• Title/Summary/Keyword: Threat Level

Search Result 359, Processing Time 0.025 seconds

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

Loss Aversion in International Environmental Agreements

  • Iris, Doruk;Tavoni, Alessandro
    • Environmental and Resource Economics Review
    • /
    • v.27 no.2
    • /
    • pp.363-397
    • /
    • 2018
  • We study the impact of loss-aversion and the threat of critical damages from insufficient pollutant abatement, which we jointly call threshold concerns, on the outcome of international environmental agreements. We aim to understand whether concerns for a critical level of damages induce cooperation among countries faced with the well-known free-riding problem, and yield sufficient emission reductions to avoid exceeding the threshold. Specifically, we focus on loss-averse countries negotiating under the threat of either high or low environmental damages. Under symmetry, when countries display identical degrees of threshold concern, we show that such beliefs have a positive effect on reducing the emission levels of both signatories to the treaty and non-signatories, leading to weakly larger coalitions of signatories than in the absence of reference dependence. We then introduce asymmetry, by allowing countries to differ in the degree of concern about the damages. We show that stable coalitions are mostly formed by the countries with higher threshold concerns. When enough countries exhibit standard preferences, the coalition size may diminish, regardless of the degree of concern by the others.

A Empirical Validation of Risk Analysis Model in Electronic Commerce (전자상거래환경에서 위험분석방법론의 타당성에 대한 연구)

  • 김종기;이동호;서창갑
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.61-74
    • /
    • 2004
  • Risk analysis model is systematic and structural process that considers internal security problems and threat factors of the information systems to find optimal level of security control. But, the risk analysis model is just only defined conceptually and there are not so many empirical studies. This research used structural equation modeling(SEM) research methodology with rigorously validated research instrument. Based on results of this study, risk analysis methodology was proved to be practically useful in e-commerce environment. Factors like threat and control were significantly related to risk. In conclusion, the results of this study can be applied to general situation or environment of information security for analyzing and managing the risk and providing new approach to comprehend concept of risk in e-commerce environment.

MND-AF application study for anti-drone system (안티드론 시스템의 국방아키텍쳐 프레임워크 적용 연구)

  • Lee, Dong Joon;Kwon, Hyeong Ahn;Kim, Ji Tae;Jung, Gil Hyun;Yang, Sang Woon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.17 no.2
    • /
    • pp.23-36
    • /
    • 2021
  • Recently, the rapid development of drones is increasing as a variety of threats to important facilities of the country. In order to build an anti-drone system that responds to drones with high technical characteristics, standardization is required in terms of operation, system, and technology. By applying the defense architecture framework, it contributes to the establishment of the optimal system by proposing a standardization plan for the operational and system perspectives of the anti-drone system by creating outputs equivalent to the stage of prior research on weapons systems. It is a prerequisite for building a drone system the operational concept of the anti-drone system, the definition of the drone threat, the function of each component, the interface, the definition of data flow, the system performance and effect scale, etc. Management, security officers, and equipment manufacturers of important national and public facilities on site expect that it will be used as an objective standard at the government level for the component technology of the equipment to respond to the drone threat and the performance required in the environment.

Consideration of Detection Range Test Results of Missile Approach Warning Equipment using UAV (UAV를 활용한 미사일접근경보 장비의 탐지거리 시험결과 고찰)

  • Byeongheon Lee;Jaeeon Kwon;Youngil Kim;Sungil Lee;Cheong Lee;Jangwook Hur
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.2
    • /
    • pp.213-221
    • /
    • 2024
  • Aircraft's operational effectiveness is reduced due to threats from enemy anti-aircraft weapons, which is a weak point. In particular, guided missiles, which pose a threat to aircraft, are rapidly developing due to technological advancements in seekers, and are classified as one of the important technologies in weapon systems. Missile approach warning equipment installed to ensure aircraft survivability detects guided missiles and provides relevant information to respond. Tests were conducted domestically to verify the detection level of missile approach warning equipment, and test results were presented under various test conditions.

