• 제목/요약/키워드: Cooperate Security

검색결과 52건 처리시간 0.027초

국제적 행사 경비와 민간경비의 역할에 관한 고찰 (The Study on the Role of Private Security in International Events)

  • 서진석
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.179-210
    • /
    • 2002
  • Recently, the industry of private security needs to cope with system for specialization improvement to security business. Especially, private security will very important in various international events such as 2002 World Cup soccer game and so on. The analyses of this study have led to the following conclusions: First, the industry of private security must advance to trait by oneself. Second, it is needed that both public and private security must know about role-sharing between them on the basis of efficiency, and try to cooperate with each other for the events security. Third, it will educate and train their officials in professional techniques to events security. In addition, it should be expand to reserve manpower and for the motivation to security officials establish as minimum pay scale.

  • PDF

러-우 전쟁 이후 NATO의 전략 변화와 한국의 안보전략적 함의 고찰 (Examination of NATO's Strategic Changes After the Russia-Ukraine War and Korea's Security Strategic Implications)

  • 김현진;배일수
    • 문화기술의 융합
    • /
    • 제10권3호
    • /
    • pp.25-29
    • /
    • 2024
  • NATO는 러시아-우크라이나 전쟁 이후 그동안 유지해오던 평화유지 전략에서 탈피하고 다자안보협의체 강화, 전략적 안정성 추구, 군비 확충, 협력안보 및 인도-태평양 지역까지 대화·협력을 강화할 것을 천명하였다. NATO의전략 변화는 직·간접적으로 한국의 안보환경에 영향을 미친다. 이를 명확히 분석하고 대응할 수 있는 정책 및 전략을수립해야 위협을 억제하고 국가이익을 보호할 수 있다. NATO는 중국과 러시아를 위협으로 명시하고 있다. 우리는NATO와 협력과 연대를 기회로 삼아 소다자 안보협력 및 동맹 강화, 방산시장 개척 및 확대, 우크라이나 재건사업참여 기회 확대를 얻을 수 있을 것이다.

경호·경비분야 전문인력양성을 위한 대학 인적자원개발 - 경호관련학과를 중심으로 - (Development of Human Resources at universities for training of specialist in security industries - based on Departments related Security services -)

  • 권태일
    • 한국재난정보학회 논문집
    • /
    • 제2권1호
    • /
    • pp.19-38
    • /
    • 2006
  • With rapid social change, security industries were diversified and universities related total security service were founded for training of specialist with a theory and practical affairs. Today, universities must provide an education which fits to job characteristics in rapidly changing society. Also students through this education must find their job properly. The purposes of this study, therefore, are to search a career selection of students majoring in total security service related departments and to study a role of universities for development of specialist related security industries. Revitalization plan of human resources for departments related security services are as follows ; roles of universities: a specialization of curriculum and a diversification of training method. 'academic-industrial cooperation', role of government: 'a legal and institutional policy on academic-industrial cooperation';. Universities, cooperations, government must cooperate mutually for development of specialist related security service field.

  • PDF

Modeling and Stimulating Node Cooperation in Wireless Ad Hoc Networks

  • Arghavani, Abbas;Arghavani, Mahdi;Sargazi, Abolfazl;Ahmadi, Mahmood
    • ETRI Journal
    • /
    • 제37권1호
    • /
    • pp.77-87
    • /
    • 2015
  • In wireless networks, cooperation is necessary for many protocols, such as routing, clock synchronization, and security. It is known that cooperator nodes suffer greatly from problems such as increasing energy consumption. Therefore, rational nodes have no incentive to cooperatively forward traffic for others. A rational node is different from a malicious node. It is a node that makes the best decision in each state (cooperate or non-cooperate). In this paper, game theory is used to analyze the cooperation between nodes. An evolutionary game has been investigated using two nodes, and their strategies have been compared to find the best one. Subsequently, two approaches, one based on a genetic algorithm (GA) and the other on learning automata (LA), are presented to incite nodes for cooperating in a noisy environment. As you will see later, the GA strategy is able to disable the effect of noise by using a big enough chromosome; however, it cannot persuade nodes to cooperate in a noisefree environment. Unlike the GA strategy, the LA strategy shows good results in a noise-free environment because it has good agreement in cooperation-based strategies in both types of environment (noise-free and noisy).

