• Title/Summary/Keyword: 민간보안산업

Search Result 72, Processing Time 0.026 seconds

A Study on the Introduction of Advanced Technology in the Realm of Defense (민간 신기술의 국방 분야 도입방안에 대한 연구)

  • Jeon, Suyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • It is expected that the technology of the fourth industrial revolution will increase the productivity and efficiency of the industrial world. Many countries are providing political and financial supports to make big advances in the technology. Especially, developed countries, such as USA, Germany and Japan, are trying to use the technology for manufacturing and finance industry, and to increase the opportunity of test-bed environment. However, many restrictions hinder adopting non-governmental technology in defense due to various limitations such as national security and protection of technology. In this study, we propose methods to adopt new and non-governmental technology in defense through by investigating internal and external policies related to technology and case studies. First, it is necessary to expand opportunities to let small and medium sized companies participate in defense R&D projects. Second, it is important to improve R&D systems for introducing new and non-governmental technology on the defense industry. Third, it is needed to increase test-bed environments for experimenting and evaluating new technologies in the defense industry. Thus, we expect that the proposed methods will help form strategies for small and medium sized companies, and analyze trends for introducing new technologies in the defense industry.

A Study on Light Weight Authentication Method of Distributed Cluster-based IoT Devices (분산 클러스터 기반 IoT 디바이스 경량 인증 방법에 대한 연구)

  • Kim, Sung-hwan;Kim, Young-gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.103-109
    • /
    • 2019
  • Due to the development of ICT technology, the IoT environment for connecting objects in the vicinity to networks and utilizing information about objects in various fields is getting attention, and security threats are also increasing. In order to solve the increasing security problem in IoT environment, we are studying methods that use certificate, encryption, hash calculation and block chain in the private sector. However, the security authentication method which overcomes the performance gap between devices and has compatibility with various devices It has not been proposed yet. In this paper, we propose an authentication method that can achieve wide compatibility by minimizing the influence of IoT device environment.

A Study on the Historical Origin of Private Security Industry in Korea (우리나라 보안산업의 역사적 기원에 관한 연구)

  • Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.91-111
    • /
    • 2010
  • Around the middle of the ninth century the strict bone-rank system of Silla frustrated many people who had political ambition but lacked nobility. They had to seek other ways, including maritime trade. Such an undertaking reflected and also increased their economic and military power. Trade prospered with T'ang China and with Japan as well. The threat of piracy to Silla's thriving maritime trade caused to create a succession of garrisons at important coastal points. Chonghae Jin (Chonghae garrison) was regarded as the most important of these. It was established in 828 by Chang Pogo. Chonghae Jin was on Wando, an island just east of the southwestern tip of Korea and a key place at this time in the trade between China, Korea, and Japan. From this vantage point Chang Pogo became a merchant-prince with extensive holdings and commercial interests in China and with trade contacts with Japan. Although piracy was rampant in East Asia at that time, either the Chinese or Silla government was not able to control it due to inner political strife and lack of policing resources. Infuriated by the piracy and the government's inability to control it, Chang Pogo came back to Silla to fight against the pirates and to protect maritime trade. He persuaded the king of Silla and was permitted to control the private armed forces to sweep away the pirates. In 829 he was appointed Commissioner of Chonghae-Jin with the mission of curbing piracy in that region. Chang's forces were created to protect people from pirates, but also developed into traders among Silla Korea, T'ang China, and Japan in the 9th century. This was geographically possible because the Chonghae Garrison was situated at the midpoint of Korea, China, and Japan, and also because Chang's naval forces actually dominated the East Asia Sea while patrolling sea-lanes. Based on these advantages, Chang Pogo made a great fortune, which might be collected from a charge for protecting people from pirates and the trades with China and Japan. Chang's forces could be termed the first private security company in the Korean history, at least in terms of historical documents. Based on historical documents, the numbers of private soldiers might be estimated to exceed tens of thousands at least, since Chang's forces alone were recorded to be more than ten thousand. Because local powers and aristocratic elites were said to have thousands of armed forces respectively, the extent of private forces was assumed to be vast, although they were available only to the privileged class. In short, the domination of Chang's forces was attributable to the decline of central government and its losing control over local powers. In addition it was not possible without advanced technologies in shipbuilding and navigation.

  • PDF

A Study on the Marine Civil Guard Officer to Enhance the Quality of Maritime Security Services (해양경비 서비스 품질 개선을 위한 해양경비사 제도에 관한 연구)

  • Jin, Seong-Ryong;Lee, Eun-Bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.1
    • /
    • pp.45-51
    • /
    • 2013
  • In order to facilitate the private maritime security system with high quality guard services, the status of private security companies and the security instructor system which has been operated in land side, are analyzed. Through screening the spectrums of private maritime security and analyzing the status of maritime security guard, the characteristics and expertise of maritime guard service, and it's system need are elicited. we propose the system of marine civil guard officer who will play a major role in private maritime security domain, and design the job requirements, the subjects of qualification test and the education program to enhance his professionalism and practicality. Moreover, the enactment of a provision on marine guard company in Marine guard law will be the platform to develop a private maritime security industry and to strengthen international competitiveness through supervising and piloting private guard service at sea by Korea coast guard.

