• 제목/요약/키워드: Security organization

검색결과 976건 처리시간 0.034초

신라가 대백제전시(서기 660년) 투입하였던 부대수, 병력수, 부대편제, 전투대형 (The com.mit.ted unit, the strength, The Organization, and The battle formation of the Silla Force During the Silla-Baekche War at 660 A.D)

  • 윤일영
    • 안보군사학연구
    • /
    • 통권5호
    • /
    • pp.393-599
    • /
    • 2007
  • In order to restore the Hwangsanbeol Combat at present, it is necessary to make a close examination on the name of the military cops, the number of units, and the numerical strength, an unit organization, and a combat formation. Based on Samguksagi, Samgukyusa, other historical documents and military history information, I tried to restore the Hwansanbeol Combat as follow. The Shilla, at the 7 year of Mooyeol Dynasty, AD. 660, maintained 35 military units. The Shilla committed18 military units from among 35 units to battle against Baekje at the 7 Year of Mooyeol Danasty. The names ofmilitary units are as follow: 1) Daedang, 2) Sangjoojeong, 3) Hajoojeong, 4) Seodang, 5) Nangdang, 6) Eumlihwajeong, 7) Samryanghwajeong, 8) Sosarnjeong, 9) Namcheonjeong, 10) Leehwahaejeong, 11) Kaegeumdang, 12) Geupdang, 13) Nodang, 14) Woonjaednag, 15) Chungdang, 16) Suktoodang, 17) Gwidang, and 18) Soogun. The numerical strength, which the Shilla maintained at the year of A.D. 660, was total 106,353 persons from 35 military units. Shilla committed 57,433 military personnel to combats against the Great Baekche. Ground Forces from the 57,433 personnel were 58,343 persons, and the naval forces were 9,100 persons. Finally, 2,602 persons from among the 9,100 naval forces were only combating forces, and non-combat forces were 6498 persons.

  • PDF

AVOIDITALS: Enhanced Cyber-attack Taxonomy in Securing Information Technology Infrastructure

  • Syafrizal, Melwin;Selamat, Siti Rahayu;Zakaria, Nurul Azma
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.1-12
    • /
    • 2021
  • An operation of an organization is currently using a digital environment which opens to potential cyber-attacks. These phenomena become worst as the cyberattack landscape is changing rapidly. The impact of cyber-attacks varies depending on the scope of the organization and the value of assets that need to be protected. It is difficult to assess the damage to an organization from cyberattacks due to a lack of understanding of tools, metrics, and knowledge on the type of attacks and their impacts. Hence, this paper aims to identify domains and sub-domains of cyber-attack taxonomy to facilitate the understanding of cyber-attacks. Four phases are carried in this research: identify existing cyber-attack taxonomy, determine and classify domains and sub-domains of cyber-attack, and construct the enhanced cyber-attack taxonomy. The existing cyber-attack taxonomies are analyzed, domains and sub-domains are selected based on the focus and objectives of the research, and the proposed taxonomy named AVOIDITALS Cyber-attack Taxonomy is constructed. AVOIDITALS consists of 8 domains, 105 sub-domains, 142 sub-sub-domains, and 90 other sub-sub-domains that act as a guideline to assist administrators in determining cyber-attacks through cyber-attacks pattern identification that commonly occurred on digital infrastructure and provide the best prevention method to minimize impact. This research can be further developed in line with the emergence of new types and categories of current cyberattacks and the future.

Organization of Independent Work of Students of Higher Pedagogical Universities of Ukraine by Means of Moodle

  • Alla, Lukіianchuk;Dmytro, Yefimov;Oksana, Biletska;Andrii, Hrytsenko;Oxana, Hevko
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.421-426
    • /
    • 2022
  • This study aimed to determine the effectiveness of the Moodle system in the organization of independent work of students of pedagogical profile.The purpose of the article is to analyze the Moodle platform as an innovative element of educational and pedagogical strategies and a component of the educational and methodological content for the self-study of students.Methodology is divided into clusters: general scientific (analysis, classification), ICT methods (modeling, informatization), and philosophical (synergetics). The study revealed the reorientation of Moodle from an auxiliary element to an alternative format in the organization of independent work of student teachers. Prospects for further scientific research determined in the interest of all participants in the educational process in the further development of Moodle as an effective tool for self-education of future teachers.

A New Approach to Load Shedding Prediction in GECOL Using Deep Learning Neural Network

  • Abusida, Ashraf Mohammed;Hancerliogullari, Aybaba
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.220-228
    • /
    • 2022
  • The directed tests produce an expectation model to assist the organization's heads and professionals with settling on the right and speedy choice. A directed deep learning strategy has been embraced and applied for SCADA information. In this paper, for the load shedding expectation overall power organization of Libya, a convolutional neural network with multi neurons is utilized. For contributions of the neural organization, eight convolutional layers are utilized. These boundaries are power age, temperature, stickiness and wind speed. The gathered information from the SCADA data set were pre-handled to be ready in a reasonable arrangement to be taken care of to the deep learning. A bunch of analyses has been directed on this information to get a forecast model. The created model was assessed as far as precision and decrease of misfortune. It tends to be presumed that the acquired outcomes are promising and empowering. For assessment of the outcomes four boundary, MSE, RMSE, MAPE and R2 are determined. The best R2 esteem is gotten for 1-overlap and it was 0.98.34 for train information and for test information is acquired 0.96. Additionally for train information the RMSE esteem in 1-overlap is superior to different Folds and this worth was 0.018.

The UNESCO Action Plan and 2030 Agenda of Sustainable Development Goals for Climate Change

  • Thriveni, Thenepalli;Ramakrishna, Chilakala;Habte, Lulit;Ahn, Ji Whan
    • 에너지공학
    • /
    • 제27권2호
    • /
    • pp.89-94
    • /
    • 2018
  • UNESCO is an international specialized agency based on the United Nations (UN) located in the Paris. The United Nations Educational, Scientific and Cultural Organization abbreviated as UNESCO. The mission and goal of UNESCO are to maintain the peace and security throughout the globe by encouraging international collaborations through educational, scientific, and cultural heritage in order to increase respect for principals of justice, international rules of law, and international human rights. Recently, the UNESCO published a new set of 17 goals for the nation's sustainable society. The Organization ensures to actively participate in UN activities to improve harmony and planning within the United Nations system. The 2030 agenda is primarily about shifting the world on to a sustainable and most in-depth. Currently, UNESCO launched broad goals and objectives for the international community including the Millennium Development Goals (MDGs). Among these sustainable goals, climate change, water security is more significant. In this paper, we briefly reviewed the seventeen goals by UNESCO.

위험분석모델의 정보시스템 구축방법론 적용에 관한 연구 (The Study of Developing an Index for Evaluating)

  • 박동석;안성진;정진욱
    • 융합보안논문지
    • /
    • 제2권2호
    • /
    • pp.67-75
    • /
    • 2002
  • 조직의 정보시스템이 직면한 위험을 분석할 수 있는 위험분석모델을 정보시스템구축 방법론에 적용하여 정보시스템 구축을 진행하면서 위험분석 결과를 반영할 수 있도록 하였다. 위험분석은 조직의 정보자산에 대한 위협과 취약성, 그리고 대응책간의 함수관계를 활용하는 방법으로 조직이 보유한 정보자산에 내재한 취약성의 영향범위와 이에 대응하고 있는 위협의 빈도와 강도 그리고 위협에 대한 대응책의 적용정도를 분석해 종합적인 정보위험수준을 평가하는 방법이다.

  • PDF

영국 치안기구의 역할분담에 관한 고찰 (A study on the Role Sharing Policing Organization in Britain)

  • 서진석
    • 시큐리티연구
    • /
    • 제3호
    • /
    • pp.117-144
    • /
    • 2000
  • Not only has there been movement along the sectoral continuum, Johnston argues, but changes in the spatial balance of policing are also visible. More concretely, he suggests that British policing has been undergoing a century-long process that has gathered pace since the 1960s. Three factors have been central to this process. First, legislative centralization brought about by the Police Act 1964 - which established the tripartite structure for police governance and amalgamated forces - and the Local Government Act 1972 which reorganized local government. Secondly, the political and industrial unrest of the 1970s and early 1980s led to the establishment of new levels of national police co-operation and, in the words of one author, to the establishment of a 'de facto national police force'. Thirdly, increasing European influence has further internationalized police co-operation and organization. Johnston concludes that the spatial restructuring that appears to be taking place in British policing is indicative of a broader process of fragmentation of social structures and systems for maintaining order.

  • PDF

Electronic Proceedings in Modern Legal Conditions

  • Veselovska, Nataliia;Slipeniuk, Vasyl;Yasynok, Dmytro;Zhukevych, Ihor;Gorbenko, Arina
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.224-228
    • /
    • 2021
  • The article is devoted to the problems and prospects of integration of informational technologies in the administration of justice as a necessary component of the development of the informational society in Ukraine. In general, informational technologies make it possible to create new forms of organization and interaction of bodies of public authorities with society, to introduce innovative solutions for legal regulation and organization of public relations. More and more services for citizens are moving to electronic format. Judicial reform is aimed at ensuring more comfortable and convenient interaction with the courts. The need for the usage of informational technology in the proceedings is preconditioned by the global informatization of modern society, the development of new forms of interaction in the civil sphere with the usage of electronic means of communication: the global Internet, mobile, and satellite communication systems and more. "Electronic justice" involves the use of information and communication technologies in the implementation of procedural law.

Modern Technologies of Personnel Management in the Conditions of Digital Economy Development

  • Boikivska, Galyna;Mokhonko, Ganna;Andrushkiv, Roman;Lytvynova, Larysa;Guk, Olga
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.283-289
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern technologies in the personnel management system in the context of the development of the digital economy. The human factor is one of the most important resources of any organization, which has a significant impact on the success of its activities. It is people who are the source of advantages that provide the company with victory in the competition. Therefore, the primary task of the organization's management should be the formation of effective personnel management systems. As a result, the main features of the introduction of modern technologies into the personnel management system in the context of the development of the digital economy were identified.

Integrated Security Management Framework for Secure Networking

  • Jo, Su-Hyung;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2174-2177
    • /
    • 2003
  • Internet is exposed to network attacks as Internet has a security weakness. Network attacks which are virus, system intrusion, and deny of service, put Internet in the risk of hacking, so the damage of public organization and banking facilities are more increased. So, it is necessary that the security technologies about intrusion detection and controlling attacks minimize the damage of hacking. Router is the network device of managing traffic between Internets or Intranets. The damage of router attack causes the problem of the entire network. The security technology about router is necessary to defend Internet against network attacks. Router has the need of access control and security skills that prevent from illegal attacks. We developed integrated security management framework for secure networking and kernel-level security engine that filters the network packets, detects the network intrusion, and reports the network intrusion. The security engine on the router protects router or gateway from the network attacks and provides secure networking environments. It manages the network with security policy and handles the network attacks dynamically.

  • PDF