• Title/Summary/Keyword: Industry Security Personnel

Search Result 53, Processing Time 0.022 seconds

A Study on the NCS based Curriculum for Educating Information Security Manpower (정보보호 산업분야 신규 인력 양성을 위한 NCS 기반 교육과정 설계에 관한 연구)

  • Song, Jeong-Ho;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.537-544
    • /
    • 2016
  • National Competency Standards (NCS) need to be introduced to train newly hired staff and to gradually improve employees' work performance in the information security industry. In particular, the introduction of a new NCS curriculum for new hires is important in order to retain and efficiently manage professionals in the information security field. However, the legacy NCS is not clearly designed for the information security field. So a formal curriculum has been suggested for institutions training the information security workforce. Therefore, this study establishes a competency unit based on the types of personnel, their duties, and required knowledge. To select the competency unit, this study reviewed prior research to understand the required skills and work knowledge, and reviewed recruitment-based NCS that public agencies and public and private companies have carried out, including them in the study. The selected competency unit was classified into a required competency unit and an elective competency unit based on the importance of the duties and the demands of training. Through a verification process for the new, licensed career path model in the NCS information and communications field, this study suggests updated NCS competency units and required courses to provide an appropriate NCS curriculum for newly hired employees in the information security industry.

A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation (사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례)

  • Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1167-1187
    • /
    • 2020
  • We are facing the situation where cyber threats such as hacking, malware, data leakage, and theft, become an important issue in the perspective of personal daily life, business, and national security. Although various efforts are being made to response to the cyber threats in the national and industrial sectors, the problems such as the industry-academia skill-gap, shortage of cybersecurity professionals are still serious. Thus, in order to overcome the skill-gap and shortage problems, we propose a Cybersecurity technical response Job Competency(CtrJC) framework by adopting the concept of cybersecurity personnel's job competency. As a sample use-case study, we implement the CtrJC against to personals who are charged in realtime cybersecurity response, which is an important job at the national and organization level, and verify the our framework's effects. We implement a sample model, which is a CtrJC against to realtime cyber threats (We call it as CtrJC-R), and study the verification and validation of the implemented model.

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF

Policy Suggestions to Improve PSS(Presidential Security Service) Education Programs for Industry-Academy-Governmental Cooperations (${\cdot}$${\cdot}$관 협력강화를 위한 대통령경호실 교육프로그램 확대 방안)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.227-243
    • /
    • 2006
  • In modern society, private securities have developed their capabilities continuously. However, despite the fact that not only security industries have been considerably expanded in quantity, but also plenty of scholars published diverse papers relating to security problems, qualitative growths of private securities have not accomplished fully. Especially, securing the President would not be guaranteed only by PSS(Presidential Security Service). In order to secure the President successfully, it is necessary for all the social parts to strive to protect the President. In this respect, improving private securities, including academic fields, might be critical so as to succeed in securing the President. Without the supports from private securities, there might be lots of security problems in national context. Therefore, this study proposes several policy suggestions for the cooperation among PSS, private security industries and academic fields: (1) Providing a lot of practical knowledge from PSS to college students, (2) Personnel exchange between academic parts and PSS to promote the efficiency of securing the President, (3) Furnishing diverse information and knowledge about security to private securities, (4) Formulating security-searching standards, (5) Expanding educational institutions under PSS.

  • PDF

The Use of Artificial Intelligence in Healthcare in Medical Image Processing

  • Elkhatim Abuelysar Elmobarak
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.9-16
    • /
    • 2024
  • AI or Artificial Intelligence has been a significant tool used in the organisational backgrounds for an effective improvement in the management methods. The processing of the information and the analysis of the data for the further achievement of heightened efficiency can be performed by AI through its data analytics measures. In the medical field, AI has been integrated for an improvement within the management of the medical services and to note a rise in the levels of customer satisfaction. With the benefits of reasoning and problem solving, AI has been able to initiate a range of benefits for both the consumers and the medical personnel. The main benefits which have been noted in the integration of AI would be integrated into the study. The issues which are noted with the integrated AI usage for the medical sector would also be identified in the study. Medical Image Processing has been seen to integrate 3D image datasets with the medical industry, in terms of Computed Tomography (CT) or Magnetic Resonance Imaging (MRI). The usage of such medical devices have occurred in the diagnosis of the patients, the development of guidance towards medical intervention and an overall increase in the medical efficiency. The study would focus on such different tools, adhered with AI for increased medical improvement.

Analysis of Iran's Air Defense Network and Implications for the Development of South Korea's Air Defense Network

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.249-257
    • /
    • 2024
  • This study analyzes the current status and prospects of Iran's air defense network, focusing on the Russian-made S-300 system, and derives implications for the development of South Korea's air defense network. Iran's air defense network exhibits strengths such as long-range detection and interception capabilities, multi-target processing, high-altitude interception, and electronic warfare response. However, it also reveals weaknesses, including lack of mobility, difficulty in detecting low-altitude targets, obsolescence, training level of operating personnel, and vulnerability to electronic warfare. Real-world cases confirm these weaknesses, making the system susceptible to enemy evasion tactics, swarm drone attacks, and electronic warfare. Drawing from Iran's case, South Korea should establish a multi-layered defense system, strengthen low-altitude air defense and electronic warfare capabilities, foster the domestic defense industry for technological self-reliance, and enhance international cooperation. By addressing these aspects, South Korea can establish a robust air defense network and firmly protect its national security. Future research should aim to secure and analyze materials from the Iranian perspective for a more objective evaluation of Iran's air defense network and continuously track Iran's efforts to improve its air defense network and the trend of strengthening drone forces to predict changes in the Middle East security situation.

