• 제목/요약/키워드: International security

검색결과 2,981건 처리시간 0.028초

미래 국제질서 패러다임 변화와 한반도 안보전망 (Changes in the Paradigm of Future International Order and Prospects for Security on the Korean Peninsula)

  • 이웅;정민섭;박상혁
    • 문화기술의 융합
    • /
    • 제6권4호
    • /
    • pp.39-43
    • /
    • 2020
  • 현재 우리나라 군대는 병역자원 감소 및 군 복무기간 단축으로 인한 현실적 위협으로 직면해 있는 환경에 처해있다. 안보를 최우선시하는 군사적 관점에 따라, 국방부를 비롯한 정부 기관 및 국제기관들이 인식을 같이 하고 있는 일반적으로 객관적인 내용 위주로 반영하여 미래 육군에 미치는 영향 및 시사점을 도출하고자 하였다. 즉, 본 연구는 국제질서를 바라보는 주류 관점(현실주의, 자유주의)의 인식 방향을 살펴보고, 국제질서 이론 및 전망에 대하여 국가안보에 기여하는 군 조직의 본질적 특성을 반영하는 군사적 합목적주의에 입각하여 한반도 미래 안보전략을 수립하는 방향과 큰 틀을 제시한다.

Smart Security 추진을 통한 인천국제공항의 미래 항공보안 구현 (Realization of Futuristic Aviation Security of Incheon International Airport by implementing Smart Security Project)

  • 임상훈;허백용;황호원
    • 한국항행학회논문지
    • /
    • 제25권6호
    • /
    • pp.492-497
    • /
    • 2021
  • Smart Security는 국제공항협의회가 전 세계 공항, 항공사, 정부 기관과 협력하여 시작한 글로벌 이니셔티브이다. 이 계획의 주요 목적은 승객과 휴대수하물의 검색에 있어 큰 변화(step change), 증가하는 보안 비용, 지속적으로 진화하는 위협 등에 대응하기 위한 것이다. 인천공항은 미래형 보안검색 구현을 위해 스마트 보안검색장비 도입을 추진하여 보안성 강화, 승객편의 및 운영효율성 향상 도모함으로 최고의 보안환경을 구축하여 테러 및 불법방해행위 방지를 위해 최선을 다 하여야한다.

국제 GNSS 기구 동향 조사 (Survey of International GNSS Organizations)

  • 이정행;전종현;강정완;임종원;이병석;주정민;김선우
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제13권2호
    • /
    • pp.117-129
    • /
    • 2024
  • In this paper, we survey recent trends of International Global Navigation Satellite System (GNSS) organizations such as the International Committee on GNSS (ICG), International Civil Aviation Organization (ICAO), International Maritime Organization (IMO), and International Telecommunication Union (ITU), and investigate their impact on the maritime and aviation sectors. Each international organization promotes international cooperation, improvement of service quality, assurance of security, compliance with international regulations, and technological innovation and development. ICG develops a variety of satellite navigation enhancement systems. ICAO establishes international aviation regulations and standards to enhance aviation safety and security. IMO establishes international shipping conventions and rules to protect and regulate the shipping environment. Lastly, ITU establishes international communication regulations and standards. Investigation of such international organizations plays an important role in increasing the efficiency and reliability of GNSS systems. Each international organization promotes international cooperation, improvement of service quality, assurance of security, compliance with international regulations, and technological innovation and development. In the future, interoperability and compatibility with new satellite navigation systems and other GNSS and satellite navigation enhancement systems must be secured, so and thus investigation of international organizations must be conducted first.

Anti-Corruption Policy to Ensure Public Order in the State Security System

  • Shchekhovska, Larysa;Gavrylechko, Yuriy;Vakuliuk, Vasyl;Ivanyuta, Viktoriya;Husarina, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.57-62
    • /
    • 2022
  • Today, in many countries of the world, the problems of forming and implementing anti-corruption policies are among the most pressing, since the scale of the spread of corruption poses a real threat to national security and democratic development. Without a victory over corruption as a system of social relations, any country will never be able to ensure the safety of its citizens, have a high standard of living, build an efficient economy and a democratic state based on the rule of law, protect its sovereignty, and become competitive among the developed countries of the world community. The main purpose of the article is to analyze the key aspects of the anti-corruption policy of ensuring public order in the state security system. The research methodology includes methods for researching aspects of the anti-corruption policy of ensuring public order in the state security system. Based on the results of the study, the main aspects of the anti-corruption policy of ensuring public order in the state security system are characterized.

