• Title/Summary/Keyword: Security Program

Search Result 1,213, Processing Time 0.026 seconds

Study about development of education & training program for Private Security guard in Korea (한국 민간경비원 교육훈련 프로그램 개선방안에 관한 연구)

  • Lee, Sang-Chul;Kim, Tea-Min
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.281-308
    • /
    • 2004
  • With regard to problems related to qualification of Private Security, this study is qualitatively to develop education & training program from the viewpoint of education for the purpose of checking professionalism of Security guard. Offering the solutions for improvement by analyzing problems of articles related to training for Private Security guard prescribed in existing 'Law of Guarding', I made studies of development of practical affairs-centered education & training program for Private Security guard on the basis of Private Security guard' duties. Education & training program for Private Security guard must be made up of practical affairs-centered one related to concrete duties. Also because it needs to be made on the basis of a model planned for the program with combined method, this study gave example of model and contests of education & training program based on duties of Facilities Security. Main duties of cPrivate Security guard can be divided into four duties; duties on their own posts, patrolling, control of going in and out, dealing with accidents and so on. Private Security guard are given main duties by each post, and after adjusting conditions according to personnel organization, they perform their own duties. As education & training program based on Private Security guard' duties, common education & training program for the new-appointed, practical affairs-centered education & training program, education & training program for superintendents, service education & training program and so on are provided.

  • PDF

A Study on The Vulnerabilities and Problems of Security Program (보안 프로그램의 취약성 및 문제점에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.77-84
    • /
    • 2012
  • Recent Security Programs are widely used to improve the security of Client Systems in the Web authentication. Security Program is provide the function of the Keyboard Security and Certificate Management, Vaccines, Firewall. in particular, This Security Program has been used Financial Institutions and Government Agencies, and some private corporate Home Page. and ActiveX is used to install the Security Program. but Security Programs caused by several security vulnerabilities and problems as they appear, are threat to the stability of the Client System. Therefore, This paper will be analyzed through Case Studies and Experiments to the Vulnerabilities and Problems of Security Program and This Is expected to be utilized to further improve the performance of the Security Program and the building of a new Certification Scheme for material in the future.

A Study on Comparative Analysis of Maritime Security Programs - Focussed on TWIC

  • Yoon, Dae-Gwun
    • Journal of Navigation and Port Research
    • /
    • v.33 no.4
    • /
    • pp.283-288
    • /
    • 2009
  • To improve maritime security and enhance international shipping commerce within US ports in addition to ISPS (International Ship and Port Facility Security Code), the TWIC (Transportation Worker Identification Credential) program is working on the maritime field from the October 15, 2008 in the United States. In this paper, the program is reviewed and investigated in terms of goal, benefit, solution, and related legislation so forth In addition, other maritime security programs including MMD (Merchant Mariner Document), FAST (Free and Secure Trade), SIDA (Security Identification Display Areas). and Air Cargo security program was analyzed and compared in order to obtain relationship and difference with the program in terms of enrollment frequency, list and method of security check, and profile of each program As a result of this paper, the program is mostly to improve maritime security, protect individual privacy, and enhance commerce rather than other programs.

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

Design and Implementation of the System Supporting Security Communication between a Web Browser and a CGI Program (웹 브라우져와 CGI 프로그램 사이의 보안 통신을 지원하는 시스템 설계 및 구현)

  • Lee, Jun-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.641-653
    • /
    • 1999
  • The paper is design and implementation of the system to support security communication between a Web Browser and a CGI program by a Web Server using PKI(Public Key Infrastructure. This system uses GSS(Generic Security Service)-API to communicate with PKI, offers a Web user a Client Proxy, and offers a CGI developer there library functions related with security. TLS(Transport Layer Security) supports security communication between a Web Browser and a Web Server, but the system supports security communication between a Web Browser and a CGI program as the protected data received from a Client Proxy are sent to a CGI program, and the CGI program decrypts the data using the library functions supported by this system.

