• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.028 seconds

A Development of Real-time Vibration Monitoring and Analysis System Linked to the Integrated Management System of Ministry of Public Safety and Security (국민안전처 통합관리시스템 연계 가능한 시설물 진동 감지 및 분석 시스템 개발)

  • Lim, Ji-Hoon;Jung, Jin-Woo;Moon, Dae-Joong;Choi, Dong-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.3
    • /
    • pp.130-139
    • /
    • 2016
  • A frequency of earthquake occurrence in the Republic of Korea is increasing over the past few decades. In this situation, an importance of earthquake prevention comes to the fore because the earthquake does damage to structures and causes severe damage of human life. For the earthquake prevention, a real-time vibration measurement for structures is important. As an example, the United States of America and Japan have already been monitoring real-time earthquake acceleration for the important structures and the measured acceleration data has been managed by forming database. This database could be used for revising the seismic design specifications or predicting the damage caused by earthquake. In Korea, Earthquake Recovery Plans Act and Enforcement Regulations are revised and declared lately. Ministry of Public Safety and Security is constructing a integrated management system for the measured earthquake acceleration data. The purpose of this research is to develop a real-time vibration monitoring and analysis system for structures which links to the integrated management system. The developed system contains not only a monitoring function to show real-time acceleration data but also an analysis system to perform fast fourier transform, to obtain natural frequency and earthquake magnitude, to show response spectrum and power spectrum, and to evaluate structural health. Additionally, this system is designed to be able to link to the integrated management system of Ministry of Public Safety and Security. It is concluded that the developed system can be useful to build a safety management network, minimize maintenance cost of structures, and prevention of the structural damage due to earthquake.

The Meaning of the Oil Market Supply and Demand in three Northeast Asian Countries (동북아 3국의 석유수급 의미의 재검토 : 원유, 석유제품 생산과 수출입, 그리고 정제시설을 중심으로)

  • Ahn, II-Hwan;Doh, Hyun-Jae;Lee, Seung-Hoon;Sonn, Yang-Hoon;Kim, Suduk
    • Environmental and Resource Economics Review
    • /
    • v.17 no.2
    • /
    • pp.381-418
    • /
    • 2008
  • This study revisits the meaning of energy security by examining the oil market supply and demand conditions of petroleum products and refinery capacity of three Northeast Asian countries(Korea, China, Japan). In 2006, 10.6 million bid of excess demand occurred and is expected to be 15~22 million bid by the year 2030 in this regional oil market. Different oil demand is caused mainly by the different demands for various petroleum products based on each country's economic structures. If the demands are ranked according to their petroleum products, Chinese case shows gasoil > gasoline > fuel oil> LPG > naphtha > Kero/jet and Japanese case shows gasoil > gasoline> naphtha> Kero/jet > fuel oil > LPG, while Korean case shows naphtha> gas oil > fuel oil > LPG > Kero/jet > gasoline, respectively. Total CDU(Crude Distillation Unit) capacity of three northeast asian countries also have been examined in this respect. This study points out the importance of the information on oil demand and supply, on petroleum products and refinery capacities of the three Northeast Asian countries to enhance the security of the oil market in this region.

  • PDF

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

The Design and Implementation of Access Control framework for Collaborative System (협력시스템에서의 접근제어 프레임워크 설계 및 구현)

  • 정연일;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.1015-1026
    • /
    • 2002
  • As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.

Nationality Deprivation of Double Nationals in France and Securitization (프랑스 이중국적자의 국적박탈 논쟁과 안보화 (securitization))

  • Park, Sunhee
    • Journal of International Area Studies (JIAS)
    • /
    • v.22 no.1
    • /
    • pp.67-90
    • /
    • 2018
  • France has allowed a deprivation of nationality for terrorism since 1996 Law. After then, a series of law revision (1998, 2006 law and 2010, 2015-2015 reform tries) have not only linked an act of terror with nationality deprivation but also put the dual national and their deprivation at the centre of dispute. Both 2010 Immigration Law by Sarkozy and 2015-2016 constitutional amendment by Hollande had been not adopted but have combined immigrants and security issue together by firmly solidifying the relationship between dual national and terrorist. Especially in 2015-2016, the constitutional amendment that failed to be adopted has extended a state of emergency and left the nationality deprivation of dual national as controversial issue. After over 4 months of discussion, the amendment that contains a clause of a state of emergency and extension plan for nationality deprivation was abolished but the dual national issues which had been non-politicized has now become politicized, defined as security issues and finally securitized. It shows very two-stage process of securitization argued by Copenhagen school including Buzan. The importance of securitization notion by Copenhagen school lies on the fact that it scrutinizes the constructive elements of the process of securitization. The concept of securitization allows us to see the problem of the process that defines a non-politicized issue as security one by making it political matter. Applying this process of securitization into the controversy of nationality deprivation of dual nationals in France, we can find out the development of non-controversial and non-politicized dual national issues into social agenda by politicization through speech-act or announcement effect.