Modelling of Public Financial Security and Budget Policy Effects

  • Zaichko, Iryna;Vysotska, Maryna;Miakyshevska, Olena;Kosmidailo, Inna;Osadchuk, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.239-246
    • /
    • 2021
  • This article substantiates the scientific provisions for modelling the level of Ukraine's public financial security taking into account the impact of budget policy, in the process of which identified indicators of budget policy that significantly affect the public financial security and the factors of budget policy based on regression analysis do not interact closely with each other. A seven-factor regression equation is constructed, which is statistically significant, reliable, economically logical, and devoid of autocorrelation. The objective function of maximizing the level of public financial security is constructed and strategic guidelines of budget policy in the context of Ukraine's public financial security are developed, in particular: optimization of the structure of budget revenues through the expansion of the resource base; reduction of the budget deficit while ensuring faster growth rates of state and local budget revenues compared to their expenditures; optimization of debt serviced from the budget through raising funds from the sale of domestic government bonds, mainly on a long-term basis; minimization of budgetary risks and existing threats to the public financial security by ensuring long-term stability of budgets etc.

Revealing the linkability of Popescue ID-based Group Signature Scheme

  • Park, Hyungki;Fangguo Zhang;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.81-83
    • /
    • 2002
  • Group signature schemes allow a group member to sign a document on behalf of the group anonymously. In addition, in case of anonymity misuse, a group authority can recover the issuer of a signature. In this paper, we analyze the security of a group signature scheme proposed by Popescu which is a modification of the Tseng-Jan group signature scheme. We show that the scheme can't provide an important requirement of the group signature, unlikability. Thus, other members are allowed to identify whether two signatures have been issued by the same group member or not.

  • PDF

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

The Main Negative Factors of Military Influence on the Economic Environment of the Region and its Financial and Economic Security

  • Sytnyk, Yosyf;Havrychenko, Dmytro;Staverska, Tetiana;Primush, Roman;Erfan, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.241-245
    • /
    • 2022
  • The main purpose of the study is to determine the main factors influencing the economic environment of the region and its financial and economic security. Ukraine aspires to become a full member of the European Union, but the events of 2022 have changed everything. Full-scale military operations on the territory of Ukraine significantly affect its socio-economic situation Today, the issue of studying the negative impact of military operations on the economic environment is very relevant. Based on the results of the study, we have identified the main negative factors of the military impact on the economic environment of the region and its financial and economic security.

Incoterms(R) 2010상 수출입 당사자의 보안관련 의무에 관한 연구 (A Study on the Security related Obligations of Contracting Party under the Incoterms(R) 2010 Rules)

  • 양정호
    • 무역상무연구
    • /
    • 제54권
    • /
    • pp.45-80
    • /
    • 2012
  • Since the 9.11 terror attack, the event which caused supply chain disruption, supply chain security has become more important than ever before. With this as a momentum, a customs supply chain security paradigm emerged intended to guarantee secure flow of cargo across boarder. Under this circumstances Incoterms(R) 2010 rules have allocated obligations between the buyer and seller to obtain or to render assistances in obtaining security clearances. Thus, security related obligations such as providing advance manifest information is the mandatory requirements for any export and import. The impact on the seller and buyer of security related obligations under the Incoterms(R) 2010 rules environment is obvious. Assistance to provide the security information in advance has become indispensable obligations to the seller and buyer. As such assistances is at the cost and risk of the party responsible for the clearances of the goods, the choice of recognised partner and compliance with the relevant security program, in order to enjoy the relevant benefits, becomes paramount.

  • PDF

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks