• Title/Summary/Keyword: 보안 대책

Search Result 583, Processing Time 0.022 seconds

A Study on the Education Status and Improvement of Military Children due to Special Environmental Factors of National Security and Survival Rights (국가안보 및 생존권 수호의 군 특수적 환경 요인으로 인한 군인자녀의 교육 실태 및 개선에 관한 연구)

  • Kim, Byoung Jin
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.95-103
    • /
    • 2018
  • The military's morale is a serious threat in terms of defense posture and protection of national security and the nation's right to survival, as it has led to losses in talented manpower, weakened fighting spirit, damaged troop confidence, and reduced work efficiency and morale. Under these circumstances, a stronger defense posture and maximum morale among the troops should be followed by a thorough diagnosis and results on the factors affecting the military's morale. Professional soldiers often travel to work because of the special nature of their jobs. Among the problems associated with these characteristics is child education. Frequent shifts of military sites are intended to be made based on the analysis of the overall state of the military service education system, such as moving frequently with family members or separating with the family due to issues related to children's education.

  • PDF

A Study on the Establishment of Social Cooperative for the Job Creation of discharged solider (제대군인 일자리 창출을 위한 사회적 협동조합 설립 방안 연구)

  • Koo, Young Hui;Kim, Ji Deok
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.149-158
    • /
    • 2018
  • Military officials in Korea are forced to change jobs early due to the retirement age after active service. Measures are needed in view of the 55% average employment rate of middle and long term soldiers during the last five years. The last government of Park Geun-hye push ahead creating of 50,000 jobs in discharged soldier with policy, but the results were not great. Therefore, it is time to drastically change the government's efforts to create large-scale jobs for discharged soldiers. It is necessary to break away from the traditional ways of expanding opportunities for employment at the academic level. So it became necessary for discharged soldiers to actively review ways to build their own organizations. For such reasons, this study presents a measure to create job through food service, Security personnel training and Manpower provision business, Special Soldier Control and Training Center Operation business, Han River Water Cleaning Project, Caring business, and delivery business by establishing their own social cooperation to create jobs for discharged soldiers.

  • PDF

A Study of System Design for Management the Confidential Records (비밀기록을 관리하기 위한 시스템 설계 연구)

  • Hong, Deok-Yong
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.277-313
    • /
    • 2017
  • With the enactment of regulations on confidential records management, the management of confidential records has become more important than ever. However, there remains no management method in the field of records management that takes the feature and values of confidential records into consideration. For this, this study processed electronically confidential records managed in a non-electronic environment. In addition, we developed a system that will allow public institutions to manage confidential records independently, that will prevent loss of information because of loss of or damage to the confidential records, and that can be used conveniently in the digital security environment of authorized users to establish a foundation for commercial management. In this study, we analyzed the system configuration requirements according to the international standard for the records management of a confidential records management system and system-related issues such as system design based on the analyzed requirements, system security and encryption, and metadata, the overall process of establishing and outputting secret management records and standard management.

Obligated Involuntary Officer's Employment Support Plan Research After Discharge (군(軍) 단기복무장교의 전역 후 취업지원 방안 연구)

  • Kim, Ji Deok
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.11-19
    • /
    • 2018
  • Because Korean military promotes employment support policy which give priority to the middle service officer who served more than 5 but less than 10 years and long term service officer who served more than 10 years, the support policy for obligated involuntary officer is relatively deficient. To make matters worse, national youth unemploy ment makes obligated involuntary officers suffer from serious unemployment crisis after discharge. These problems have bad effect on gaining ROTC KAOCS cadets who constitute about 80% of first appointment officers and because they are mostly discharged after just taking a short service, it's time to find a measure to solve the problem. Thus, this study is investigated to improve competitive rate of entry of ROTC KAOCS for securing outstanding manpower by deducing MR about legislation and system which are related to employment support for obligated involuntary officers and suggesting stable job secure plan for employment support, supplement system, and after discharge, model way of career management during military service of an obligated involuntary officers who are suitable for qualificated men who are needed for a company. Also, it will lead to combat power development of the military consequently.