A Study on the Analysis of Related Information through the Establishment of the National Core Technology Network: Focused on Display Technology (국가핵심기술 관계망 구축을 통한 연관정보 분석연구: 디스플레이 기술을 중심으로)

  • Pak, Se Hee;Yoon, Won Seok;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.2
    • /
    • pp.123-141
    • /
    • 2021
  • As the dependence of technology on the economic structure increases, the importance of National Core Technology is increasing. However, due to the nature of the technology itself, it is difficult to determine the scope of the technology to be protected because the scope of the relation is abstract and information disclosure is limited due to the nature of the National Core Technology. To solve this problem, we propose the most appropriate literature type and method of analysis to distinguish important technologies related to National Core Technology. We conducted a pilot test to apply TF-IDF, and LDA topic modeling, two techniques of text mining analysis for big data analysis, to four types of literature (news, papers, reports, patents) collected with National Core Technology keywords in the field of Display industry. As a result, applying LDA theme modeling to patent data are highly relevant to National Core Technology. Important technologies related to the front and rear industries of displays, including OLEDs and microLEDs, were identified, and the results were visualized as networks to clarify the scope of important technologies associated with National Core Technology. Throughout this study, we have clarified the ambiguity of the scope of association of technologies and overcome the limited information disclosure characteristics of national core technologies.

The information process on labor and the protection of information human rights (노동정보처리와 정보인권보호)

  • 하우영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.17-32
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers' side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers' side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals' with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

Event Log Analysis Framework Based on the ATT&CK Matrix in Cloud Environments (클라우드 환경에서의 ATT&CK 매트릭스 기반 이벤트 로그 분석 프레임워크)

  • Yeeun Kim;Junga Kim;Siyun Chae;Jiwon Hong;Seongmin Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.263-279
    • /
    • 2024
  • With the increasing trend of Cloud migration, security threats in the Cloud computing environment have also experienced a significant increase. Consequently, the importance of efficient incident investigation through log data analysis is being emphasized. In Cloud environments, the diversity of services and ease of resource creation generate a large volume of log data. Difficulties remain in determining which events to investigate when an incident occurs, and examining all the extensive log data requires considerable time and effort. Therefore, a systematic approach for efficient data investigation is necessary. CloudTrail, the Amazon Web Services(AWS) logging service, collects logs of all API call events occurring in an account. However, CloudTrail lacks insights into which logs to analyze in the event of an incident. This paper proposes an automated analysis framework that integrates Cloud Matrix and event information for efficient incident investigation. The framework enables simultaneous examination of user behavior log events, event frequency, and attack information. We believe the proposed framework contributes to Cloud incident investigations by efficiently identifying critical events based on the ATT&CK Framework.

A Study on Analysis and Enhancement Strategy of South Korea's Defense Industry Exports Amidst Global Geopolitical Crisis (세계 지정학적 위기 속에서 한국의 방산수출 분석 및 강화 전략 연구)

  • Dongbum Kim;Youngsam Yoon
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.181-188
    • /
    • 2024
  • Amid global geopolitical crises that are heightening tensions worldwide, the importance of national security is being reevaluated. Consequently, South Korea is gaining attention in the global defense market due to its superior technology, competitive pricing, and rapid delivery capabilities. The increasing international demand for defense materials offers opportunities for the development of the domestic defense industry and has the potential to lead to long-term defense strategies and an expansion of exports. In particular, the development of future advanced weapons systems and the expansion of defense exports are likely to be possible through a deep understanding of the international political and economic situation and proactive defense diplomacy. This study analyzes the impact of current global geopolitical crises on Korea's defense industry and presents effective strategies based on these findings, including innovative improvements to defense acquisition systems and the discovery of overseas defense cooperation partners to strengthen defense exports. This strategic approach aims to balance domestic consumption with exports, enhance military strength, and improve the country's standing in the international community. Therefore, efforts are needed to ensure the sustainable growth of the defense industry, enabling South Korea to achieve economies of scale and play a pivotal role in the global defense industry.

A Study of Decision-Making Support Plan of SAR Through Maritime Search Theory Application (탐지이론 적용을 통한 해상탐색 및 구조작전 의사결정 지원방안)

  • Jung, Ha-Loung;Lee, Jae-Yeong
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.3
    • /
    • pp.67-77
    • /
    • 2008
  • In the 21st century, it is highly required to develop a better security management system to prevent many severe accidents occurred in the sea because it has been growing both size and importance for industries and global business which are heavily related to the sea. In this paper, we proposed a new theoretical criteria for three core decisions to make for SAR(search and rescue). These are three decisions for search scope, search assets, and search duration. We first brought up several issues and problems of current SAR system, and then studies all related factors of these three decisions for SAR operations. This paper provides a theoretical foundation of SAR operations by applying a theoretical approach and reasonable standards.