 seconds

A study on the precedent trend of safe port and its Implication (안전항 판례동향과 시사점에 관한 연구)

  • Kim, Taw-Woo;Lee, Won-Jeong
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.3
    • /
    • pp.93-99
    • /
    • 2010
  • As more than 90% of global trade is carried by sea there is little doubt that the safety of the ports at which the world's trading fleet call is of critical concern. The concept of 'safe port' continues to be an area of critical concern for charterers and ship-owners. In light of increased global security and health risks the recognised principles are under security. This paper examines the nature of safe port, and analyses the precedent trend of safe port and its Implication

The study of Port-MIS ship information displaying method in VTS operation console (Port-MIS 선박 정보를 VTS 운용 콘솔에 현시하는 방안에 대한 연구)

  • Oh, Seung-hee;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.10a
    • /
    • pp.179-181
    • /
    • 2014
  • 지금까지의 해상교통관제시스템(Vessel Traffic System: VTS)에서 관제를 수행함에 있어서 관제사들이 확인할 수 있는 선박에 대한 정보는 AIS(Automatic Identification System) 정보에 한정적이었다. 하지만 선박에서 전달받는 AIS 정적 정보는 한정적이며, 정확성 역시 신뢰할 수 없을 경우가 많은 실정이다. 그래서 관제사들은 선박의 정확한 정보 확인을 위해서 항만운영시스템(Port-MIS)에 별도로 접속하여 해당 선박에 대한 정보를 조회하여 활용하는 상황이다. 현재 ETRI에서는 Single Windows 개념을 적용한 차세대 해상교통관제시스템을 개발하면서 관제사들의 편의성 제공을 위해 추가적인 Port-MIS의 연동 없이 관제 화면을 통해 관제중인 선박에 대한 Port-MIS 정보를 조회하여 현시할 수 있도록 개발하고 있다. 본 논문에서는 관제사들의 VTS 현시용 선박 정보 필드에 대한 요구사항을 도출하고, 이를 제공하기 위한 시스템 설계 구조에 대해서도 기술한다.

  • PDF

Design of Port Security System Using Deep Learning and Object Features (딥러닝과 객체 특징점을 활용한 항만 보안시스템 설계)

  • Wang, Tae-su;Kim, Minyoung;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.50-53
    • /
    • 2022
  • Recently, there have been cases in which counterfeit foreign ships have entered and left domestic ports several times. Vessels have a ship-specific serial number given by the International Maritime Organization (IMO) to identify the vessel, and IMO marking is mandatory on all ships built since 2004. In the case of airports and ports, which are representative logistics platforms, a security system is essential, but it is difficult to establish a security system at a port and there are many blind spots, which can cause security problems due to insufficient security systems. In this paper, a port security system is designed using deep learning object recognition and OpenCV. The security system process extracts the IMO number of the ship after recognizing the object when entering the ship, determines whether it is the same ship through feature point matching for ships with entry records, and stores the ship image and IMO number in the entry/exit DB for the first arrival vessel. Through the system of this paper, port security can be strengthened by improving the efficiency and system of port logistics by increasing the efficiency of port management personnel and reducing incidental costs caused by unauthorized entry.

  • PDF

A Study on the Enhancement of Maritime Security in Korea Maritime Jurisdiction

  • Lee Eun-Bang;Yun Jong-Hwui
    • Journal of Navigation and Port Research
    • /
    • v.29 no.7
    • /
    • pp.619-625
    • /
    • 2005
  • The security vulnerabilities in Korea maritime domain were mentioned and analysed with the static data of crimes relating to maritime security. The counterterrorism and initiatives to reduce the security risk and to minimize the damage are introduced and evaluated. The maritime security strategy and the near term initiatives to enhance the non-military security at Korean sea and ports are proposed in order to response maritime security threats economically, efficiently and safely.

A Study on Perceptions on Supply Chain Security Orientation (공급사슬 보안지향성의 인식에 관한 연구)

  • Park, Hong-Gyu;Chung, Jae-Wan
    • International Commerce and Information Review
    • /
    • v.15 no.2
    • /
    • pp.83-106
    • /
    • 2013
  • The purpose of this paper is to investigate the perceptions that ports and port users in the supply chain have on the variables of Supply Chain Security Orientation construct. This paper also aims to provide directions and insights to the perceptional issues on supply chain security that have emerged as an independent area of research within SCM and logistics. Starting from the explanation on Supply Chain Security Orientation research model, this paper mainly explored and analyzed the different perceptions of variables in the research model between port group and port user group. Primarily, it explores the descriptive statistics from the questionnaire, and does not analyze the causal relationships of proposed research model. It aims to serve as a guide to the supply chain security managers who are interested in policy issues related to security measures to better performance of the organization.

