• 제목/요약/키워드: Safety Threats

검색결과 259건 처리시간 0.023초

민간항공사의 운항승무원에 영향을 주는 위협관리에 관한 연구 (A study of the threats towards the flight crew)

  • 최진국;김칠영
    • 한국항공운항학회지
    • /
    • 제18권2호
    • /
    • pp.54-59
    • /
    • 2010
  • The flight deck crew must manage complexity during daily flight operations. The Airline may obtain data regarding threats and errors through LOSA(Line Operations Safety Audits) on normal flights as predictive safety tool in Safety Management System of the Airline to actively improve the systems such as SOP(Standard Operation Procedure), training, evaluation and the TEM(Threat and Error Management) for the flight deck crew. The flight deck crew make errors when they fail managing threats. The crew mismanage around ten percent of threats and commit errors. The major mismanaged threats are aircraft malfunction, ATC(Air Traffic Communication), and wether threats. The effective countermeasures of TEM for manageing threats are leadership, workload management, monitor & cross check, Vigilance, communication environment and cooperation of the crew. It is important that organizations must monitor for the hazards of threats and improve system for the safer TEM environments.

운항시간 압력 및 Threat과 Error 관리 (The Operational Time pressure and TEM)

  • 최진국;안경수;정원경;김칠영
    • 한국항공운항학회:학술대회논문집
    • /
    • 한국항공운항학회 2006년도 추계학술대회 논문집
    • /
    • pp.61-65
    • /
    • 2006
  • The flight deck crew are under the operational time pressure in the cockpit. The crew tend to make errors when they face the threats of operational time pressure because they are in a rush. The flight deck crew can reduce threats and errors which existing within the airlines by using threat and error management when the crew know these threats and errors. The airlines can implement meaningful safety management system by analyzing into the useful information for to identify the hazard and manage the risk to reduce these threats and errors since aircrafts accidents can be fatal.With the threats and errors that were found regard to operational time pressures, company may implements safety change process to improve the safety systematically and the crew can manage the threats and errors more effectively.

  • PDF

원전 안전계통의 사이버보안 위협 및 대응 (Cybersecurity Threats and Responses of Safety Systems in NPPs)

  • 정성민
    • 디지털산업정보학회논문지
    • /
    • 제16권1호
    • /
    • pp.99-109
    • /
    • 2020
  • In the past, conservative concepts have been applied in terms of the characteristic of nuclear power plants(NPPs), resulting in analog-based equipment and closed networks. However, as digital technology has recently been applied to the design, digital-based facilities and communication networks have been used in nuclear power plants, increasing the risk of cybersecurity than using analog-based facilities. Nuclear power plant facilities are divided into a safety system and a non-safety system. It is essential to identify the difference and cope with cybersecurity threats to the safety system according to its characteristics. In this paper, we examine the cybersecurity regulatory guidelines for safety systems in nuclear power plant facilities. Also, we analyze cybersecurity threats to a programmable logic controller of the safety system and suggest cybersecurity requirements be applied to it to respond to the threats. By implementing security functions suitable for the programmable logic controller according to the suggested cybersecurity requirements, regulatory guidelines can be satisfied, and security functions can be extended according to other system requirements. Also, it can effectively cope with cybersecurity attacks that may occur during the operation of nuclear power plants.

연안여객선의 보안위협 대응방안에 관한 연구 (A Study on the Countermeasure of the Security Threats for Coastal Passenger Ships)

  • 주종광;이은방
    • 해양환경안전학회지
    • /
    • 제13권3호
    • /
    • pp.199-206
    • /
    • 2007
  • 연안여객선 보안위협과 관리제도 현황을 분석하고 관련 종사자들에 대한 보안의식을 설문조사하여 분석함으로서 연안여객선의 보안취약성과 보안위협의 특성을 도출하였다. 이러한 여객선의 보안위협에 효율적으로 식별, 대응하여 보안 취약성 제고를 위하여 보안문화 구축방안을 제안하였다. 또한 국내 연안여객선 현장에서 다양한 보안위협에 대응하기 위한 시스템을 제안하였다.

  • PDF

원전 계측제어시스템의 사이버보안 요구사항 (Introduction of Requirements and Regulatory Guide on Cyber Security of I&C Systems in Nuclear Facilities)

  • 강영두;정충희;정길도
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.209-210
    • /
    • 2008
  • In the case of unauthorized individuals, systems and entities or process threatening the instrumentation and control systems of nuclear facilities using the intrinsic vulnerabilities of digital based technologies, those systems may lose their own required functions. The loss of required functions of the critical systems of nuclear facilities may seriously affect the safety of nuclear facilities. Consequently, digital instrumentation and control systems, which perform functions important to safety, should be designed and operated to respond to cyber threats capitalizing on the vulnerabilities of digital based technologies. To make it possible, the developers and licensees of nuclear facilities should perform appropriate cyber security program throughout the whole life cycle of digital instrumentation and control systems. Under the goal of securing the safety of nuclear facilities, this paper presents the KINS' regulatory position on cyber security program to remove the cyber threats that exploit the vulnerabilities of digital instrumentation and control systems and to mitigate the effect of such threats. Presented regulatory position includes establishing the cyber security policy and plan, analyzing and classifying the cyber threats and cyber security assessment of digital instrumentation and control systems.

