• Title/Summary/Keyword: Security-threat act

Search Result 33, Processing Time 0.028 seconds

Analysis of True Nature of Taliban and Terror Threat to Korea (탈레반의 실체와 한국에 대한 테러위협 분석)

  • Choi, Kee-Nam
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.97-107
    • /
    • 2012
  • Our nation, of which the term of dispatching troops is winded up at the end of this year, is facing presidential election time including the nuclear security summit meeting in March, opening of EXPO in May, and the general election. Hence, the possibility to select our nation at the strategy forming public opinion of military withdrawal through Taliban's terror is high. It coincides with public affair strategy of Taliban terror and learning effect by the past cases. If the possibility of terror threat of Taliban along with this is summarized, the period of threat will concentrate on and be heightened in the first half when the nuclear security summit meeting and EXPO open in our nation, and target and method have high possibility of collision terror of bomb carrying vehicle and suicide bomb on national government organizations or American facilities, and etc, and possibility of kidnapping on our people such as oversea tourists, missionaries, and so on. Terror groups joining the criminal act is to use Islam illegal aliens who already acquire base in our nation or entry maneuver of specialized terrorists connected to Al-Qaeda. Pretext of such terror is withdrawal of our military and western allies stationed in Afghanistan. Therefore, publicity terror of Taliban against our people living overseas and security measure of international events such as the world nuclear security summit meeting, Yeosu EXPO, and etc in the first half of this year should be thoroughly prepared, domestic illegal aliens' movement should be comprehended, and measure blocking international terrorists' relating to Taliban infiltration into our nation should be sought for. Also, there is need of early announcement of government's political will on our military stationed in Afghanistan.

China's Maritime Strategy (중국의 해양전략)

  • Lee, Won-Bong
    • The Journal of Information Technology
    • /
    • v.12 no.1
    • /
    • pp.35-56
    • /
    • 2009
  • After Chinese reforms and market opening, China actively started working on ways to attach importance to the ocean and it's maritime strategy has been developed and carried out by external and internal factors. We can take two things as external factors attributed to China's marine strategy. The first one is maritime environment change in the East Asian region and the second one is the strategic importance of Taiwanese Straits and the South China Sea. And we can take about national strategy, security strategy, and change of foreign policy as internal factors. China recognizes the ocean as a major step to achieve a goal of national development. The main goal of China's marine strategy in the 21st century is to secure marine transportation and marine resources and to make peaceful maritime environment in the ocean to keep up with their economic development by opening itself to the world. China has strengthened their defense abilities to act against threat of national security by modernizing sea forces and increased national power by building up the marine power. It is expected that China will continue to seek more aggressive maritime strategy on matters of national security as well as pour heir efforts into making economic development and obtaining energy resources. This will also be one factor making new dynamics between countries in and around the East Asian region.

  • PDF

Legal Issues in Application of the ISPS Code under Marine Cargo Insurance (해상적하보험에서 국제선박 및 항만시설 보안규칙의 적용상 법률적 쟁점)

  • Lee, Won-Jeong;Yoo, Byung-Ryong
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.307-316
    • /
    • 2014
  • In view of the increased threat arising terrorism, the International Maritime Organization(IMO) adopted the International Ship and Port Facility Security Code (ISPS Code) which attached to the SOLAS Convention. The ISPS Code requires a comprehensive set of measures to enhance the security of ships and port facilities. For example, a shipowner must obtain the International Ship Security Certificate(ISSC). If the carrying vessel has not ISSC, the ship may be detained by the contracting governments. The Joint Cargo Committee(JCC) in London adopted the Cargo ISPS Endorsement, in which the assured who knowingly ships the cargoes on a non-ISPS Code compliant vessel will have no cover. However, where there is no the Cargo ISPS Endorsement in a Marine Cargo Insurance Policy and the cargo is carried by a non-ISPS Code certified vessel, the legal problem is whether or not it would constitute a breach of an implied warranty of seaworthiness and/or an implied warranty of legality. The purpose of this article is to analyze the potential legal issue on the relations between non-ISPS Code compliant vessel and two implied warranties under Marine Insurance Act(1906) in U.K.