  • PDF

Machine Learning-Based Prediction Technology for Medical Treatment Period of Automobile Insurance Accident Patients (머신러닝 기반의 자동차보험 사고 환자의 진료 기간 예측 기술)

  • Kyung-Keun Byun;Doeg-Gyu Lee;Hyung-Dong Lee
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.89-95
    • /
    • 2023
  • In order to help reduce the medical expenses of patients with auto insurance accidents, this study predicted the treatment period, which is the most important factor in the medical expenses of patients in their 40s and 50s, and analyzed the factors affecting the treatment period. To this end, a mechine learning model using five algorithms such as Decision Tree was created, and its performance was compared and analyzed between models. There were three algorithms that showed good performance including Decison Tree, Gradient Boost, and XGBoost. In addition, as a result of analyzing the factors affecting the prediction of the treatment period, the type of hospital, the treatment area, age, and gender were found. Through these studies, easy research methods such as the use of AutoML were presented, and we hope that the results of this study will help policies to reduce medical expenses for automobile insurance accidents.

A Study on the Application of the 4th Industrial Drone to the Military Field (4차 산업시대 드론의 군사 분야 적용에 관한 연구)

  • Lee Young Uk
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.75-84
    • /
    • 2022
  • In the 4th industry, drones are being used while having a close relationship with our lives. The development and use of various drones suggests a new paradigm for the domestic industry in the future, and is expected to become more advanced and scientific. Meanwhile, in the field of defense, efforts are being made in various ways to overcome the social phenomenon of reduced service resources. It is concentrating its efforts on strengthening the national defense power by preparing an exit strategy to supplement the shortage of service resources and to maintain and improve combat power, and by combining various science and technology related to the 4th industry. The military is planning to reinforce its combat power in connection with future industries to effectively respond and perform missions in preparation for the future combat aspects that have been researched and planned, and is planning an unmanned combat system for the science and technology army by investing a separate budget. Therefore, we systematically introduce and utilize drones, which are the core of the unmanned combat system, to create more active combat power and seek countermeasures for the battle vacuum, It is expected to provide a new paradigm for the battlefield when using advanced technology developed in the private sector and grafting it to the military sector.

