• Title/Summary/Keyword: Public Security

Search Result 2,557, Processing Time 0.035 seconds

Policy Plans for the Maintenance of Public Security of Living During the War (전시 국민생활안정 유지방안)

  • Kil, Byung-Ok
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.131-172
    • /
    • 2007
  • Government duties in the cases of crisis are aimed at supporting efficient military operations in the fields of non-military affairs and resource mobilization, maintenance of government functions, and search for the public security of living during the war. In crisis, the government must change its functions into the total-war system with all resources available for the efficient performance of military operations, war economy, public safety and security as well as government continuance. The main contents of "Chung-Mu Plan" include the alternative measures to control the circulation of life necessities, emergency electricity, water and gas; recover public facilities from the disaster; and accommodate the wounded and refugees. Governments have practiced Ul-chi and ChungMoo exercises to improve government's management capabilities and master standard operating procedures including systematic distribution plans in the national and local level. However, such plans have not yet sufficient enough for the maintenance of public security of living. In addition to the conceptual ambiguity, major problems are the inappropriate system of the war economy, legal institutions, and administrative SOPs for the efficient maintenance of it. Thus, for the betterment of national crisis management system, the government should have the manual stated from every step and level dealing with crisis to the legal institutions. It is important to empower the National Emergency Planning Commission for the policy consistency and efficient/effective implementation. The comprehensive plans must have an integrated cooperative system of the central/local governments, military and civil society with actual practices and exercises for the maintenance of the public security of living.

  • PDF

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

Study on Private Security Ideology (민간경비 이념에 관한 연구)

  • Seo, JinSeok
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.207-213
    • /
    • 2013
  • As the axis of the private security maintain social order in order to achieve the original purpose of all society must move in the direction of motion, and so in order to be a private security based philosophical values and ideological composition should be based. In this process, to be followed by private security value or direction, philosophy private security is the norm. In this regard, this study pursued by the private security justification ever truly normative principles are intended to establish. The public nature of the ideology of private security, public, efficiency, legality, responsiveness and the like. Conflict occurs between the value of these ideals, although complementary are in harmony.

Ways to establish public authorities information security governance utilizing E-government information security management system (G-ISMS) (전자정부 정보보호관리체계(G-ISMS)를 활용한 공공기관 정보보호 거버넌스 수립방안)

  • Ryu, Seung-Han;Jeong, Dae-Ryeong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.769-774
    • /
    • 2013
  • In order to strengthen the protection of information, public institutions have introduced information security governance system. Public institutions recognizes the importance of information security governance system, and have striven to establish information security governance by establishing institutions and making policies. In this paper, in order to investigate ways that will be the basis for the establishment of information security governance in public institutions, we studied the necessity and model of information security governance. Also, by studying the government policies and cases, we proposed the direction of the policy.

The impact of the introduction of information security solutions by public organizations on the improvement of information security level (공공기관의 정보보안 솔루션 도입이 정보보안 수준 향상에 미치는 영향)

  • Kim, Hyeob;Eom, Su-Seong;Kwon, HyukJun
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.19-25
    • /
    • 2017
  • Public institutions invest about half of the information protection budget annually to introduce information security products and information protection services in order to prevent cyber terrorism and establish organizational security. However, research on whether introduced information security products has a positive influence on improving the information security level of the actual institution is in an incomplete state, and accordingly, There are problems such as the measurement of the investment effect of the information security product introduced in the organization and the difficulty in selecting the optimum information security product that the agency actually needs. In this paper, prior research will conduct research on the influence of the introduction of information security products on the improvement of information security level of organization through analysis of operational data of inadequate information security products, and based on the research results, It would be useful to use it for information security practices such as optimal product selection and internal security policy formulation through validation of the introduction of information security products of public institutions.

