• Title/Summary/Keyword: Security Operations Center

Search Result 46, Processing Time 0.023 seconds

Study on the Freight Forwarding System of Advanced Shipping Country - A Case of United States of America System - (선진 해운국의 Freight Forwarding System에 관한 연구 - 미국제도를 중심으로 -)

  • Kim, Se-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.20 no.3
    • /
    • pp.416-428
    • /
    • 2008
  • In the end of 2007, Korea Government promulgated the Rule of 'Basic Act of Logistics Policy' for improving international logistics forwarding business. The goals of these rules are to achieve the development of our nation's economics for providing the security and efficiency of logistics system and enforced competition of logistics enterprises. This is established the basic principles of the legal basis for expanding into the Logistics Hub Center of North-east Asia. However In May 1999 new licensing requirements for ocean freight forwarders and NVOCCs operating in the USA were established by the US Federal Maritime Commission(FMC). Due to these regulations, each ocean transportation service provider in the USA acting as ocean freight forwarder, NVOCCs, or NVOCC agent must obtain a license to operate as Ocean Transportation Intermediary(OTI) before it begins operations. Only licensed OTIs may act as US transportation agents or receiving agents of other NVOCCs, on both US exports and imports. In this context, I think this study will be contributes for the development of korean freight forwarding system by analysis and comparing with between the Rule of the Basic Act of Logistics Policy of Korea and OTI freight forwarder & NVOCCs of USA.

Improvement of Okamoto-Uchiyama Probabilistic Public Key Cryptosystem (Okamoto-Uchiyama 확률 공개키 암호 방식의 효율성 개선)

  • Choi, Duk-Hwan;Kim, Hyun-Jue;Choi, Seung-Bok;Won, Dong-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.346-351
    • /
    • 2002
  • We improve a new probabilistic public key cryptosystem, in which the one wav function was defined only on the discrete logarithmic functions, proposed by Okamoto and Uchiyama. The plaintexts are calculated from the modular product of two these functions, one of which has a fixed value depending on a given public key. The improvement is achieved by a well-chosen public key assuming an unit element 1 as the fixed function value. Because it is possible to reduce the number of operations at the decryption. Also the concrete method for a public key of our improved scheme is suggested.

Development of an Imaging Based Gang Protection System

  • Grimm, M.;Pelz, M.
    • International Journal of Railway
    • /
    • v.1 no.4
    • /
    • pp.149-156
    • /
    • 2008
  • During maintenance or construction works in or at the tracks of railways, high risks for passengers and railway staff, especially for the workers on the construction site exist. The high risks result out of the movement of rail vehicles, like trains or construction vehicles, which must be faced by using any available technical and operational technologies for securing them against the environment. Therefore, it is necessary to evaluate the level of protection continuously and to identify new and innovative methods and technologies for the protection of the gang (construction worker, machines and material). Especially on construction sites at line sections with two or more parallel tracks but also with single tracks, there are still a lot of incidents and accidents mostly with seriously injured persons or fatalities. These were mainly gang members that breach the railway-loading gage. By using proper warning or protection systems, the avoidance of such accidents must be achieved. The latest developments. in gang protection systems concern on the one hand fixed barriers in the middle between the construction site and the operated track and on the other hand construction vehicles equipped with automatic warning systems. The disadvantage of such protection methods is that the gang can be warned against an approaching train but a monitoring of the gang members cannot be performed. Only one part of a potential dangerous situation will be detected. If the gang members will overhear the acoustic warning signal of the security staff and the workers will not leave the danger zone in the track, the driver of the approaching train had no chance to react to the dangerous situation. An accident is often inevitable. While the detection of acoustic warning signals by the gang members working on a construction site is very difficult, the acoustical planning of an automatic warning system has to be designed for an acoustic short range level of one meter besides the construction vehicle. The decision about the use of today's technical warning system (fixed systems, automatic warning systems, etc.) must be geared to the technical feasibility and the level of safety which is needed. Criteria for decision guidance to block a track should be developed by danger estimation and economical variables. To realize the actual jurisdiction and to minimize the hazards of railway operations by the use of construction vehicles near the tracks further developments are needed. This means, that the warning systems have to be enhanced to systems for protection, which monitor the realization of the warning signal as a precondition for giving a movement authority to a train. This method can protect against accidents caused by predictable wrongdoing. The actual state of the art technique of using a collective warning combined with additional security staff is no longer acceptable. Therefore, the Institute of Transportation System of the German Aerospace Center in Braunschweig (Germany) will develop a gang warning and protection system based upon imaging methods, with optical sensors such as video in visible and invisible ranges, radar, laser, and other. The advantage of such a system based on the possibility to monitor both the gang itself and the railway-loading gauge either of the parallel track or of the same track still in use. By monitoring both situations, the system will be able to generate a warning message for the approaching train, that there are obstacles in the track, so that the train can be stopped to prevent an accident. And also the gang workers will be warned, while they breach their area.

