• Title/Summary/Keyword: Security law

Search Result 899, Processing Time 0.023 seconds

A Study on the Development about Crisis Control Analyzes and the Realities of VIP Terrorism (요인(要人)테러의 위기관리 사례분석 및 발전방향에 관한 고찰)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.235-259
    • /
    • 2007
  • These days our society, no matter it is individual or community or nation it has diversity big and small trouble and Terrorism, disaster that gives national crisis in many different ways. Before we dont think disaster is big problem in nation crisis but now we have to think seriously and put the disaster problem in nation crisis. Also security terrorism is important in national crisis just same as security of nation and disaster in national crisis management. Specially, attacking national sovereign and the head of the government are still increasingly and if deadly terror happens than nation will get big crisis and can get aftereffect. Accordingly way of development about crisis control in security terrorism, first of all, for make confrontation system because of crisis management, need judical revision about escort law and prevention of terror. Second of all, need exclusion of guard danger element for strengthening guard safe action. Third of all, strengthening education to people so increase ability of conquest in the scene. Finally, security terror not only directly purpose also indirectly purpose increase, need to development about guards way and need a strong will to reduce terrorism, also put emphasis on prevention guards action and before the fact make perfection more perfect in crisis control to removal element of terror.

  • PDF

A Study on the Feasibility of the Espionage Charges for the Industrial Technology Divulgence (산업기술의 해외유출행위에 대한 간첩죄 처벌 타당성 연구)

  • Kim, Hang-Gon;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.253-275
    • /
    • 2018
  • Economic security emerged as a strong element of national security. Nations around the world are exerting their efforts to collect economic intelligence to serve their national interest while making added efforts to uncover industrial espionage and arrest industrial spies in defensive aspect. Cases in point are the enactment of "Economic Espionage Act(1996)" of the U.S. and the "Act on Prevention of Divulgence and Protection of Industrial Technology(2006)"of Korea. Korea is trying to punish industrial spying on the same level as espionage that poses national security threat by revising Criminal Code. It is necessary to review whether the move to toughen the punishment of industrial spying from "up to 15 years in prison and/or up to 1.5 billion won in fine" to "minimum seven years of imprisonment, life imprisonment or death penalty" is appropriate. Advanced nations regulate industrial spying with a special act on economy although they have applied espionage act not to "enemy states" but to "foreign countries" in the first place. Likewise, preventing industrial spying by applying espionage act through the revision of criminal code poses a risk of undermining the autonomy of industry sector by excessive influence of state power. Furthermore, the penalty of minimum imprisonment of seven years, life imprisonment or death penalty with the application of espionage act under the criminal code is an legal application by stretching of the law, posing a risk of dampening healthy economic activities. Therefore, revising and applying relevant economic laws such as aforementioned 'Act on Prevention of Divulgence and Protection of Industrial Technology(2006)' is thought to be desirable to achieve the goal of protecting industrial technologies.

A Study on the policy counterplan of Cross Border Financial Information Transfer according to FTA (FTA 체결에 따른 금융정보 국외이전에 대한 정책적 대응방향 연구)

  • Lee, Jung-Hun;Park, Seok-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.117-130
    • /
    • 2011
  • In a situation where worldwide free trade between countries has expanded recently, our country is being rapidly pushed FTA agreements with the financial developed countries such as United States, EU. According to the agreement, the user information of foreign financial companies in Korea is expected to be transfered overseas. In this paper, we need to define the scope and the definition about the transfer of information and analyze the relating domestic and foreign laws preparing for Cross Border Financial Information Transfer. Also, we review the expected issues about the transfer of information divided into institutional and technical sectors and arc presented the policy implication such as differentiation of regulatory information, enactment and amendment of Personal Information Protection Law(Draft) and related regulations, ensuring the safety of financial companies, raise the standard guidelines of the transfer of information. We refers to the needs for policy formulation to differentiate our privacy information from financial information to protect the privacy of users. The proposed countermeasures in this paper is expected to be helpful the measures to prepare for other institutions such as banks and supervisory authorities prepare for the future Cross Border Financial Information Transfer according to PTA.

Study on the Appropriate Use of Weapons by Private Security Guards: Focusing on Public Crowded Places (민간 경비원(보안요원)의 정당한 무기사용 방안 연구: 다중이용시설을 중심으로)

  • Hangil Oh;Kyewon Ahn;Ye ji Na
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.936-949
    • /
    • 2023
  • On August 3, 2023, a brutal incident of unprovoked violence, termed as "Abnormal motivated crime," occurred in a multi-use facility, where retail and transportation facilities converge, near Seohyeon Station. The assailant drove onto the sidewalk, hitting pedestrians, and then entered a department store where a knife rampage ensued, resulting in a total of 14 victims. In the aftermath of this incident, numerous murder threats were posted on social media, causing widespread anxiety among the public. This fear was further exacerbated by the emergence of a "Terrorless.01ab.net" service. Purpose: This research aims to explore necessary institutional improvements for private security personnel who protect customers and employees in multi-use facilities, to enable them to perform their duties more effectively. Method: To assess the risk of Abnormal motivated crime, a time series analysis using the ARIMA model was conducted to analyze the domestic trends of such crimes. Additionally, Result: the study presents suggestions for improvements in the domestic security service law and emergency manuals for multi-use facilities. Conclusion: This is informed by a legal analysis of the indemnity rights for weapon use by private security guards abroad and their operational authority beyond weapon usage.