E-BLP Security Model for Secure Linux System and Its Implementation (안전한 리눅스 시스템을 위한 E-BLP 보안 모델과 구현)

  • Kang, Jung-Min;Shin, Wook;Park, Chun-Gu;Lee, Dong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.391-398
    • /
    • 2001
  • To design and develop secure operating systems, the BLP (Bell-La Padula) model that represents the MLP (Multi-Level Policy) has been widely adopted. However, user\`s security level in the most developed systems based on the BLP model is inherited to a process that is actual subject on behalf of the user, regardless whatever the process behavior is. So, there could be information disclosure threat or modification threat by malicious or unreliable processes even though the user is authorized in the system. These problems can be solved by defining the subject as (user, process) ordered pair and by defining the process reliability. Moreover, when the leveled programs which exist as objects in a disk are executed by a process and have different level from the process level, the security level decision problem occurs. This paper presents an extended BLP (E-BLP) model in which process reliability is considered and solves the security level decision problem. And this model is implemented into the Linux kernel 2.4.7.

  • PDF

A Study on the Characteristics of Low-Level Wind Shear at Jeju International Airport from Go-Around Flight Perspective (항공기 복행사례를 통한 제주국제공항 저층 윈드시어의 특징 연구)

  • Cho, Jin Ho;Baik, Ho Jong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.1
    • /
    • pp.1-8
    • /
    • 2021
  • Low level wind shear, which often occurs at Jeju International Airport, is a phenomenon that occurs when the topological location and topographical characteristics of Jeju Island are combined with weather characteristics. Low level wind shears, which are caused by rapid changes in wind direction and wind speed, pose a threat to aircraft safety and also cause abnormal situations, such as aircraft go-around, diversion, and cancellation. Many meteorological studies have been conducted on weather patterns, occurrence periods and frequency of low level wind shears. However, researches related to aircraft operations are limited where here we study the similarities and differences between strong southwest winds and bidirectional tailwind type low level wind shears based on aircraft go-around cases at Jeju International Airport. The results are expected to be used to enhance safety when operating to Jeju International Airport, which includes pilot training that reflects the characteristics generated by wind changes, pilot prior notification, providing pilots with latest trends, and increasing extra fuel.

The Study of SWOT(Strength-Weakness-Opportunity-Threat) Analysis for Micro-robot Technology Development and Trend of S. Korea (SWOT분석을 통한 한국 마이크로 로봇의 발전방안)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.881-895
    • /
    • 2012
  • Micro-robots are utilized as useful tools in diagnosis and treatment of various human diseases. At present, lots of countries are developing and making many micro-robots. Government of S. Korea are trying to push ahead with the plan as technology policy, for the same reason. So this study examined about micro-robot technology development and trend of S. Korea, by using the method of SWOT(Strength-Weakness-Opportunity-Threat) analysis. As a result, the future policy for micro-robot of S. Korea is to further spur the development of new micro-robot technology and more improvement of the technology level of micro-robots registered by patent as 'micro-robot of bacterium base for lesion treatment' and 'micro-robot moved by compressive fluid'. Finally, It was already confirmed as high level, technology of 'micro-robot of bacterium base for lesion treatment' and 'micro-robot moved by compressive fluid' invented at S. Korea.

Assessment of Development and Opertation for Maritime Leisure in Mokpo Port using SWOT&AHP (목포항 요트산업 개발과 운영 주체 선정)

  • Jang, Woon-Jae;Keum, Jong-Soo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.451-456
    • /
    • 2005
  • This paper proposes an evaluation model to assessment of development and operation for maritime leisure in Mokpo Port.. The proposed model is combination of SWOT(Strength, Weakness, Opportunity, Threat) and AHP(Analytic Hierarchy Process) to evaluate development and operation for maritime leisure. The evaluation hierarchical structure is structured by ISM(Interpretive structural modeling) and composed of five level. At the third level, It combine SWOT into the assessment system. Strength and Weakness are internal factors. Opportunities and threats are external factors. There are economic and maritime leisure development in the model. There are three development and operation investment as Third-Sector, company, local organization. According to the results, the participants perceive prefer to strength and opportunity and found that the priority for the development and operation for maritime leisure of Third-Sector.

  • PDF