  • PDF

PRC Maritime Operational Capability and the Task for the ROK Military (중국군의 해양작전능력과 한국군의 과제)

  • Kim, Min-Seok
    • Strategy21
    • /
    • s.33
    • /
    • pp.65-112
    • /
    • 2014
  • Recent trends show that the PRC has stepped aside its "army-centered approach" and placed greater emphasis on its Navy and Air Force for a wider range of operations, thereby reducing its ground force and harnessing its economic power and military technology into naval development. A quantitative growth of the PLA Navy itself is no surprise as this is not a recent phenomenon. Now is the time to pay closer attention to the level of PRC naval force's performance and the extent of its warfighting capacity in the maritime domain. It is also worth asking what China can do with its widening naval power foundation. In short, it is time to delve into several possible scenarios I which the PRC poses a real threat. With this in mind, in Section Two the paper seeks to observe the construction progress of PRC's naval power and its future prospects up to the year 2020, and categorize time frame according to its major force improvement trends. By analyzing qualitative improvements made over time, such as the scale of investment and the number of ships compared to increase in displacement (tonnage), this paper attempts to identify salient features in the construction of naval power. Chapter Three sets out performance evaluation on each type of PRC naval ships as well as capabilities of the Navy, Air Force, the Second Artillery (i.e., strategic missile forces) and satellites that could support maritime warfare. Finall, the concluding chapter estimates the PRC's maritime warfighting capability as anticipated in respective conflict scenarios, and considers its impact on the Korean Peninsula and proposes the directions ROK should steer in response. First of all, since the 1980s the PRC navy has undergone transitions as the focus of its military strategic outlook shifted from ground warfare to maritime warfare, and within 30 years of its effort to construct naval power while greatly reducing the size of its ground forces, the PRC has succeeded in building its naval power next to the U.S.'s in the world in terms of number, with acquisition of an aircraft carrier, Chinese-version of the Aegis, submarines and so on. The PRC also enjoys great potentials to qualitatively develop its forces such as indigenous aircraft carriers, next-generation strategic submarines, next-generation destroyers and so forth, which is possible because the PRC has accumulated its independent production capabilities in the process of its 30-year-long efforts. Secondly, one could argue that ROK still has its chances of coping with the PRC in naval power since, despite its continuous efforts, many estimate that the PRC naval force is roughly ten or more years behind that of superpowers such as the U.S., on areas including radar detection capability, EW capability, C4I and data-link systems, doctrines on force employment as well as tactics, and such gap cannot be easily overcome. The most probable scenarios involving the PRC in sea areas surrounding the Korean Peninsula are: first, upon the outbreak of war in the peninsula, the PRC may pursue military intervention through sea, thereby undermining efforts of the ROK-U.S. combined operations; second, ROK-PRC or PRC-Japan conflicts over maritime jurisdiction or ownership over the Senkaku/Diaoyu islands could inflict damage to ROK territorial sovereignty or economic gains. The PRC would likely attempt to resolve the conflict employing blitzkrieg tactics before U.S. forces arrive on the scene, while at the same time delaying and denying access of the incoming U.S. forces. If this proves unattainable, the PRC could take a course of action adopting "long-term attrition warfare," thus weakening its enemy's sustainability. All in all, thiss paper makes three proposals on how the ROK should respond. First, modern warfare as well as the emergent future warfare demonstrates that the center stage of battle is no longer the domestic territory, but rather further away into the sea and space. In this respect, the ROKN should take advantage of the distinct feature of battle space on the peninsula, which is surrounded by the seas, and obtain capabilities to intercept more than 50 percent of the enemy's ballistic missiles, including those of North Korea. In tandem with this capacity, employment of a large scale of UAV/F Carrier for Kill Chain operations should enhance effectiveness. This is because conditions are more favorable to defend from sea, on matters concerning accuracy rates against enemy targets, minimized threat of friendly damage, and cost effectiveness. Second, to maintain readiness for a North Korean crisis where timely deployment of US forces is not possible, the ROKN ought to obtain capabilities to hold the enemy attack at bay while deterring PRC naval intervention. It is also argued that ROKN should strengthen its power so as to protect national interests in the seas surrounding the peninsula without support from the USN, should ROK-PRC or ROK-Japan conflict arise concerning maritime jurisprudence. Third, the ROK should fortify infrastructures for independent construction of naval power and expand its R&D efforts, and for this purpose, the ROK should make the most of the advantages stemming from the ROK-U.S. alliance inducing active support from the United States. The rationale behind this argument is that while it is strategically effective to rely on alliance or jump on the bandwagon, the ultimate goal is always to acquire an independent response capability as much as possible.

