• Title/Summary/Keyword: 경호 대응방안

Search Result 118, Processing Time 0.021 seconds

Revitalizing Measures of an Operating System on Casino Security Management - Focusing on Domestic Casino Only for Foreigners - (카지노 기업 보안관리 운영시스템 활성화 방안 - 국내 외국인 전용 카지노를 중심으로 -)

  • Kim, Jae Il;Lee, Julak
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.57-73
    • /
    • 2018
  • The domestic casino industry is attempting to change from the existing single form to the advanced-type of complex casino resort. In addition, the importance of the security management system, which prevents and responds to accidents caused by negative influences of gambling, is emphasized at the casino enterprise level. Therefore, this study aimed to find measures to revitalize the security management system for domestic casinos only for foreigners through an analysis of relevant literature and case studies. As a result of the analysis, it was found that in order to effectively cope with changes in the casino industry, three areas were needed to be revamped: (1) a lack of protocols which intend to protect casino security personnel, (2) an inefficient operational system due to the dualized casino security management system, and (3) a lack of systematic educational system for casino security personnel. This study therefore proposed three measures: (1) a review of revisions of related laws to protect casino security personnel, (2) enhancement of professionalism of casino security personnel and (3) establishment of a single operating system of the casino security management operating system.

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF

A study on the paradigm shift in National crisis management system and its functional, structural improvements : Focused on the construction of elite civil defense force (국가위기관리체계의 패러다임 변화와 기능 및 구조적 개선방안에 관한 연구 : 정예민방위대 구축을 중심으로)

  • Lee, Mi-Jeong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.137-161
    • /
    • 2012
  • There are some common and broad trends in National crisis management system around the world. This article considers that paradigm theoretically. 1) a shift from civil defense to civil protection, 2) 10 principles in sustainable National crisis management system, 3) the collaborative governance of crisis management. Some civil defense problems in National crisis management system are as follows; 1) obscurity of organizational identity through twofold function in civil defense, 2) ineffective organization in civil defense and disaster management system, 3) weakness of competencies in local government, 4) overlook of actual condition in communities and civil defense resources. This article suggests that to provide retired and active private security practitioners, retired law enforcement personnel, and retired military personnel to form a elite civil defense force and to find creative ways to address this pervasive threat which one reasonable and affordable solution would be for the government to take advantage of an existing resource.

  • PDF

The Study on Threats of Information Security and Their Solutions in the Fourth Industrial Revolution (4차 산업혁명 시대에 정보보안의 위협요인과 대응방안에 대한 연구)

  • Cho, Sung-Phil
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.11-35
    • /
    • 2017
  • The third industrial revolution, characterized by factory automation and informatization, are moving toward the fourth industrial revolution which is the era of superintelligence and supernetworking through rapid technology innovation. The most important resources in the fourth industrial revolution are information or data since the most of industrial and economic activities will be affected by information in the fourth industrial revolution. Therefore we can expect that more information will be utilized, shared and transfered through the networks or systems in real time than before so the significance of information management and security will also increase. As the importance of information resource management and security which is the core of the fourth industrial revolution increases, the threats on information security are also growing so security incidents such as data breeches and accidents take place more often. Various and thorough solutions are highly needed to protect information resources from security risks because information accidents or breaches seriously damage brand image and cause huge financial damage to organization. The purpose of this study is to research general trends on data breaches and accident that can be serious threat of information security. Also, we will provide resonable solutions to protect data from nine attack patterns or other risk factors after figuring out each characteristic of nin attack patterns in data breaches and accidents.

  • PDF

Study on Police-led National Response against CBRN Terror by Strengthening the Standing Cooperation System of the Interagencies (다부처 상설 협력체계 구축을 통한 경찰주도 국가 화생방 테러대응 발전방안)

  • Cha, Jang-Hyeon;Kang, Taeho;Kim, Daesoo;Lee, Hochan
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.217-242
    • /
    • 2019
  • Nowadays, Terrorism has become bloodier. Unlike the past, the recent terrorism has been indiscriminate in the purpose of mass- killing. Given this aspect, the threat of a CBRN attack is the biggest one to modern society. Notably, the possibility of terrorist attacks in Korea by international terrorist groups such as ISIL is higher than ever in consideration of its allusion; crusades and the devil's allied forces. To overcome these circumstances, various measures have been taken for counter terrorism at the state level including anti-terrorist legislation. Under the anti-terrorist act, police have to lead relevant inter agencies when it comes to the CBRN terror. At first glance, current countermeasures would work well. However, in order to respond quickly, the standing cooperations system of related departments need to be set up. In this sense, this article proposed a coagulatory body that could not only consider institutional-oriented organizational restructuring and response but also integrate and operate functions of various specialized institutions. It also stressed that the council should move toward a consultative body of information gathering, distribution and working- level consultation. With this cooperation system, counter-terrorism agencies can respond rapidly, stop wasting their effort and assets by about 30%. Also, they could design the atypical aspect of terrorism into standardized.

