• 제목/요약/키워드: Border Security

검색결과 118건 처리시간 0.029초

레이더 기반 AI 과학화 경계시스템의 효과분석 : 악천후 시 실험 결과를 중심으로 (Efficacy analysis for the AI-based Scientific Border Security System based on Radar : focusing on the results of bad weather experiments)

  • 이호찬;신규용;문미남;곽승현
    • 융합보안논문지
    • /
    • 제23권2호
    • /
    • pp.85-94
    • /
    • 2023
  • 북한에 의한 위협이 증대되고 있는 엄중한 안보 상황에서 우리 군은 첨단기술을 활용한 GOP 과학화 경계시스템의 성능개량 사업을 통해 병력 절감 효과를 추구하고 있다. GOP 과학화 경계시스템이 인구절벽에 따른 병역자원 감소에 대한 효과적인 대안이 되기 위해서는 높은 탐지 및 식별률이 보장되어야 하고, 오탐율을 획기적으로 개선함으로써 병력의 개입이 최소화되어야 한다. 그런데, 현(現) GOP 과학화 경계시스템의 경우 양호한 기상환경에서는 비교적 높은 탐지 및 식별률을 보장하지만, 강우 및 안개 등의 악천후 상황에서의 성능은 다소 부족한 것으로 알려져 있다. 이를 극복할 수 있는 대안으로 악천후 시에도 물체를 탐지할 수 있는 레이더 기반 경계시스템이 하나의 대안으로 제시되고 있는데, 본 논문은 2021년 신속시범획득사업을 통해00사단에서 운용 중인 레이더 기반 AI 과학화 경계시스템의 악천후 상황에서의 효과성을 검증하고 이를 통해 향후 GOP 과학화 경계시스템의 발전 방향을 제시한다.

초국가적 위협 및 테러리즘 증가와 통합국경안보체계 구축: 미국, 캐나다, 호주를 중심으로 (Increasing Transnational Threats and Terrorism and Establishment of Integrated Border Security Systems: Focused on U.S., Canada and Australia)

  • 윤태영
    • 융합보안논문지
    • /
    • 제17권4호
    • /
    • pp.69-78
    • /
    • 2017
  • 2001년 9월 11일 테러 이후 초국가적 범죄와 테러리즘의 증가로 인해 국경안보의 중요성이 강조됨에 따라 통합적인 CIQ 역량강화가 요구되고 있다. 미국, 캐나다, 호주는 CIQ를 통합하여 여행자 물품 출입국통제 강화 및 공항만 육로 국경보안에 중점을 둔 국경안보 활동을 강화하고 있다. 미국은 2003년 국토안보부 산하에 관세국경관리청(CBP)을 신설하였다. 캐나다도 2003년 공공안전부 산하에 국경보안청(CBSA)을 창설하였다. 호주도 2015년 이민국경보호부(DIBP) 산하로 관세국경보호청을 통합하고, 국경수비대(ABF)를 신설하였다. 그러나 CIQ 업무별 분산된 국경관리체계를 운영하고 있는 한국은 공항만 육로 국경에서 발생하는 불법 출입국, 테러분자 입국, 밀수입, 마약 총기류 밀거래 등 복합적인 국경위협에 통합적으로 대응하기 어렵다. 이를 해결하기 위해서 유사성이 높은 세관 및 검역 업무부터 순차적으로 통합하고, 중장기적으로 관세청이 출입국관리 업무를 위임받아 CIQ 업무 전체를 통합하는 방안도 검토해볼 수 있다. 또는 미국, 캐나다, 호주의 CIQ 단일책임기관을 한국의 실정에 맞게 벤치마킹하여 새로운 통합국경안보조직을 신설하는 방안도 있다.

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

ABMS와 NOLH을 이용한 한국군 GOP 경계시스템에 관한 분석 (Analysis of the GOP Border security systems of the ROK Army by Using ABMS and NOLH design)

  • 오경택
    • 한국시뮬레이션학회논문지
    • /
    • 제23권2호
    • /
    • pp.25-33
    • /
    • 2014
  • 본 논문은 에이전트 기반 모델링 및 시뮬레이션 개념과 그 플랫폼인 MANA를 적용한 연구이다. 유전학적 알고리즘을 이용하여 획득한 근사 최적화된 침투하는 적의 행동을 바탕으로 병력, 감시, 통신 시스템들로 이루어진 GOP 경계시스템의 효과를 평가하였다. 경계시스템의 효과 분석을 위해 4가지의 효과척도를 이용하였고, 모델을 구성하는 다수의 경계 자산을 고려하기 위해 NOLH 디자인을 적용하였다. NOLH 디자인을 적용함으로써, 시뮬레이션을 효과적으로 수행할 수 있었다. 이 연구의 결과는 경계시스템을 구성하는 경계자산의 효과적인 구성과 소초에 적정한 병력배치 등을 결정하는데 좋은 자료를 제공할 수 있을 것으로 기대한다.