치안서비스의 민간위탁 도입에 관한 연구 : 치안분업모델을 중심으로 (Introducing Contract-out in the Policing Service : Focusing on Policing segregated System)

  • 최정택
    • 시큐리티연구
    • /
    • 제12호
    • /
    • pp.309-333
    • /
    • 2006
  • 오늘날 공공분야의 민간위탁은 비용효과와 수요자 변화에 따른 탄력성 확보가 유리하고, 사업의 관리가 용이하다는 이유로 대부분의 공공사업 분야에서 실시되고 있는 상태이다. 이러한 사회적 변화는 치안구조와 지역방범체계의 변화 등과 함께 공공 치안서비스 부분의 민간위탁제도를 도입하는 문제에 대하여 많은 논의가 이루어지고 있다. 그러나 위탁사업 대상 범위의 제한, 민간 참여의 어려움 그리고 위탁 계약 방식의 한계와 같은 문제점들로 인하여 치안서비스 분야의 민간위탁사업 시행에는 아직 많은 걸림돌이 있는 실정이다. 이러한 문제점들을 해결, 보완하기 위하여 치안서비스 모델을 변화시켜 예산절감과 조직의 재구성을 도모하고, 가변성을 가질 수 있는 부분위탁형태의 개발 및 민${\cdot}$관 협력체제 확립 및 계약방식의 합리화가 필요하다 할 수 있다. 본 연구는 업무상의 특수성을 감안하여 기존 민간위탁의 개념과는 다르게 치안서비스 분야만의 기준을 다음과 같이 제시한다. (1)치안분업모델의 설계 (2)양자의 의견을 존중하고 타협점을 찾을 수 있는 새로운 혼합형태의 시스템 모델구축 (3)다자간 접근법을 통한 사회 모든 구성원의 참여기회 확대 (4)지명경쟁 입찰을 통한 계약 방식의 확립 등이다. 이처럼 공공안전 서비스 분야의 민간위탁은 타 정부분야의 민간위탁 형태와는 다른 형식으로 이루어져야 하며 국민의 안전을 담보로 한다는 점에서 업무선정과 방식에 대해 기준을 높여야 할 것이다.

  • PDF

계약망 프로토콜의 에이전트 선택을 위한 퍼지 컨트롤러 설계 (Fuzzy Controller Design for Selecting the Agent of Contract Net Protocol)

  • 서희석;김희완
    • 한국컴퓨터산업학회논문지
    • /
    • 제5권2호
    • /
    • pp.251-260
    • /
    • 2004
  • 네트워크 보안의 중요성과 필요성이 증대됨에 따라 많은 조직들이 다양한 보안 시스템을 네트워크에 적용하고 있다. 침입 차단 시스템, 침입 탐지 시스템, 취약점 스캐너와 같은 보안 시스템들이 취약성 정보를 공유하게 되면 일관된 통합 보안 환경을 구축할 수 있다. 본 논문에서는 침입탐지 에이전트와 방화벽 에이전트가 계약망 프로토콜(Contract Net Protocol)에 의해서 서로 연동할 수 있는 구조를 디자인하고 구축하려다 계약망 프로토콜은 분산 시스템과 같은 이 기종의 컴퓨터 시스템의 효과적인 연통을 위한 방법으로서 여러 에이전트들이 모여 서로 협력하며 하나의 문제를 해결하게 된다 계약망 프로토콜의 선택 알고리즘과 퍼지 제어기를 사용하였을 경우 성능을 비교함으로써 에이전트 선택에 있어서 보다 효과적인 방법을 제시할 것이다.

  • PDF

계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션 (Application of Contract Net Protocol to the Design and Simulation of Network Security Model)

  • 서경진;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구 (A Study on the Security System of the Web Based Defense Information Service Network)

  • 신유찬;남길현
    • 한국국방경영분석학회지
    • /
    • 제28권1호
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.