  • PDF

Prioritization Analysis for Cyber Security Enhancement at Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 우선순위 분석)

  • Ha, Do-Yeon;Kim, Chi-Yeol;Kim, Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.40 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • The port industry has been actively adopting Fourth Industrial Revolution technologies, leading to transformations in port infrastructure, such as automated and smart ports. While these changes have improved port efficiency, they have also increased the potential for Cyber Security incidents, including data leaks and disruptions in terminal operations due to ransomware attacks. Recognizing the need to prioritize Cyber Security measures, a study was conducted, focusing on Busan Port's rapidly automating container terminal in South Korea. The results of the Eisenhower Matrix analysis identified legal and regulatory factors as a top priority in the first quadrant, with educational systems, workforce development, network infrastructure, and policy support in the third quadrant. Subsequently, a Borich Needs Analysis revealed that the highest priority was given to legal improvements in security management systems, while the development of Cyber Security professionals ranked lowest. This study provides foundational research for enhancing Cyber Security in domestic container terminals and offers valuable insights into their future direction.

Design and implementation of port scan detection improvement and algorithm connected with attack detection in IDS (침입탐지시스템에서 포트 스캔 탐지 개선 및 공격 탐지와 연계한 알고리즘 설계 및 구현)

  • Park Seong-Chul;Ko Han-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.65-76
    • /
    • 2006
  • This paper deals with an effective algerian aimed at improving the port scan detection in an intrusion detection system (IDS). In particular, a detection correlation algerian is proposed to maximize the detection capability in the network-based IDS whereby the 'misuse' is flagged for analysis to establish intrusion profile in relation to the overall port scan detection process. In addition, we establish an appropriate system maintenance policy for port scan detection as preprocessor for improved port scan in IDS, thereby achieving minimum false positive in the misuse detection engine while enhancing the system performance.

Initial User Identification Scheme Using Multiple Internet Remote Login (인터네트 환경에서의 다단계 원격지 로그인 최초 사용자 확인 기법)

  • 윤기송
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1994.11a
    • /
    • pp.255-262
    • /
    • 1994
  • 인터네트에서는 Port Number를 이용하여 다양한 응용 서비스를 제공하고 있다. 본 논문에서는 인터네트 기본 서비스중 하나인 원격지 로그인기능을 이용하여 여러 시스템을 경유한 사용자의 위치를 Port Number를 이용하여 파악하는 기법을 제시하고 효율성있는 추적기법 연구를 위한 문제점을 분석하고자 한다.

  • PDF

A Study on the Development of Analysis Model for Maritime Security Management (해상보안관리 분석모델 개발에 관한 연구)

  • Jeong, Woo-Lee
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.9-14
    • /
    • 2012
  • Maritime security incidents by pirates and by terrorists increase, but maritime incidents investigation models are limited to figure out the maritime security incidents. This paper provides the analysis model for maritime security incidents. To develop this analysis model, this categorizes five threat factors, the ship, the cargo type, port system, human factor, information flow system, makes the risk assessment matrix to quantify the risk related to threat factors and classifies four priority categories of risk assessment matrix. Also, this model makes from the frameworks which include a variety of security initiatives implementing in stakeholder levels like international organizations, individual governments, shipping companies, and the ship. Therefore, this paper develops the Analysis for Maritime Security Management model based on various security initiatives responding to the stakeholder levels of maritime security management and top-bottom/bottom-up decision trees, and shows the validity through verifying the real maritime security incident of M/V Petro Ranger.

A Study on the Introduction of Maritime Security System(ISPS Code) (해상보안체제(ISPS Code)의 도입 방향에 관한 연구)

  • 노창균
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2003.05a
    • /
    • pp.7-15
    • /
    • 2003
  • This paper is intended as an investigation of introduction of Maritime Security System. In the last few years, several articles have been devoted to the study of ISPS Code(International Code for the Security of Ships and of Port Facilities). The Diplomatic Conference on Maritime Security held in London in December 2002 adopted new provisions in the International Convention for the Safety of Life at Sea, 1974 and this ISPS Code to enhance maritime security. These new requirements form the international framework through which ships and port facilities can co-operate to detect and deter acts which threaten security in the maritime transport sector. Accordingly, the purpose of this paper is to suggest an introduction of Maritime Security System and understanding of ISPS Code.

  • PDF