• Title/Summary/Keyword: security plan

Search Result 979, Processing Time 0.029 seconds

Tasks and Development plan of R.O.K. Navy to support Korean government's 『Indo-Pacific Strategy』 (한국의 『인도-태평양 전략』 지원을 위한 해군의 역할·발전방안 고찰)

  • Ji, Young
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.83-107
    • /
    • 2023
  • To Republic of Korea in the Indo-Pacific region, the stability and prosperity of the area are directly coupled with national survival, interest. Currently, on account of strategic competition between U.S.A, and China in this area as well as supranational·non-conventional threats, the security environment is unstable, required joint/allied responses. So, lots of states inside(U.S.A., Japan, ASEAN, etc.), also, out of this Indo-Pacific area like EU-NATO, open their own strategy related in Indo-Pacific issues to be involved. R.O.K. government took its own line with publishing self strategy following this international trend, it can be shown korean government's strong intend to join in the pending security issues in this region with 'strategic clarity'. Now, R.O.K. Navy has to back up governments, policy. First, R.O.K. Navy should strengthen the relationship inside and take part in the multilateral cooperation of security. Second, to convey this deterrence message to potential threats, Navy is required to show of forces and have combined exercises. Also, as naval forces of advanced countries, Korea, Navy should be taken action in non-traditional threats, and help developing states improve their sea power. To fulfill this tasks in the wide ocean area, Navy need five inherent characteristics(mobility, flexibility, sustainability, capability of presence and projection). In the end, this paper propose the development plan following operational environment (SWOT) analysis as well.

  • PDF

The Study about Role and Importance of Site Activity Stage in Safety Activity for the International Conference among Several Countries (다자간 국제회의 안전활동에 있어서 현장활동단계의 역할 및 중요성에 관한 연구 : 부산 APEC 행사를 중심으로)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.105-138
    • /
    • 2009
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference among Several Countries which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Busan in 2005. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role and importance of site activity stage for international conference among several countries are as followings ; First, the system that experienced security-enforcement agents can be selected for the next national security event is needed, by data-basing the security-enforcement agents who were experienced in security event as man power management. Second, the middle-term plan for the introduction of high-tech equipment and joint inspection with relevant security agents are needed for the efficient explosive technical detection. Third, high-tech security equipment could be introduced through the international high-tech security equipment exhibition. Fourth, an anti-terrorism plan should be measured by sharing information through the cooperation with domestic and international intelligence agency. Fifth, public relations should be measured systematically by organization rather than agents' individual public relations. Sixth, political consideration to secure integrative coordination with other agency is needed for security activity, through normal cooperation with fire fighting related agency such as an electric, gas, elevator company. Seventh, a definite press guideline is needed for a convenient news coverage and safety during security event.

  • PDF

Security Stress Management Plan for Military Soldiers (군 장병의 보안 스트레스 관리방안)

  • Lee Tae Bok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.61-67
    • /
    • 2024
  • Soldiers serving in military units and institutions are subject to strict security policies and technologies because they handle sensitive and confidential information related to national security, so they are likely to experience security stress. The purpose of this study is to recognize the need to manage the security stress of military personnel and to suggest management measures. To this end, a literature study was conducted on 12 KCI(Korean Journal Citation Index) journals dealing with security stress. Since 2016, research on security stress has been conducted mainly through empirical analysis through surveys. Studies related to security stress were divided into studies dealing with factors that affect stress, the relationship between security stress and security compliance intentions, and factors that reduce security stress. In particular, it was confirmed that factors such as organizational justice, organizational technical support, and security feedback can alleviate security stress. Next, by applying the results of this literature study to the defense security environment, we presented security stress management measures for military personnel in terms of improving security-related organizational justice awareness, technical support, and security feedback. The significance of this study is that we recognized the need to manage military personnel's security stress and reviewed practical measures related to this.

A Method on the Implementation of Intelligent Security Service Application based on Spatial Information (공간정보기반 지능형 방범서비스 어플리케이션 개발)

  • Choi, Woo Chul;Na, Joon Yeop
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.89-98
    • /
    • 2015
  • In this study, The criteria for assessing the security-related functions and services using spatial information is deduced, and orders of priority a priority for the applicable alternatives of functions/services of intelligent security service application based on spatial information are suggested by calculating relative importance. Also this study suggested connection plan about service implementation of national security services by government ministry & local government. And, the intelligent security app service model which has possible substantiation and commercialization is proposed. This study performed the AHP as the final assessment criterions by 3 item in 1st class and 12 item in 2nd class. And, tried to implementation methods of the intelligent security service application(ex. control of emergency and the crime opportunity, real-time location tracking of protector, the device for missing child & dementia patient, user participation & provision of information).