Knowledge and Current Status about AED in the Public Facilities - Focused on the Gwangju City - (다중이용시설에서의 AED에 관한 지식 및 운영실태에 관한 연구 - 광주광역시 중심으로 -)

  • Park, Si-Goo;Park, Chang-Hyun;Chae, Min-Jung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.14 no.3
    • /
    • pp.13-28
    • /
    • 2010
  • Purpose: In this study, we investigated the better application of the law which is about the AED installation and more effective ways of emergency medical care system, to understand the law and to research the current condition of public facilities which belong to local governments, and to seize the aspect of safety guards who currently work in order to provide the installation of AED in the public facilities and to provide more efficient emergency medical service with the effectuation of the immunity law of the good intention of first-aid treatment. Methods: In Gwang-ju, 234 public facilities have been identified by 31 December, 2008. With the exception of the duplication, we researched 158 facilities and received the answers from 95 of them. Results: In the research, 53% of them have had internal emergency first-aid education, and 55% of them didn't have this education and a CPR education manual, and 30% of the facilities even didn't know how to connect with the manager of the company for the first-aid department. On the other hand, most of them were highly interested in CPR and AED education on the ratio of 91% and 93%. 88% of them have been trained about first-aid, 51% of them haven't been retrained, 17% have never been trained. so, the reality of emergency system at public facilities is serious. 78% of them knew they are working at public facilities, though 49% of them didn't know about AED installation. 57% of them didn't know the fact there is the immunity law related with good intentions for first-aid treatment. 63% of the facilities have security guards, and 30% of them didn't answer the questions. Also, many of them agreed to the opinion that all employees should have first-aid training. At representative survey report of participator of public-facility, emergency treatment is 61%, 16% of patients calling. Accordingly they importantly think better doing an on-site first-aid than evacuating the patient. And the rates show that 57% of them answerers tend to call Fire-Office(119) for evacuating the patients, and 28% of them EMIC(1339) for the first-aid. Conclusions: In this study, we are suggest to improve the details of the efficient operations and management after the grasp of the uninstallation, indifference, and unreliable conditions of AED. 1) Need a publicity of AED install cognition which is an emergency medical instrument at public facilities. 2) Arrangement of safety agents at facilities and concerns about them for good management from the parties concerned. 3) Need a designation of legal details according to the decision of the AED installation and the standard of the AED installation. 4) Training about first-aid of safety guards and the persons concerned in the facilities should be practiced participation with the positive and through this, first-aid treatment could be done by anyone who knows the immunity law related to medical emergency. 5) The brochures for the potential users and the results form practicing the instructions need to be improved in many ways through recording the emergency cases that have happened.

  • PDF

A Study on Institutional Foundation on the Korea Counter-Terrorism System (한국 테러대응 시스템의 제도적 구축방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.27-61
    • /
    • 2010
  • This study looks at plans for the efficient functions of the current terror response system in Korea. The results are derived from by comparing and analyzing American, British, German, Japanese, and Korean terror response systems. It focuses especially on addressing some problems with Korea's terror response system and how to operate it effectively. The study will systematically compare and analyze each nation's terror countermeasure studying organizational, functional, and legal aspects as standards. This study shows that there is not an exclusive terror response center in Korea compared with other nations such as America, the United Kingdom, Germany, and Japan. Also it is difficult to expect effective and vigorous operations due to weak cooperation across the relevant organizations. The presidential directive of the state's anti-terrorism action guidelines is legally ineffective. This means that on legal grounds, it is difficult to take actions to prevent the terrorism. Therefore, keys to counteracting terrorism derived from this study are summarized below. In the first place, an integrated terror response system should be set up for expansion of information sharing which leads to emergence effect. In the second place, the superior legislative systems should be made for the cleardefinition and extent of what the terror is, rigid enforcement of investigation, immigration, and keeping an eye on the funds raised by terrorists and tracking down the terrorists, the plan for eco-terrorism. In the third place, to augment security of vital facilities and peoples' awareness of terrorism safety should be emphasized and a cooperative system between civil and government organizations need to be built. In the fourth place, system for crisis management must be provided in an effort to maximize management system of terrorism and unify a decentralized emergency countermeasures effectively.

