A Pythagorean fuzzy Petri net based security assessment model for civil aviation airport security inspection information system

Author(s):  
Hongyu Yang ◽  
Yuhao Feng

WARTA ARDHIA ◽  
2012 ◽  
Vol 38 (1) ◽  
pp. 97-105
Author(s):  
Ismail Nadjamuddin

Kualanamu Medan Airport Construction is an alternative to overcome the operational limitations and the land that was experienced Polonia Airport. Airport security enhancement program Kualanamu Medan when operating include airport security aspects of the provision of facilities consisting of: X-Ray facility 12 units, Walk Throught Metal Detector (WTMD) 14 units, Hand Held Metal Detector (HHMD) 24 units, Closed Circuit Television (CCTV , Explosive Detection System 2 units, 2 units Liquit Scan Detecto,, Detector Nubikara 2 units (Nuclear, Biological, Chemical, Radio Active), Body Scane 1 unit, Body Inspector, Airport For Perimeter Surveillance, Security Inspection Car and Motorcycle 4. The security officer in Medan Airport Kualanamu totaling 204 personnel consisting of 124 personnel from the PT. Angkasa PuraII, 40 BKO-military personnel who assisted and 40 staff personnel outsoursing. The system and airport security procedures will refer to the Regulation of the Minister of Transportation No. 9 of 2010 about the National Aviation Security Programme and ICAO in Annex17 on Security and Document-8973 on the Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, that the safety and security systems at airports should be the maximum, using equipment and adequate procedures that ensure safety and smooth flight. Pembangunan Bandara Kualanamu Medan merupakan alternatif untuk mengatasi keterbatasan operasional dan tanah yang dialami Bandara Polonia. Program peningkatan keamanan bandara Kualanamu Medan saat dioperasikan meliputi aspek keamanan bandara, penyediaan fasilitas yang terdiri dari: 12unit fasilitas X-Ray, 14 unit Walking Through Mental Detector (WTMD), 24 unit Hand Held Metal Detector (HHMD), 2 unit Closed Circuit Television (CCTV)dan sistem Deteksi peledak, 2 unit Liquit Pindai Detecto, 2 unit Detector Nubikara (Nuklir, Biologi, Kimia, Radio Aktif), Badan Scane 1 unit, Bandara Untuk Surveillance Perimeter, 4 Mobil Keamanan Inspeksi dan Sepeda Motor petugas keamanan di Medan Bandara Kualanamu sebesar 204 personel yang terdiri dari 124 personil dari PT Angkasa Pura II, 40 BKO-personil militer yang dibantu dan 40 personil staf outsoursing. Sistem dan prosedur keamanan bandara akan mengacu pada Peraturan Menteri Perhubungan Nomor 9 tahun 2010 tentang National Aviation Security Program dan ICAO dalam Annex-17 tentang Keamanan dan manual dokumen-8973 tentang Keamanan Penerbangan Sipil upaya pelanggaran hukum, bahwa keamanan dan sistem keamanan di bandara harus maksimal , menggunakan peralatan dan prosedur yang memadai yang menjamin keamanan dan kelancaran penerbangan.



2003 ◽  
Vol 14 (5) ◽  
pp. 459-477 ◽  
Author(s):  
R. P. Mohanty ◽  
S. Kumar ◽  
M. K. Tiwari
Keyword(s):  


2021 ◽  
Author(s):  
Madison Bland ◽  
Shane Chiovarou ◽  
Seung-Yun Kim


2016 ◽  
Vol 4 (20) ◽  
pp. 38 ◽  
Author(s):  
Ján Kolesár ◽  
Lucia Melníková ◽  
Daniela Heralová ◽  
Petr Daňko

Airports similarly to other companies are certified in compliance with the International Standardization Organization (ISO) standards of products and services (series of ISO 9000 Standards regarding quality management), to coordinate the technical side of standardizatioon and normalization at an international scale. In order for the airports to meet the norms and the certification requirements as by the ISO they are liable to undergo strict audits of quality, as a rule, conducted by an independent auditing organization. Focus of the audits is primarily on airport operation economics and security. The article is an analysis into the methodology of the airport security audit processes and activities. Within the framework of planning, the sequence of steps is described in line with the principles and procedures of the Security Management System (SMS) and starndards established by the International Standardization Organization (ISO). The methodology of conducting airport security audit is developed in compliance with the national programme and international legislation standards (Annex 17) applicable to protection of civil aviation against acts of unlawful interference.



2015 ◽  
Vol 22 (12) ◽  
pp. 4717-4723 ◽  
Author(s):  
Kai-qing Zhou ◽  
Azlan Mohd Zain ◽  
Li-ping Mo


Author(s):  
Wei-dong Huang ◽  
Qian Wang ◽  
Bang-lan Ding ◽  
Jie Cao


2022 ◽  
Vol 1 (13) ◽  
pp. 80-92
Author(s):  
Nguyễn Mạnh Thiên ◽  
Phạm Đăng Khoa ◽  
Nguyễn Đức Vượng ◽  
Nguyễn Việt Hùng

Tóm tắt—Hiện nay, nhiệm vụ đánh giá an toàn thông tin cho các hệ thống thông tin có ý nghĩa quan trọng trong đảm bảo an toàn thông tin. Đánh giá/khai thác lỗ hổng bảo mật cần được thực hiện thường xuyên và ở nhiều cấp độ khác nhau đối với các hệ thống thông tin. Tuy nhiên, nhiệm vụ này đang gặp nhiều khó khăn trong triển khai diện rộng do thiếu hụt đội ngũ chuyên gia kiểm thử chất lượng ở các cấp độ khác nhau. Trong khuôn khổ bài báo này, chúng tôi trình bày nghiên cứu phát triển Framework có khả năng tự động trinh sát thông tin và tự động lựa chọn các mã để tiến hành khai thác mục tiêu dựa trên công nghệ học tăng cường (Reinforcement Learning). Bên cạnh đó Framework còn có khả năng cập nhật nhanh các phương pháp khai thác lỗ hổng bảo mật mới, hỗ trợ tốt cho các cán bộ phụ trách hệ thống thông tin nhưng không phải là chuyên gia bảo mật có thể tự động đánh giá hệ thống của mình, nhằm giảm thiểu nguy cơ từ các cuộc tấn công mạng. Abstract—Currently, security assessment is one of the most important proplem in information security. Vulnerability assessment/exploitation should be performed regularly with different levels of complexity for each information system. However, this task is facing many difficulties in large-scale deployment due to the lack of experienced testing experts. In this paper, we proposed a Framework that can automatically gather information and automatically select suitable module to exploit the target based on reinforcement learning technology. Furthermore, our framework has intergrated many scanning tools, exploited tools that help pentesters doing their work. It also can be easily updated new vulnerabilities exploit techniques.



Sign in / Sign up

Export Citation Format

Share Document