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

KASP-Integrated Learning Model for the Information Security Education in Elementary Education (초등 정보보호 교육을 위한 KASP-통합수업 모형)

  • Park, Sung-Soon;Han, Seon-Kwan
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.2
    • /
    • pp.157-164
    • /
    • 2010
  • This study proposed the information security integrated learning model-based KASP. By analyzing the teaching materials regarding information security in the regular curriculum, and by investigating preliminary studies, the information security contents were examined in terms of knowledge, attitudes, skills and ways to practice(KASP). And, the KASP-information security learning model integrating knowledge, attitudes, and ways to practice was developed, and the teaching plan and learning material hand-out were accordingly made out. Moreover, the developed model was tested in an experimental group, and common information security learning content centered on ethics in the comparison group in order to compare the results of two groups. As the test result analysis, it was verified that the developed KASP-information security integrated learning model was effective to help the students learn the knowledge, attitudes, skills and ways to practice.

  • PDF

Design Plan of Secure IoT System based Common Criteria (CC 기반의 안전한 IoT 시스템 설계 방안)

  • Kim, Ju-Hun;Jung, Hyun-Mi;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.61-66
    • /
    • 2017
  • Recently, IoT technology is rapidly developing with the keyword "Anytime, Anywhere, Convenient". In addition, security problems in IoT systems are exploding and the damage is increasing as well. In this paper, we propose a method to develop IoT system safely by using internationally recognized CC evaluation in ICT by identifying the standardization and security technology development status defining IoT system security requirements. For this purpose, IoT system and service security aspects are analyzed. Based on this, it is possible to design the security functional requirements and to demonstrate the rationale of the security objective through the correspondence relation, and it is possible to design the protection profile for the IoT system. This is a sufficient basis for the development methodology to be presented in this paper because it is used as a means of referring to the set of security requirements of administrators, developers, and users.

A Plan for Strengthening Cyber Security Capability toward North Korea: focusing on the Preparation of Cyber Warfare (대북 사이버 안보역량 강화를 위한 방안: 사이버전 대비를 중심으로)

  • Kim, Ho Jung;Kim, Jong-ha
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.123-132
    • /
    • 2018
  • North Korea's cyber warfare capability is becoming a serious security threat to Korea because most of the operational systems of social infrastructure and advanced weapons system are all networked. Therefore, the purpose of this article is to examine what the Korean government should do to strengthen cyber security capabilities toward North Korea. For this purpose, this article analyzed North Korea's cyber attack cases against Korea by categorizing according to threat type and purpose. The research findings are as follows. It is necessary first, to have aggressive cyber protection and attack capabilities; second, to establish an integrated cyber security control tower that can be overseen by the national government; third, to need to legislate domestic cyber- related laws; fourth, to build a multilateral & regional cyber cooperation system. The implication of these findings are that it needs to be strengthened the cyber security capability from the cyber threats of North Korea by minimizing the damage during the peacetime period and for the complete warfare in case of emergency.

  • PDF

A Study on Reality and Quality Improvement of Aviation Security Equipments Performance Certification System in Korea (항공보안장비 성능 인증제의 현실과 품질개선에 관한 연구)

  • Lee, Wonjoo;You, Sangwoo;Park, Soohong;Kim, Kyunghoon;Seol, Eunsuk;Han, Soojin;Park, Seoha;Lee, Jisu;Kim, Chanhwi;Kang, Jingu;Lee, Kiyoung
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.2
    • /
    • pp.113-125
    • /
    • 2021
  • Purpose: This study focused on reality and quality improvement of aviation security equipment performance certification system. Methods: For this propose, we analyzed aviation security equipment performance certification system related legislations. Using analyzed data, we suggested advancement plan of aviation security equipment performance certification system. Results: In results, South Korea has been implementing aviation security performance certification system since October 2018. Parts for improvement of system are mutual certification with major countries that operate aviation security equipment performance certification systems, the spread of the defense industry's system, development of similar substances for handling explosives, and introduction of preliminary inspections. Conclusion: The research result could be used as a basic data for upgrading Korea's aviation security performance certification system.

Security Information and Event Management System for Ship Cyber Security (해사 사이버 보안 대응을 위한 선박용 보안 정보와 이벤트 관리 시스템)

  • Nam-seon Kang;Chang-sik Lee;Seong-sang Yu;Jong-min Lee;Gum-jun Son
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.497-506
    • /
    • 2024
  • In this study, we proposed security information and event management for ship as a technology to respond to maritime cybersecurity regulations and evolving cyber threats. We analyze the main technologies of network management system and security information and event management, which are representative technologies for responding to ship cyber security, and propose SIEM for ships based on this. Optimized for ships based on the International Maritime Organization's Maritime Cyber Threat Management Guidelines, IACS UR E26, 27, etc. Derive the main functions of the SIEM for ship, linkage and normalization plan for the ship's heterogeneous equipment, ship's cyber threat and ship detection policy to identify ship's cyber security threats, and ship's operating environment and operating personnel.