The Smart AtoN(Aids to Navigation) project aims to upgrade the facilities of AtoN to provide new additional information to nearby ships and unmanned ships. This paper deals with methods for collecting various sensor data through standardized interfaces; the NMEA-0183(serial line), the NMEA-2000(CAN), and the NMEA OneNet(IPv6). The AIS(Automatic Identification System) and the AIS-ASM(Application Specific Message) are considered as communication means for providing sensor information to nearby ships. In this paper, we summarize existing NMEA sentences for collecting sensor data and AIS-ASM messages that can be used to deliver sensor data to ships. Information provided from the smart AtoN through AIS, ASM, etc. may be presented on the shipborne displays that complies with the IEC62288:2021 standard.
By Foreign Trade Act and the relevant laws, any organization which intends to export strategic items shall be classified whether the products, S/W, or technology are strategic items and obtain an export license from the Nuclear Safety and Security Commission (NSSC) in case those are nuclearrelated strategic items. The NSSC and KINAC conduct outreach activities to enhance the recognition and implementation of nuclear export and import control. However, ensuring that all target organizations identify and comply with relevant legislation and laws is difficult. Therefore, the government and regulators should continuously make efforts to reduce blind spots for nuclear export and import control. KINAC established the National Nuclear Technology Information Collection and Analysis System (NNTICAS) to find nuclear-related companies through online website information of various companies and to list organizations that handle nuclear-related strategic items. Based on the NICE corporate information website, NNTICAS finds related companies using dynamic collection methods through interactions such as search word input, search button input, check box click, and collected text from each company website using static collection methods through URL address access and HTML source code extraction. After that, the text contained on the company website is analyzed to check whether the predefined normalized word is included, and if the normalized word appears at a certain number or higher, it is judged as a potential target company dealing with nuclearrelated strategic items. Information on the potential target company is compared with the export controlled item list and finally classified as a target company dealing with nuclear-related strategic items. According to the comparison a manually analyzed result of potential target companies and finally selected target companies NNTICAS, it is confirmed that predefined normalized words need to be more detailed, and a controlled item list such as axes (0B001.b.2) needs to be additionally processed. In addition, if the collection is repeated without completing the previous classification of the collected corporate information, it is also possible to collect companies in cosmetics, semiconductors, and displays. Although it was confirmed that some supplementation is needed to use this system to select target companies for the outreach activity, it is also confirmed that target companies for outreach activity can be expanded through this system and is expected to increase the implementation rate and reduce the blind spot for nuclear export and import control.
해상교통정보의 수집, 관리 및 공유를 개선하기 위해서는 해상교통정보 관련 기술 동향 파악 및 해상교통정보의 현황·문제점 분석이 우선되어야 한다. 따라서 본 연구에서는 먼저 해상교통정보의 국내외 기술 동향을 조사하였으며 국내 해상교통정보의 수집·관리· 공유에 대한 현황·문제점을 분석하여 정리하였다. 자료를 토대로 문제점을 분석한 결과 우선 수집단계의 문제점은 주로 LTE 통신권을 벗 어나는 원거리 RADAR·CCTV·카메라 영상정보 수집의 어려움으로 나타났으며 이로 인해 EEZ를 거쳐 영해로 진입하는 밀입국 선박 등의 조기 탐지가 어려운 것으로 나타났다. 그리고 관리단계의 문제점은 대부분 해상교통시스템이 자체 구축한 물리 저장 공간을 사용함으로 써 저장 공간의 유연성 부족으로 인해 편리한 축소·확대가 어렵고 시스템 장애 발생 시 대비책으로 시스템 이중화·백업 등이 힘든 상황이 다. 또한 공유단계의 문제점은 대부분 해상교통정보 공유시 주로 내부망을 사용하고 있는 현황상 운영기관 외부로의 정보 공유가 어려운 것으로 나타났으며 LRIT·SASS와 같이 정부 클라우드를 통해 정보 공유가 되고 있다고 하여도 정부 클라우드의 특성상 해양 빅데이터 등 을 효과적으로 활용할 수 있는 다양한 애플리케이션의 제공이 원활히 되고 있지 않은 상황이다. 이러한 문제점들을 개선하기 위해 우선 수집단계의 경우 무인기·위성 등 수집장비의 추가 구축을 제시함으로써 수집구역을 확장하였고 관리·공유단계는 각 해상교통시스템의 운 영 주체·정보 공개성을 고려한 민간 클라우드 도입 및 구축형태를 제시함으로써 클라우드 도입 시 전문성·보안성 향상을 기대하였다.
