• Title/Summary/Keyword: Security Case

Search Result 1,810, Processing Time 0.027 seconds

Analysis of energy security by the diversity indices: A case study of South Korea (다양성지수를 통한 에너지안보수준 분석: 한국사례를 중심으로)

  • Jang, Yong-Chul;Bang, Ki-Yual;Lee, Kwan-Young;Kim, Kyung Nam
    • Journal of Energy Engineering
    • /
    • v.23 no.2
    • /
    • pp.93-101
    • /
    • 2014
  • How to determine the extent of national energy security? In this paper, we estimate it by comparative analysis of South Korea and other OECD countries in terms of energy diversity (fuel diversity). Energy security consists of 4 key factors such as availability, accessibility, acceptability, affordability. Especially the importance of accessibility can grow as local imbalance of supply and demand increases. As a proxy of the accessibility, fuel diversity can be a significant indicator to estimate a measure of energy security. In this paper, we use Shannon-Wiener index to measure energy diversity. If fuel diversity increases, the stability of energy security also should increase, because of the smoothing effect to lessen dependence on key energy sources. In 2012 Korean growth rate of H-index (energy diversity) is 18.38%, which is higher than other OECD countries. However, Korean H-index itself is 1.93, lesser than other countries. Shift from oil to coals/gas within fossil fuels has more impact on H-index than weight transition from fossil fuels to renewable energies in Korea. We conclude that more renewable energy is an effective solution to achieve higher energy diversity and ultimately higher energy security as the same as the German case.

A Study on Performance Improvement of ConTracer Using Taguchi Method (다구찌법을 이용한 컨테이너화물 안전수송장치 ConTracer의 성능향상에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shon, Jung-Rock;Shin, Joong-Jo;Lee, Ho-In;Kim, Gwang-Pil;Kim, Chae-Soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.23-31
    • /
    • 2009
  • Since 9.11 terrorist attacks against the USA, the new paradigm for "supply chain security" has been established. And at the same time a lot of researches are being made on supply chain security by many foreign companies or research institutes. However, domestically the terms "supply chain security" themselves are not yet familiar, and the paradigm of security are not being used in the logistics, while little researches are being made on them But recently along with development of "ConTracer," a supply chain security technology, which is to be used as the equipment for container cargo transportation safety based on RF1D technology, related researches have begun to be activated. The key issues for the development of equipment for container transportation safety are to obtain both a high recognition rate and enough recognition distance. To this end, this study has tested the ConTracer (433 MHz type and 2.4 GHz type) by using Taguchi Method. According to our test results, in the case of 433 MHz type, it is a little more effective that the reader faces to the front-right side, and in the case of 2.4 GHz, reader direction does not make difference in the view of sensitivity. The test also has proved that it is better that antenna location, as expected, is to be installed on the outside for both types alike.

Study on Method to Develop Case-based Security Threat Scenario for Cybersecurity Training in ICS Environment (ICS 환경에서의 사이버보안 훈련을 위한 사례 기반 보안 위협 시나리오 개발 방법론 연구)

  • GyuHyun Jeon;Kwangsoo Kim;Jaesik Kang;Seungwoon Lee;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.91-105
    • /
    • 2024
  • As the number of cases of applying IT systems to the existing isolated ICS (Industrial Control System) network environment continues to increase, security threats in the ICS environment have rapidly increased. Security threat scenarios help to design security strategies in cybersecurity training, including analysis, prediction, and response to cyberattacks. For successful cybersecurity training, research is needed to develop valid and reliable security threat scenarios for meaningful training. Therefore, this paper proposes a case-based security threat scenario development methodology for cybersecurity training in the ICS environment. To this end, we develop a methodology consisting of five steps based on analyzing actual cybersecurity incident cases targeting ICS. Threat techniques are standardized in the same form using objective data based on the MITER ATT&CK framework, and then a list of CVEs and CWEs corresponding to the threat technique is identified. Additionally, it analyzes and identifies vulnerable functions in programming used in CWE and ICS assets. Based on the data generated up to the previous stage, develop security threat scenarios for cybersecurity training for new ICS. As a result of verification through a comparative analysis between the proposed methodology and existing research confirmed that the proposed method was more effective than the existing method regarding scenario validity, appropriateness of evidence, and development of various scenarios.

  • PDF

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

A Case Study on Teacher's Process-centered Evaluation Competency(T-PEC) : Focused on the Case of a Middle-School/a High-School Science Teacher (교사의 과정 중심 평가 역량에 관한 사례 연구 -중·고등학교 과학 교사 사례를 중심으로)

