• Title/Summary/Keyword: 시큐리티기법

Search Result 60, Processing Time 0.02 seconds

A quantitative study on patterns of terrorist bombing incidents (계량분석을 통한 폭탄테러사건의 패턴분석)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.317-347
    • /
    • 2013
  • This study focuses on the characteristics of terrorist bombing incidents and causal factors on terrorist bombing incidents and number of casualty per incident in Afghanistan though statistical quantitative analysis. For doing so, the bombing data from GTD(Global Terrorism Database) of START program occurred from January 1st 2002 until December 31st 2011 was used. By using descriptive analysis, chi-square, and logistic regression analysis, characteristics of bombing incidents and causal factors on the frequency of incidents and the number of casualty were identified. According to the analysis results, a clear pattern was appeared in terrorist bombing incidents. This result suggests that terrorists rationally and strategically calculate bombing operations and therefore terrorist bombing incidents and number of casualty per incident are conditioned or affected by time, season, Pashtun tribal entity, production level of drugs, the characteristics of targets.

  • PDF

Definition of aggressive response scale through quantitative evaluation of cyber attack (사이버공격의 정량적 피해평가를 통한 공세적 대응규모 산정)

  • Hong, Byoungjin;Lim, Jaesung;Kim, Wanju;Cho, Jaemyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.17-29
    • /
    • 2017
  • Various cyber attacks against our society and the government are continuing, and cases and damages are reported from time to time. And the area of cyber attack is not limited to cyberspace, but it is expanding into physical domain and affecting it. In the military arena, we have established and implemented the principle of responding proportionally to enemy physical attacks. This proportionality principle is also required in the version where the region is expanding. In order to apply it, it is necessary to have a quantitative and qualitative countermeasure against cyber attack. However, due to the nature of cyber attacks, it is not easy to assess the damage accurately and it is difficult to respond to the proportionality principle and the proportional nature. In this study, we calculated the damage scale by quantitatively and qualitatively evaluating the cyber attack damage using the Gorden-Lobe model and the security scoring technique based on the scenario. It is expected that the calculated results will be provided as appropriate level and criterion to counteract cyber attack.

Police Officers' Perception Concerning the Roles of Private Security (민간경비의 역할에 대한 경찰관의 인식연구)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.101-118
    • /
    • 2009
  • Despite large increases in the growth of the private security industry in the last few decades, very little empirically based information has been collected on the roles of private security within current Korean literature. Attempting to address this gap, this study examined perceptions of the roles of private security by surveying 212 police officers. In order to measure the strength of police officers' perception, not only quantitative but also qualitative methods were adopted. Overall, results of the study indicate that police officers considered private security as an adjunct to the police. However, they also believed that private security industry would grow to get square with the police in the near future. Concerning the specific roles of private security, police officers rated the roles of loss prevention and protection more highly than those of crime prevention and order maintenance. This result reveals that police officers thought private security had focused more on the roles related to the pursuit of profits than on the roles tied to its public functions.

  • PDF

The Design and Implementation of a Security Management Server for Pre-Distributed Key Exchange Method and Lightweight Key Distribution Protocol for Mobile Ad-hoc Node (이동 Ad-hoc 노드용 사전 키 분배 기법 및 경량 키 분배 프로토콜을 위한 보안관리 서버 시스템 설계 및 구현)

  • Yang, Jong-Won;Seo, Chang-Ho;Lee, Tae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.1-8
    • /
    • 2007
  • The Mobile Ad-hoc network does environmental information which an individual collects in nodes which are many as the kernel of the USN technology based on the radio communication. And it is the latest network description delivering critical data to the destination location desiring through a multi-hop. Recently, the Ad-hoc network relative technique development and service are activated. But the security function implementation including an authentication and encoding about the transmitted packets, and etc, is wirelessly the insufficient situation on the Ad-hoc network. This paper provides the security service of key exchange, key management. entity authentication, data enciphering, and etc on the Mobile Ad-hoc network. It implements with the Ad-hoc network security management server system design which processes the security protocol specialized in the Ad-hoc network and which it manages.

  • PDF

Embedded-based Power Monitoring Security Module Design (임베디드 전력 모니터링 보안 모듈 설계)

  • Yoon, Chan-Ho;Kim, Gwang-Jun;Jang, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1485-1490
    • /
    • 2013
  • The demonstration project of the electrical grid for Smart grid is progressed, the smart digital appliances AV technology, Smart home energy management technology charging the management function of complex energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual bio information, and the Smart home security technology dealing with the biometric security and motion sensors, etc. have been studied. The power monitoring terminal which uses a variety of wired and wireless networks and protocol is the target additionally to be considered in addition to the security vulnerabilities that was occurred in the existing terminal. In this research paper, the author analyzes the cryptographic techniques corresponding to the smart meter occurred by the problems that are exposed on the outside which are vulnerable to physical attacks, and intends to propose the design of the security systems for the Smart meter terminal being able to maximize the efficiency of the terminal.

