• 제목/요약/키워드: security strategy

검색결과 979건 처리시간 0.024초

중국 해상법집행기관조직 개편과 한·중 해양협력 (China's Reorganization of Maritime Law Enforcement Administrations and ROK-China Maritime Cooperation)

  • 김석균
    • Strategy21
    • /
    • 통권33호
    • /
    • pp.178-201
    • /
    • 2014
  • China National People's Congress has passed the bill to combine the Marine Law Enforcement into "State Oceanic Administration People's Republic of China". This bill was intended to resolve the overlapping jurisdiction and disputes caused in ocean territory in nearby countries. The purpose of reorganizing the administration was to combine the dispersed organization into one group. This new big administration was basically organized to increase the power of China marine state on the long-term. The reorganization plan is to group General Administration of Customs, China Marine Surveillance, Fisheries Law Enforcement Command, and Border Control Department into one State Oceanic Administration. The new state Oceanic Administration carries the authority to protect rights and enforce the marine law supported by Public Security Bureau. Korea Coast Guard has been cooperating with China Marine Surveillance since 1998 when the first pact was made. The next step expanded to General Administration of Customs. Currently working with Regional Maritime Law Enforcement organizations dealing mostly with illegal Chinese fishing boats and IEODO conflict. In order to solve the problems we face today is to observe the process of the New China Coast Guard administration, analysing the effects that could be caused by the change and to keep close cooperation between the new administrations.

해적행위의 최근 발생 동향과 국제사회의 대응 (Recent Developments in Piracy Attacks and Counter-Efforts of the International Community)

  • 김석균
    • Strategy21
    • /
    • 통권41호
    • /
    • pp.85-107
    • /
    • 2017
  • The purpose of this article is to explore recent developments in piracy attacks at the global level. This article provides an overview of global trend of recent piracy attacks and presents global counter-piracy efforts at the international and governmental as well as industry level. The issue of piracy has been a grave concern of the globe, becoming the biggest threat to the safety and security navigation and seaborne trade. Overall, piracy attacks in recent years have greatly diminished owing to multi-faceted counter-piracy efforts. However, Southeast Asia and West Africa have reemerged as an hotspot of piracy. A worrisome trend in these regions is that many of piracy attacks are committed by militant groups for financing their activities. As a result, the level of violence and the sophistication of attacks have escalated. The problem of contemporary piracy is beyond a particular region or coastal state, but a common concern of the international community. In order to address the global piracy problem, international cooperation should be further strengthened at the global level as well as the regional level. As a way of counter-piracy measures in Southeast Asian waters, the creation of a joint regional coast guard to patrol the highly piracy concentration areas needs to be considered.

기후변화와 대기환경의 통합적 관리에 대한 고찰 (A Review of the Integrated Strategy for Climate Change and Air Pollution Management)

  • 송창근;이석조;윤종수
    • 한국대기환경학회지
    • /
    • 제27권6호
    • /
    • pp.805-818
    • /
    • 2011
  • The unequivocal risk of climate change, the weakness of energy security, and the problem of air quality will be possibly accelerated by the same reason, the enhanced fossil fuel dependancy in the future. It is obvious that greenhouse gases and air pollutants are mainly emitted from same sources. Moreover, greenhouse gases and air pollutants have their adversed impacts on same socio-economical, and environmental sectors. With these regards, several but limited studies have emphasized on the importance of the integrated management of climate change and air quality problem. In this study, we address the current trend of energy consumption and the change of air quality condition. Also the related policies are checked out in order to reduce emissions of greenhouse gases and air pollutants in Korea. By surveying previous studies, it is shown that the cost of climate change actions can be reduced by air quality co-benefits and vis-a-versa. Also the integrated strategy for climate change and air quality is introduced in term of cost-effectiveness and co-benefit.

국가 사이버보안 전략 수립과 개선을 위한 참조 모델 개발 (Developing Reference Model for National Cybersecurity Strategy Establishment and Improvement)

  • 윤재석
    • 융합보안논문지
    • /
    • 제16권4호
    • /
    • pp.53-61
    • /
    • 2016
  • 많은 국가들은 사이버위협으로 인한 피해를 사전에 예방하고, 사고 발생 시 그 피해를 최소화하기 위해 국가차원의 사이버보안 전략을 수립하여 이행하고 있다. 그러나 국가 사이버보안 전략은 해당 국가가 처한 환경과 필요에 따라 그 수준과 범위에 있어 상당한 편차를 보이고 있다. 어느 한 곳의 취약점은 전 세계적인 문제로 이어질 수 있다는 점에서 국가 사이버보안 전략 수립을 지원하고 개선하기 위해 국제기구를 비롯한 관련 기구, 기관에서 다양한 지침서가 개발되었다. 본 논문에서는 국가 사이버보안 전략 수립을 위해 발표된 각종 지침서를 분석하고, 주요 공통요소를 도출한 참조 모델을 제시하였다. 아울러 이를 우리나라 정책과 비교하여 미흡한 부분에 대한 보완대책을 제안하였다.