  • Kim, Yu-Jung;Lee, Gyeong-Geon;Hong, Hun-Gi
    • Journal of The Korean Association For Science Education
    • /
    • v.39 no.6
    • /
    • pp.695-706
    • /
    • 2019
  • This study conducted a case study on the process-centered evaluation competency of a middle-school/high-school science teacher using Teacher's Process-centered Evaluation Competency (T-PEC) measurement tool. The case analysis shows that teacher A in a middle school represents high competency of process-centered evaluation planning and cooperative communication while the competency of utilizing process-centered evaluation results is low owing to the characteristics of non-standardized areas. Teacher B in a high school shows high level of cooperative communication competency whereas low level of process-centered evaluation execution competency because the freedom given to students is not enough during the process of evaluation. The teacher also shows very low level of utilizing process-centered evaluation results due to the lack of time and the school culture not giving feedback to the students. According to cross-case analysis, teacher A and B both represent the highest level of collaborative communication competency and the lowest level of utilization process-centered evaluation results competency. And the lack of clear criteria for process-centered evaluation leads to different understanding of process-centered evaluation between the two teachers, and teacher B shows low the level of utilizing process-centered evaluation affects results due to the students not being concerned on feedback, security problem, and the reality focusing on the university entrance examination in high schools. Based on the results, this study suggests providing clear guidelines of process-centered evaluation to teachers, introducing an application in order to solve the time-lack problem pointed out as the biggest problem of process-centered evaluation, ensuring objectivity and security about process-centered evaluation results, and building the school culture such as the expanded application of standardized areas in order to implementing process-centered evaluation.

Analysis of plane frame structure using base force element method

  • Peng, Yijiang;Bai, Yaqiong;Guo, Qing
    • Structural Engineering and Mechanics
    • /
    • v.62 no.1
    • /
    • pp.11-20
    • /
    • 2017
  • The base force element method (BFEM) is a new finite element method. In this paper, a degenerated 4-mid-node plane element from concave polygonal element of BFEM was proposed. The performance of this quadrilateral element with 4 mid-edge nodes in the BFEM on complementary energy principle is studied. Four examples of linear elastic analysis for plane frame structure are presented. The influence of aspect ratio of the element is analyzed. The feasibility of the 4 mid-edge node element model of BFEM on complementary energy principles researched for plane frame problems. The results using the BFEM are compared with corresponding analytical solutions and those obtained from the standard displacement finite element method. It is revealed that the BFEM has better performance compared to the displacement model in the case of large aspect ratio.

A Determining Contingency Ranking Using the Weather Effects of the Power System (날씨효과를 고려한 전력계통의 상정사고 순위 결정)

  • 김경영;이승혁;김진오;김태균;전동훈;차승태
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.9
    • /
    • pp.487-493
    • /
    • 2004
  • The electric power industry throughout the world is undergoing considerable changes from the vertically integrated utility structure to the deregulated market. However, the deregulated electricity market is operated with respect to theory of economical efficiency, and therefore, the system operator requires data with fast contingency ranking for security of the bulk power system. This paper compares the weather dependant probabilistic risk index(PRI) with the system performance index for power flow in the IEEE-RTS. The system performance index for power flow presents the power system stability. This paper presents fast calculation method for determining contingency ranking using the weather dependant probabilistic risk index(PRI). The probabilistic risk index can be classified into the case of normal and adverse weather. This paper proposes calculation method using the probabilistic risk index in determining contingency ranking required for security under the deregulated electricity market.

A Novel Method for Clustering Critical Generator by using Stability Indices and Energy Margin (안정도 지수와 에너지 마진을 이용한 불안정 발전기의 clustering 법)

  • Chang Dong-Hwan;Jung Yun-Jae;Chun Yeonghan;Nam Hae-Kon
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.9
    • /
    • pp.441-448
    • /
    • 2005
  • On-line dynamic security assessment is becoming more and more important for the stable operation of power systems as load level increases. The necessity is getting apparent under Electricity Market environments, as operation of power system is exposed to more various operating conditions. For on-line dynamic security assessment, fast transient stability analysis tool is required for contingency selection. The TEF(Transient Energy Function) method is a good candidate for this purpose. The clustering of critical generators is crucial for the precise and fast calculation of energy margin. In this paper, we propose a new method for fast decision of mode of instability by using stability indices. Case study shows very promising results.

Adaptation of Secure Algorithm of Short Messaging Services(SMS) on CDMA Network (CDMA에서 단문 메시지 서비스(SMS)의 보안 적용 알고리즘)

  • Kim Yoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.8
    • /
    • pp.30-37
    • /
    • 2006
  • At the present, Short Messaging Transfer Protocol Standard described under TIA/EIA/IS-637-A does not cover the measures for security at all. Sequentially, in case of necessity, it seems to be a better idea that security functions are made up for current short messaging transfer protocol. This paper proposes security mechanisms including algorithms and protocols for Short Messaging Services(SMS) which present not only high levels of confidentiality and integrity but also appropriate level of authentication.

  • PDF

Design of A Cryptographic Add-on Card Dedicated to SOHO VPN (SOHO VPN 시스템에 특화된 암호가속카드의 설계 및 구현)

  • Lee, Wan-Bok
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.87-92
    • /
    • 2005
  • The performance of a cryptographic module is the most important thing to achieve a high performance VPN system which realizes information security by encrypting and decrypting all the communicating data packets. However the cryptographic operations require much computation power and software cryptographic systems reveal bad performance. Thus, it is strongly recommended to develop a VPN system employing hardware component. This paper introduces a case study of developing a PCI add-on card which supports several block cipher algorithms such as DES, 3DES, AES, and SEED. The performance of them was measured by embedding the card in a commercial VPN system.

  • PDF