• Title/Summary/Keyword: 보안요원

Search Result 79, Processing Time 0.022 seconds

Outsourcing strategy of SCC of Korean electronic security companies (한국 기계경비 관제업무 아웃소싱 전략)

  • Ha, Kyung-Su
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.299-300
    • /
    • 2017
  • 한국의 지역기반 소규모 기계경비업체들은 고객의 수요는 다변화되어 가는 현실에서 첨단 경비서비스 제공을 위한 시스템의 미비와 전문 인적자원의 부족으로 기업경영의 위기에 봉착했다. 이에 지역기반 소규모 기계경비업체들의 혁신적 생존전략 모색방안의 일환으로 관제업무 아웃소싱 전략이 대두되었다. 기계경비 관제업무 아웃소싱 전략은 관제업무의 일부 또는 특정부분을 전문용역업체에 위탁하는 것으로 첨단 관제시스템과 전문관제요원을 보유하고 관제업무를 대행해 주는 아웃소싱기업의 전문성을 최대한 이용할 수 있는 장점이 있으나, 통제와 보안의 문제, 비용 상승과 계약종결의 문제 및 내부 전문기술의 축적기회 상실 등의 산재한 선결과제도 있다.

  • PDF

Secure Access Control Scheme for CCTV Video Management (CCTV영상 관리를 위한 안전한 접근 제어 방안 연구)

  • Lee, Jae-Seung;Kim, Hyung-Joo;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.534-536
    • /
    • 2014
  • CCTV의 다양한 필요성이 대두됨에 따라 CCTV를 통합관리하는 CCTV 통합관제 센터가 늘어나고 있다. 행정안전부는 2015년까지 전국 시군구에 CCTV 통합관제센터 구축을 추진하고 있을 정도로 앞으로도 계속적으로 증가할 예정이다. 하지만 이를 관리할 전문 모니터링 요원이 턱없이 부족한 상황이며, 전문 교육의 부재로 CCTV 영상을 개인적 호기심이나 개인의 이익을 위해 열람하는 경우가 발생하고 있다. 본 논문을 비밀 분산 기법을 이용하여 암호화된 키를 분배하고 요청에 따라 일정 수 이상의 분배키가 모이면 영상 열람권한을 주는 방식으로 설계 하여 관리자가 임의로 영상정보에 접근하는 상황을 방지하였다. 또한 그룹 키를 분배하고 수시로 키 갱신을 함으로서 다양한 보안 위협에 대응 하였다.

A Legal Study on the Promotion of the In-Flight Security Officers System

  • Jin, Seong Hyun;Jeon, Seung Joon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.100-105
    • /
    • 2021
  • The purpose of this study is to provide in-flight security in situations where aviation security is constantly threatened by the increase in illegal interference in aircraft and the threat of terrorism that still exists. It is to identify legal operational problems such as education and qualification of the original system and to propose improvement measures. To this end, the need for revision based on relevant laws and guidelines such as "Operation Guidelines for In-Flight Security Officers" is to be discussed based on international standards such as ICAO and Federal Air Marshal. The research method was based on interviews with SEMs such as cabin managers, which focused on ensuring the legal status of In-Flight Security Officer, establishing relationships with captains, and improving education and training.

Stuty on Access Control measure for secure image management in CCTV Integrated Control center (CCTV통합관제센터에서 안전한 영상 관리를 위한 접근 제어 방안 연구)

  • Lee, Jae-Seung;Kim, Hyung-Joo;Choi, Won-Kyu;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.842-844
    • /
    • 2013
  • 범죄예방이나 위급사항에 대한 대응 등 CCTV의 다양한 필요성에 따라 CCTV를 통합관리하는 CCTV 통합관제 센터가 늘어나고 있다. 행정안전부는 2015년까지 전국 시군구에 CCTV 통합관제센터 구축을 추진하고 있어 앞으로도 계속적으로 증가할 예정이다. 하지만 CCTV관제센터는 증가하고 있음에도 이를 관리할 전문 모니터링 요원이 부족하며, 동시에 이들이 영상정보를 개인의 호기심이나 이득을 위해 사용하는 일이 발생 할 수 있다. 본 논문을 Shamir's Secret Sharing 방법을 이용하여 암호화된 키를 분배하고 요청에 따라 일정 수 이상의 분배키가 모이면 영상 열람권한을 주는 방식으로 설계 하여 관리자가 임의로 영상정보에 접근하는 상황을 방지하였다. 또한 암호키와 랜덤한 값을 이용한 세션키 생성 등을 통해 다양한 보안위협에도 대응하였다.

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.

