• Title/Summary/Keyword: Security major

Search Result 1,282, Processing Time 0.034 seconds

Extending Plans of the Role of ROK Navy vis-'a-vis the Expansion of Maritime Security Threats (해양안보위협의 확산에 따른 한국해군의 역할 확대방안)

  • Kil, Byung-ok
    • Strategy21
    • /
    • s.30
    • /
    • pp.63-98
    • /
    • 2012
  • Northeast Asia has a multi-layered security structure within which major economic and military powers both confront one another and cooperate at the same time. Major regional powers maintain mutually cooperative activities in the economic sphere while competing one another in order to secure a dominant position in the politico-military arena. The multifarious threats, posed by the North Korea's nuclear development, territorial disputes, and maritime demarcation line issues demonstrate that Northeast Asia suffers more from military conflicts and strifes than any other region in the world. Specifically, major maritime security threats include North Korea's nuclear proliferation and missile launching problems as well as military provocations nearby the Northern Limit Line(NLL) as witnessed in the Cheonan naval ship and Yeonpyong incidents. The ROK Navy has been supplementing its firm military readiness posture in consideration of North Korea's threats on the NLL. It has performed superb roles in defending the nation and establishing the Navy advanced and best picked. It also has been conducive to defend the nation from external military threats and invasion, secure the sea lanes of communications, and establish regional stability and world peace. In order to effectively cope with the strategic environment and future warfares, the ROK Navy needs to shift its military structure to one that is more information and technology intensive. In addition, it should consolidate the ROK-US alliance and extend military cooperative measures with neighboring countries in the Asia-Pacific region. Evolved steadily for the last 60 years, the ROK-US alliance format has contributed to peace and security on the Korean peninsula and in the Northeast Asian region. In conclusion, this manuscript contends that the ROK Navy should strive for the establishment of the following: (1) Construction of Jeju Naval Base; (2) Strategic Navy Equipped with War Deterrence Capabilities; (3) Korean-type of System of Systems; (4) Structure, Budget and Human Resources of the Naval Forces Similar to the Advanced Countries; and (5) Strategic Maritime Alliance and Alignment System as well as Domestic Governance Network for the Naval Families.

  • PDF

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.

The Study on Education and Training System for the Special Security Guards' Specialization (특수경비원 전문화를 위한 교육훈련제도 개선방향)

  • Kim, Jong-Woong;Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.69-89
    • /
    • 2008
  • As year passes, terrorism is gradually increasing. Its target has becom various and arbitary, and recently, terrorists are aiming for national major facilities wich include multiplex facilities. Although special security guards took charge of its defence system from 2002, they have failed to establish its system firmly due to some institutional inertia. And 'Professionalism' appeared to be the mattter, according to the spot-probe and interviews. The purpose of this essay is to devise measures to develop sepecial security system including its specialization through investigating current educational training system. In order to attain professionalism, establishment of new proffessional school, division of current education system(into common education and full-course education), and reinforcement of substantial inspection activity should be preceded. Moreover, inspection activity should include standards for engaging instructors, establishment of compilation committee for editorial supervision, and establishment of clear educational policy. I hope the developmental measures in this essay to be speedily actualized with endeavor from police, security association, academic circles.

  • PDF

The Effect of Class Satisfaction among Students in the Department of Security Services on Career Decision Efficacy (경호학과 학생들의 전공수업만족도가 진로 결정 효능감에 미치는 영향)