A Research on the improvement of domestic IoT security certification system (국내 IoT 보안인증 제도 개선 연구)

  • Lee, Yongpil;Suh, YungJin;Lee, SangGeol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.79-92
    • /
    • 2021
  • In a society where ICT technology is converged, the use of various network-connected devices such as IoT is spreading. Network-connected devices are inevitably exposed to the threat of hacking such as information leakage, and countermeasures need to be prepared to respond. Security certification system for IoT devices has been introduced to promote security of IoT products, and for this purpose, legalization and standardization of certification standards and methods are in progress. In line with this, in Korea, as the Information and Communication Network Act was revised in 2020, ICT convergence devices connected to the network were newly defined as "information and communication network connected devices," and the basis for the security certification system is being established. We summarized related domestic and foreign trends and suggest specific considerations for implementing the security certification system for IoT devices in South Korea.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.

Crime prevention role and limitations of private security organizations (민간방범기구의 범죄예방 역할과 한계)

  • Gong, Bae-Wan
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.33-41
    • /
    • 2012
  • Important crime prevention is emphasized. Depending on the type of criminal act itself, but with many material and human damage because it is a threat to the safety of civil life. The traditional police power of the police in patrolling the derailment by the diversification of the crime, globalization, organizing, specialization, and ferocious anger by far exceeds the capabilities of the police crime prevention are occurring. Civilian police crime prevention organizations in the area of the region as a base for complementary activities, and even if the purpose of commercial availability, but many organizations is the autonomous and spontaneous personality voluntary work civic life is to serve as the safety fence. But that suits the role of these organizations and social support and lack of institutional support and practical and effective crime prevention activities has not been effective. Law reform and the role of the Organization for the maintenance of redundancy, or a series of systematic effort to equip networks and take advantage of the functional and has been factory.

A Study on the Analysis and Countermeasures of Security Vulnerabilities in Drone (드론의 보안 취약점 분석 및 대응방안 연구)

  • Son, Chung-Ho;Sim, Jaebum;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.355-358
    • /
    • 2016
  • Recently, As the interest of the drone has increased the fields such as broadcasting, disaster site and leisure which uses the drone has been constantly expanded. However, an invasion of a person's privacy and a threat of hacking attack also have increased as population of drone. High-resolution cameras mounted on drones can take a photo or real-time video anytime and anywhere. It causes the invasion of privacy from private houses, buildings, and hotels. In this paper, we perform a security vulnerability assessment tests on the camera's from common commercial drones and we propose the countermeasures to protect the drones against unauthorized attacker who attempts to access the drone's camera from internal or external. Through this research, we expect the Aviation Act and legislation accept the concept of security and provide the polices such as drones equipped with security devices from the production stage to promote drone industry.

  • PDF

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

Study on the Security Officials in the Study of the Working Environment and Education (경호공무원의 근무환경과 교육에 관한 연구)

  • Jo, Sung-Gu;Kim, Dong-Je;Choi, Jong-Gwang;Park, Ju-Hyeon
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.247-268
    • /
    • 2013
  • Country is security agencies with the launch of the Park Chung Hee government president security service act was enacted since installed successfully now undergoing a large-scale international events reborn professional Security agencies, including the North and the Northeast, but the conflict continues because of the national reduce the threat to the security without a destination. However countermeasures against these threats is emphasized, but in an effort to raise the country is security officials security agencies working environment and training for these studies have not performed in this study was started. In order to achieve this purpose, president security service and the seoul police agency personnel working in the field for 45 people who were interviewed, recently developed by utilizing Nvivo 8 program to improve working conditions in the analysis of organizational culture 51(78.46%), Image 7(10.93%), physical and mental 6(9.37%) were categorized, educational institutions in the direction of a police constable 56(76.71%), educational psychology 12(16.43%), theory of education 5(6.84%) were categorized as high. We look at the research results suggest that the authority of the president security service president security service officials in tissue culture officials were struggling to belong to an organization, you need to induce a change in culture has been raised, the current president of the Security Service, as well as specialized police constable training within the organization establish the necessary institutions respectively.

  • PDF