• 제목/요약/키워드: national security

검색결과 5,175건 처리시간 0.031초

대통령경호업무 경찰 이관에 대한 비판적 소고 (A Critical Review of the Transfer of Presidential Security Work to the Police)

  • 조성구
    • 시큐리티연구
    • /
    • 제58호
    • /
    • pp.177-194
    • /
    • 2019
  • 문재인 정부에서는 대통령경호를 전담하는 대통령경호실을 폐지하고 경찰청 산하 대통령경호국을 신설하여 경호업무를 이관하려고 시도한 바 있다. 현재 G7국가들은 모두 경찰이 주도적으로 경호체제를 유지하고 있어 한국의 대통령 경호도 경찰청으로 업무를 이관하는 정책이 논의될 수 있으나 다음과 같은 현실에 집중할 필요가 있다. 첫째, 현재 대통령경호 체계는 (1)대통령경호처의 근접경호(Inner Ring), (2) 경찰의 중간 경호(Middle Ring) (3)수도방위사령부의 외곽경호(Outer Ring)로 구분된 중첩된 경호 조직을 구성하고 있는데 대통령경호처를 폐지하면 계층성의 원리에 공백이 발생하게 된다. 둘째, 현재 대통령의 효율적인 경호를 위해 「대통령경호안전대책위원회」에서는 대통경 경호처에서는 업무조정의 역할을 하고 있는데, 경찰청이 대통령경호의 컨트롤타워가 된다면 대통령경호업무의 군사적, 외교적 측면까지 지휘통제가 가능할 것인지도 고려되어야 할 부분이다. 셋째, 현재 한국은 북한과의 휴전중으로 앞서 설명한 영국, 독일, 프랑스, 일본 등의 G7 국가와는 안보환경에 큰 차이가 있다는 점이다.

융합보안 관점에서 방위산업보안 개념 정립과 연구동향 분석 (Resaerch Trend and Cocentualization of Defense Industry Security From Convergence Security Perspective)

  • 우광제
    • 융합보안논문지
    • /
    • 제15권6_1호
    • /
    • pp.69-78
    • /
    • 2015
  • 산업스파이에 의한 핵심기술 유출이 점차 지능화, 첨단화, 복잡화 되어가고 있으며 이로 인한 피해 또한 심각해지고 있다. 이러한 상황에 대응하는 방안으로 융합보안이 대두되었고 모든 산업분야에 점차 확대되고 있다. 특히 국가적 핵심기술과 인력 및 시설을 포함하고 있는 방위산업은 융합보안이 더 요구되는 산업분야이다. 방위산업은 국가의 안전보장에 필요한 방위산업물자를 연구, 개발, 생산하는 산업이다. 방위산업은 군사기밀, 산업비밀, 핵심기술인력, 방위산업물자, 국가중요시설, 정보통신체계 등 다양한 보안요소를 포함하고 있다. 방위산업보안은 군사보안과 산업보안의 복합체이며 방위산업의 모든 보안요소를 통합하는 융합보안이다. 따라서 방위산업보안은 융합보안의 대표적인 실천모델이라고 할 수 있다. 방위산업보안에 대한 연구는 일반적인 다른 산업분야에서의 보안과 관련된 연구에 비해 미흡한 실정이다. 방위산업의 핵심기술 유출을 방지하고 기술인력 및 시설을 보호하기 위해서, 방위산업보안을 융합보안의 개념에서 연구하고 실천하는 노력이 절실한 시점이다.

국가핵심기술을 보유한 기업의 물리보안수준이 보안성과와 업무효율성에 미치는 영향 (Effect of Physical Security Level of Companies with National Core Technology on Security Performance and Work Efficiency)

  • 장예진;최정일
    • 융합보안논문지
    • /
    • 제22권5호
    • /
    • pp.81-87
    • /
    • 2022
  • 본 연구의 목적은 국가핵심기술을 보유하고 있는 기업들의 물리보안수준이 보안성과와 업무효율성에 미치는 영향을 분석하는데 있다. 이를 위해 보안요원 200여명을 대상으로 한 달 동안 설문조사를 실행하였다. 설문조사에서 독립변수는 물리보안수준, 매개변수는 보안성과, 종속변수는 업무효율성으로 선정하였다. 신뢰도 분석과 타당성분석, 판별타당성분석 등을 SPSS를 통해 인과관계를 분석한 결과 "물리보안수준 ⇒ 보안성과, 보안성과 ⇒ 업무효율성"는 채택되었으나 "물리보안수준 ⇒ 업무효율성"은 기각되었다. 따라서 물리보안수준이 매개변수인 보안성과를 거쳐 업무효율성에 영향을 주는 것으로 조사되었으나 물리보안수준이 직접 업무효율성에 영향을 미치지 않는 것으로 나타났다. 향후 업무효율성을 향상시키기 위해서는 보안성과를 높이는 것이 우선되어야 할 것이다.

