• Title/Summary/Keyword: Security and Safety

Search Result 2,139, Processing Time 0.031 seconds

Accomplishment Analysis of the Fire Fighting and Safety Research Development Program Supported by Ministry of Public Safety and Security (2012-2014) (국민안전처 소방안전분야 연구개발사업(2012년~2014년)의 성과분석)

  • Chung, Jae-Han;Han, Yong-Taek
    • Fire Science and Engineering
    • /
    • v.30 no.4
    • /
    • pp.141-147
    • /
    • 2016
  • The fire fighting and safety research development program supported by Ministry of Public Safety and Security is composed of fire prevention and alert technology research, special disaster response technology research, and rescue and disaster-field response safety technology research. The principal accomplishment indices of this research program are (1) patent submitting or registration; (2) field test, ensuring performance criteria for commercialization, development of prototype, registration of software, royalty of technology-transfer; (3) the task to be carried out in a published research paper, and number of applied policies; and (4) the study period of task performance of employment and incubated high-technology manpower. Therefore, this study analyzed the performance result of a patent, research paper, and software registration of the fire-fighting and safety R&D program supported by Ministry of Public Safety and Security from 2012 to 2014.

An implementation of portable gamma ray detection platform using Cortex-A8 (Cortex-A8을 이용한 휴대용 감마선 검출 플랫폼 구현)

  • Seo, Jae-Gil;Lee, Yoon-Ho;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.1028-1033
    • /
    • 2013
  • As safety and security systems of shipping logistics are reinforced all over the world, ubiquitous technology-based core technology for safety and security is developing to build the system of logistics security. It is feared that the logistics security system of Korea has a possibility to technically depend on developed countries in the futures. Because the essential skills and equipment to retain security of logistics are not developed. It is urgent to introduce a logistics security system that fully integrates the entire logistics segment in the future. Thus, the necessity of developing the portable radiation detector which can detect gamma-ray nuclide is increasing for reinforcing safety and security systems. In this paper, a research suggests the implementation of portable radiation detector platform using Cortex-A8.

A Study of the Security and Secretary Service's Roles (경호비서의 역할에 관한 연구)

  • Kim, Jung-Suk;Park, Aok-Cheol
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.65-80
    • /
    • 2006
  • Security and Secretary Service is the man who maintains safe condition of boss', following him during all daily schedule and help the boss display his supreme business abilities, settling various affairs The purpose of this study is to examine the role of Security and Secretary Service. To understand the role of Security and Secretary Service, interviews with Security and Secretary Service's. synthesizing records inquire and interviews with present workers, was analyzed. As results of the study, the open coding of grounded theory was 85 categories, 22 lower categories, and 13 upper categories; 7 roles of Security and Secretary Service types out of 13 upper categories were attained. Based on this, from the axial coding a paradigm model related to categories was produced and selective coding the core category, story line development and type were analyzed. Therefore, Security and Secretary Service plays roles: Office manager, Training manager, Information manager, Customer relations manager, Facilitator, Health manager, and Safety manager. Compared with Office secretary, It is said that Health manager, and Safety manager are distinguishing roles. Through the coding process based on grounded theory. For this, based on the writer's theoretical sensitivity and constant comparative analysis, theses as well as writing in each field, data from serial publications and others, the statements of interview subjects were constantly compared and analyzed. Based on these analyses, this study suggests the following: First, the intimidate sample survey is need. Second, professional educational content during the training process of Security and Secretary Services should be strengthened. Third, to expect a more professional role of Security and Secretary Services. the systematic support will be required.

  • PDF

Maritime Security Training: Evaluation of the Impact on Seafarers' Security Awareness and Security Performance (선박보안교육: 선원의 보안인식과 보안성과에 미치는 영향 평가)

  • D'agostini, Enrico;Jo, Sohyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.2
    • /
    • pp.201-211
    • /
    • 2019
  • Safety and security measures in the shipping industry play a pivotal role in ensuring efficient and reliable cargo and passengers operations at each stage of the supply chain. The ISPS Code was adopted into SOLAS convention to protect seafarers and vessels from security threats. Furthermore, according to the Manila amendments to STCW Convention in 2010, personnel employed on board are required to participate in security training. Effective seafarers' education and training programs are of major importance to guarantee satisfactory performance levels onboard to minimize security-related risks. The study's contribution focuses on empirically evaluating the relationship between personal level of awareness and security performance when seafarers undertake security training courses. Findings of this study suggest that (1) seafarers who undertake maritime security training have a higher awareness of ship security, (2) security training and security awareness have a positive influence on security performance, and (3) security awareness mediates the impact of security training and security performance. In conclusion, education and training programs are key tools in enhancing seafarers' security awareness and security performance which, from an industry viewpoint, can translate into major economic, operational and reputational benefits.

A Safety Verification of the Modified BLP Model using PVS (PVS를 이용한 수정된 BLP 모델의 안전성 검증)

  • Koo Ha-Sung;Park Tae-Kue;Song Ho-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1435-1442
    • /
    • 2006
  • The ideal method of safety evaluation is to verify results of execution against all possible operations within operating system, but it is impossible. However, the formal method can theoretically prove the safety on actual logic of operating system. Therefore we explain the contents of the art of the safety verification of security kernel, and make a comparative study of various standardized formal verification tools. And then we assigned PVS(Prototype Verification system) of SRI(Stanford Research Institute) to verify the safety of a modified BLP(Bell & LaPadula) model, the core access control model of multi-lavel based security kernel. Finally, we describe formal specification of the revised BLP model using the PVS, and evaluate the safety of the model by inspecting the specification of the PVS.