  • Paek, Kyung-Hwa;Ji, Chi-Hwan
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.19-33
    • /
    • 2009
  • This study attempted to investigate the effect of class satisfaction of the students majoring in the studies of security services on the efficacy of career decision. To do this, I chose 430 security services of the students majoring by the systematic stratified cluster random sampling as the subject of study. All data were analyzed the causal relationship of the collected equation. In order to do a data analysis used descriptive statistics analysis, t-test, one-way ANOVA and multiple regression analysis of SPSS. As a result, the following conclusion was drawn: First, it was found that there was not a statistically significant(learning factor, interpersonal relation, aptitude factor) difference in their major class satisfaction and career decision efficacy(goal choice, future plan, working information) according to gender. Second, it was found that there was a statistically signifiant difference in such factors as learning, interpersonal relations and aptitude, in relation to the difference in subfactor such as major class satisfaction and career decision efficacy. Third, it was found that the learning, aptitude and career factors of major class satisfaction had a statistically significant effect on the future plan. Fourth, it was found that he learning and career factors of major class satisfaction had a statistically significant effect on the resolution of the goal. Fifth, it was found that the aptitude and career factors of major class satisfaction had a statistically significant effect on job information. Sixth, it was found that the career factors of major class satisfaction had a statistically significant effect on the problem-solution. Therefore, we must first give priority to improve the class satisfaction. By doing this, we can raise the efficacy level of career decision.

  • PDF

A Study of WiMAX Security threats and Their Solution

  • Woo, Seon-mi;Jeong, Gisung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.66-74
    • /
    • 2016
  • In this study, we have discussed and illustrated the security issues of WiMAX technology including vulnerabilities, threats and some security solution. Both physical layer and data link layer have been considered. Jamming is a major threat in physical layer, and in data link layer we study an authentication problem and see the problem of some unencrypted messages leading to lack of confidentiality. Some of these vulnerabilities have been solved in the recent amendment of 802.16 and some still remain. Moreover WiMax is a new technology yet.

Analyses of Vulnerability and Security Mechanisms in Wireless Sensor Networks (무선센서네트워크에서의 취약성 및 보안 메카니즘의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.805-808
    • /
    • 2009
  • Security has become a major concern for many real world applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all these approaches are based on wellknown cryptographic algorithms. At the same time, performance studies have shown that the applicability of sensor networks strongly depends on effective routing decisions or energy aware wireless communication. In this paper, we analyses vulnerability and security mechanisms in wireless sensor networks.

  • PDF

Designing demand side education of information security professionals (수요자 중심의 정보보호 전문 인력 양성을 위한 교육과정 설계)

  • Lee, Jong Lark
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.99-106
    • /
    • 2013
  • There has been a lot of growth more than 10% in the information security industry. In accordance with the industrial growth, it increased needs for the information security manpower development as a national problem. But there is an imbalance between demand and supply of the information security manpower in terms of the quantity and quality. It is mainly caused by the curriculum of the information security is made considering for suppliers not for demanders. As a resolution to solve this problem, we suggest the curriculum of information security for vocational education and training. As the information security area is wide in view of required knowledge and technology, we design the curriculum by selecting major occupation type from the information security manpower distribution and products and then by investigating the job description using NCS(National Competency Standard). And we compared the curriculum to that of two or three year diploma courses in Korea.

Analysis of Education Training Program of Information Security Man Power in Domestic (국내 정보보호 교육 훈련 프로그램 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3725-3730
    • /
    • 2009
  • A serious disturbance of the 7.7 DDoS hacking gets a chance of raised awareness for importance of response countermeasure with current status of information security. The critical factor out of countermeasure of information security is the supply of information human power. In this paper, we review program of information security of domestic and foreign, from major courses of domestic university, and category of government about information security, and analyze security education training awareness program of human power in the information security area.

A study on the rules and policy of the maritime and aviation supply chain security (해상 및 항공물류보안의 법규 및 정책에 관한 연구)

  • Choi, Byoung-Kwon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.42
    • /
    • pp.247-274
    • /
    • 2009
  • The supply chain security programs are designed to prevent terrorist attacks on world transit system, and to help protect the passengers and workers who use these systems on a daily basis. as evidenced by the train bombings in London and Madrid in recent years, the threats to America's transit systems are real. After 9 11 terrors in 2001, security problem is appearing to every nations and international organizations main pending issue than any problem and various countermeasure is prepared. Security is the major issue in international trade, with significant potential costs and economic impact. So, We need to ensure that supply chain security does not become a new non-tariffs barrier. The aim of this study is to examine the international maritime and aviation law on the supply chain security. Also I review the supply chain security in U.S. and other countries.

  • PDF

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF