• Title/Summary/Keyword: 보안사건

Search Result 217, Processing Time 0.045 seconds

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.

A Study on Current Status of Detection Technology and Establishment of National Detection Regime against Nuclear/Radiological Terrorism (핵테러/방사능테러 탐지 기술 현황 및 국내 탐지체계 구축 방안에 관한 연구)

  • Kwak, Sung-Woo;Jang, Sung-Soon;Lee, Joung-Hoon;Yoo, Ho-Sik
    • Journal of Radiation Protection and Research
    • /
    • v.34 no.3
    • /
    • pp.115-120
    • /
    • 2009
  • Since 1990s, some events - detection of a dirty bomb in a Russian nation park in 1995, 9/11 terrorist attack to WTC in 2001, discovery of Al-Qaeda's experimentation to build a dirty bomb in 2003 etc - have showed that nuclear or radiological terrorism relating to radioactive materials (hereinafter "radioactive materials" is referred to as "nuclear material, nuclear spent fuel and radioactive source") is not incredible but serious and credible threat. Thus, to respond to the new threat, the international community has not only strengthened security and physical protection of radioactive materials but also established prevention of and response to illicit trafficking of radioactive materials. In this regard, our government has enacted or revised the national regulatory framework with a view to improving security of radioactive materials and joined the international convention or agreement to meet this international trend. For the purpose of prevention of nuclear/radiological terrorism, this paper reviews physical characteristics of nuclear material and existing detection instruments used for prevention of illicit trafficking. Finally, national detection regime against nuclear/radiological terrorism based on paths of the smuggled radioactive materials to terrorist's target building/area, national topography and road networks, and defence-in-depth concept is suggested in this paper. This study should contribute to protect people's health, safety and environment from nuclear/radiological terrorism.

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

SW Quality of Convergence Product: Characteristics, Improvement Strategies and Alternatives (융합 소프트웨어 품질의 특성, 개선 전략과 대안)

  • Min, Sang-Yoon;Park, Seung-Hoon;Lee, Nam-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.19-28
    • /
    • 2011
  • In today and near future, most of the commercially manufactured IT products will be evolved into software convergence product. Recently, the embedded software products is called as 'Software Convergence Products.' This phenomenon does not simply show the trendy fashion, but has the seriously implication that the functionalities of IT product is accomplished and evolved via software technology, not via mechanical nor electrical means. It will become true that the quality of the convergence product is dominantly governed by the software it uses. Meanwhile, we are facing with the threatening fact that software defects in the mass products will requires tremendous amounts of cost proportional to the quantity of the product. We can remind ourselves of the disasters that have been already happened, such as Automotive recalls, Smart-phone recalls, and others. In software engineering, there have been large amount of work done in software quality improvement for the past couple of decades. Software process improvement, and testings are the representative ones. But we are facing with limitations of those traditional approaches in current convergence industry; exponentially increasing software sizes and rapid changes in software technology. In this paper, we analyze the characteristics of the software convergence industry, the limitations of the traditional Software quality improvement approaches. We suggest a new approaches in software quality improvement in different angles of thought and philosophy.

  • PDF

Film and the Politics of Post-memory in Chile's No and Korea's The Attorney (칠레의 와 한국의 <변호인>, 영화와 포스트메모리의 정치)

  • Park, Jungwon
    • Cross-Cultural Studies
    • /
    • v.44
    • /
    • pp.29-58
    • /
    • 2016
  • 'Post-memory' is the act of remembering traumatic events in history by subsequent generations who have not had direct experiences or relations with them. For this reason, the narratives of 'post-memory' are considered as re-interpretations of the past deeply influenced by current perspectives and concerns. The Chilean film NO goes back to the Referendum of 1988 in order to examine the "NO campaign" which was opposed to another eight years of continuation of the Pinochet regime. Although this campaign contributed significantly to the Chilean democratization, the filmmaker does not just celebrate it: rather he attempts to cast a critical reflection on its strategies that eventually turned democracy into a "commodity" by deploying commercial language and marketing tools for characterizing and describing it. On the other hand, the Korean movie The Attorney sheds light on the story of an attorney who, during the military regime in the 1980's, became a human rights lawyer when he tried to advocate for university students accused of violating national security law. This film reconstitutes the meaning of democracy built upon the logic of "common-sense" that privileges freedom and fundamental human rights over Statism. Despite the different historical contexts between Chile and South Korea, these two movies retell the history of a dictatorship that ended a couple of decades ago. In doing so, they raise questions about history, memory and democracy in order to deepen the understanding of current social and political circumstances while placing an emphasis on the roles and responsibilities of intellectuals during the transition to democracy and democratic consolidation.