The Economic Security System in the Conditions of the Powers Transformation

  • Arefieva, Olena;Tulchynska, Svitlana;Popelo, Olha;Arefiev, Serhii;Tkachenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.35-42
    • /
    • 2021
  • In the article, the authors investigate the economic security system in the conditions of the powers transformation. It is substantiated that economic security acts as a certain system that includes components and at the same time acts as a subsystem of the highest order. It is determined that the economic security system of regions acting as a system has its subsystems, which include: production, financial, environmental, innovation, investment and social subsystems. The parameters of the economic security system include relative economic independence, economic stability and self-development of economic systems, and it is proved that an important feature of economic security in addition to its systemic nature is multi-vector. It is substantiated that the monitoring of ensuring the economic security system of the development of economic systems of different levels in the conditions of the powers transformation should contain the analysis of social, economic and ecological development of regions; spheres of possible dangers of the development of regional economic systems; the nature of the threats; the degree of the possibility of threats; time perspective of economic development threats; possible consequences of losses for economic entities; the impact of threats to the object of the economic entities' activity; possible asymmetry of economic development of regional economic entities. Possible threats as a consequence of the powers transformation have been identified. A PEST analysis of the impact of factors of different nature on economic security and the development of regional economic systems in the powers transformation is carried out. A recurrent ratio is proposed for the economic security system in the conditions of the powers transformation.

수중 음파 센서네트워크에 기존 네트워크 보안을 적용하기 위한 고려사항과 논쟁점 (Considerations and Issues for Applying the Existing Network Security to Underwater Acoustic Sensor Networks)

  • 신동현;이승준;김창화
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.1940-1950
    • /
    • 2017
  • The security threat types in underwater communication networks environment are almost the same as the terrestrial, but the security of mechanisms the terrestrial RF-based networks environment can not be directly applied due to not only the limited resources of each node but also unsafe channel such as low propagation delay, high bit error rate etc. Nevertheless there has not been much research on the security of underwater acoustic communication networks. Therefore, in this paper analyzes the differences between the terrestrial communication networks and underwater acoustic communication networks, and identifies issues that are the starting points of underwater communication networks security research.

Personnel Security System in the Context of Public Administration

  • Kryshtanovych, Myroslav;Dragan, Ivan;Chubinska, Nataliia;Arkhireiska, Natalia;Storozhev, Roman
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.248-254
    • /
    • 2022
  • The main purpose of the study is to analyze the main aspects of personnel security in the context of the public administration system. Today the civil service is the central link in increasing the efficiency of the public administration system. One of the most important directions of reforming the civil service is strengthening personnel security, since the level of formation and implementation of managerial decisions depends on the staff of professional employees with the necessary qualities, competencies and competencies. As a result, the main aspects of personnel security in the context of public administration were analyzed.

Modernization determinants by ensuring economic security of enterprises in the competitive conditions

  • Tkachenko, Tetiana;Tulchynska, Svitlana;Kostiunik, Olena;Vovk, Olha;Kovalenko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.119-126
    • /
    • 2021
  • The study develops methodological aspects for modeling the determining impact of modernization on the enterprise's economic security in development competitive conditions using the model of speed, stability and spaciousness of modernization. Modeling the determining impact of modernization on the enterprise's economic security in a competitive conditions involves: firstly, the formation of estimated modeling indicators in accordance with the speed, stability and spaciousness of the enterprise's modernization; secondly, establishing the weight of indicators in the assessment system using the tools of cognitive judgment; thirdly, the establishment of reference values of sound evaluation indicators; fourthly, the calculations of the integrated impact assessment of the modernization's determining impact modeling on the enterprise's ensuring economic security in a competitive conditions; fifthly, conducting calculations and analytical summarization of the results. To determine a comprehensive integrated indicator of the modernization changes impact on the competitiveness and economic security of enterprises, we use the correlation method of the calculated value with the reference value, as well as use weights for groups of calculations. Approbation of modeling of determining influence of modernization on maintenance of economic safety of the enterprise in competitive conditions of development by authors was carried out concerning such enterprises, as: JSC "Ukrzaliznytsia", SE "Ukraerorukh", SE IA "Boryspil", SE "Ukrposhta", KP "Kyivpastrans".

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions

  • Kim, Nam Yong;Rathore, Shailendra;Ryu, Jung Hyun;Park, Jin Ho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제14권6호
    • /
    • pp.1361-1384
    • /
    • 2018
  • Recently, Cyber Physical System (CPS) is one of the core technologies for realizing Internet of Things (IoT). The CPS is a new paradigm that seeks to converge the physical and cyber worlds in which we live. However, the CPS suffers from certain CPS issues that could directly threaten our lives, while the CPS environment, including its various layers, is related to on-the-spot threats, making it necessary to study CPS security. Therefore, a survey-based in-depth understanding of the vulnerabilities, threats, and attacks is required of CPS security and privacy for IoT. In this paper, we analyze security issues, threats, and solutions for IoT-CPS, and evaluate the existing researches. The CPS raises a number challenges through current security markets and security issues. The study also addresses the CPS vulnerabilities and attacks and derives challenges. Finally, we recommend solutions for each system of CPS security threats, and discuss ways of resolving potential future issues.

A Study on the Enhancement of Maritime Security in Korea Maritime Jurisdiction

  • Lee Eun-Bang;Yun Jong-Hwui
    • 한국항해항만학회지
    • /
    • 제29권7호
    • /
    • pp.619-625
    • /
    • 2005
  • The security vulnerabilities in Korea maritime domain were mentioned and analysed with the static data of crimes relating to maritime security. The counterterrorism and initiatives to reduce the security risk and to minimize the damage are introduced and evaluated. The maritime security strategy and the near term initiatives to enhance the non-military security at Korean sea and ports are proposed in order to response maritime security threats economically, efficiently and safely.

정보보호 교육이 청소년의 정보보호 실천에 미치는 영향 (Effects of Information Security Education on the Practice of Information Security for the Youth)

  • 강민성;김태성;김택영
    • Journal of Information Technology Applications and Management
    • /
    • 제26권2호
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.