Research of Development and Social Settlement to the Security and Secretary (경호비서업무의 사회적 정착과 발전방안에 관한 제언)

  • Gong, Bae-Wan
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.3-18
    • /
    • 2006
  • Recently the demand for civil bodyguards and security guards shows rapid growth by the social development and improve the quality of life. However the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. But the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyse current situation of civil body and security guard training industry and to seek an educational model. For it, the following questions will be examined. First, Do the professional training organizations meet social demand for the body and security guards? Second, What kind of training has to be provide for the body and security guards? and what the qualifications of the trainers? Then, what are the differences in training courses between private organizations and universities? Is there differences in the job placement among the trainers of private organizations and universities? etc.. In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim.

  • PDF

A Study on Cybersecurity Risk Assessment in Maritime Sector (해상분야 사이버보안 위험도 분석)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri;Park, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.134-136
    • /
    • 2019
  • The International Maritime Organization (IMO) issued 2017 Guidelines on maritime cyber risk management. In accordance with IMO's maritime cyber risk management guidelines, each flag State is required to comply with the Safety Management System (SMS) of the International Safety Management Code (ISM) that the cyber risks should be integrated and managed before the first annual audit following January 1, 2021. In this paper, to identify cyber security management targets and risk factors in the maritime sector and to conduct vulnerability analysis, we catagorized the cyber security sector in management, technical and physical sector in maritime sector based on the industry guidelines and international standards proposed by IMO. In addition, the Risk Matrix was used to conduct a qualitative risk assessment according to risk factors by cyber security sector.

  • PDF

Technology and Policy Post-Security Management Framework for IoT Electrical Safety Management (IoT 제품의 안전 관리를 위한 기술 및 정책적 사후 보안관리 프레임워크)

  • Lee, Donghyeok;Park, Namje
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1879-1888
    • /
    • 2017
  • The Internet of Things (IoT) environment has been gradually approaching reality, and although it provides great convenience, security threats are increasing accordingly. For the IoT environment to settle safely, careful consideration of information security is necessary. Although many security measures in the design and development stages of IoT products have been studied thus far, apart from them, the establishment of systems and countermeasures for post management after the launch of IoT products is also very important. In the present paper, a technical and policy post-security management framework is proposed to provide secure IoT environments. The proposed framework defines the concrete response procedures of individual entities such as users, manufacturers, and competent authorities in the case of the occurrence of security flaws after launching IoT products, and performs appropriate measures such as software updates and recalls based on an assessment of the risk of security flaws.

Efficient Searching for Shipwreck Using an Integrated Geophysical Survey Techniques in the East Sea of Korea (동해에서 지구 물리 이종방법간의 결합시스템을 활용한 침선 수색의 효용성 연구)

  • Lee-Sun, Yoo;Nam Do, Jang;Seom-Kyu, Jung;Seunghun, Lee;Cheolku, Lee;Sunhyo, Kim;Jin Hyung, Cho
    • Ocean and Polar Research
    • /
    • v.44 no.4
    • /
    • pp.355-364
    • /
    • 2022
  • When the 60-ton-class patrol boat '72' of the Korea Coast Guard (KCG) was on duty and she accidentally collided with another patrol boat ('207', 200-ton-class) and sank. A month-long search found a small amount of lost items, but neither the crew nor the ship was found. For the first time in 39 years since the accident, the Korea Institute of Ocean Science and Technology (KIOST) searched the boat 72 using the latest integrated geophysical techniques. A number of sonar images presumed to be of a sunken ship was acquired using a combined system of side scan sonar and marine magnetometer, operated at an altitude of approximately 30 m from the seabed. At the same time, a strong magnetic anomaly (100 nT) was detected in one place, indicating the presence of an iron ship. A video survey using a remotely operated underwater vehicle (ROV) confirmed the presence of a shielding part of a personal firearm at the stern of the sunken vessel. Based on these comprehensive data, the sunken vessel discovered in this exploration was assumed to be '72'. This result is meaningful in terms of future ocean exploration and underwater archaeology, as the integrated system of various geophysical methods is an efficient means of identifying objects present in the water.

Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File (알려지지 않은 실행파일의 악의적인 특징들을 분석하기 위한 행위추적 프로그램)

  • Kim, Dae-Won;Kim, Ik-Kyun;Oh, Jin-Tae;Jang, Jong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.941-944
    • /
    • 2011
  • 컴퓨팅 환경에서 각종 보안 위협들의 핵심에는 악성 실행파일들이 있다. 전통적인 시그니처 기반의 보안 시스템들은 악의적인 실행파일들 중에서 알려지지 않은 것들에 대해서는 런타임 탐지에 어려움이 있다. 그러한 이유로 런타임 탐지를 위해 시그니처가 필요 없는 정적, 동적 분석 방법들이 다각도로 연구되어 왔으며, 특히 악성 실행파일을 실제 실행한 후 그 동작상태를 모니터링 하는 행위기반 동적 분석방법들이 많은 발전을 이루어왔다. 그러나 대부분의 행위기반 분석방법들은 단순히 몇 가지 행위나 비순차적인 분석정보를 제공하기 때문에, 차후 악성여부를 최종 판단하는 방법론에 적용하기에는 그 분석정보가 충분하지 않다. 본 논문에서는 악성 실행파일이 실행되는 동안 발생할 수 있는 행위들을 분류하고, 이를 모니터링 하는 프로토타입 프로그램을 구현하였다. 또한, 악성 실행파일을 직접 실행하는 것은 제한된 컴퓨팅 환경에서 이루어지기 때문에, 실제 악성 실행파일을 모니터링 한 결과를 토대로 행위기반 모니터링 방법이 극복해야 될 이슈들에 대해서도 언급하고 있다.