ABMS와 유전학적 알고리즘을 이용한 한국군 경계시스템에 관한 연구 (Exploration of Border Security Systems of the ROK Army Using ABMS and GA Algorithm)

  • 오경택;이재영
    • 한국시뮬레이션학회논문지
    • /
    • 제22권2호
    • /
    • pp.33-40
    • /
    • 2013
  • 본 논문은 에이전트 기반 모델링 및 시뮬레이션을 바탕으로 한 한국군 GOP 경계시스템에 관한 연구이다. 에이전트 기반 모델링 및 시뮬레이션 기반 소프트웨어인 MANA를 이용하여 다양한 시나리오를 모델링하고 유전학적 알고리즘을 통해 침투 양상이 변화하는 적에 대해 분석하였다. 우리는 유전학적 알고리즘을 이용하여 침투하는 적의 최적화된 행동에 근사하는 값을 구하기 위해 최적화 모델을 구성하였다. 그 결과는 GOP 경계시스템에서 침투하는 적의 행동에 대한 최적화가 경계시스템의 효과성에 현저한 차이를 가져온다는 점과 침투하는 적의 아군 자산에 대한 회피 정도는 각각의 자산의 중요성을 반영한다는 점에서 두 가지 중요한 통찰력을 제공한다.

Saudi Universities Electronic Portals: A Case Study of Northern Border University

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.103-109
    • /
    • 2021
  • The study aimed to analyze the current situation of the electronic portal of the Northern Border University, in terms of content and components, the extent of quality of use, service assurance and integrity, linguistic coverage of objective content, in addition to assessing the efficiency of the Blackboard e-learning platform and measuring the degree of safety of the portal, in addition to measuring the extent of satisfaction, through a sample that included 135 faculty members, as the researcher was keen to apply the case study methodology with the use of the questionnaire as the main tool for measurement, and the study found that there is an average trend among faculty members in the degree of content for the components of the portal and electronic security While it rose to good use, and very good at using the Blackboard platform.

The New Ecosystem of Cross-border E-Commerce among Korea, China and Japan Based on Blockchain

  • Shen, Xiang-Dong;Chen, Xi;Ji, Ran;Wu, Ren-Hong
    • Journal of Korea Trade
    • /
    • 제24권5호
    • /
    • pp.87-105
    • /
    • 2020
  • Purpose - The purpose of the study is to propose a theoretical framework of cross-border e-commerce ecosystems based on blockchain technology. The ecosystem includes five systems, namely, crossborder supply chain intelligent system, cross-border logistics system, cross-border payment system, cross-border product quality traceability system and cross-border customs supervision system. Design/methodology - This study firstly derived the main improvement factors for the new ecosystem based on blockchain through prior research and expert interviews on cross-border e-commerce. Then explored the use of virtue of decentralization, anti-counterfeiting traceability, consensus mechanism, smart contract and other means of the core technology of blockchain to overcome the bottleneck of cross-border e-commerce development among Korea, China, and Japan. Finally, proposed valuable implications in both theoretical and practical perspectives. Findings - As a result, we combined with the problems existing in cross-border e-commerce among Korea, China and Japan, this paper proposes a solution based on blockchain. On this basis, it constructs a cross-border e-commerce ecosystem among these three countries, including five systems. In addition, we discuss the main problems existing in the current blockchain, such as low transaction concurrency, security loopholes, and inconsistent standards, the corresponding countermeasures are proposed from the technical level, security level and industry standards. Originality/value - This study is the first to apply the blockchain technology to solve the cross-border e-commerce problems in Korea, China and Japan, which is of pioneering significance in both literature and practice. Block chain technology is in the ascendency. This study provides technical solutions for promoting the development of cross-border e-commerce import and export trade between Korea, China and Japan.

Establishing and Designing the Financial System for the Research Program of the Deanship of Scientific Research at Northern Border University

  • Hamad, Sofian;Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.35-40
    • /
    • 2021
  • The study aimed to realize one of the basic requirements for designing and building the integrated automated system for scientific research at Northern Border University, which includes the establishment of an automated interconnected system to manage all academic and financial operations of scientific research. From receiving the budget of the funded research courses, then the regular financial regulation of all the research team's rewards, the cost of publishing, translation and equipment, then receiving the research plans and linking them financially, preparing the total and detailed financial value for all stages, then financial disbursement operations, financial closure of research when published, and preparing financial reports The research team used the analytical approach to build the main and subsidiary requirements for designing the financial system, and the study concluded that all the elements required for the stages of financial management for scientific research at Northern Border University can be met based on sufficient by sequencing these processes and how they are sequenced as e It is designed in the research study.