• Title/Summary/Keyword: critical infrastructure protection

Search Result 52, Processing Time 0.033 seconds

A Study on the Integrated Management of National Critical Infrastructures (국가기반체계의 통합적 관리 연구)

  • Ryu, Ji-Hyeob;Lim, Ik-Hyun;Hwang, Eui Jin
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.3
    • /
    • pp.67-72
    • /
    • 2009
  • The occurrence of disaster lately is coming with the more complex form and increasing the necessity of National Infrastructures Protection Plan(NIPP). International and domestic laws and systems related to critical infrastructures were investigated. The program in which the classification of national critical infrastructures was expanded eight fields to thirteen fields including emergency services, large gathering sites, defense industrial base, and national monuments was presented in this study. The plan for integrating national critical infrastructures, national important infrastructures and national security infrastructures and a NIPP framework were proposed.

  • PDF

A Study on Risk Assessments and Protection Improvement for Electric Power Infrastructures against High-altitude Electromagnetic Pulse (전력기반시설의 고 고도 핵 전자기파에 대한 위험성 검토 및 방호 개선방안 연구)

  • Chung, Yeon-Choon
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.43-50
    • /
    • 2019
  • In a hyper-connected society, electric power infrastructures and information and communication infrastructures are the core of critical national infrastructures. However, electric power infrastructure is very deadly to high-frequency nuclear electromagnetic pulse (HEMP) threats recently issued by North Korea, so the resilience through rapid recovery after attack is directly related to the survivability of our country. Therefore, electric power infrastructure should take precedence over any other key infrastructure, with preemptive protection measures and fast recovery plans. In this paper, the characteristics of the HEMP threats was examined, and the risks and effective major protection measures of the electric power infrastructures are discussed. In the future, it is expected that it will be able to help establish the direction of enactment and revision of legal schems related to the 'high power EMP infringement prevention' for Korea's electric power infrastructures.

Reconstruction of North Korean Water Infrastructure: Present Status and Future Challenge (북한 상하수도 인프라 재구축: 현황과 전망)

  • Yun, Zuwhan
    • Journal of Korean Society on Water Environment
    • /
    • v.24 no.6
    • /
    • pp.641-650
    • /
    • 2008
  • This paper reviews the infrastructure of the water supply and sewerage system in North Korea. North Korean has similar legal protection to preserve water environment that can be seen in Republic of Korea, but North Korean regulations seemed lack of detailed measures. The critical pollution problems of rivers and lakes in the northern part of peninsula is mainly due to the lack of sewage collection system and poor treatment works. It has been estimated that less than 20% of sewers are connected to the wastewater treatment plants. Although the availability of water resources seemed sufficient, North Koreans suffer the lack of the drinking water supply which needs an urgent attention. Based on the analysis, it has been suggested that the reconstruction of North Korean water and sewage infrastructure needs at least 17.5 trillion Korean Won.

Systems Approach to Sociotechnical Systems - Cyber Security (사회기술적 시스템의 시스템보안과 시스템엔지니어링)

  • Han, Myeong Deok
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.10 no.1
    • /
    • pp.65-71
    • /
    • 2014
  • As one member of the Korea Society of Systems Engineering (KOSSE) and especially as a member of Sociotechnical Systems session of the KOSSE, I tried to contribute somehow to the activity of KOSSE to help development of better Korea systems. This report is a brief discussion of the need for KOSSE activity in the Cyber Security area especially for the protection of national critical infrastructure systems from cyber terror.

Defending Against Today's Advanced Persistent Threats (최신 APT 해킹공격에 대한 방어)

  • Marpaung, Jonathan A.P.;Lee, HoonJae
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.954-957
    • /
    • 2012
  • Recent high profile attacks have brought the attention of governments, corporations, and the general public towards the dangers posed by Advanced Persistent Threats. This paper provides an analysis of the attack vectors employed by these actors by studying several recent attacks. We present recommendations on how to best defend against these threats by better classification of critical information infrastructure and assets, people protection, penetration tests, access control, security monitoring, and patch management.

A Study on Optimized Placement of Green-Gray Infrastructure for Effective Flood Mitigation (효과적인 도시 홍수 저감을 위한 그린-그레이 인프라 위치 설정에 관한 연구)

  • Bae, Chae-Young;Lee, Dong-Kun
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.6
    • /
    • pp.65-75
    • /
    • 2022
  • Urban flood management(UFM) strategy ought to consider the connections and interactions between existing and new infrastructures to manage stormwater and improve the capacity to treat water. It is also important to demonstrate strategies that can be implemented to reduce the flow at flooding sources and minimize flood risk at critical locations. Although the general theory of spatial impact is popular, modeling guidelines that can provide information for implementation in real-world plans are still lacking. Under such background, this study conducted a modeling research based on an actual target site to confirm the hypothesis that it is appropriate to install green infrastructure(GI) in the source area and to take structural protection measures in the impact area, as summarized in previous studies. The results of the study proved the hypothesis, but the results were different from the hypothesis depending on which hydrological performance indicators were targeted. This study will contribute to demonstrating the effectiveness of strategies that can be implemented to reduce the flow at flooding sources and minimize the risk of flooding in critical locations in terms of spatial planning and regeneration.

