• Title/Summary/Keyword: Security training

Search Result 977, Processing Time 0.028 seconds

A Study on the Comparison between 「SECURITY SERVICES INDUSTRY ACT」 and 「ACT ON THE PROTECTION, ETC. OF TEMPORARY AGENCY WORKERS」 among Security Guards (「경비업법」상 경비원과 「파견근로자보호 등에 관한 법률」상 경비원의 비교에 관한 연구)

  • Noh, Jin Keo;Choi, Kyung Cheol;Lee, Young Ho
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.143-167
    • /
    • 2018
  • According to the Security Services Industry Act security guards are not just workers but security-related service workers complementing the lack of police force and specializing in protecting of national important facilities, industrial facilities and apartment houses. Nevertheless, confusing or mixing the security service workers in "Security Services Industry Act" with the guards in the "Act on the Protection etc. of Temporary Agency Workers" lead to a constant debate about the scope of work of security guards. In the case of security service workers in "Security Services Industry Act" there is a strict limitations on security service worker's qualification such as strict reasons for disqualification, a need to pass training for new workers and qualification training, a need to report to the competent chief police officer if the security guard has placed or unplaced by the security service company. It distinguishes security service workers in "Security Services Industry Act" from the guards in the "Act on the Protection etc. of Temporary Agency Workers" and acknowledges the occupation of security service worker as a professional service worker. Therefore, security service workers in "Security Services Industry Act" shouldn't be obliged to do any other work than security work. If it is required to do other work than security work contract by the "Security Services Industry Act" doesn't apply but need to use a security guard according to "Act on the Protection etc. of Temporary Agency Workers" or hire a security guard on the employment contract. In this way, when security service workers in "Security Services Industry Act" are recognized as professional security related workers, the entire security industry can ultimately develop.

Development of Measurement Tools for Success and Failure Factors of Education and Training of Korean Bodyguard

  • Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.199-206
    • /
    • 2020
  • This study was conducted for the purpose of developing a measurement tool for success and failure factors of education and training of Korean bodyguards. conducted a meeting from the fully open questionnaire at first, and then formed the semi-structured questionnaire, finally carried out the survey from the closed questionnaire and analyzed data from SPSS 21.0, AMOS 21.0 and developed the measurements. It was conducted from May, 2019 to December, 2019. This survey was conducted of 150 security guards after the verification of the content validity though the pilot survey and presented the success attribution factors and standards on the basis of the result form this survey. As a result, the success factors of the training of the bodyguards were accidental education (5 item), vocational mental education (2 item), vocational mental education (2 item), work ability enhancement education (2 item), realistic practical education (2 item) ), Including 4 items, 11 items, The failure factors consisted of 12 item of three factors: formal education and training (5 item), lack of leadership qualities (4 item), and lack of education (3 item).

Application Consideration of Machine Learning Techniques in Satellite Systems

  • Jin-keun Hong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.48-60
    • /
    • 2024
  • With the exponential growth of satellite data utilization, machine learning has become pivotal in enhancing innovation and cybersecurity in satellite systems. This paper investigates the role of machine learning techniques in identifying and mitigating vulnerabilities and code smells within satellite software. We explore satellite system architecture and survey applications like vulnerability analysis, source code refactoring, and security flaw detection, emphasizing feature extraction methodologies such as Abstract Syntax Trees (AST) and Control Flow Graphs (CFG). We present practical examples of feature extraction and training models using machine learning techniques like Random Forests, Support Vector Machines, and Gradient Boosting. Additionally, we review open-access satellite datasets and address prevalent code smells through systematic refactoring solutions. By integrating continuous code review and refactoring into satellite software development, this research aims to improve maintainability, scalability, and cybersecurity, providing novel insights for the advancement of satellite software development and security. The value of this paper lies in its focus on addressing the identification of vulnerabilities and resolution of code smells in satellite software. In terms of the authors' contributions, we detail methods for applying machine learning to identify potential vulnerabilities and code smells in satellite software. Furthermore, the study presents techniques for feature extraction and model training, utilizing Abstract Syntax Trees (AST) and Control Flow Graphs (CFG) to extract relevant features for machine learning training. Regarding the results, we discuss the analysis of vulnerabilities, the identification of code smells, maintenance, and security enhancement through practical examples. This underscores the significant improvement in the maintainability and scalability of satellite software through continuous code review and refactoring.

