• Title/Summary/Keyword: Security

Search Result 25,935, Processing Time 0.043 seconds

A Study on the Security English Ability Status and Progress Plan of Security Related Department Students (경호관련학과 학생들의 경호영어 능력 실태 및 발전방안)

  • Kim, Doo-Hyun;Choi, Byun-Kwon
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.51-72
    • /
    • 2008
  • This study is aimed at looking into the security English ability status and progress plan of security related department students. The status was captured through a questionnaire survey to English proficiency and simple tests on security knowledge. Current status to general English and security English ability was indicated very low and unsatisfactory as a whole, through which individuals and students perceived their need of positive effort. The security personnel for domestic figures and VIPs need to have English communication ability as an international ability, and the security related department students have to improve English communication ability during their college course for smooth post-graduation employment and career preparation. General English ability should be bettered through the diversity of cultural English programs, and systematic learning and effort needed for equipment of ability on specialized security ability, for this, compilation of security English curricula encouraged by each college. It is expected that significance and perception of security English would be conscious and progressive in Korean security related departments, by which more security personnel with international qualifications and abilities would be produced.

  • PDF

A Study on the License & Training System of Security Agent in Japan (일본 민간경비원의 자격 및 훈련제도에 관한 연구)

  • Jo, Yong-Chul;Kim, Soon-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.339-356
    • /
    • 2008
  • This study discusses some topics of Security License System and Security Training System in Japan. Especially, the Security License must be very influence that the growth of security industry. And it's true that a few enlightened approach to cooperation between police and private security has already begun to take place in some divisions. The most important thing of the License Test System in Japan is the method of test rule and test section. Then the training systems of the security agent have been very impressive rule and the system for security agent. Today, the market of the security industry in Korea have been going to develop and extend to the future industry. The assignments that are leaved to security industry in Korea must be that the improvement of the License & Training System of Security Agent in Korea should be made effort by the security industry and the public section that looks like the police.

  • PDF

Development of a Standardized Framework for Domestic Information Security Education; Focusing on a Two-Track Curriculum Customized by Age and Job (국내 정보보호 교육 표준 프레임워크 개발; 연령 및 직무 맞춤의 이원화(Two-track) 교육과정을 중심으로)

  • Park, Minjung;Lee, GI Hyouk;Chai, Sangmi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1083-1095
    • /
    • 2021
  • With the recent increase in users' dependence on the Internet and the spread of various IT devices, the influence of information security on the users' has expanded compared to the past. Therefore, it is expected to have an increased influence on information security in personal life. In addition, as the intrusion factors that threaten security continue to become more advanced and diversified (eg., fake news, cyberbullying, identity theft), the need for nurturing information security experts is increasing. Furthermore, not only corporate information security workers, but also all individuals, cannot be free from the threat of information security. Therefore, it is necessary to prepare various information security education to improve information security awareness and induce proactive information security behaviors. In this study, characteristics of domestic and foreign information security education courses are analyzed and provide a standardized framework for information security education applicable to the domestic environment.

A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model (보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구)

  • Lee, Sang-kyu;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1585-1594
    • /
    • 2018
  • In recent years The importance of information security management for securing information collection and analysis, production and distribution is increasing. Companies are assured of confidence in information security through authentication of information Security Management System. However, level assessment and use of domains that make up the management system is limited. On the other hand, the security maturity model is able to diagnose the level of information protection of the enterprise step by step. It is also possible to judge the area to be improved urgently. It is a tool to support goal setting according to the characteristics and level of company. In this paper, C2M2, which is an example of security maturity model, is compared and analyzed with Korea Information Security Management System certification. Benchmark the model to check the level of information security management and derive the priority among the items that constitute the detailed area of information security measures of ISMS certification. It also look at ways to check the level of information security management step by step.

A Study on the Institutional Improvement for Establishment of Occupational Identity and Occupational Prestige of Private Security (민간경비의 직업정체성과 직업명망 확립을 위한 제도적 개선방안 연구 : 한국표준직업분류상 경비원 직업분류의 개선을 중심으로)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.187-203
    • /
    • 2017
  • This study focuses on analyzing the problems of the Korean standard classification of occupations(KSCO), which is a formal and institutional implementation method that affects the occupational identity and Occupational Prestige of Private Security, and suggests ways to improve it. The following should be supplemented. (1) It is necessary to unify occupations related to private security that are classified into simple labor workers. (2) Delete the Technical Security Guards(4123) and create a Security Guard(4123) instead. (3) Facility Security Guards(41230), Convoy Security Guards, Technical Security Guards(41232), Security monitoring and control personnel(41233), and Special Security Guards(National important facility security guard)(41234) will be newly established. (4) Change the name of subclassification and subclassification in simple labor worker of Major Class 9(Code 9), and adjust Security Guards(9421) to the Surveillance Personnel(9421).

