• Title/Summary/Keyword: Cyber Training

Search Result 226, Processing Time 0.031 seconds

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.

Expand public interest of Private Security activities (민간경비 활동의 공익성 확대 논의)

  • Gong, Bae Wan;Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.3-10
    • /
    • 2014
  • Private security organizations are complementary to the national safety of life and property of individuals as a social role to play in maintaining peace and order. Pursuit of profit is to the public practice according to the logic of capitalist markets and customers seeking to protect the lives and property. However, the legal and institutional constraints of private security is being requirements inhibited by the development. Crime prevention as a private security role that the private companies, which will pursue the public interest. After all, the expansion of the private security crime is results in an increase in unit. The current level of private security in the 1970s remain, and the constraints is being under goodwill and expertise outside of the training system on the market. Variety of crimes, including cyber crime increases and considering the reality of the constraints on private security requirements are able to improve or supplement shall be realistic. In particular, the legal, regulatory and institutional factors must be improved, with goodwill, and for the creation of new industrial policy as a complement to the public interest should be also provided. The private security law interests through integration of private security guards should be guaranteed, and the term of the theorem, sales activities, ensuring the training of professional staff with professional qualifications system is to be settled. As a private security guard industry growth and development can be based on this composition.

Suitability Evaluation Method for Both Control Data and Operator Regarding Remote Control of Maritime Autonomous Surface Ships (자율운항선박 원격제어 관련 제어 데이터와 운용자의 적합성 평가 방법)

  • Hwa-Sop Roh;Hong-Jin Kim;Jeong-Bin Yim
    • Journal of Navigation and Port Research
    • /
    • v.48 no.3
    • /
    • pp.214-220
    • /
    • 2024
  • Remote control is used for operating maritime autonomous surface ships. The operator controls the ship using control data generated by the remote control system. To ensure successful remote control, three principles must be followed: safety, reliability, and availability. To achieve this, the suitability of both the control data and operators for remote control must be established. Currently, there are no international regulations in place for evaluating remote control suitability through experiments on actual ships. Conducting such experiments is dangerous, costly, and time-consuming. The goal of this study is to develop a suitability evaluation method using the output values of control devices used in actual ship operation. The proposed method involves evaluating the suitability of data by analyzing the output values and evaluating the suitability of operators by examining their tracking of these output values. The experiment was conducted using a shore-based remote control system to operate the training ship 'Hannara' of Korea National Maritime and Ocean University. The experiment involved an iterative process of obtaining the operator's tracking value for the output value of the ship's control devices and transmitting and receiving tracking data between the ship and the shore. The evaluation results showed that the transmission and reception performance of control data was suitable for remote operation. However, the operator's tracking performance revealed a need for further education and training. Therefore, the proposed evaluation method can be applied to assess the suitability and analyze both the control data and the operator's compliance with the three principles of remote control.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Comparison of Response Systems and Education Courses against HNS Spill Incidents between Land and Sea in Korea (국내 HNS 사고 대응체계 및 교육과정에 관한 육상과 해상의 비교)

  • Kim, Kwang-Soo;Gang, Jin Hee;Lee, Moonjin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.6
    • /
    • pp.662-671
    • /
    • 2015
  • As the type of Hazardous and Noxious Substances(HNS) becomes various and the transport volume of HNS increases, HNS spill incidents occur frequently on land and the sea. In view of various damages to human lives and properties by HNS spills, it is necessary to educate and train professional personnel in preparation for and response to potential HNS spills. This study shows the current state of response systems and education courses against HNS spill incidents on land and the sea to compare those with each other between land and sea in Korea. Incident command system on land are basically similar to that at sea, but leading authority which is responsible for combating HNS spills at sea is changeable depending on the location of HNS spill, as it were, Korea Coast Guard(KCG) is responsible for urgent response to HNS spill at sea, while municipalities are responsible for the response to HNS drifted ashore. Education courses for HNS responders on land are established at National Fire Service Academy(NFSA), National Institute of Chemical Safety(NICS), etc., and are diverse. Education and training courses for HNS responder at sea are established at Korea Coast Guard Academy(KCGA) and Marine Environment Research & Training Institute(MERTI), and are comparatively simple. Education courses for dangerous cargo handlers who work in port where land is linked to the sea are established at Korea Maritime Dangerous Goods Inspection & Research Institute(KOMDI), Korea Port Training Institute(KPTI) and Korea Institute of Maritime and Fisheries Technology(KIMFT). Through the comparison of education courses for HNS responders between land and sea, some recommendations such as extension of education targets, division of an existing integrated HNS course into two courses composed of operational level and manager level with respective refresh course, on-line cyber course and joint inter-educational institute course in cooperation with other relevant institutes are proposed for the improvement in education courses of KCG and KOEM(Korea Marine Environment Management Corporation) to educate and train professionals for combating HNS spills at sea in Korea.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

