• Title/Summary/Keyword: Safety Threats

Search Result 259, Processing Time 0.027 seconds

Smart Disaster Safety Management System for Social Security (사회안전을 위한 스마트 재난안전관리 시스템)

  • Kang, Heau-jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.225-229
    • /
    • 2017
  • In this paper, various units of industrial disaster safety threats as well as local and national facilities unit real-time detection and prevention refer to the corresponding system goes into disaster management preparedness, prevention, response recovery of phase I systematic ICT skills that can be managed more efficiently. In addition, the immediate disaster prevention and preparedness for early forecasting preemptive damage scale and high-tech information exchange technology to overcome the limitations of a human disaster in the field against the analysis and strategy of preemptive disaster safety management with smart risk management and prevention in response and recovery and the scene quickly and efficient mutual cooperation and effective collaboration and cooperation of the Community Center social security presented a smart disaster safety management system.

A study of Web Service Security System using the Secure Network Transfer Message (안전한 네트워크 전송 메시지를 이용한 웹 서비스 보안 시스템에 관한 연구)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.850-853
    • /
    • 2008
  • As th Internet grew rapidly, the Electronic Commerce that is based on Internet increased. The Electronic Commerce is unsubstantial in the mutual authentication between the parties and a commerce As a solution to this issue, a Web server uses a Client Message technology. The purpose of Client Message is to validate the user and the electronic commercial transaction. Further, it increases efficiency and offers several ability at various purposes. However, the Client Message is transferred and stored as an unencrypted text file, the information can be exposed easily to the network threats, end system threats, and Client Message harvesting threats. In this paper designed by used crypto algorithm a Secure Message as a solution to the issue have proposed above. Further, designed a security service per Network transmitting message to transfer client's user input information to a Web server safety.

  • PDF

A Study on the Planning of Civil Defense Shelter and Design 3 - Focusing on Considerations Related to Military Threat - (민방위 대피시설 계획 및 설계 방안에 관한 연구 3 - 군사위협에 따른 고려 요소를 중심으로 -)

  • Park, Namkwun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Currently, South Korea is exposed to various attacks of North Korea such as traditional, nuclear, and ABC weapons. Now it is hard to make an accurate estimate the damage may have been occurred to citizens due to those attacks. It is only possible to assume the rough outline. As a countermeasure to such military threats of North Korea, government-aided evacuation facilities services are going along across the board concerning the object, installation range, budget, and drawing standards. Whereas, in case of public evacuation facilities, there is no special regulation or principle in designation. Since various facilities are regarded as applicable, any protection against military threats can't be anticipated. In this study, military threats provoked by North Korea are figured out, thus the problem of plan and design that public evacuation facilities have are pointed out. This study suggest the result and proposal.

Artificial Intelligence for Autonomous Ship: Potential Cyber Threats and Security (자율 운항 선박의 인공지능: 잠재적 사이버 위협과 보안)

  • Yoo, Ji-Woon;Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.447-463
    • /
    • 2022
  • Artificial Intelligence (AI) technology is a major technology that develops smart ships into autonomous ships in the marine industry. Autonomous ships recognize a situation with the information collected without human judgment which allow them to operate on their own. Existing ship systems, like control systems on land, are not designed for security against cyberattacks. As a result, there are infringements on numerous data collected inside and outside the ship and potential cyber threats to AI technology to be applied to the ship. For the safety of autonomous ships, it is necessary to focus not only on the cybersecurity of the ship system, but also on the cybersecurity of AI technology. In this paper, we analyzed potential cyber threats that could arise in AI technologies to be applied to existing ship systems and autonomous ships, and derived categories that require security risks and the security of autonomous ships. Based on the derived results, it presents future directions for cybersecurity research on autonomous ships and contributes to improving cybersecurity.

A Study on the Improvement of Cybersecurity Training System in Nuclear Facilities (원자력 시설 사이버보안 훈련체계 개선 방안 연구)

  • Kim, Hyun-hee;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.187-188
    • /
    • 2022
  • As information processing technology develops with the trend of the times, the possibility of cyber threats to nuclear facilities is increasing. In the 2000s, there was a growing perception that cyberattacks on nuclear facilities were needed, and in fact, a cybersecurity regulatory system for nuclear power plants began to be established to prepare for cyberattacks. In Korea, in order to prepare for cyber threats, in 2013 and 2014, the Act on Protection and Radiation Disaster Prevention, Enforcement Decree, and Enforcement Rules of Nuclear Facilities, etc., and notices related to the Radioactive Disaster Prevention Act were revised. In 2015, domestic nuclear operators prepared information system security regulations for each facility in accordance with the revised laws and received approval from the Nuclear Safety Commission for implementation of information system security regulations divided into seven stages. In 2019, a special inspection for step-by-step implementation was completed, and since 2019, the cybersecurity system of operators has been continuously inspected through regular inspections. In this paper, we present some measures to build improved training to suit the steadily revised inspection of the nuclear facility cybersecurity system to counter cyber threats to the ever-evolving nuclear facilities.