A Study on Piracy Matters and Introduction of the Privately Contracted Armed Security Personnel on Board Ships (해적사건 대응을 위한 무장경비원제도 도입방안에 관한 연구)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.293-326
    • /
    • 2014
  • Piracy is a worldwide issue, but the deteriorating security situation in the seas off Somalia, the Gulf of Aden and the wider Western Indian Ocean between 2005 and 2012 and in the increasing number of attacks in the Gulf of Guinea are a major problem. The depth of concern for the problem internationally is amply demonstrated by the levels of co-operation and coordination among naval and other forces from several countries that have assembled in the west Indian Ocean region and the Gulf of Aden to escort ships carrying humanitarian aid to Somalia and to protect vulnerable shipping. Notwithstanding this unprecedented effort, the vast sea area in which the pirates now operate makes it difficult to patrol and monitor effectively, particularly with the limited resources available. More resources, in the form of naval vessels and aircraft, are needed and at every opportunity the IMO encourages Member Governments to make greater efforts to provide the additional naval, aerial surveillance and other resources needed through every means possible. IMO provide interim guidance and recommendations to be taken into account when considering the use of PCASP(privately contracted armed security personnel) if and when a flag State determines that such a measure would be lawful and, following a full risk assessment, appropriate. The interim guidance and recommendations of IMO are not intended to endorse or institutionalize the use of armed guards. Therefore, they do not represent any fundamental change of policy by the Organization in this regard. It is for each flag State, individually, to decide whether or not PCASP should be authorized for use on board ships flying their flag. If a flag State decides to permit this practice, it is up to that State to determine the conditions under which authorization will be granted. Therefore, Korea should be introduced rationally PCASP for safe shipping. PCASP on board ships is much the same to special guard personnel of security services industry act. Act plan of Oceans and fisheries ministry on PCASP collides with special guard personnel system of National Police Agency. Rather than new law making, PCASP regukations have to be included in security services industry act. Management Agency of PCASP is to not Oceans and fisheries ministry, but Central Headquarters Korea Coast Guard of Public Safety and Security Ministry because of specialty and closely connection.

  • PDF

A qualitative Research on Establishment of Department of Private Investigation and Its Future Direction (민간조사학과 개설의 필요성과 성장방향에 대한 질적 연구)

  • Jo, Sung-Gu;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.181-205
    • /
    • 2011
  • There are various discussions about introducing private investigation in South Korea these days, and training private investigators is one of the main topics. Training private investigators, unlike other training, is required to instill expertise and ethical quality into the trainees since the major task of the investigators includes protecting the lives of the citizens as well as their properties. Therefore, many agree to the idea that systematic educational programs need to be organized to produce private investigators with expertness and morality. In this study, we explored the opinions of those who are concerned with this issue of establishing private investigation in the university education and analyzed the data by using the NVivo 2 program. The result revealed that the reasons that people supported the idea of launching private investigator services were as follows. First, there is lack of manpower to maintain peace and public order in the country. Second, the police does not intervene actively and help harmed victims unless it is a consequential incident. Third, in position to wield public power, police officers cannot get involved in civil affairs. Also, absence of an academic institution to educate private investigators and lack of the police and clients' trust in private investigation were the two biggest reasons that people approved the proposal to introduce department of private investigation in universities. The interviewees of the study believed the outlook and future direction for private investigation would change depending on the status of the licensed private investigation business bill. Before the bill passes, they thought that the work of private investigators will be performed by insurance companies, foreign private investigation businesses, domestic consulting firms, and security providers which supply similar services. On the other hand, after the bill passes, they believed that numerous private investigator corporations resembling existing security corporations will be founded in addition to the current market, and that private investigation in the academic field will also be vitalized.

  • PDF