Dismantling Simulation of Nuclear Reactor Using Partial Mesh Cutting Method for 3D Model (3D 형상 모델의 부분 절단 기법을 이용한 원자로 해체 시뮬레이션)

  • Lee, Wan-Bok;Hao, Wen-Yuan;Kyung, Byung-Pyo;Ryu, Seuc-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.303-310
    • /
    • 2015
  • Game technologies are now applied in various engineering areas such as the simulation of surgical operation or the implementation of a cyber model house. One of the essential and important technology in these applications is cutting of the 3D polygon model in real time. Real-time cutting technology is an essential technology needed to implement the simulation of a building demolition or a car assembly for training or educational purpose. Previous cutting method using the conventional BSP-Tree structure has some limitations in that they divide the whole world including the 3D model and its environment, only into two parts with respect to an infinite plane. In this paper, we show a technique cutting the 3D model in a finite extent in order to solve this problem. Specifically, we restricted the cut surface in a finite rectangular area and constructed the mesh for the divided surface. To show the usefulness of our partial cutting technique, an example of the dismantling process simulation of a nuclear reactor polygon model was illustrated.

A Study on the Support for the Re-employment of Women with Career Break in Life Cycle (생애주기에 따른 경력단절 여성의 재취업 지원에 관한 연구)

  • Bae, Na-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.8
    • /
    • pp.268-275
    • /
    • 2018
  • The purpose of this study is to investigate what items are needed for reemployment according to the life cycle of women and to provide basic data to address the career discontinuity of women. The study selected five women currently unemployed living in Daejeon who were taking classes related to entrepreneurship at the Cultural Center and the Women Resource Development Center. The data collection period was from October to December, 2017, and collected from in depth interviews. An open-ended interview was used to explore the content of the interview process. The results of the study are as follows: Support policies for women with career disruptions should, above all, be given priority over career support to ensure that currently employed women do not quit their jobs due to marriage, childbirth or childcare. In addition, there is a need to improve the relevant systems and to implement vocational education and training programs so that women with career discontinuity can reenter the labor market. To do this, it is necessary to establish and support career planning in order to understand the effects of women's lifecycles and to support women's economic activity.

Estimation of Populations of Moth Using Object Segmentation and an SVM Classifier (객체 분할과 SVM 분류기를 이용한 해충 개체 수 추정)

  • Hong, Young-Ki;Kim, Tae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.705-710
    • /
    • 2017
  • This paper proposes an estimation method of populations of Grapholita molestas using object segmentation and an SVM classifier in the moth images. Object segmentation and moth classification were performed on images of Grapholita molestas moth acquired on a pheromone trap equipped in an orchard. Object segmentation consisted of pre-processing, thresholding, morphological filtering, and object labeling process. The classification of Grapholita molestas in the moth images consisted of the training and classification of an SVM classifier and estimation of the moth populations. The object segmentation simplifies the moth classification process by segmenting the individual objects before passing an input image to the SVM classifier. The image blocks were extracted around the center point and principle axis of the segmented objects, and fed into the SVM classifier. In the experiments, the proposed method performed an estimation of the moth populations for 10 moth images and achieved an average estimation precision rate of 97%. Therefore, it showed an effective monitoring method of populations of Grapholita molestas in the orchard. In addition, the mean processing time of the proposed method and sliding window technique were 2.4 seconds and 5.7 seconds, respectively. Therefore, the proposed method has a 2.4 times faster processing time than the latter technique.