  • PDF

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

Optimized Evaluation of Counter Drone System for Defending National Major Facilities through a Thinking Process of RMA (군사혁신(RMA) 사고과정을 적용한 국가중요시설 대드론체계 평가점검표 최적화)

  • Sang-Keun Cho;Ki-Won Kim;In-keun Son;Cook Rhie;Hyun-Ho Choi;Kang-Il Seo;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.789-793
    • /
    • 2023
  • Evalution of counter drone systems is conducted in order to designate plausible countermeasues against possible drone threats, assess the level of safety of national major facilities and derive complementary measures for detected weakness. Recently drone threats by North Korea have heavily impacted ROK(Republic of Korea) people and it has been stronly stressed to build efficient counter drone system for make the society protected and secured against drone threats. The researchers has conducted field investigations for some of national major facilites. There is, however, no standardized evaluation checklist, so we have proposed an evaluation checklist for counter drone systems though thinking process of RMA(Revolution in Military Affairs). This paper is to introduce the evaluation checklist for properly diagnosing each counter drone system.

An Investigation of Health and Safety Measures in a Hydroelectric Power Plant

  • Acakpovi, Amevi;Dzamikumah, Lucky
    • Safety and Health at Work
    • /
    • v.7 no.4
    • /
    • pp.331-339
    • /
    • 2016
  • Background: Occupational risk management is known as a catalyst in generating superior returns for all stakeholders on a sustainable basis. A number of companies in Ghana implemented health and safety measures adopted from international companies to ensure the safety of their employees. However, there exist great threats to employees' safety in these companies. The purpose of this paper is to investigate the level of compliance of Occupational Health and Safety management systems and standards set by international and local legislation in power producing companies in Ghana. Methods: The methodology is conducted by administering questionnaires and in-depth interviews as measuring instruments. A random sampling technique was applied to 60 respondents; only 50 respondents returned their responses. The questionnaire was developed from a literature review and contained questions and items relevant to the initial research problem. A factor analysis was also carried out to investigate the influence of some variables on safety in general. Results: Results showed that the significant factors that influence the safety of employees at the hydroelectric power plant stations are: lack of training and supervision, non-observance of safe work procedures, lack of management commitment, and lack of periodical check on machine operations. The study pointed out the safety loopholes and therefore helped improve the health and safety measures of employees in the selected company by providing effective recommendations. Conclusion: The implementation of the proposed recommendations in this paper, would lead to the prevention of work-related injuries and illnesses of employees as well as property damage and incidents in hydroelectric power plants. The recommendations may equally be considered as benchmark for the Safety and Health Management System with international standards.

A Study on the Safety and Health Consciousness for the Working Environment of Fire Fighter (소방공무원 근무환경에 대한 안전보건 의식 연구)

  • Lee, Jong-Ho;Kim, Yo-Han
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.1
    • /
    • pp.137-143
    • /
    • 2015
  • Fire fighter are exposed to the situations which are hard to predict due to continuous and accidental changes which hinder their fire fighting activity. As these threats of safety accident act as fear factors, they are doing insecure fire fighting activities. Therefore, as unclear and abnormal risks of working environment such as the riskiness of expansion of disaster, instability, obstacles of activities, abnormality, urgency, etc. increase, safety accidents are caused. This study analyzes the actual condition of safety and health and awareness of fire fighter who are exposed safety accidents during their fire fighting activities and utilize such result as the basis data to secure safety of fire fighter, keep efficient safety control and prevent accidents. The results of analysis are as follows. As rescue works among all fire-fighting works shows the highest emotional stabilization and the highest post-traumatic stress disorder is shown in fire sergeant level positions, and fire fighters whose working period is 10-15 years, reinforcing safety training to long-term workers is necessary. As the result of survey regarding safety awareness, the highest awareness level was shown in fire sergeant level positions, and fire fighters whose working period is over 20 years, and when it comes to operation of fire fighting equipments, fire-fighting workers and workers having 1-4 years of working period showed high safety awareness. The more serious injury in a fire fighter experienced as the first injury after working as a fire-fighter, the more cause-and-effect relationship was shown between personal physical condition and work, and it is shown as obstacles of fire fighting activities and affects to post-traumatic stress disorder. Moreover, as after-work off duty activities also affect to official disaster, systematic improvement of working environment is required. Occupational medical work compatibility evaluation considering the distinct characteristics of works to secure fire-fighter' health care together with fire-fighting capability is shown to be necessary.

Status and Future of Security Techniques in the Internet Banking Service (인터넷 뱅킹 서비스 보안기술의 현황과 미래)

  • Lee, Kyungroul;Yim, Kangbin;Seo, Jungtaek
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.31-42
    • /
    • 2017
  • As Internet banking service became popular, many users can exchange goods by online. Even though this advantage, there are incident cases in the Internet banking service due to security threats. In order to counteract this problem, various security techniques have been applied over whole area in the Internet banking service. Therefore, we described that analyzed results of security techniques applied in the financial institutions area and network communication area in this paper. We consider that this paper will be useful as a reference to protect security threats occurred by insiders and vulnerabilities in implementation.