Modern Pedagogical Technologies: Optimization And Provision Of Educational Activities

  • Pustovalov, Serhii;Kliuchko, Yuliia;Chukhrai, Liubov;Behal, Tetiana;Cherniakova, Zhanna;Genkal, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.81-84
    • /
    • 2021
  • The article substantiates the need to use innovative pedagogical technologies as an effective mechanism for implementing the idea of advanced vocational education, highlights the main components of the idea of anticipation, highlights the experience of using modern technologies in institutions of secondary vocational education. The purpose of the study is to increase the level of professional training of qualified workers and specialists through the effective choice of methodological tools aimed at the formation of professional competencies on the basis of an educational institution.

Preparing Future Specialists of Preschool Education for the Development of Conscious Citizenship and Environmental Values of Students

  • Ivanchuk, Sabina;Dronova, Olga;Vozniuk, Anna;Myskova, Nataliia;Nepomniashcha, Iryna;Sych, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.279-283
    • /
    • 2022
  • The main purpose of the study is to analyze the specifics of training future preschool education specialists for the development of conscious citizenship and environmental values of students. The methodology includes a number of theoretical methods of analysis. The importance of the issue of professional training of a specialist in a preschool institution is proved, along with an increase in the general and professional culture of a teacher, his readiness to work in alternative institutions for preschool children, it is necessary to develop creative pedagogical thinking, independence, motivational and value attitude to the profession, readiness for further self-education. Based on the results of the research, the key aspects of training future preschool education specialists for the development of conscious citizenship and environmental values of students were determined.

The Use of Innovative Distance Learning Technologies in the Training of Biology Students

  • Biletska, Halyna;Mironova, Nataliia;Kazanishena, Natalia;Skrypnyk, Serhii;Mashtakova, Nataliia;Mordovtseva, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.115-120
    • /
    • 2022
  • The main purpose of the study is to identify the key aspects of the use of innovative distance learning technologies in the training of biology students. Currently, there is a modernization, the evolution of the education system from a classical university to a virtual one, from lecture material teaching to computer educational programs, from a book library to a computer one, from multi-volume paper encyclopedias to modern search databases. During studies in higher education, distance learning ensures the delivery of information in an interactive mode through the use of information and communication technologies. The main disadvantage of distance learning is the emotional interaction of the teacher with students. It is necessary to increase the level of methodological developments for independent studies of students. The methodology includes a number of theoretical methods. Based on the results of the study, the main elements of the use of innovative distance learning technologies in the training of biology students were identified.

The Teacher's Role in the Context of Information Society

  • Dmitrenko, Natalia;Voloshyna, Oksana;Melnyk, Liudmyla;Hrebenova, Valentyna;Mazur, Inna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.187-193
    • /
    • 2022
  • The study deals with the problem of transformation of the teacher's role in the information society. A comparative analysis of the competencies of the teacher, declared in the Pedagogical Constitution of Europe, the documents of the New Ukrainian School, the scientific research of contemporary scholars was conducted. The correlation analysis of the survey results for teachers and students' parents on their expectations of contemporary teachers was presented. It was noted that the analyzed views of scientists, legislative documents, and the results of sociological research help to modify the educational process of competitive and effective prospective teachers' training. Based on the survey results the acmeograms of the teacher's main role positions as an orientation for training of prospective teachers were developed.

Effectiveness of A Proposed Program for Training Social Studies Teachers in the Light of Electronic Functional Competencies

  • Atef Mohamed Saied, Abdallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.139-145
    • /
    • 2022
  • The study aimed to build a proposed program for training Social Studies teachers in the light of electronic functional competencies, the researcher used the experimental method with a quasi-experimental design, the study sample consisted of (37) Social studies teachers in Ismailia. A proposed program in the light of electronic functional competencies. A measure of awareness of the dimensions and components of electronic feasibility. The study concluded several results: There is a statistically significant difference at the level of (a ≤0.01) between the average scores of the teachers of the research group in the pre and post measurements of the measure of awareness of the dimensions and components of electronic functional competencies in favor of the teachers scores in the post-measurement. Training Social studies teachers on the functional electronic competencies necessary for them to keep up with educational developments.

A Scheme of Training the MND Information Security Manpower (국방 정보보호 인력 양성 방안)

  • 박상서;최운호
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.69-81
    • /
    • 2001
  • As soon as possible, our military have to trainning the information security manpower for Cyber Warfare, it should be block the foreign infowarrior to go by way of other country from our system. An emergency, we can protect our military information system and this thesis provide checkpoint about how we consider about trainning the infowarrior for future war.

  • PDF

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.