Analysis of Domestic Security Solution Market Trend using Big Data (빅데이터를 활용한 국내 보안솔루션 시장 동향 분석)

  • Park, Sangcheon;Park, Dongsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.492-501
    • /
    • 2019
  • To use the system safely in cyberspace, you need to use a security solution that is appropriate for your situation. In order to strengthen cyber security, it is necessary to accurately understand the flow of security from past to present and to prepare for various future threats. In this study, information security words of security/hacking news of Naver News which is reliable by using text mining were collected and analyzed. First, we checked the number of security news articles for the past seven years and analyzed the trends. Second, after confirming the security/hacking word rankings, we identified major concerns each year. Third, we analyzed the word of each security solution to see which security group is interested. Fourth, after separating the title and the body of the security news, security related words were extracted and analyzed. The fifth confirms trends and trends by detailed security solutions. Lastly, annual revenue and security word frequencies were analyzed. Through this big data news analysis, we will conduct an overall awareness survey on security solutions and analyze many unstructured data to analyze current market trends and provide information that can predict the future.

A Study on the Formation and Development of Collective Security System and the Possibility of Security System Shift in East Asia (집단안보체제의 형성 및 발전요인과 동아시아 안보체제의 변화 가능성 연구)

  • Oh, Dongkeon
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.1-29
    • /
    • 2023
  • For the last 70 years, the U.S.-led bilateral security system, or "Hub-and-Spokes" system, has been applied to Northeast Asia, and the system has been successfully settled in terms of stability and economic achievements of the region. Given the increasing complexity of the security environment of East Asia, it is plausible to consider the possibility of a security system shift from bilateral alliances to collective security. In order to analyze the driver of collective security system, this study developed three factors of formation and development of collective security system - main threat, intensity of the threat, and confidence among countries in the system - by reviewing international political theories related to security cooperation. Comparing the formation, development, and achievements of NATO and SEATO, the study figures out that the existence of the main threat, the high intensity of the threat, and the strong confidence among countries in the security system are the primary drivers for a successful collective security system. Based on the result, the study also analyzed the possibility of a security system shift in East Asia. Considering contemporary international conflicts such as U.S.-China strategic competition, Russia-Ukraine War, and growing threats posed by North Korean nuclear and missiles, the study anticipates that the necessity of a collective security system that will replace the current security system of the region would arise. Still, although some issues between countries should be overcome, the growing intensity of the threats will promote cooperation among countries by improving their confidence.

  • PDF

Security Design for Information protection System using BSIMM (BSIMM을 활용한 정보보호시스템 보안 설계 방안)

  • Park, Jung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1541-1547
    • /
    • 2015
  • In the recent IT industry, security has established itself as the factor to be considered the most in the software development. It goes without saying that security is the critical factor for the development of information security products. In the evaluation of the information security products, the security is assured by the security architecture requirement (ADV_ARC). However, the Absence of the systematic software security architecture process makes it difficult to guarantee the security quality consistently even though they are evaluated based on common criteria. In this paper, we propose a way to ensure a consistent security quality applying the software security framework in BSIMM.

A Study on Strengthening of Logistics Security and RFID (물류보안강화와 RFID에 관한 소고)

  • Kim, Jang-Ho;Kim, Jong-Deuk;Kim, Jea-Sung
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.241-261
    • /
    • 2007
  • 9.11 terrors which happen in 2001 in the U.S. recognize importance about national security and Department of Commerce, country safety department, Federal Communication Commission(FCC) etc. are establishing RFID sticking plan in harbor exit and entrance container for this, and it is real condition that is preparing preparation of law and system that establishes harbor peace law(Safe Port Act) on October, 2006 and acts on for U.S. about container load cargo Europe and Asia each countries. These law and system is logistics security that strengthen search for import and export freight and security to main contents. To meet in these circumstance subsequent, this paper is to examine the following three themes. First, examined necessity of logistics security and logistics security strengthening tendency, and second, examined in achievement of logistics business and RFID, and third, presented logistics security process that utilize change of realization about logistics security and RFID's role for logistics security. Through upper investigation, this paper suggested the realization about logistics security raising, logistics security connection system construction by export step, real-time freight chase that use RFID, construction necessity of executive system and development of logistics security equipment required.

  • PDF

A Study on The Vulnerabilities and Problems of Security Program (보안 프로그램의 취약성 및 문제점에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.77-84
    • /
    • 2012
  • Recent Security Programs are widely used to improve the security of Client Systems in the Web authentication. Security Program is provide the function of the Keyboard Security and Certificate Management, Vaccines, Firewall. in particular, This Security Program has been used Financial Institutions and Government Agencies, and some private corporate Home Page. and ActiveX is used to install the Security Program. but Security Programs caused by several security vulnerabilities and problems as they appear, are threat to the stability of the Client System. Therefore, This paper will be analyzed through Case Studies and Experiments to the Vulnerabilities and Problems of Security Program and This Is expected to be utilized to further improve the performance of the Security Program and the building of a new Certification Scheme for material in the future.