  • PDF

A Study on the Smart Medical Equipment Management Program (Secure-MEMP) Method Considering Security (보안성을 고려한 스마트 의료기기 관리(Secure-MEMP) 방법에 관한 연구)

  • Kim, Dong-Won
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.63-72
    • /
    • 2021
  • The hospital biomedical engineering team is responsible for establishing and regulating the Medical Device Management Program (MEMP) to ensure that medical devices are safe and reliable. As technology advances, medical devices such as artificial intelligence and precision medicine are developing into a form that allows connection between objects anytime, anywhere, and as various technologies converge, internal and external security threats continue to increase. In this paper, we present a study of the Medical Device Management Program (Secure-MEMP) method, considering that the security threat of medical devices continues to increase due to advances in technology.

Analysis of Education Training Program of Information Security Man Power in Domestic (국내 정보보호 교육 훈련 프로그램 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3725-3730
    • /
    • 2009
  • A serious disturbance of the 7.7 DDoS hacking gets a chance of raised awareness for importance of response countermeasure with current status of information security. The critical factor out of countermeasure of information security is the supply of information human power. In this paper, we review program of information security of domestic and foreign, from major courses of domestic university, and category of government about information security, and analyze security education training awareness program of human power in the information security area.

Object Classification Method for Security Model Based on Linux System (리눅스 환경에서 보안 모델을 위한 객체 분류 방법)

  • Im Jong-Hyuk;Park Jae-Chul;Kim Dong-Kook;Noh Bong-Nam
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.228-232
    • /
    • 2006
  • 최근 활발히 개발 중인 보안운영체제의 핵심인 보안커널(security kernel)은 참조모니터(reference monitor)에서 주체(subject)가 객체(object)에 대한 실행(action) 권한을 판단함으로써 접근 제어를 실행한다. 보안운영체제의 대표적인 접근제어모델에는 다중레벨접근제어(MLS: Multi Level Security)모델과 역할기반접근제어(RBAC: Role Based Access Control) 모델 등이 있다. 리눅스 시스템에서 이러한 접근제어모델을 적용하기 위해서 접근 대상이 되는 객체들의 효과적인 분류가 요구된다. 본 논문에서는 리눅스 환경에서 효과적인 접근제어모델을 적용하기 위하여 객체들을 객체 클래스(class)와 유형(type)을 기준으로 분류 하였다.

  • PDF

A Study on Mobile Game Security Threats by Analyzing Malicious Behavior of Auto Program of Clash of Clans (클래시 오브 클랜 오토 프로그램의 악성 행위 분석을 통한 모바일 게임 보안 위협에 관한 연구)

  • Heo, Geon Il;Heo, Cheong Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1361-1376
    • /
    • 2015
  • Recently, the size of the mobile game market and the number of mobile game users are growing. Also, as the mobile game's life cycle is increasing at the same time, auto program issue reappears which has been appeared in PC online games. Gamers usually tend to ignore warning messages from antivirus programs and even worse they delete antivirus program to execute auto programs. Therefore, mobile game users are easily compromised if the auto program performs malicious behaviors not only for the original features. In this paper, we analyze whether seven auto programs of "clash of clans" which has a lot more users for a long time perform malicious behaviors or not. We forecast the possible security threats in near future and proposed countermeasures based on this analysis. By analyzing auto programs of highly popular mobile game of today, we can acquire the knowledge on auto program's recent trend such as their development platform, operating mode, etc. This analysis will help security analysts predict auto program's evolving trends and block potential threats in advance.

SELinux Policy Template Converter (SELinux 정책 템플릿 변환기)

  • Park, Ho-Jun;Lee, Jae-Seo;Kim, Jung-Sun;Kim, Min-Soo;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.961-964
    • /
    • 2007
  • 인터넷의 발달에 따라 보안에 위협적인 요소 또한 크게 증가하고 있으며, 이를 극복하기 위한 방법으로 운영체제 수준의 보안 운영체제 연구가 활발히 진행되고 있다. 그 대표적인 연구로는 SELinux 가있지만 SELinux는 정책의 복잡성으로 인하여 사용자가 이용하기 어렵다는 단점이 존재한다. 본 논문에서는 이와같은 문제점을 해결하기 위해 SELinux 정책 템플릿(SELT)을 이용하여 SELinux의 TE형태로 쉽게 변환하기 위한 SELinux 정책 템플릿 컨버터를 제안한다.

  • PDF