• Title/Summary/Keyword: Security monitoring

Search Result 931, Processing Time 0.028 seconds

Study on Methodology of Collecting Realtime File Access Event Information (실시간 파일 접근 이벤트 정보 수집 방법에 관한 연구)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.447-448
    • /
    • 2021
  • The boundary-based security architecture has the advantage of easy deployment of security solutions and high operational efficiency. The boundary-based security architecture is easy to detect and block externally occurring security threats, but is inappropriate to block internally occurring security threats. Unfortunately, internal security threats are increasing in frequency. In order to solve this problem, a zero trust model has been proposed. The zero trust model requires a real-time monitoring function to analyze the behavior of a subject accessing various information resources. However, there is a limit to real-time monitoring of file access of a subject confirmed to be trusted in the system. Accordingly, this study proposes a method to monitor user's file access in real time. To verify the effectiveness of the proposed monitoring method, the target function was verified after the demonstration implementation. As a result, it was confirmed that the method proposed in this study can monitor access to files in real time.

  • PDF

Security Monitoring System for Apartment House Building Using Paver Line Carrier (전력선 통신을 이용한 집단주택 안전관리 시스템)

  • Kim, In-Soo;Kim, Kwan-Ho;Kim, Yo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 1993.07a
    • /
    • pp.476-478
    • /
    • 1993
  • Instead of installing new communication wiring to each house in the apartment house building. the power distribution network. which is already installed in the building. can be use as communication medium. In a safty management, by adoption of power line communication system, at remote we can monitor safty related sensors such as fire, gas leakage, burglar intrusion and emergency call which are located at each house. From this viewpoint, we developed security monitoring system for apartment house building using power lines. Security monitoring system consists of Power Line Communication-Sub Controller (PLC-SC). Power Line Communication-Main Controller (PLC-MC) and Management System (MS). Between a PLC-MC and a PLC-SC, the transmission rate is 1200 bps in power lines and modulation technique is frequency shirt keying (FSK). In between a PLC-MC and a MS, the transmission rate is 1200 bps in communication line (RS-485). As a result of this research. transmission loss is 0.1dB per meter of intrabuilding distribution network. Transmission can be reach in 250 meters. So it is enough to communicate for security monitoring system in apartment house building.

  • PDF

Development of Mobile Monitoring System for Home Security (홈 시큐리티를 위한 모바일 모니터링 시스템 개발)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.43-49
    • /
    • 2009
  • Network industry is complex combined with various fields of industry, such as communication, broadcast, construction, and home appliances. Moreover, it's fairly lucrative since the growth industry makes lots of added values, interacting with the others. The network industry, usually called 'Ubiquitous', connects some home appliances and makes an integrated system that you can use them with whenever and wherever. A demand for network security, however, has skyrocketed due to the relatively low safety. It's been expected that the market of home security is going to be grown up nearly 30 percent every year. Recently, analog surveilance cameras have been replaced with digital ones, and they will be providing stronger security services taking advantage of mutual interaction with related industies. In this paper, a mobile monitoring system for home security is proposed, which makes it possible to supervise all home appliances wherever you're, using the conventional wired/wireless network infra.

Establishment of Cyber Security Countermeasures amenable to the Structure of Power Monitoring & Control Systems (전력계통 제어시스템 구조에 따른 사이버 보안대책 수립)

  • Woo, Pil Sung;Kim, Balho H.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.12
    • /
    • pp.1577-1586
    • /
    • 2018
  • The emergence of the Smart Grid is an integrated solution for the next generation power system that combines IT technology in the power system to create optimal energy utilization and various services. However, these convergence technologies (power systems and information communications) are not only improving the related technologies but also producing various problems especially exposure to cyber risk. In particular, the intelligent power grid has security vulnerabilities through real-time information sharing among various organically linked systems, and it is more complicated than the cyber risk problem in the existing IT field and is directly connected to national disaster accidents. Therefore, in order to construct and operate a more stable smart grid, this paper analyzes the system of power system control system in Korea, and proposes a cyber security element definition and a countermeasure establishment method of power monitoring & control systems based on security standards of smart grid (No. SPS-SGSF-121-1-1).

Development of Smartphone Application for Monitoring Container Cargo (컨테이너화물 모니터링을 위한 스마트폰 애플리케이션 개발)

  • Choi, Hyung-Rim;Son, Hee-Mok
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.209-220
    • /
    • 2014
  • Most of monitoring systems in logistics industry have limitations on monitoring container information in real-time. And customers only could check information gathered from certain points through web browser. That is why it is very hard to take actions in advance when emergency situation has happened. But if customers could check information such as position and status of freight in real-time through their mobile devices, they could take prompt actions. So, in this study, mobile application based on mobile devices is developed to monitor position and status information of the container in real-time. Entire devices monitoring container in aspect of logistics security are handled by workers in the field. So it is strongly required to develop monitoring system operated in mobile devices. For that reason this study aims to develop mobile application in order to monitor information related to container security and safety in real-time.