  • PDF

국내 스마트공장의 위험과 위협에 대한 기초 연구 (The Basic Study on Risk and Threat Issues in Domestic Smart Factories)

  • 권영국;권재범
    • 대한안전경영과학회지
    • /
    • 제23권4호
    • /
    • pp.1-9
    • /
    • 2021
  • This study examines the trends of domestic and foreign smart industries and discusses safety and security issues. Based on the actual situation survey and interview of the smart factory, we would like to examine the perspectives on risks and threats. We will examine safety and health issues related to new harmful and risk factors that may occur in smart factories and suggest institutional development directions for future safety and health. First, a safety and health-related work environment for smart factory workers is investigated and interviews are conducted. Second, we investigate new risk factors and threats to prevent industrial accidents for workers in smart factories. The purpose of this study is to examine what are the new risk factors in the smart factory. In addition, we will try to find reasonable improvement measures by finding out the risks and threats of smart factories through case studies in advanced countries, on-site interviews and surveys.

Molecular Characterization of an Isolate of Bean Common Mosaic Virus First Identified in Gardenia Using Metatranscriptome and Small RNA Sequencing

  • Zhong-Tian Xu;Hai-Tao Weng;Jian-Ping Chen;Chuan-Xi Zhang;Jun-Min Li;Yi-Yuan Li
    • The Plant Pathology Journal
    • /
    • 제40권1호
    • /
    • pp.73-82
    • /
    • 2024
  • Gardenia (Gardenia jasminoides) is a popular and economically vital plant known for its ornamental and medicinal properties. Despite its widespread cultivation, there has been no documentation of plant viruses on gardenia yet. In the present study, gardenia leaves exhibiting symptoms of plant viral diseases were sampled and sequenced by both metatranscriptome and small RNA sequencing. As a consequence, bean common mosaic virus (BCMV) was identified in gardenia for the first time and named BCMV-gardenia. The full genome sequence of BCMV-gardenia is 10,054 nucleotides (nt) in length (excluding the poly (A) at the 3' termini), encoding a large polyprotein of 3,222 amino acids. Sequence analysis showed that the N-termini of the polyprotein encoded by BCMV-gardenia is less conserved when compared to other BCMV isolates, whereas the C-termini is the most conserved. Maximum likelihood phylogenetic analysis showed that BCMVgardenia was clustered closely with other BCMV isolates identified outside the leguminous plants. Our results indicated that the majority of BCMV-gardenia virus-derived small interfering RNAs (vsiRNAs) were 21 nt and 22 nt, with 21 nt being more abundant. The first nucleotide at the 5' termini of vsiRNAs derived from BCMV-gardenia preferred U and A. The ratio of vsiRNAs derived from sense (51.1%) and antisense (48.9%) strands is approaching, and the distribution of vsiRNAs along the viral genome is generally even, with some hot spots forming in local regions. Our findings could provide new insights into the diversity, evolution, and host expansion of BCMV and contribute to the prevention and treatment of this virus.

Comparative analysis of liver transcriptome reveals adaptive responses to hypoxia environmental condition in Tibetan chicken

  • Yongqing Cao;Tao Zeng;Wei Han;Xueying Ma;Tiantian Gu;Li Chen;Yong Tian;Wenwu Xu;Jianmei Yin;Guohui Li;Lizhi Lu;Shuangbao Gun
    • Animal Bioscience
    • /
    • 제37권1호
    • /
    • pp.28-38
    • /
    • 2024
  • Objective: Tibetan chickens, which have unique adaptations to extreme high-altitude environments, exhibit phenotypic and physiological characteristics that are distinct from those of lowland chickens. However, the mechanisms underlying hypoxic adaptation in the liver of chickens remain unknown. Methods: RNA-sequencing (RNA-Seq) technology was used to assess the differentially expressed genes (DEGs) involved in hypoxia adaptation in highland chickens (native Tibetan chicken [HT]) and lowland chickens (Langshan chicken [LS], Beijing You chicken [BJ], Qingyuan Partridge chicken [QY], and Chahua chicken [CH]). Results: A total of 352 co-DEGs were specifically screened between HT and four native lowland chicken breeds. Gene ontology and Kyoto encyclopedia of genes and genomes enrichment analyses indicated that these co-DEGs were widely involved in lipid metabolism processes, such as the peroxisome proliferator-activated receptors (PPAR) signaling pathway, fatty acid degradation, fatty acid metabolism and fatty acid biosynthesis. To further determine the relationship from the 352 co-DEGs, protein-protein interaction network was carried out and identified eight genes (ACSL1, CPT1A, ACOX1, PPARC1A, SCD, ACSBG2, ACACA, and FASN) as the potential regulating genes that are responsible for the altitude difference between the HT and other four lowland chicken breeds. Conclusion: This study provides novel insights into the molecular mechanisms regulating hypoxia adaptation via lipid metabolism in Tibetan chickens and other highland animals.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권4호
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

Methodology of Cyber Security Assessment in the Smart Grid

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권2호
    • /
    • pp.495-501
    • /
    • 2017
  • The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.