• Title/Summary/Keyword: security manual

Search Result 121, Processing Time 0.023 seconds

A Study on the e-Document Development of Parcel Service for Reliable Delivery (택배 물류 안전 배송을 위한 전자문서 개발 연구)

  • Ahn, Kyeong Rim;Park, Chan Kwon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.47-59
    • /
    • 2016
  • Parcel service is to deliver goods from one place to the designated destination requested according to user request. Parcel operations such as sorting, distributing, etc. or the managed information are heterogeneous by the companies. Additionally, it is impossible to support interoperability between companies with unformatted data of manual processing. Most parcel package boxes attached to paper typed waybill is attached is delivered to consignee. So, security problems such as personal information leaking are occurred, or extra processing time and logistics costs are needed due to wrong or the damaged information. Business environment of parcel service is rapidly changed as introducing unmanned delivery or the advanced technology such as Internet of Things. User want to know the accurate status or steps from parcel service request to delivery. To provide these requirements, the unified and integrated waybill information for reliable transportation of parcel service is needed. This information will provide to pickup or delivery carrier, warehouse or terminal, and parcel service user per pickup, transport, and delivery stage of parcel delivery service. Therefore, this paper defines the simplified and unified information model for parcel service waybill by analyzing information systems used for logistics unit processes that is occurred to parcel service, and manual work processes, and developing the relevant information of work flows occurred between business processes or transactions with the collected or processed information by from parcel service's stages. It is possible to share these standard model between business entities, and replacing paper typed waybill will improve national life safety as preventing security threats by paper typed waybill. As a result, it will promote the public interest from the stakeholder's perspective.

Direction of Development of Reaction to Bio-terrorism (생물테러리즘 대응을 위한 기술적 측면의 발전방향)

  • Lee, Kwang-Iyeol;Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.311-336
    • /
    • 2007
  • This study examines the concepts of counter-act against the Bio-terrorism and the reaction system in advanced countries, thereby to find out reaction system necessary to Korea. Acts on anti-Bio-terrorism is divided to detection stage, protection stage, diagnosis stage and detoxication and neutralization stage according to flow of event occurrence. As for detection stage, Korea is developing it as contact type, while advanced countries are under development of the devices that may detect the terrorism from the remote distance. It is necessary for Korea to develop the remote-distant detection system as well as the contact type of device that may promptly operate. Among the protection gears, the quality of Korea's gas mask is recognized worldwide, but that of other outfits should be improved by applying the state-of-art science technology. The diagnosis device also should be developed to the extent that the dispatched initial action team may make immediate decisions necessary in the field. As the current trends for detoxication materials worldwide require the improvement to new materials harmless to human body and equipment, Korea is also required to acquire those materials. The technology for neutralization means the development of vaccine and antibiotics and it requires the development made by shared efforts worldwide. For this purpose, it is necessary to further develop Korea's medical technology. In addition, the further efforts are required in terms of reaction manual, training model, public communication efforts and preparation for trauma syndrome.

  • PDF

A Study on the improvement for response manual of chemical terror incident using the service design analysis (서비스디자인 접근법을 활용한 화학테러현장 대응매뉴얼의 개선방안 연구)

  • Ham, Seung Hee;Park, Namkwun;Lee, Jun
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.325-333
    • /
    • 2018
  • Purpose: There have been terrorist attacks all over the world, causing massive damage. In Korea, there are few cases of terrorist damage, but the lack of the on-site response experience lead to constraints on the opportunity to verify capabilities against terrorism. Therefore, in this study, the chemical terrorism on-site countermeasures is considered as a concept of service, it was possible to draw up improvement alternatives for each element by reviewing at once the interactions between the concerned organizations and citizens in the field and the utilization of the equipment and facilities in the invisible area. Results: It had been evaluated the service process of the counterpart manager from the viewpoint of the victim citizen, who is the beneficiary of the final security service. It has found out the waiting point(W.P) between the victim's civilian incident management, and the element of failure(F.P). Conclusion: In this way, comparing chemical terror incident response manuals belonged to each related organization by fusion of service design approach and scenario technique, It is expected that it will be able to find out more specific problems and to find improvement alternatives.

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

Automatic identification of ARPA radar tracking vessels by CCTV camera system (CCTV 카메라 시스템에 의한 ARPA 레이더 추적선박의 자동식별)

  • Lee, Dae-Jae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.45 no.3
    • /
    • pp.177-187
    • /
    • 2009
  • This paper describes a automatic video surveillance system(AVSS) with long range and 360$^{\circ}$ coverage that is automatically rotated in an elevation over azimuth mode in response to the TTM(tracked target message) signal of vessels tracked by ARPA(automatic radar plotting aids) radar. This AVSS that is a video security and tracking system supported by ARPA radar, CCTV(closed-circuit television) camera system and other sensors to automatically identify and track, detect the potential dangerous situations such as collision accidents at sea and berthing/deberthing accidents in harbor, can be used in monitoring the illegal fishing vessels in inshore and offshore fishing ground, and in more improving the security and safety of domestic fishing vessels in EEZ(exclusive economic zone) area. The movement of the target vessel chosen by the ARPA radar operator in the AVSS can be automatically tracked by a CCTV camera system interfaced to the ECDIS(electronic chart display and information system) with the special functions such as graphic presentation of CCTV image, camera position, camera azimuth and angle of view on the ENC, automatic and manual controls of pan and tilt angles for CCTV system, and the capability that can replay and record continuously all information of a selected target. The test results showed that the AVSS developed experimentally in this study can be used as an extra navigation aid for the operator on the bridge under the confusing traffic situations, to improve the detection efficiency of small targets in sea clutter, to enhance greatly an operator s ability to identify visually vessels tracked by ARPA radar and to provide a recorded history for reference or evidentiary purposes in EEZ area.

Cryptft+ : Python/Pyqt based File Encryption & Decryption System Using AES and HASH Algorithm (Crypft+ : Python/PyQt 기반 AES와 HASH 알고리즘을 이용한 파일 암복호화 시스템)

  • Shin, Dongho;Bae, Woori;Shin, Hyeonggyu;Nam, Seungjin;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.43-51
    • /
    • 2016
  • In this paper, we have developed Crypft+ as an enhanced file encryption/decryption system to improve the security of IoT system or individual document file management process. The Crypft+ system was developed as a core security module using Python, and designed and implemented a user interface using PyQt. We also implemented encryption and decryption function of important files stored in the computer system using AES based symmetric key encryption algorithm and SHA-512 based hash algorithm. In addition, Cx-Freezes module is used to convert the program as an exe-based executable code. Additionally, the manual for understanding the Cryptft+ SW is included in the internal program so that it can be downloaded directly.

A Study on The Reinforcement Measures of First Investigation Capability (초동수사역량 강화방안에 관한 연구)

  • Park, Hyung Sik;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.83-88
    • /
    • 2014
  • First investigation is urgent investigation activities to arrest and to obtain evidence at the beginning of the incident. If the first investigation is wrong, the crime will not be solved or a lot of evidence will be disappeared. Therefore, if the first investigation is wrong, Wasting a lot of manpower and budget, or the other victims are to occur. First investigation is the crime scene centered investigation, victim centered investigation and damaged goods centered investigation. The crime scene centered investigation is the investigation on the discovery of dropped objects, to confirm thd date of offense, on the discovery of witnesses. Victim centered investigation is the investigation of victim's personal information, the living conditions of the family, fellowship and home interior matter. Damaged goods centered investigation is the investigation on the place of crime damaged goods and the movement route of crime damaged goods. In order to reinforce the investigative capacity of police first investigation, It is needed to reinforce the education on the first investigation, to conduct continuously for FTX (field training), to product the manual for first investigation, to build a case analysis system, to develop of forensic techniques and the coordination of national. The police should be giving people faith from the first investigation.

Game Behavior Pattern Modeling for Bots(Auto Program) detection (봇(오토프로그램) 검출을 위한 게임 행동 패턴 모델링)

  • Jung, Hye-Wuk;Park, Sang-Hyun;Bang, Sung-Woo;Yoon, Tae-Bok;Lee, Jee-Hyong
    • Journal of Korea Game Society
    • /
    • v.9 no.5
    • /
    • pp.53-61
    • /
    • 2009
  • Game industry, especially MMORPG (Massively Multiplayer Online Role Playing Game) has rapidly been expanding in these days. In this background, lots of online game security incidents have been increasing and getting more diversity. One of the most critical security incidents is 'Bots', mimics human player's playing behaviors. Bots performs the task without any manual works, it is considered unfair with other players. So most game companies try to block Bots by analyzing the packets between clients and servers. However this method can be easily attacked, because the packets are changeable when it is send to server. In this paper, we propose a Bots detection method by observing the playing patterns of game characters with data on server. In this method, Bots developers cannot handle the data, because it is working on server. Therefore Bots cannot avoid it and we can find Bots users more completely.

  • PDF

The Study of the electronic Access Service Model for Supply Chain (공급망을 위한 전자적 접근 서비스 모델 연구)

  • Ahn, Kyeongrim;Lee, Suyoun
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.95-100
    • /
    • 2014
  • The trend of business work that is related to supply chain changed into e-business using the electronic document However, the small and medium enterprise organizations still use huge volume of paper document, especially in private sector. Recently, the need for eco-friendly and low cost logistics becomes increasing. For this, it has expanded to exchange or to use e-document rather than the paper or manual processing in supply chain business. Therefore, this paper proposed the electronic access system for supply chain by business process modeling. If it is using the proposed system, it can be saving the exchanged or the scanned document to system, and user can utilize that document on just accessing system whenever they need the document. We believe it might reduce the burden of each organization because they don't need to save large volume data to their system or place. Furthermore, the benefits will effect across the national as well as global.

Analytic Hierarchy Process(AHP) to Improve the Current Counter-Terrorism System (현행 대(對)테러시스템의 개선을 위한 상대적 중요도 분석)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.123-128
    • /
    • 2019
  • In March 2016, the Korean National Assembly passed the Counterterrorism Act called as "Counterterrorism Law for the Protection of the People and Public Safety", and relevant functions and roles of the counterterrorism institution were granted based on the law. However, a number of problems have been raised in the course of the job performance of the counterterrorism related institution, and various improvements have been discussed. This study conducted 'Analytic Hierarchy Process(AHP)' on the experts to identify the issues related to the improvement possibilities of the counterterrorism system that had been discussed previously. The results of the analysis to improve the current counterterrorism system are as follows. First, the priorities of the top factors were identified as in the order of legal institutions, cooperation, and operational aspect. Next, the priorities of the individual sub-factors were identified as the reorganization of the counterterrorism task force, the organic cooperation of domestic counterterrorism institution, and the cultivation of specialized human resources for anti-terrorism work. It was found that we should discuss the reorganization of counterterrorism institution as a policy consideration to improve the counterterrorism system.