Evaluation of Access Control Function of the Standard Records Management System (표준기록관리시스템 기능 평가 접근관리 기능을 중심으로)

  • Park, Min-Yung
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.3-35
    • /
    • 2013
  • The physical access or control of records with material entities is relatively easy. However, in the case of electronic records, due to its heightened applicative aspect that allows anyone with the authority to have access over the data, it requires an appropriate standard and stability to ensure the authenticity and integrity of electronic records. This study performed functional evaluation by extracting the minimum critical items from the national functional requirements documents and standards to explore the access control function that play an important role for the standard records management system to maintain quality requirements of electronic records. Based on this checklist, it evaluates whether the standard records management system properly carries out the access control function and investigates the current condition of application to practical records management work. Records managers generally do not use access control function, which may be because they do not feel the necessity, since the application of records management system is not yet actively promoted. In order for the standard records management system to be developed to become a more active system, it requires system improvement as well as considerations for below factors: First, although the necessity of establishing access control conditions is already recognized, it requires a clear stipulation of the regulation. Second, measures must be taken to implement access control in the records management system through document security solution. Third, it requires self-reflection of records manager, who utilizes the records management system. Instead of placing all responsibility on the National Archives, which established the system, professionals must further develop the system through continuous evaluation and improvement. Finally, a general discussion is required to publicize the issue of functional improvement of records management system. Although there is a bulletin board already created for this purpose, its users are extremely limited and it only deals with current problems. A space in online as well as in offline is required to solve the fundamental problems and exchange opinions.

Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response (이미지 및 코드분석을 활용한 보안관제 지향적 웹사이트 위·변조 탐지 시스템)

  • Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.871-883
    • /
    • 2014
  • New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit or national confusion are being emerged and evolved. In addition, in case of 'drive by download' attack, if a host just visits the compromised websites, then the host is infected by a malware. Website falsification detection system is one of the most powerful solutions to cope with such cyber threats that try to attack the websites. Many domestic CERTs including NCSC (National Cyber Security Center) that carry out security monitoring and response service deploy it into the target organizations. However, the existing techniques for the website falsification detection system have practical problems in that their time complexity is high and the detection accuracy is not high. In this paper, we propose website falsification detection system based on image and code analysis for improving the performance of the security monitoring and response service in CERTs. The proposed system focuses on improvement of the accuracy as well as the rapidity in detecting falsification of the target websites.

Study of Hospitality Security (Hospitality Security의 학문적 고찰)

  • Kim, Hyeong-Seok;Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.37-56
    • /
    • 2018
  • Safety is considered as a very important factor when tourists select tourist spots, which means that the desire for safety in the tourism industry is very high. Therefore, a specialized field for the safety of the tourism industry is necessary. Already, there are staff members who are responsible for safety in various tourism sectors, but they have been led through knowledge based on work experience without professional education. In order to train specialists who are responsible for the safety of the tourism industry, research in related fields is indispensable, and universities in charge of research and education systematically construct surveys of related fields, and through experts I have to train. In the field meaning tourism security, there is Hospitality Security. Hospitality means 'to hospitality', 'to be entertaining', Hospitality Industry is used to cover the tourism industry in its exhaustive sense. Security is a term that refers to safety and security. Therefore, Hospitality Security which the two meanings together, that is, korean word hospitality security, tourism security can be said. Already in the US experts in the field of Hospitality Security explained the importance through related books. Currently in Korea, well-known tourism related universities operate subjects in the Hospitality field, and the security field also manages subjects at several universities. So, We collected the subjects managed at each university, analyzed them, and selected subjects of Hospitality Security. If the results of research through continuous research accumulate, the value as academic will be further increased, and it will be possible to have a role responsible for the safety of the tourism industry by producing experts accordingly.

The Study on the Disciplinary Model in Div. Military Science (대학 군사학과 훈육 모델에 관한 연구)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.3-12
    • /
    • 2014
  • The purpose of this study is to identify disciplinary professors' core competencies in Div. Military Science student. To best accomplish the study, I select core competencies in the precedent study about Disciplinary Professors' Core Competencies studies. The 5 factors of core competencies are as follow ; teaching core competency, evaluation core competency, guidance core competency, class management core competency, speciality development core competency. Through this study I developed disciplinary process model. This model is conducted to fit the structural relationship among the disciplinary professors' core competencies and students' life satisfaction and aspiration for military occupation. But this study has some restriction, so we should study actual proof the more.

A Study on the insurance crime using a false hospitalization (허위입원을 이용한 보험범죄에 대한 연구)

  • Park, Hyung Sik;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.79-87
    • /
    • 2015
  • In order to clearly recognize illegality of insurance crime, declaring the provisions on insurance crime is preferable. An insurance fraud differentiated from Configuration Requirements of general fraud should be established And differentiation in accordance with the act type of insurance crime the degree of organizational involvement is required. Also the introduction of civil sanctions and creation of additional punishment provision about Organized insurance fraud are required. To notice duplicate insurance when sign up life insurance, the revision of the provisions is required. To limit unnecessary long-term hospitalization, hospitalization standard is required. Introduction of private investigator is required as a method for endowing with investigation to the staff of insurance companies. By providing information sharing laws between relevant agencies including insurance companies and law enforcement agencies, the foundation of information database, and the introduction of SNA Techniques in the IFAS,, you can detect Organized collusion crime.