• Title/Summary/Keyword: System & Network Security

Search Result 2,697, Processing Time 0.03 seconds

두만강지역개발계획(RADP)에 관련된 동북아시아 지역 전력계통의 연계 및 안전성 강화방안

  • 윤갑구
    • Proceedings of the Korean Professional Engineer Association Conference
    • /
    • 1996.12a
    • /
    • pp.76-102
    • /
    • 1996
  • 북한은 전력부족난과 전기품질의 저하로 인하여 주요 생산기업에 지장을 주고 있으며, 노후 발전소의 성능저하도 함께 진행되고 있는 것으로 추정된다. 이에 대한 적절한 대책이 없는 한 그 상황은 더욱 악화될 전망이다. 한반도 에너지 개발기구(KEDO)가 추진하고 있는 경수로 원자력 발전기가 6~7년 후에 준공된다고 해도 이처럼 불안정한 전력계통에 병입되어 원활한 운전이 가능할런지 기대하기 곤란하다. 이러한 실정에서 \circled1 전력부족으로 주파수가 저하될 때 우선 순위가 낮은 부하를 제한하는 자동 부하제한 방식을 포함한 자동 주파수 제어 계통개선 \circled2 기존발전소 성능과 이용을 향상을 위한 재가동(Repowering) 등의 리 엔지니어링 \circled3 가스터빈 복합화력과 열병합발전(Co-generation) 등과 같이 건설기간이 짧고 비용이 적게 들며 송전 설비 건설도 불필요한 분산형 전원의 건설 \circled4 수력발전소와 조력발전소의 건설 \circled5 양수발전 등 전력에너지 저장설비의 개발 \circled6 송전전압격상과 배전방식개선 및 종합전력정보시스템 구축 \circled7 남ㆍ북한 전력계통 내지는 동북아시아 전력계통을 연계하는 평화망사업(Peace Network Project)등의 추진이 경수로 사업에 선행되어야 한다. 특히 러시아, 중국, 한국, 일본의 발전 에너지원 분포와 년간 부하곡선을 고려할 때 동북아시아 전력계통의 연계는 관련국 상호간에 에너지 환경과 경제적 측면에서 상당한 이득과 안정성을 강화해 줄 것이며, 기술발전과 평화공존에 크게 기여 할 것이다. 이를 위하여 관련국의 전력계통연계 전문가들이 참여하는 남\ulcorner북한전력 계통연계연합회(Co-Pia ; Co-rea Power Systems Interconnection Association)와 동북아지역전력 계통연합회(Near Pia=North-Eastern Asia Region Power Systems Interconnection Association)의 구성을 제안하는 바이다. 주요용어(Key Words): 자동주파수 제어(AFC), 리엔지니어링(Re-Engineering), 분산형 전원(Dispersed Generation System), 전력저장(Power Storage), 부하조절기(Load Conditioner), 수요관리(DSM) 연계(Interconnection), 인터시스템(Intersystem), 통합자원계획(IRP), 안전성 강화(Security Enhancement), 전력시장개방(Electricity Free Maket), 통일비용(Unification Expense, Unification Cost), 남ㆍ북한전력계통연계연합회(Co-Pia), 동북아지역전력 계통연계연합회(Nea,-Pia).

  • PDF

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-an;Shin, young-Tae;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.175-184
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics, system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

A Study on the Application of Blockchain to Accounts Receivable Insurance to Small and Mid-Size Businesses (중소기업 매출채권보험 활성화를 위한 블록체인 적용방안 연구)

  • Kwon, HyukJun;Kim, Hyeob
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.135-149
    • /
    • 2019
  • Accounts receivable insurance is a system in which small and medium-sized enterprises insure the accounts receivables acquired by the purchasing company, and the insurance company pays when the purchaser fails to pay the debts. Accounts receivable insurance is a very effective means of eliminating the risk of loss due to the counterparty default, and it is economically effective to protect the domestic industry by preventing the bankruptcy of one company leading to a chain bankruptcy of other companies. In this study, we constructed a business model of the accounts receivable insurance, by building an infrastructure based on a private blockchain in activating the accounts receivable insurance accounts. The accounts receivable insurance platform using these blockchain technologies not only addressed the problem of document and reliability verification for insurance, but also sought ways to facilitate accounts receivable insurance by small businesses through rapid transaction rates, easy network expansion and access management based on private blockchain.

Development of Nursing Home Quality Management Index & Application in the Field (노인간호요양시설의 QMI 개발과 현장 실태분석)

  • Cho, Hye-Sook
    • Journal of Home Health Care Nursing
    • /
    • v.12 no.1
    • /
    • pp.117-135
    • /
    • 2005
  • Purpose: Expecting a new system of nursing security for elderly in operation in 2007, a substantial expansion of nursing facilities for elderly and quality management of those facilities are imperative now. Therefore. specific quality management measures or schemes which could be used for the operation of small-scale nursing homes are in urgent need. The purpose of this study was to develop a Quality Management Index(QMI) to guide Nursing Home management. Method: This study developed a QMI for small-scale nursing homes, which focused on quality management in structural dimensions such as environment, staffs, local community network, atmosphere, and quality management in process dimensions such as nursing, communication, resident satisfaction. The QMI developed in this study is based on extensive review of literature and the actual experiences of nursing home operation. It consists of 7 dimensions, 39 components and 148 indexes, which have been verified by three times validity tests of experts group. Then the QMI was used to evaluate the quality management levels of nursing homes in Korea. Result: In sum, after analyzing all nursing homes in Korea operated by nurses, this study found that there were significant differences of quality management level among facilities in several dimensions such as environment, staffs, local community connections, communication. In dimensions such as nursing, atmosphere, resident satisfaction, however, little differences of quality management level among facilities were reported. It is considered that this result has to do with several factors like the size of facilities, operation expenses, operation forms, the disposition of professional human resources, and philosophy and management policy of the owners. As far as generalization is concerned, however, it needs to be noted here that the sample size for this study is not statistically big enough to generalize the results. Conclusion: Having Developed a QMI for small-scale nursing home with 7 dimensions, 39 components and 148 indexes, this study is expected to be used in developing more elaborated quality evaluation tools for nursing homes, and also function as a practical guide of quality management for those who are opening and managing nursing homes. I hope this quality index could lead to further development of a standardized quality management index, and eventually contribute to quality improvement of nursing homes.

  • PDF

Secure and Efficient Access Control Protocol in Digital Broadcasting System (디지털 방송에서 안전하고 효율적인 접근 제어 프로토콜)

  • Lee, Ji-Seon;Kim, Hyo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • IPTV is an emerging technology that combines both broadcasting and tele-communication technologies, and provides various multi-media contents to the service subscribers. In general, IPTV broadcasters transmit scrambled signals (multi-media contents) to the paying subscribers, and the users within the acknowledged network descramble the signals using the smart-card. That is, users are verified through communication between STB (Set-Top Box) and smart-card. In 2004, Jiang et al. proposed a secure protocol regarding the verification process. The method has been modified and enhanced by several following research works. However, all the methods that have been proposed so far required modular exponentiation operations which may raise the smart-card costs. In this paper, we propose a new efficient mutual authentication and session-key establishment protocol using only hash functions and exclusive-or operations, and show that the proposed protocol is still secure under various security attacks.

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF