• 제목/요약/키워드: Security Expert

검색결과 218건 처리시간 0.026초

원자력발전소 특수경비원을 위한 체력검정방법 개발 (Development of Fitness Test Method for Special Guard in Nuclear Power Plant)

  • 정호원;최지웅
    • 시큐리티연구
    • /
    • 제60호
    • /
    • pp.227-251
    • /
    • 2019
  • 원자력 안전에 대한 국민적 관심이 지속적으로 증가하고 있는 가운데 그동안 비정규직으로 위탁운영되던 원자력발전소 특수경비원의 정규직화가 추진 중에 있다. 특수경비원은 시설경비하기, 무기 사용하기, 비상사태 대응하기, 출입통제하기 등 상당한 수준의 체력이 요구되는 직무를 수행하는 바, 특수경비원의 정규직화 과정에 있어 이들의 체력검정방안에 대한 논의가 시급한 실정이다. 본 연구에서는 문헌연구를 통해 한국, 미국, 일본 3개국의 경찰, 소방, 군인을 대상으로 한 체력검정방법을 분석하였으며, 이를 통해 기존 특수직종별 체력검정방법의 특징과 장·단점을 고찰하고자 하였다. 이후 전문가 회의를 거쳐 원자력발전소 특수경비원에게 적합한 새로운 체력검정방법을 도출하였다. 또한 본 연구는 개발된 체력검정방법이 현장에 도입될 수 있도록 체력검정결과를 해석할 수 있는 가이드라인을 제시하고자 하였다. 이를 위해 74명의 피검자를 대상으로 체력검정을 실시하였으며, 실험결과를 기초로 특수경비원 체력검정종목별 예상기록을 제시하였다.

СЕВЕРО-ВОСТОЧНАЯ АЗИЯ В ПОВОРОТЕ РОССИИ НА ВОСТОК (Northeast Asia in Russia's Pivot to the East)

  • Kanaev, Evgeny
    • 분석과 대안
    • /
    • 제1권1호
    • /
    • pp.44-64
    • /
    • 2017
  • Russia's push in the Asia-Pacific region stems from its interests that have the national, regional and global dimensions. In their turn, the aims of this policy are civilizational, geopolitical, economic and prospective, with a long-term outlook. In the course of their achievement, cooperation with Northeast Asia's countries will play one of the key roles owing to the factors of geographic proximity, Northeast Asia's economic potential, risk hedging and a growing influence Northeast Asia exerts upon the global development. A new cooperation paradigm between Russia and the states of Northeast Asia should be based upon establishing and cementing self-reproducing ties. This is the central aim of Russian initiatives in relations, with Japan, the Republic of Korea, Democratic People's Republic of Korea, Mongolia and China. However, numerous obstacles ranging from Russia's absence in the regional free trade agreements and supply-production chains of value-added production to the permanent international instability generated by Pyongyang's missile-nuclear developments hamper the practical implementation of this task. Realizing the necessity to give an additional impetus to this new cooperative paradigm, Russia has to develop directions with an apparent consolidating effect. The most promising may be the establishment of a permanent security forum based upon Northeast Asia Peace and Security Mechanism chaired by the Russian Federation. The urgency of this measure and its expected support stem from the necessity to strengthen security in Northeast Asia, a task neither the US-led hub-and-spoke system nor ASE-AN-led multilateral dialogue venues have been able to resolve. The issues addressed at the security forum must include the unification of approaches to North Korean nuclear issue and producing a document specifying actions of the claimants on the disputed maritime territories in the "direct contact" situations. At the expert level, Russia has elaborated on the idea to establish such a forum outlining the spectrum of the key directions of cooperation. With the urgency in the establishment of this dialogue venue, its agenda has to be coordinated with the agendas of the existing security systems presented by the US alliances and the ASE-AN-led multilateral negotiations. The practical implementation of this initiative will strengthen security in Northeast Asia as its challenges will be resolved in the pre-emptive way based on coordinated approaches. Therefore, Russia as the Eurasian state will be one of the role players in the advent of the Asian century.

  • PDF

훈련용시뮤레이터 현황과 향후계획 (A study on development dispatcher's training simulator in the operation of power system)

  • 김문기;정창덕
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1993년도 하계학술대회 논문집 A
    • /
    • pp.515-517
    • /
    • 1993
  • Dispatcher's Training simulation function are network analysis, power system modeling, supervisory control, and system security assessment. This function provides hand-on training for power dispatchers for operation of the nation control center in the future, it needs interface between simulator and expert system. This paper introduces DTS function which is adopted in the Central Load Dispatching Office.

  • PDF

미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계 (Security Knowledge Classification Framework for Future Intelligent Environment)

  • 나원철;이효직;성소영;장항배
    • 한국전자거래학회지
    • /
    • 제20권3호
    • /
    • pp.47-58
    • /
    • 2015
  • 근래에 들어 정보보안 환경이 ICT와 융합됨에 따라 새로운 취약성 지속적으로 증가하고 있다. 이에 따라 새로운 유형의 사이버범죄가 대두되고 있으며 사이버 공격, 내부자 유출 등 보안문제로 인하여 보안사고 사례가 급증하고 있다. 또한 기존의 기술적인 보안위협처럼 취약점을 악용한 외부의 해킹이 아닌 내부직원에 의한 정보유출 등의 신종 보안위협이 등장하고 있으며 산업과 기술이 융합되는 새로운 환경으로 발전함에 따라 그 위협은 더욱 증가하고 있는 실정이다. 따라서, 본 논문에서는 고도화된 정보위협에 능동적으로 대처하기 위한 전문보안관리 인재를 양성하기 위해 균형있는 정보보호 교과목을 설계하여 정보보호 교과목 분류체계를 도출하고자 하였다. 이를 위해 선행연구조사 분석과 전문가 자문위원회의 회의를 통해 기술적인 교육과 경영 관리적인 교육이 적절히 배분된 정보보호 교과목을 도출하고 국내실정에 적합한 형태로 분류된 정보보호 직업분류체계와의 연결을 통해 균형감있는 정보보호교과목 분류체계를 도출하였다. 본 연구결과는 미래 산업융합 환경의 신종 보안위협을 막아낼 수 있는 지능형 보안인재를 양성하는데 긍정적인 효과를 미칠 것으로 기대된다.

분석적 계층기법을 활용한 e-Business 기업의 초기투자단계 및 성장단계별 평가모형의 개발 (Developing the Stage Evaluation Model for e-Business Company using Analytic Hierarchy Process)

  • 최혜진;한인구;오경주
    • Asia pacific journal of information systems
    • /
    • 제15권1호
    • /
    • pp.45-61
    • /
    • 2005
  • This study develops the evaluation model for e-Business company using analytic hierarchy process. As the first step of this study, we derived the appraisal standards based on the previous literature and the knowledge of experts from venture capitalists, security companies, credit evaluation companies, and consulting firms. In order to validate the evaluating factors in the models, this study was supported by analysts of top ranked venture capitalists in Korea. Through their assistance, this study can determine necessary evaluating factors that refined and deepened the models. Four expert groups, such as venture capitalists, credit analysts, analysts of security company and e-Business consultants, provide their knowledge for the determination of the weights of evaluating factors in the hierarchical model through the questionnaires and interviews. The results show that the weights of the evaluating factors differed by the maturity of e-Business company.

경호기법에 의한 위급상황의 발견과 대처 방안에 관한 고찰 (The consideration about prevention ways of discovery of emergency situation which is based on guard techniques)

  • 공배완
    • 한국재난정보학회 논문집
    • /
    • 제6권2호
    • /
    • pp.11-20
    • /
    • 2010
  • All of the people or objects which are contacted during the activity of guard are added to range of objects. guard has to notice decision, question proposal, observation, accomplish to be happened them at the same time recognizing the steps as soon as possible. Before a lot of information of client are shown, guard expert has to search observation of materialization, extension of reservation, notification of business and causes of danger through personal interviews. Rapid communication system has to be assumed and effective caution, protection and shelter and following prevention are cooperated as well as has to care about safe of guard object by a protective wall. And also has to get out of the ground, keep the large shape when moves, prevent the trials of attack from the assassinators after takeing control over weapons.

국내 디지털 포렌식 기술 현황과 발전 방안 (The present of state Domestic Digital Forensics and Development Methodology)

  • 손정환;김귀남
    • 융합보안논문지
    • /
    • 제5권1호
    • /
    • pp.11-18
    • /
    • 2005
  • 정보통신기술의 발전과 인터넷 보급 확산의 영향으로 디지털 범죄는 해마다 증가하고 있다. 고도화 전문화되어 가고 있는 디지털 범죄를 해결하기 위해서는 디지털 포렌식 프로세스 표준화, 전문가 양성 및 교육, R&D, 정부의 정책적인 지원 등 디지털 포렌식 기술 발전을 위한 노력이 필요하다. 이에 본 연구에서는 국내 디지털 포렌식 기술의 현황을 파악하고 발전방안을 제시하고자 한다.

  • PDF

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • 한국멀티미디어학회논문지
    • /
    • 제20권5호
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

Comparing U-Net convolutional network with mask R-CNN in Nuclei Segmentation

  • Zanaty, E.A.;Abdel-Aty, Mahmoud M.;ali, Khalid abdel-wahab
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.273-275
    • /
    • 2022
  • Deep Learning is used nowadays in Nuclei segmentation. While recent developments in theory and open-source software have made these tools easier to implement, expert knowledge is still required to choose the exemplary model architecture and training setup. We compare two popular segmentation frameworks, U-Net and Mask-RCNN, in the nuclei segmentation task and find that they have different strengths and failures. we compared both models aiming for the best nuclei segmentation performance. Experimental Results of Nuclei Medical Images Segmentation using U-NET algorithm Outperform Mask R-CNN Algorithm.

A Methodology of Automated Analysis and Qualitative Assessment of Legislation and Court Decisions

  • Trofimov, Egor;Metsker, Oleg;Kopanitsa, Georgy
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.229-235
    • /
    • 2022
  • This study aims to substantiate an interdisciplinary methodology for automated analysis and qualitative assessment of legislation and court decisions. The development of this kind of methodology will make it possible to fill a number of methodological gaps in various research areas, including law effectiveness assessment and legal monitoring. We have defined a methodology based on the interdisciplinary principles and tools. In general, it should be noted that even at the level of qualitative assessment made with the use of the methodology described above, the accumulation of knowledge about the relationship between legal objectives, indicators and computer methods of their identification can reduce the role of expert knowledge and subjective factor in the process of assessment, planning, forecasting and control over the state of legislation and law enforcement. Automation of intellectual processes becomes inevitable in a digital society, but, releasing experts from routine work, simultaneously reorients it to development of interdisciplinary methods and control over their application.