A Study on the Current State and Improvement of Operation of Fire Investigation Teams (화재조사 실태 분석과 개선방안에 관한 연구)

  • Lee, Tae-Geun;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.45-53
    • /
    • 2006
  • The purposes of fire investigation are to identify and analyze the causes of fire and, using the results in promoting fire fighting policies, ultimately to prevent fires caused by similar causes and to protect people's life and properties from fire. However, although the patterns of fire are getting more diverse and complicated with the rapid development of industry, complicated with the rapid development of industry, fire fighting organizations are continuing traditional superficial fire investigation without operating a fire investigation department for the reason of insufficient manpower, equipment and budget, losing public confidence. Thus, the present study purposed to propose plans to improve the technicality of fire investigation and win public confidence in fire investigation. First, the technicality of fire investigation should be improved by operating a department and personnel exclusively for fire investigation. Second, fire investigation should be more scientific and precise using high tech fire investigation equipment. Lastly, responsible fire fighting administration should be realized through statistical analysis of the causes of fire and computerization. The results of this study are expected to contribute to the safety and security of our society.

  • PDF

A Study of the Effectiveness and Status of the Information Security Disclosure System (정보보호 공시제도의 운영실태와 효과성 분석)

  • Baek, Seung Jun;Lee, Hong Joo
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.309-330
    • /
    • 2021
  • The information security disclosure system (ISDS) has been implemented since 2016 to ensure the protection of stakeholders and the right to know, and to promote voluntary investment in information protection by companies. Regarding the information security disclosure system, there have been studies that urge the implementation of the system, but studies that analyze the contents disclosed after the implementation of the system or suggest improvement directions are few. In this study, the contents of the information security disclosure system that had been announced on the information security industry promotion portal until 2019 were analyzed, the current status was summarized, and the direction of system improvement was suggested. In some cases, companies that disclosed information through the disclosure system increased the number of personnel in charge and obtained certifications related to information security, but did not find any effect on the increase/decrease in investment. The current disclosure system has not been activated because it has difficulty in giving individual companies incentives to disclose. Thus, this study suggests the inclusion of ISDS to information security management system (ISMS), which is currently mandatory for certain companies. In the current disclosure system, it is difficult for the company's stakeholders or customers to check the contents of the disclosure. As a way to do this, a method of including in the contents of the personal information processing policy or the notification of the use of personal information was suggested.

The Review of Studies on Safety and Health Management System of the Specialized Construction Company (전문건설업 안전보건경영시스템 동향연구)

  • Kim, Se-hoon;Kang, Hwi-jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.1
    • /
    • pp.41-50
    • /
    • 2020
  • The introduction, construction, and operation of the safety and health management system of specialized construction companies have a problem incurred in the cost of introducing and operating the safety system. In addition, it is difficult to establish a virtuous cycle system to build a safety system, obtain a certification, and settle in a harsh environment that does not have technical personnel in construction safety. The purpose of this paper is to investigate and review the literature related to the safety and health management system of the construction industry and to analyze various research trends such as the actual situation. Through this, it is to find ways to improve the safety and health management system level of specialized construction companies that want to build and obtain the safety and health management system of the construction industry and specialized construction companies that are carrying out the post-assessment and extension examination after obtaining the certification.

The Study on the Measure to Improve the Event Place Guarding Operation System (행사장경호 운용시스템 개선방안에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.203-226
    • /
    • 2006
  • A highly sophisticated expertise and systematic and integrated management of security operation are essential for a crowded stadium. a special object of security guarding. Nonetheless, the recent incident in a singing concert hall reveals the overall problem like the lacking safety management system. lacking deployment of professional security personnel, absence of safety manuals and safety measures, as well as the lack of professionalism of private sector security companies. In this study, we presented three categories that needed improvement, like the legal and institutional improvement, improvement of policy and improvement of operation which are required to set up the model to operate the optimal private sector security duties. For the revision of law and institution for a better and more desirable method, we discussed the revision of related laws and regulations pursuant to the security operation at places where events are held, including the revision of law on security guarding work, regulation on common housing management, uniformity of security guarding, and law on performance. For the improvement of policies, we discussed the introduction of security consultants, strengthening the security instructor system, expansion of relevant organizations, establishment of mutual cooperation, privatization of profitable events, improvement of awareness about the security activities provided by private sector, policy for the professionalism of private security operation, expansion of security exhibition and seminar. For the improvement of operation. we discussed professional security techniques. such as the technique of security consulting, the application of CPTED technique, the technique for the integration of system, the method of operation, the establishment of a system to support public security operations and volunteers, establishment of a manual for security guarding performance, modernization and high tech-oriented equipment, organization of security guarding entity in which the industry, academic society and government participates together.

  • PDF