Integrated Monitoring System using Log Data (로그 데이터를 이용한 통합모니터링 시스템)

  • Jeon, Byung-Jin;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.35-42
    • /
    • 2017
  • In this paper, we propose to implement an integrated monitoring system using log data to reduce the load of analysis task of information security officer and to detect information leak in advance. To do this, we developed a transmission module between different model DBMS that transmits large amount of log data generated by the individual security system (MSSQL) to the integrated monitoring system (ORACLE), and the transmitted log data is digitized by individual and individual and researches about the continuous inspection and measures against malicious users when the information leakage symptom is detected by using the numerical data.

Improvement the Security Service of Cash Delivery Using Real-time Binary CDMA Monitoring (실시간 Binary CDMA 모니터링을 통한 현금호송 보안업무 개선방안)

  • Kim, Min-Su;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.53-60
    • /
    • 2012
  • Financial institutions keep putting efforts to filling cash into ATMs and branches in order to provide customers with better service. This kind of job usually required an automobile unit to be done, and financial institutions employee perform this task directly or sourcing out to professional security service companies. However, the job has been of ten a target of criminals because it deals with cash. In fact, since 2003, there were several cash truck robberies occurred. This circumstances made the public be aware of the necessity of creative research and the strict management of financial institutions and security companies. However, the existing studies on security service of cash delivery suggest only how to improve the job legally and in operation, and the technological aspect of the improving way has not been studied. Therefore, this study aimed at suggesting an improvement the security service of cash delivery using real-time binary CDMA monitoring for providing better safety service to customers.

Improvement of Shift Work System due to Reduction of Working Hours for Efficient Security Monitoring & Control (근무시간 단축에 따른 효율적인 보안관제를 위한 근무체계 개선방안)

  • Park, Wonhyung;Lee, YoungShin;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.143-150
    • /
    • 2019
  • Recently, As ICT technology develops, cyber attacks are becoming more intelligent and advanced. In order to cope with such cyber attacks, the security control system must be maintained 24 hours a day, 365 days a year. Security personnel should be able to respond in real time to cyber attacks through shift work for 24 hours, but the workforce law was revised in 2018 to affect manpower and security control work systems. Therefore, in this paper, we propose an effective security control work system by reducing 52 working hours per week.

Developing Warning Map for Risk Monitoring on Personal Information Security (개인정보보호를 위한 리스크 모니터링: 경고맵)

  • Lee, Youngjai;Shin, Sangchul;Min, Geumyoung
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.33-40
    • /
    • 2008
  • Personal information security has been as risk ever since the development of information technology increased its internet use. As personal information security is compromised there will be a rise in personal privacy conflicts and this will become an important social issue. The following research is a presentation of the warning map for risk monitoring on personal information security. First, the personal information security process is identified then defined. Second, in order to achieve the personal information security's objective, a survey was taken and the data was collected. Third, factor in the Fishbone Diagram's analysis and figure out the key indicators that include metric and threshold. Last, develop the warning map which has the matrix table composed of the process and the risk. It displays the warning based on the threshold and the value of key indicators related to risks.

  • PDF

Wearable and Implantable Sensors for Cardiovascular Monitoring: A Review

  • Jazba Asad;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.171-185
    • /
    • 2023
  • The cardiovascular syndrome is the dominant reason for death and the number of deaths due to this syndrome has greatly increased recently. Regular cardiac monitoring is crucial in controlling heart parameters, particularly for initial examination and precautions. The quantity of cardiac patients is rising each day and it would increase the load of work for doctors/nurses in handling the patients' situation. Hence, it needed a solution that might benefit doctors/nurses in monitoring the improvement of the health condition of patients in real-time and likewise assure decreasing medical treatment expenses. Regular heart monitoring via wireless body area networks (WBANs) including implantable and wearable medical devices is contemplated as a life-changing technique for medical assistance. This article focuses on the latest development in wearable and implantable devices for cardiovascular monitoring. First, we go through the wearable devices for the electrocardiogram (ECG) monitoring. Then, we reviewed the implantable devices for Blood Pressure (BP) monitoring. Subsequently, the evaluation of leading wearable and implantable sensors for heart monitoring mentioned over the previous six years, the current article provides uncertain direction concerning the description of diagnostic effectiveness, thus intending on making discussion in the technical communal to permit aimed at the formation of well-designed techniques. The article is concluded by debating several technical issues in wearable and implantable technology and their possible potential solutions for conquering these challenges.