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

A Study of Institutional Restrictions for Private Security's Activities as for Profit Businesses (영리기업으로서 민간경비의 영업활동에 대한 제도적 제약성 고찰)

  • Gong, Baewan
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.3
    • /
    • pp.181-189
    • /
    • 2011
  • Private Security company concentrated on the commerciality as a for-profit businesses. Even so, his role is concerned with public welfare and public security over personal gain. Establishing a company and the business activities are free and protected by the constitutional law and the commercial law such as natural rights. However, it would be restricted in case of need for the national security affairs, public security violation and public weal problems. On the other hand, even though private security law is a for-profit businesses, the natural rights of the text of the Constitution is ignored and distinct from the different apply the rules for the establishment standard and for the business activities. Also, over a certain size of place and capital are required to establish a private security company. Therefore, this paper will study the public interests and the profits of commerciality for the private security by constitutional law and commercial law which assure and conserve the natural rights and the business activities.

Nuclear·Atomic Public Diplomacy: The Possibility of Expanding Toward New Issue Area (핵·원자력 공공외교: 새로운 영역으로의 확장 가능성)

  • Hanhyung Lee
    • Journal of Public Diplomacy
    • /
    • v.3 no.1
    • /
    • pp.43-63
    • /
    • 2023
  • Objectives: Nuclear security and atomic energy industry have always been the domain of political and economical diplomatic affairs. The issue of nuclear proliferation must be resolved politically or militarily given the importance of the problem, the impact it has on global security, the influence of major powers, and non-proliferation regimes. Considering scope of the budget, manpower, and scale of the project, the atomic energy issue was also viewed from an economic perspective. Therefore, the goal of this study is to depart from the conventional viewpoint and investigate if public diplomacy may be extended to a new issue domain of nuclear security and atomic energy. Methods: In order to determine whether there are any areas that overlap, the uniqueness of Korea's position in the nuclear security and atomic power domains is evaluated and compared with the traits of public diplomacy. Results: It seems plausible to broaden the scope and function of public diplomacy in that field given Korea's uniqueness in nuclear security and atomic energy issue and overlap with public diplomacy. This is especially true given that the state must take the leading role and that ongoing policy demands are made in light of Korea's security and economic structure. In reality, it is assessed that the Summer Fellows Program, run by the KAIST Nuclear Nonproliferation Education and Research Center (KAIST NEREC), has had a considerable impact on public diplomacy in the area of nuclear security and atomic energy. Conclusions: Nuclear security and atomic energy issues have traditionally been handled from the perspectives of political diplomacy, summit diplomacy, and economic diplomacy. However, this paper evaluate that the possibility of enhancing the role of public diplomacy in this issue area is high and underscore that the budget support, programs, and manpower for similar public diplomacy activities are needed. Through this, South Korea's nuclear security policy and atomic energy industry could be supported from international community and it will advance national interest.

A Study on the Short Term Curriculum for Strengthening Information Security Capability in Public Sector (공공분야 정보보안 역량 강화를 위한 단기 교육과정 연구)

  • Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.769-776
    • /
    • 2016
  • Recently, cyber attacks are continuously threatening the cyberspace of the state across the border. Such cyber attacks show a surface which is intelligent and sophisticated level that can paralyze key infrastructure in the country. It can be seen well in cases, such as hacking threat of nuclear power plant, 3.20 cyber terrorism. Especially in public institutions of the country in which there is important information of the country, advanced prevention is important because the large-scale damage is expected to such cyber attacks. Technical support is also important, but by improving the cyber security awareness and security expert knowledge through the cyber security education to the country's public institutions workers is important to raise the security level. This paper suggest education courses for the rise of the best security effect through a short-term course for the country's public institutions workers.

Evaluation of Public Information Security Training Programs : A Case Study (공공부문 정보보호 교육과정의 평가 : 사례 연구)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.173-185
    • /
    • 2020
  • It is very important to evaluate training because it can systematically grasp the current status of training. Evaluation includes getting ongoing feedback from the learner, trainer and learner's supervisor, to improve the quality of the training and identify if the learner achieved the goals of the training. It also provides a justification for the implementation of training. Nonetheless, there is a lack of studies that attempt to evaluate information security training programs. In this study, we utilize the Philips model to evaluate the public training programs for the people who are in charge of the information security duties in the public sector and propose the training improvement plans. Research result has shown that it is necessary to evaluate the level of the trainees in advance and conduct training programs according to the information security skill level. In addition, it needs to conduct training according to duties such as information security management, information security operate and maintain. The limitation of this study is that each education program was not assessed individually because this study had developed an evaluation tool that could be used comprehensively.