KINAC (Korea Institute of Nuclear Non-proliferation and Control) is entrusted with the NSSC (Nuclear Safety And Security Commission) to conduct threat assessments for nuclear facilities. As part of the threat assessment, DBT (Design Basis Threat) must be established every three years, and a threat assessment report must be developed for DBT establishment. This paper suggests a method for collecting and analyzing cyber threat information for the development of a cyber security threat assessment report. Recently, cyber threats not only in the IT (Information Technology) field but also in the ICS (Industrial Control System) field are rapidly increasing. As cyber threats increase, threat information including related attack techniques is also increasing. Although KINAC is conducting a threat assessment on cyber security at nuclear facilities, it cannot collect and analyze all cyber threat information. Therefore, it is necessary to determine a reliable source of threat information for threat assessment, and establish a strategy for collecting and analyzing threat information for DBT establishment. The first method for collecting and analyzing threat information is to first collect threat information on industrial fields with high similarity to nuclear facilities. Most of the disclosed cyber threat information is in the IT field, and most of this information is not suitable for closed-network nuclear facilities. Therefore, it is necessary to first collect and analyze threat information on facilities that use networks similar to nuclear facilities such as energy and financial sector. The second method is to analyze the attack technique for the collected threat information. The biggest factor in DBT reset is whether there is a new threat and how much it has increased compared to the existing threat. Therefore, it is necessary to analyze which attack technique was used in the collected threat information, and as part of the analysis, a cyber attack analysis model such as a kill chain can be used. The last method is to collect and manage the disclosed vulnerability information. In order to manage vulnerabilities, it is necessary to analyze what assets are in the nuclear facility first. By matching the reported vulnerability with the CDA (Critical Digital Asset) in the facility, it is possible to analyze whether the CDA can be affected by a cyber attack.As cyber threats continue to increase, it is necessary to analyze threat cases of similar facilities, attack techniques using attack models, and vulnerability analysis through asset identification in order to develop a threat assessments report.
In this study, we introduce the technology that provides the driver with the information related to the traffic information application such as the traffic center or T-map when the slippery situation occurs on the road by collecting the slip information by the vehicle speed on the road surface. Road surface detection technology collects road surface information by using black box and DTG which are installed in commercial vehicles and detects dangerous sections for road safety. It transmits information to a traffic center and transmits it to a rear vehicle driver It is aimed at delivering safe driving information.
정보통신기술의 발달로 가상세계는 현실세계와 더욱 흡사해지고 있고, 가상세계에 대한 활용도 늘어나고 있다. 가상세계 서비스 이용자는 수많은 이용자들로 이루어진 가상 사회(virtual society)의 일원으로서 현실에서 할 수 있는 거의 모든 종류의 활동을 상당한 기간 지속적으로 행하면서 자신의 의사와 상관없이 매우 다양하고 방대한 개인정보를 노출하므로, 가상세계 서비스 제공자는 종래의 온라인 서비스 제공자에 비하여 이용자에 관하여 훨씬 다양하고 방대한 정보를 얻을 수 있고 이를 적절한 도구로 분석하여 훨씬 구체적이고 정확한 이용자 프로파일(user profile)을 구축할 수 있다. 이와 같은 가상세계의 특징으로 인하여, 가상세계 서비스 제공자의 개인정보 수집, 프로파일의 구축, 이용 및 이전 등이 개인정보에 관한 중대한 문제를 야기할 위험성은 매우 높다. 위와 같은 위험을 방지하기 위하여, 가상세계 서비스 제공자의 개인정보 수집, 프로파일의 구축, 이용 및 이전에 대한 적절한 법적인 규제가 필요하고, 이와 관련하여 약관의 규제에 관한 법률 제6조의 불공정 약관 조항에 대한 해석론의 재검토와 정보통신망이용촉진 및 정보보호 등에 관한 법률 중 관련 조항에 대한 개정이 요구된다.