무인이동체 드론의 취약점분석 및 대응기술 연구 동향

  • Kim, Myoungsu;You, Ilsun;Yim, Kangbin
    • Review of KIISC
    • /
    • v.30 no.2
    • /
    • pp.49-57
    • /
    • 2020
  • 군사 등의 특수 목적으로만 사용되었던 무인비행체 드론이 최근 상용 수준의 간결한 구조와 저가화가 가능해지면서 여러 제조업체를 통하여 민간분야의 다양한 응용에 활용 가능함을 증명하고 있다. 그러나 제조업체들 간의 시장 우위 선점을 위한 과열 경쟁으로 인하여 보안 안전성 검증 단계를 거치지 않은 드론과 이에 수반되는 애플리케이션이 시장에 바로 출시되면서 이들이 우리 사회를 향한 공격도구로 활용될 수 있다는 새로운 잠재적 위협이 우려되고 있다, 이와 관련하여 현재 드론과 애플리케이션과의 연결 및 데이터 통신 과정에서 완성도가 낮은 접근제어 기술이나 암호화되지 않은 통신방식을 비롯하여 드론 내부 소프트웨어의 코딩 상의 문제점 등에 의하여 다양한 취약점이 노출되고 있는 상태이다. 이러한 취약점들로 인하여 드론의 인증 해제 및 하이재킹을 통한 불법 영상촬영이나 개인정보의 유출 등을 비롯하여 특정 목표물을 향한 드론의 고의적 추락 등이 발생할 경우 재산 피해뿐만 아니라 인명 피해까지 발생할 수 있다. 특히, 현재의 드론 응용은 초기단계여서 향후 다양한 응용과 유관 기술들이 폭넓게 전개되어야 하는 시점에서 이러한 사고 가능성은 매우 심각하게 인식되어야 할 것이다. 더구나 제4차 산업혁명 시대의 드론은 비상시를 위한 다이나믹 모바일 게이트웨이 역할까지도 수행하여야 하는 환경에서 악의적인 행위는 전체 사회로 확산될 우려도 있으므로 미래 사회의 드론을 위한 안전문제는 매우 시급하고 중대하다고 할 수 있다. 이에 본 고에서는 현재까지 발표된 드론에 대한 다양한 보안위협을 조사하고 이러한 보안 위협을 요소별로 분류하여 정리하였다. 본 기고가 간단하게나마 정리한 내용을 통하여 다양한 보안위협에 대한 대응기술을 준비하기 위한 시발점이 되었으면 한다.

Design and Evaluation Security Control Iconology for Big Data Processing (빅데이터 처리를 위한 보안관제 시각화 구현과 평가)

  • Jeon, Sang June;Yun, Seong Yul;Kim, Jeong Ho
    • Journal of Platform Technology
    • /
    • v.8 no.4
    • /
    • pp.38-46
    • /
    • 2020
  • This study describes how to build a security control system using an open source big data solution so that private companies can build an overall security control infrastructure. In particular, the infrastructure was built using the Elastic Stack, one of the free open source big data analysis solutions, as a way to shorten the cost and development time when building a security control system. A comparative experiment was conducted. In addition, as a result of comparing and analyzing the functions, convenience, service and technical support of the two solution, it was found that the Elastic Stack has advantages in the security control of Big Data in terms of community and open solution. Using the Elastic Stack, security logs were collected, analyzed, and visualized step by step to create a dashboard, input large logs, and measure the search speed. Through this, we discovered the possibility of the Elastic Stack as a big data analysis solution that could replace Splunk.

  • PDF

A Study on the Application of the 4th Industrial Drone to the Military Field (4차 산업시대 드론의 군사 분야 적용에 관한 연구)

  • Lee Young Uk
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.75-84
    • /
    • 2022
  • In the 4th industry, drones are being used while having a close relationship with our lives. The development and use of various drones suggests a new paradigm for the domestic industry in the future, and is expected to become more advanced and scientific. Meanwhile, in the field of defense, efforts are being made in various ways to overcome the social phenomenon of reduced service resources. It is concentrating its efforts on strengthening the national defense power by preparing an exit strategy to supplement the shortage of service resources and to maintain and improve combat power, and by combining various science and technology related to the 4th industry. The military is planning to reinforce its combat power in connection with future industries to effectively respond and perform missions in preparation for the future combat aspects that have been researched and planned, and is planning an unmanned combat system for the science and technology army by investing a separate budget. Therefore, we systematically introduce and utilize drones, which are the core of the unmanned combat system, to create more active combat power and seek countermeasures for the battle vacuum, It is expected to provide a new paradigm for the battlefield when using advanced technology developed in the private sector and grafting it to the military sector.

A Study on the Actual Operation Conditions of the Private Security Guard Certification Exam and it's Improvement Plan (신변보호사 자격시험의 운영실태와 개선방안에 관한 연구)

  • Lee, Sanghun
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.35-44
    • /
    • 2014
  • Private Security Guard Certification Exam that initiated as the eligibility of private in 2006, has been requested more fulfilling management because that becomes to be recognized at the national certified qualification system in 2013. The findings of this study were as follows: First, it is necessary to expand more exemptions, currently some are mainly police officers. Secondly, it is needed to make to announce the final successful candidates through the opposition proceedings by publishing assumptions answer of the problem and by improving the procedure for determining the successful candidates, and so forth.

The Modeling of Management Data and Drones Recommendation for Military Operation Support Mission (군 작전지원 임무 수행을 위한 드론 추천 및 관리 데이터 모델링)

  • Park, Keun-Seog;cheon, Sang-pil;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.133-140
    • /
    • 2018
  • As the core technology of the 4th Industrial Revolution is applied to drone, the potential for growth in the field of unmanned aerial vehicles is very large, and the utilization of civilian & military fields in the domestic & foreign is increasing rapidly. Because application areas of drone in the civilian field is various, it is excellent in terms of cost effectiveness and high value in utilization when it is used for military operation support mission. Especially, in the case of the Air Force, it is expected that military usage effectiveness will be high if drone replaces various air operations support missions such as aircraft inspection, supply of military supplies, base security. We find out the missions that can utilize drones for military operations support and propose the recommendation and data management plan accordingly. We recommend the most suitable drones and equipment that perform similar missions in the private sector and propose the data modeling of relational database.

  • PDF

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.