A study on the paradigm shift in National crisis management system and its functional, structural improvements : Focused on the construction of elite civil defense force (국가위기관리체계의 패러다임 변화와 기능 및 구조적 개선방안에 관한 연구 : 정예민방위대 구축을 중심으로)

  • Lee, Mi-Jeong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.137-161
    • /
    • 2012
  • There are some common and broad trends in National crisis management system around the world. This article considers that paradigm theoretically. 1) a shift from civil defense to civil protection, 2) 10 principles in sustainable National crisis management system, 3) the collaborative governance of crisis management. Some civil defense problems in National crisis management system are as follows; 1) obscurity of organizational identity through twofold function in civil defense, 2) ineffective organization in civil defense and disaster management system, 3) weakness of competencies in local government, 4) overlook of actual condition in communities and civil defense resources. This article suggests that to provide retired and active private security practitioners, retired law enforcement personnel, and retired military personnel to form a elite civil defense force and to find creative ways to address this pervasive threat which one reasonable and affordable solution would be for the government to take advantage of an existing resource.

  • PDF

Meanings and Tasks of the Three Revised Bills which Ease Regulations on the Use of Personal Information (데이터 3법 개정의 의미와 추후 과제)

  • Kim, Seo-An
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.59-68
    • /
    • 2020
  • In January 2020, the National Assembly passed the revisions of three bills which ease regulations on the use of personal information. The revised laws include the launch of an independent supervisory body, the arrangement of redundant regulations, and regulations for the development of the data economy. This paper analyzes the content and meaning of each law of the Three Revised Bills that Ease Regulations on the Use of Personal Information. And the future challenges outline three aspects: the establishment of a system to ensure the right to informational self-determination of privacy concerns, the establishment of a certification system and the presentation of reasonable guidelines, and the expectation of professional performance by the Personal Information Protection Commission.

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics

  • No, Byung-Gyu;Park, Doo-Soon;Hong, Min;Lee, Hwa-Min;Park, Yoon-Sok
    • Journal of Information Processing Systems
    • /
    • v.5 no.1
    • /
    • pp.33-40
    • /
    • 2009
  • Ever since the network-based malicious code commonly known as a 'worm' surfaced in the early part of the 1980's, its prevalence has grown more and more. The RCS (Random Constant Spreading) worm has become a dominant, malicious virus in recent computer networking circles. The worm retards the availability of an overall network by exhausting resources such as CPU capacity, network peripherals and transfer bandwidth, causing damage to an uninfected system as well as an infected system. The generation and spreading cycle of these worms progress rapidly. The existing studies to counter malicious code have studied the Microscopic Model for detecting worm generation based on some specific pattern or sign of attack, thus preventing its spread by countering the worm directly on detection. However, due to zero-day threat actualization, rapid spreading of the RCS worm and reduction of survival time, securing a security model to ensure the survivability of the network became an urgent problem that the existing solution-oriented security measures did not address. This paper analyzes the recently studied efficient dynamic network. Essentially, this paper suggests a model that dynamically controls the RCS worm using the characteristics of Power-Law and depth distribution of the delivery node, which is commonly seen in preferential growth networks. Moreover, we suggest a model that dynamically controls the spread of the worm using information about the depth distribution of delivery. We also verified via simulation that the load for each node was minimized at an optimal depth to effectively restrain the spread of the worm.

A Study on development of privacy indicators in the context of cloud service level agreement (클라우드 개인정보보호를 위한 SLA 지표 개발)

  • Kim, Jungduk;Park, Dae-Ha;Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2015
  • As the cloud services, the underlying technology of the digital convergence environment, have been widely adopted in the business, personal information protection has been recognized as one of the major issues to resolve. When cloud services are used to process the personal information, the personal information protection law speculates the establishment of a contract or service level agreement(SLA). This research presents 7 privacy indicators and 13 metrics which can be included in cloud SLA, based on the analysis of related regulation and standards and the SMART(Specific, Measurable, Action-oriented, Relevant and Timely) model. The proposed indicators are examined using the Focus Group Interview method in terms of materiality and feasibility. The results show that all the proposed indicators are meaningful and useful.

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.