The Influence of Improved Question and Check Education Program of Private Security Guard on the Job Satisfaction and Job Performance (개선된 질문검색 요령 교육 프로그램이 민간경비원 직무성과 및 직무만족도에 미치는 영향)

  • OH, Jea-Hwan
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.79-102
    • /
    • 2011
  • This is a follow-up research of Oh Jae Hwan(2010) aimed to confirm the influence of the educational program of improved question search methods on the duty and job satisfaction of private security guards. For this research, a survey was conducted on a sampling of 170 private security guards living in Seoul and Gyeonggi province, as selected in the research of Oh Jae Hwan(2010). A frequency analysis, correlation analysis and multiple regression analysis were conducted on the collected data by using the SPSS 15.0. The Cronbach's ${\alpha}$ value of the reliability of the survey was over 0.800. The analyzed result of the research is as follows. It was found that when there was an increase in the content of educational training of the program there was also an increase in the job satisfaction and performance. This signifies that the contents of the improved educational program includes scientific and systematic techniques such as METT and action promoting questions, the adequately constructed practical skill education allows private guards to have confidence in their duty, the research reflects the current trends and has a high possibility of utilization due to its high relevance to the duties of private security guards.

  • PDF

Analysis of the Importance and Priority of HRM Factors in Private Security (민간경비 인사업무의 중요도 및 우선순위에 대한 고찰)

  • Kwon, Jung-Eon
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.55-81
    • /
    • 2018
  • The purpose of this study is to find significant activities in human resource management (HRM) to solve growing-pains caused by the rapid external growth in private security business. To this end, we applied the HRM factors suggested by the National Job Capability Standard (NCS) to the private security and investigated the relative importance using the Analytic Hierarchy Process (AHP). The results were as follows. First, the importance of 4 HRM criteria in the private security was ranked in order of recruitment, operation, benefit, and retirement. Particularly, the relative importance of recruitment reached 63.8%. Second, the composite importance was calculated by dividing the 4 HRM criteria into 14 capability sub-criteria and 46 capability alternatives. As a result, personnel planning and hiring at the recruitment turned out as the areas that needed the most improvement. In addition, the operating and planning of education involved in the highest rank, 8th and 10th respectively. Based on these results, we suggested critical HRM factors for developing the private security business as well as proposed research directions and methods for further studies.

A Study on Activating Police Conversational Techniques - Focusing on activation of crisis negotiation techniques - (경찰 대화기법 활성화 방안에 관한 연구 - 위기협상기법의 활성화 방안을 중심으로 -)

  • Cho, Se-Hee
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.149-179
    • /
    • 2018
  • October 31, 2017, a man named Saipov who follows ISIS killed 8 people and injured nearly 20 others by driving his truck to the riverside bicycle path in Manhattan, New York, in an act of terror. June 5, 2017, the Islamic extremist Yacqub Khayre held a woman hostage in a suburb of Melbourne, Australia, before being killed by the police. Various countries around the world including the UK, France, and Germany are in war against terrorism. The terrorists change their target from hard targets such as government officials to vulnerable soft target, intensifying the public's fear, and, unlike in the past when they were organized by governments or organizations, extremists such as ISIS followers are now acting on their own in the act of terrorism. Also, as they use vehicles, pressure cooker, and other objects that can be easily found for terrorism, it is becoming more difficult for the police to prepare against terrorist attacks. Meanwhile, some terrorism researchers argue that conversational techniques (negotiation) used by the police are now of no use, as shown in the cases like 9/11 attacks in 2001 and 2016 Nice attack in France in which the suspects committed terrorist attacks without leaving enough time for the police to take action and that, therefore, tactical suppression techniques need to be developed. Therefore, this study suggested police negotiation techniques are necessary not only for terrorist attacks but also for overall police work, including handling intoxicated people at police station, and proposed ways to activate conversational techniques for police organizations.

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

The Improvement Method of "Question and Research Guides" Training for Private Security (민간경비원의 질문.검색 요령 교육훈련에 관한 개선방안)

  • Kim, Chang-Ho;Oh, Jae-Hwan
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.43-66
    • /
    • 2009
  • For the quality improvement on private security industry, the quality of personnel in private security should be advanced through the systematic training. If the personnel in private security provide an advanced service in applying knowledge and technique to the field when in training, they can obtain the reliability from people. With the point of this side, practical and systematic training is essential to the restoration on the private security industry. The personnel of private security face many people in the field. So they must work with an active concept that can prevent additional crime from behavior suspicions through scientific observation method and systematic inquiry method rather than negative work with providing a friendly service in the field. For conducting this concept, therefore, this study suggested the improvement training program of "Question and Research Guides" from new employee training on existing private security. The scientific observation standard is specifically suggested from the study 'people watching' of Professor Morris, D. and an act contact question from lead technique that US FBI, police, and inspection institute are taking through the feature of human act and 'METT' that is the program for emotion capture training through human minute look is going to be applied on "Question and Research Guides" training. This will provide the educational mood for students with the training content that is available for the practical training program and the real work, and will help to restore the private security industry with obtaining people's reliability through the scientific work and advanced field treatment.

  • PDF