이동코드에 관련한 보안문제 및 방안기법 연구

  • 김준회;조충호
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2001.05a
    • /
    • pp.79-82
    • /
    • 2001
  • 이동코드는 자바 애플릿(applet)이나 스크립트와 같이 원격지에서 실행가능한 코드로서 현재 웹브라우저를 통하여 쉽게 수행 가능하다. 이러한 프로그램은 누구나 작성할 수 있고 브라우저를 수행할 수 있는 어떤 컴퓨터에서도 수행 가능하다. 즉, 자바 애플릿과 같이 운영체제나 하드웨어에 관계없이 어떤 플랫폼에도 동일 코드가 수행될 수 있다. (일반적으로 에이전트도 이동 코드라고 부르지만 여기서는 포함시키지 않는다.) 인터넷에서 어떤 컴퓨터에서도 공통적인 스크립트를 수행할 수 있다는 것은 편리함, 가능성에서 많은 장점을 가지고 있지만 보안 관점에서 보면 이러한 공통의 스크립트를 수행할 수 있는 인터프리터는 매우 위험하다. 또한 이러한 인터프리터가 브라우저의 한 부분이기 때문에 위험은 더욱 증가한다. 이동 코드 인터프리터에서 어떤 버그가 존재할 경우 이것을 이용한 악성 사용자가 프로그램을 특정 컴퓨터에서 수행시켜 접근 권한을 쉽게 얻거나 시스템을 파괴할 수 있다. 일반 사용자들이 주로 사용하는 윈도95 같은 운영체제에서는 이러한 공격을 막을 보호대책이 없고 심지어 UNIX에서도 사용자의 권한을 가지고 이동 코드가 수행되기 때문에 사용자의 파일을 조작하거나 정보가 유출될 수 있다. 또한, 이동코드가 서로 다른 수행환경을 이동할 경우, 악성 이동코드로부터 영향을 받을 수 있는 수행환경의 보호와 악성 호스트 및 수행환경에 의해 이동코드가 파괴되는 경우도 있다. 위와 같은 이동 코드의 위험으로부터 발생할 수 있는 보안문제점들의 실제 피해 사례 및 시스템을 보호하기 위해 사용되어온 몇 가지 기법을 제시하였다.사업을 통하여 경남지역 산업단지에 입주한 기업체의 정보 활용을 극대화하여 지역경제 발전에 기여함과 동시에 국내 지역정보화 시범모델로서 위상을 확립하고자 한다.을 기업의 타인자본비용과 자기자본비용의 조합인 기회자본비용으로 할인함으로써 현재의 기업가치를 구할 수 있기 때문이다. 이처럼 기업이 영업활동이나 투자활동을 통해 현금을 창출하고 소비하는 경향은 해당 비즈니스 모델의 성격을 규정하는 자료도로 이용될 수 있다. 또한 최근 인터넷기업들의 부도가 발생하고 있는데, 기업의 부실원인이 어떤 것이든 사회전체의 생산력의 감소, 실업의 증가, 채권자 및 주주의 부의 감소, 심리적 불안으로 인한 경제활동의 위축, 기업 노하우의 소멸, 대외적 신용도의 하락 등과 같은 사회적·경제적 파급효과는 대단히 크다. 이상과 같은 기업부실의 효과를 고려할 때 부실기업을 미리 예측하는 일종의 조기경보장치를 갖는다는 것은 중요한 일이다. 현금흐름정보를 이용하여 기업의 부실을 예측하면 기업의 부실징후를 파악하는데 그치지 않고 부실의 원인을 파악하고 이에 대한 대응 전략을 수립하며 그 결과를 측정하는데 활용될 수도 있다. 따라서 본 연구에서는 기업의 부도예측 정보 중 현금흐름정보를 통하여 '인터넷기업의 미래 현금흐름측정, 부도예측신호효과, 부실원인파악, 비즈니스 모델의 성격규정 등을 할 수 있는가'를 검증하려고 한다. 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주

  • PDF

Study about the role of the Prevention of School Safety Keeper System (학교안전지킴이의 학교폭력예방에 대한 제도적 고찰 - 전문성과 제약성을 중심으로 -)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.3-13
    • /
    • 2013
  • School violence that have occurred recently, showing a tendency to collectivization and diverse types of violence, as well as the quality and increase the damage levels. School violence in the home, school, and social factors, but is caused by the lack of awareness about the violence and the reporting of consciousness due to poor acts of violence indirectly assisted. The only place violence has caused the school to establish the legal and institutional arrangements in order to minimize school violence have no choice but to limit its effectiveness is negligible. The problem of school violence in connection with the problem of juvenile crime prevention and control, and punishment should be made of the complex and layered. Operation and School police system, School safety keeper system, school sheriff system since 2005, each municipality in order to minimize school violence, but have no practical help to limit the visible and symbolic effects. Nonexistent professional staff of the institution or school safety monitors emphasis on monitoring the physical state of the system in the form of 'guards' departure inherently have limitations. Also, to prevent criminal acts or violence in the state is not given special privileges and the appropriate role for the school keeper is a problem with the system. Report no other role can not be expected. Should therefore be preceded by a systematic improvement and training of experts in order to prevent school violence, and home and school, in terms of social support and measures.

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF

Analysis of Privacy threats and Security mechanisms on Location-based Service (위치기반 서비스의 프라이버시 위협 요소 분석 및 보안 대책에 관한 연구)

  • Oh, Soo-Hyun;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2009
  • A location information used in LBS provides convenience to the user, but service provider can be exploited depending on how much risk you have. Location information can be exploited to track the location of the personal privacy of individuals because of the misuse of location information may violate the user can import a lot of damage. In this paper, we classify the life cycle of location information as collection, use, delivery, storage and destroy and analyze the factors the privacy is violated. Furthermore, we analyze information security mechanism is classified as operation mechanism and policy/management mechanism and propose a security solutions of all phase in life cycle.

  • PDF