Damage Prediction of Infomation and Communication Facilities for Prolonged Power Outage (장기간 정전사태에 대비한 기반시설-정보통신시설-에서의 피해예측)

  • Song, Chang Young;Cho, In Uh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2012
  • Critical infrastructures (energy, information technology and communications, banking, transportation, public government services, etc.) are now more vital to modern society. Citizens, businesses and governments all rely on an array of interlinked physical and information infrastructures to satisfy their needs and perform their daily operations. At the same time, these infrastructures are becoming increasingly interdependent, such that failure of one of them can often propagate and result in domino effects. Recent dramatic episodes, from 9/11 to the Madrid train bombings, the April 2010 ash cloud the power cuts in Korea in 2011, and the cyber-attacks have highlighted the need for a comprehensive, internationally coordinated policy for the protection of critical infrastructures. For the purposes of this report, we define critical infrastructure as infrastructure whose failure would result in substantial damage to society and/or the economy.

Trends and Implications of Cybersecurity Policies in Major Countries (주요국 사이버보안 정책 동향 및 시사점)

  • J.S. Lee;S.M. Choi;C.M. Ahn;Y. Yoo
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.58-69
    • /
    • 2023
  • Cyberspace is emerging as a critical domain requiring national-level governance and international cooperation owing to its potential financial and societal impacts. This research aims to investigate the cybersecurity policies from major countries for understanding with comprehensive perspectives. Global trends emphasize a comprehensive command-centered approach, with top leadership directing cybersecurity policies. Key policy areas include security across technology ecosystems, protection of critical infrastructure, and software supply chain security. Investment is being focused on zero-trust architectures, software bills, and new technologies like artificial intelligence. For countries like Korea, immediate response and adaptation to these trends are crucial to develop and enforce national cybersecurity policies.

Security Analysis of AMI Using ACT (ACT를 이용한 AMI 보안 분석)

  • Wi, Miseon;Kim, Dong Seong;Park, Jong Sou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.639-653
    • /
    • 2013
  • Smart grid is a network of computers and power infrastructure that monitor and manage energy usage efficiently. Recently, the smart grid demonstration projects around the world, including the United States, Europe, Japan, and the technology being developed. The protection of the many components of the grid against cyber-threats has always been critical, but the recent Smart grid has been threatened by a variety of cyber and physical attacks. We model and analyze advanced metering infrastructure(AMI) in smart grid. Using attack countermeasure tree(ACT) we show qualitative and probabilistic security analysis of AMI. We implement using SHARPE(Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool and calculate probability, ROA, ROI, Structure Importance, Birnbaum Importance.

Investigation of aerodynamic behaviour of a high-speed train on different railway infrastructure scenarios under crosswind

  • Jiqiang, Niu;Yingchao, Zhang;Zhengwei, Chen;Rui, Li;Huadong, Yao
    • Wind and Structures
    • /
    • v.35 no.6
    • /
    • pp.405-418
    • /
    • 2022
  • The aerodynamic behaviour of a CRH high-speed train under three infrastructure scenarios (flat ground, embankment, and viaduct) in the presence of a crosswind was simulated using a 1/8th scaled train model with three cars and the IDDES framework. The time-averaged and instantaneous flow field around the model were examined. The employed numerical algorithm was verified through a wind tunnel test, and the grid and timestep resolution analyses were conducted to ensure the reliability of the data. It was noted that the flow around the rail line was different under different infrastructure scenarios, especially in the case of the embankment, which degraded the aerodynamic performance of the train under the crosswind. The flow around the train on the flat ground and viaduct was different, although the aerodynamic performance of the train was similar in both cases. Moreover, the viaduct accidents were noted to have the most critical consequences, thereby requiring the most attention. The aerodynamic performance of the train on the windward track of the embankment under the crosswind was worse than that of the train on the leeward track. But for the other two infrastructure scenarios, the aerodynamic performance of the train on the windward track is relatively dangerous, which is mainly caused by the head car. These observations suggest that the aerodynamic behaviour of the train on an embankment under a crosswind must be carefully considered and that certain wind protection measures must be adopted around rail lines in windy areas.