Design for Zombie PCs and APT Attack Detection based on traffic analysis (트래픽 분석을 통한 악성코드 감염PC 및 APT 공격탐지 방안)

  • Son, Kyungho;Lee, Taijin;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.491-498
    • /
    • 2014
  • Recently, cyber terror has been occurred frequently based on advanced persistent threat(APT) and it is very difficult to detect these attacks because of new malwares which cannot be detected by anti-virus softwares. This paper proposes and verifies the algorithms to detect the advanced persistent threat previously through real-time network monitoring and combinatorial analysis of big data log. In the future, APT attacks can be detected more easily by enhancing these algorithms and adapting big data platform.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

The Policing of the G20 Seoul Protests: A Case Analysis on the Death of Ian Tomlinson (G20 서울 정상회의 관련 집회시위 경비방안 : 이안 톰린슨(Ian Tomlinson) 사망사건 분석을 중심으로)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.125-146
    • /
    • 2010
  • The G20 summit is the premier forum for international economic cooperation and it will be held in Seoul in November 2010. However, protests are expected during the Seoul summit, as a part of the deepening global war against capitalism. The Korean Police need to deal with these protests effectively in order to provide security to the participating leaders and make the meeting run on wheel as planned. The current study attempts to analyze the death of Ian Tomlinson who died in the context of a heavily policed protest during 2009 G20 London summit. There are number of unique features regarding this incident, such as the public scrutiny of police conduct through video footage, the police use of excessive force, and the process to hold the police to account for misconduct. This incident caused serious damages to the public's faith in the British police. Based on the analysis, this study found that during the G20 London summit British police had the problems such as the lack of the clear standards on the use of force, improper training in the use of force, poor communications with the media and protesters, inappropriate use of the close containment tactic, and the failure to display police identification. Therefore, this study suggests the inducement of peaceful protests, the adoption of a set of standards on the use of force, public order training that is more directed and more relevant to the public order challenges facing the Korean police, improvement of the communication with the media and protesters, enhancement of individual officer's accountability as public order policing strategies for G20 Seoul summit meeting. However, the most fundamental principle is that Korean police must place a high value on tolerance and winning the consent of the public.

  • PDF

SSR Analysis Study for Power System Data Base Considering HVDC System (HVDC 연계를 고려한 SSR 해석 연구)

  • Park, Kyoung-Ho;Lee, Uk-Hwa;Jang, Gil-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.159-160
    • /
    • 2015
  • 현재 한국 전력계통의 경우 신재생전원의 보급 확대 및 전력수요의 증대에 따라, 국가적으로 대정전 사태 사전방지 등 신뢰도 높은 전력전송을 위한 노력으로서 HVDC 송전기술 도입이 폭넓게 검토되고 있다. 우리나라 전력 계통은 송전망 건설이 지연되고 있는 상황에서 수도권 부하는 증가하고, 발전 단지는 대규모화되고 있어 전력 계통 사고 및 그 파급이 점점 대형화되고 있다. 증가하는 전력수요에 대응하여 발전소를 건설해도 송전망 건설이 어려워 전력전송 능력이 점점 취약해지고 있다. 초대형화된 발전단지와 취약해진 송전망은 송전선의 혼잡을 증가시켜 불시에 기능정지가 될 경우, 사고의 영향력은 광역 정전으로 발전될 만큼 매우 커질 수 있다. 따라서 제 6차 전력수급 기본계획에 신규 반영되는 대규모 발전소의 계통 연계방안과 계통 신뢰도 측면으로 고려하여 장거리 전력 전송을 위한 HVDC 적용이 검토 됨에 따라 국내 HVDC 적용의 신규 시장이 될 가능성이 높다.

  • PDF

A Study of Terrorism Response System and Development in Korea (한국의 테러리즘 대응 체계와 발전방안 관한 연구)

  • Kim, Jong-Ryul;Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.81-101
    • /
    • 2012
  • A sudden change of social structure makes the nations have experienced terrorism to establish an anti-terrorism law and associate with international agreements to protect themselves from terrorism. Korea is exposed to terrorism as it has grown in stature by holding the international occasions and has been easy to travel abroad since 1980. Korea regulates the terrorist by a guideline which was established in 1982 by the presidential instruction and other criminal law. However, the majority of people doubt the propriety of overinterpretation of the law and punishment for terrorism. To cope with the situation strongly, it is better to establish an anti-terrorism law to block terrorism and apprehend the terrorist beforehand. Also we should realign an anti-terrorism organization that should be organized by the type of terrorism. In addition, we can expect to avoid waste of a budget and human efforts if we introduce terrorism warning system and face with each stage of situation. Lastly it is possible to prevent terrorism if we build up preventive actions along with the local residents.

  • PDF