  • PDF

Perception of Patient Safety Risk Factors and Performance Level of Safety Care Activities among Hospital Nurses (환자안전 위험요인에 대한 병원간호사의 인식수준과 안전간호활동 수행정도)

  • Son, Young Shin;Lee, Young Whee;Kim, Young Shin;Song, Eun Jeong;Lee, Hye Ryun;Lee, Ju Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.2
    • /
    • pp.190-200
    • /
    • 2018
  • Purpose: The purpose of this study was to identify the level of perception of safety risk factors and the degree of performance of safety nursing activities in order to develop an education program to improve the safety of patients. Methods: The subjects were 217 nurses from 3 university hospitals in Incheon. Data were collected with structured questionnaires and analyzed using descriptive analysis, t-test, and ANOVA using SPSS 22.0. Results: The level of perception of patient's safety risk factors and safety care activities was 2.93 and 4.68, respectively. Perception of patient safety risk factors which belonging to the risk type of therapeutic devices, equipment, service and infrastructure all scored below average; also in addition, behavior, performance, and violence risk type and work system, information and communication risk type showed relatively low perception levels. Safety nursing activities showed a low level of performance in accurate communication among medical teams, management of fire and disaster, security management, use of restraints, identification of patients, and correct performance of operations and procedures. Conclusion: Based on these results, it is necessary to improve the safety of patients by taking proper management measures along with education.

A Study of Using the Car's Black Box to generate Real-time Forensic Data (자동차의 블랙박스를 이용한 실시간 포렌식 자료 생성 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.253-260
    • /
    • 2008
  • This paper is based on the ubiquitous network of telematics technology, equipped with a black box to the car by a unique address given to IPv6. The driver's black box at startup and operation of certification, and the car's driving record handling video signals in real-time sensor signals handling to analyze the records. Through the recorded data is encrypted transmission, and the Ubiquitous network of base stations, roadside sensors through seamless mobility and location tracking data to be generated. This is a file of Transportation Traffic Operations Center as a unique address IPv6 records stored in the database. The car is equipped with a black box used on the road go to Criminal cases, the code automotive black boxes recovered from the addresses and IPv6, traffic records stored in a database to compare the data integrity verification and authentication via secure. This material liability in the courtroom and the judge Forensic data are evidence of the recognition as a highly secure. convenient and knowledge in the information society will contribute to human life.

  • PDF

Countermeasure of Uumanned Aerial Vehicle (UAV) against terrorist's attacks in South Korea for the public crowded places (국내 소프트 타깃 대상 드론테러의 법제도 개선방안 연구)

  • Oh, Hangil
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.49-66
    • /
    • 2019
  • Purpose: This study aims to apply the counter terrorism policy in pertain to malicious drone abuse and the croweded public places in South Korea. And, to improve counter terrorism protection measure, this study suggests an adoptation of Anti UAV technology into counter terrorism related regulation. Method: Compared to nations' operations of counter terrorism prevention and protection activities with the South Korean gov, problems and limitations are suggested. Results: Anti UAV technology could not be applied for Multi-user facilities by any law due to the limitation, so that it is required to amend counte terrporism related policies and law. Conclusion: This study intends to identify various protection methods against UAV threats. To reduce the risk of UAV, the law of public safety and counter terrorism should be promoted and reinforced for the first.

Exploring trends in U.N. Peacekeeping Activities in Korea through Topic Modeling and Social Network Analysis (토픽모델링과 사회연결망 분석을 통한 우리나라 유엔 평화유지활동 동향 탐색)

  • Donghyeon Jung;Chansong Kim;Kangmin Lee;Soeun Bae;Yeon Seo;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.246-262
    • /
    • 2023
  • The purpose of this study is to identify the major peacekeeping activities that the Korean armed forces has performed from the past to the present. To do this, we collected 692 press releases from the National Defense Daily over the past 20 years and performed topic modeling and social network analysis. As a result of topic modeling analysis, 112 major keywords and 8 topics were derived, and as a result of examining the Korean armed forces's peacekeeping activities based on the topics, 6 major activities and 2 related matters were identified. The six major activities were 'Northeast Asian defense cooperation', 'multinational force activities', 'civil operations', 'defense diplomacy', 'ceasefire monitoring group', and 'pro-Korean activities', and 'general troop deployment' related to troop deployment in general. Next, social network analysis was performed to examine the relationship between keywords and major keywords related to topic decision, and the keywords 'overseas', 'dispatch', and 'high level' were derived as key words in the network. This study is meaningful in that it first examined the topic of the Korean armed forces's peacekeeping activities over the past 20 years by applying big data techniques based on the National Defense Daily, an unstructured document. In addition, it is expected that the derived topics can be used as a basis for exploring the direction of development of Korea's peacekeeping activities in the future.