• Title/Summary/Keyword: Security Target

Search Result 693, Processing Time 0.026 seconds

A Legal Study on the Countermeasures against Explosive Terrorism in the Airport Land-side: Case of Korea Airport (공항 Land-side에서의 폭발물 테러방지를 위한 법률적 연구: 한국공항을 중심으로)

  • Jeong Jin-Man;Shin Dong-Il
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.407-411
    • /
    • 2022
  • 공항 시설에서 통틀어 보안이 가장 취약한 곳은 Landside이다. 항공기 테러가 빈번하던 시절에는 X-ray를 비롯한 검색기술의 수준이 높지 않았던 탓에 Hijacking이나 폭발물에 의한 피해가 많았었다. 물론 기술이 발전한 현대에 와서도 Hijacking이나 항공기 폭파 같은 테러가 발생하고 있지만 9.11테러 이전보다는 훨씬 감소한 상황이다. 최근에는 보안수준이 높은 Airside 보다 상대적으로 보안이 취약한 Landside에 대한 보안 강화가 필요하다. 그 이유는 테러의 유형이 협상의 여지가 없는 최대피해와 최대공포를 주는 방식으로 변화하고 있기 때문이다. 따라서 상대적으로 부담이 덜하고 유동인구가 많은 Landside가 Soft Target이 되었다. 이런 상황에서 대한민국 공항이 어떻게 대응해야 하는지 관련된 법을 중심으로 본 연구를 진행해 보고자 한다.

  • PDF

A Study on Activation Characteristics Generated by 9 MeV Electron Linear Accelerator for Container Security Inspection (컨테이너 보안 검색용 9 MeV 전자 선형가속기에서 발생한 방사화 특성평가에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-Hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.5
    • /
    • pp.563-575
    • /
    • 2020
  • The purpose of this study is to evaluate the activation characteristics that occur in a linear accelerator for container security inspection. In the computer simulation design, first, the targets consisted of a tungsten (Z=74) single material target and a tungsten (Z=74) and copper (Z=29) composite target. Second, the fan beam collimator was composed of a single material of lead (Z=82) and a composite material of tungsten (Z-74) and lead (Z=82) depending on the material. Final, the concrete in the room where the linear accelerator was located contained magnetite type and impurities. In the research method, first, the optical neutron flux was calculated using the MCNP6 code as a F4 Tally for the linear accelerator and structure. Second, the photoneutron flux calculated from the MCNP6 code was applied to FISPACT-II to evaluate the activation product. Final, the decommissioning evaluation was conducted through the specific activity of the activation product. As a result, first, it was the most common in photoneutron targets, followed by a collimator and a concrete 10 cm deep. Second, activation products were produced as by-products of W-181 in tungsten targets and collimator, and Co-60, Ni-63, Cs-134, Eu-152, Eu-154 nuclides in impurity-containing concrete. Final, it was found that the tungsten target satisfies the permissible concentration for self-disposal after 90 days upon decommissioning. These results could be confirmed that the photoneutron yield and degree of activation at 9 MeV energy were insignificant. However, it is thought that W-181 generated from the tungsten target and collimator of the linear accelerator may affect the exposure when disassembled for repair. Therefore, this study presents basic data on the management of activated parts of a linear accelerator for container security inspection. In addition, When decommissioning the linear accelerator for container security inspection, it is expected that it can be used to prove the standard that permissible concentration of self-disposal.

A Study on the Multi-sensor Data Fusion System for Ground Target Identification (지상표적식별을 위한 다중센서기반의 정보융합시스템에 관한 연구)

  • Gang, Seok-Hun
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.191-229
    • /
    • 2003
  • Multi-sensor data fusion techniques combine evidences from multiple sensors in order to get more accurate and efficient meaningful information through several process levels that may not be possible from a single sensor alone. One of the most important parts in the data fusion system is the identification fusion, and it can be categorized into physical models, parametric classification and cognitive-based models, and parametric classification technique is usually used in multi-sensor data fusion system by its characteristic. In this paper, we propose a novel heuristic identification fusion method in which we adopt desirable properties from not only parametric classification technique but also cognitive-based models in order to meet the realtime processing requirements.

  • PDF

People Tracking Method with Distributed Laser Scanner and Its Application to Entrance Monitoring System (분산배치된 레이저 스캐너를 이용한 사람추적방법 및 출입감시시스템에의 응용)

  • Lee, Jae-Hoon;Kim, Yong-Shik;Kim, Bong-Keun;Ohba, Kohtaro;Kawata, Hirohiko;Ohya, Akihisa;Yuta, Shin'ich
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.2
    • /
    • pp.130-138
    • /
    • 2009
  • Recently, people tracking technology is being required to various area including security application. This paper suggests a method to track people with multiple laser scanners to detect the waist part of human. Multi-target model and Kalman filter based estimation are employed to track the human movement. The proposed method is applied to a novel system to monitor the entrance area and to filter out the trespasser to pass through the door without identification. Experiments for various cases are performed to verify the usefulness of the developed system.

  • PDF

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

A Strengthened Android Signature Management Method

  • Cho, Taenam;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1210-1230
    • /
    • 2015
  • Android is the world's most utilized smartphone OS which consequently, also makes it an attractive target for attackers. The most representative method of hacking used against Android apps is known as repackaging. This attack method requires extensive knowledge about reverse engineering in order to modify and insert malicious codes into the original app. However, there exists an easier way which circumvents the limiting obstacle of the reverse engineering. We have discovered a method of exploiting the Android code-signing process in order to mount a malware as an example. We also propose a countermeasure to prevent this attack. In addition, as a proof-of-concept, we tested a malicious code based on our attack technique on a sample app and improved the java libraries related to code-signing/verification reflecting our countermeasure.

(The chip design for the cipher of the voice signal to use the SEED cipher algorithm) (SEED 암호 알고리즘을 적용한 음성 신호 암호화 칩 설계)

  • 안인수;최태섭;임승하;사공석진
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.1
    • /
    • pp.46-54
    • /
    • 2002
  • The world was opened by communication network because of fast improvement and diffusion of information communication. And information was effected in important factor that control economy improvement of the country. The country should improve the information security system because of necessity to maintain its information security independently. Therefore we have used the SEED cipher algorithm and designed the cipher chip of the voice band signal using the Xilinx Co. XCV300PQ240 chip. At the result we designed the voice signal cipher chip of the maximum frequency 47.895MHz and the total equivalent gate 27,285.

Prototype Design of Hornet Cloud using Virtual Honeypot Technique (가상 허니팟 기술의 호넷 클라우드의 프로타입 설계)

  • Cha, Byung-Rae;Park, Sun;Kim, Jong-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.8
    • /
    • pp.891-900
    • /
    • 2015
  • Cloud Computing has recently begun to emerge as a new attack target. The malice DDoS attacks are ongoing to delay and disturb the various services of the Cloud Computing. In this paper, we propose the Hornet-Cloud using security Honeypot technique and resources of Cloud Computing, and design the concept of active-interaction and security functions of Hornet-Cloud simply.

A Design of Syslog Real-time Monitoring System (Syslog 실시간 감시시스템 설계)

  • Kim, Do-Hyeong;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.43-48
    • /
    • 2008
  • Previously, we need to log-in to the target system to check the system log. This is a problem that can not be monitored in real time. This paper designed a syslog real-time monitoring system to solve this problem. The proposed system be able to detect a problem of system in real time without log-in process and be able to solve problems immediately. The proposed syslog real-time monitoring system in this paper is based on Windows OS.

  • PDF

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.