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • 제6권3호
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

The Impact of Using Some Participatory E-learning Strategies in Developing Skills of Designing and Producing Electronic Courses for A sample of Umm Al-Qura University Students and their Innovative Thinking

  • Emad Mohammed Samra
    • International Journal of Computer Science & Network Security
    • /
    • 제23권3호
    • /
    • pp.17-30
    • /
    • 2023
  • The current research aims to reveal the impact of using some participatory e-learning strategies (participatory product - classroom web simulation) in developing cognitive achievement, electronic course design skills, and - skills list - Torrance test of innovative thinking). The tools of innovative thinking among a sample of Information Science students. To achieve the objectives of current research, the researcher designed an educational website to train students to produce electronic courses via the web, according to the two participatory e-learning strategies. The researcher used a set of tools represented in (achievement test research and experimental treatment were applied to a sample of the Faculty of Computer students at Umm Al-Qura University. The results found that both participatory product strategy and web simulation have an imact on developing learning aspects discussed in the research. As for which of the two strategies had a greater impact than the other, it turned out that the web simulation strategy had a greater impact than the participatory product strategy in developing these aspects.

산업융합환경을 위한 보안 거버넌스 프레임워크 설계 (A Design on Security Governance Framework for Industry Convergence Environment)

  • 이효직;나원철;성소영;장항배
    • 한국융합학회논문지
    • /
    • 제6권4호
    • /
    • pp.33-40
    • /
    • 2015
  • 산업과 ICT 기술간의 융합으로 새로운 부가가치를 창출할 수 있는 융합환경이 도래되어짐에 따라 경제성장과 더불어 우리의 삶의 질이 향상 되고 있지만 이러한 융합환경은 다수의 이익만을 제공하는 것이 아니라 융복합적인 보안 위협이 발생됨에 따라 다양한 보안문제를 발생시켰다. 이러한 보안 문제를 해결하기 위해서는 기존의 기술적인 접근으로 단편적인 보안 문제 해결방식이 아닌 통합적인 관점에서 보안문제를 접근할 필요가 있다. 그래서 본 연구에서는 전략적 관점, 관리적/운영적관점, 기술적 관점 등 다차원적인 관점에서 신뢰성 있는 보안 거버넌스 관리를 할 수 있도록 인적측면이 고려되어진 보안 거버넌스 프레임워크를 개발하였다. 그래서 이 프레임워크를 통해 보안 관리에 대한 단일 기준을 제시함으로서 최고 경영진들의 직접적인 관여가 가능하고 조직구성원들이 스스로 보안활동을 수행하고 책임 질수 있는 신뢰성 있는 보안관리체계를 구축할 수 있을 것이다.

한국의 테러리즘의 대테러전략과 민간시큐리티의 역할증대방안 (Counter-Terrorism Strategy of Terrorism and Developmental plan of Private Security in Korea)

  • 박준석
    • 시큐리티연구
    • /
    • 제14호
    • /
    • pp.195-214
    • /
    • 2007
  • 이 연구의 목적은 대테러 대응책에서 보안, 경호, 경비시스템을 정부주도형에서 민영화로 전환할 수 있는 구축방안을 제시하고자 하는데 있다. 본 논문에서는 우리나라의 대테러 현황과 선진국과의 비교를 통한 민간시큐리티의 발전방안 중 대테러 전문가 양성을 위한 자격제도 및 제반적인 발전 방안에 대해서 연구하고자 하는데 목적이 있다. 본 논문의 요약은 다음과 같다. 첫째, 국가적 대응전략에서는 선진국과 같은 통합적인 대테러 센터를 설립해야 한다. 둘째, 미국의 대통령 직속기구로 통합된 국토안보부와 같은 (가칭 : 대테러 안전부) 기구를 만들어야 한다. 셋째, 대테러법에 대한 제정이다. 넷째, 국민과 상호신뢰 회복할 수 있는 대테러 업무 민영화에 따른 협력 체제를 만들어야 한다. 다섯째, 테러 경보 체제가 필요하다. 그에 따른 민간시큐리티의 상호연계성과 발전방안으로서는 첫째, 대테러 전문가를 양성해야 한다. 둘째, 대테러 전문가 자격증 제도를 도입시켜야 한다. 셋째, 민영화 된 대테러 연구소가 필요하다. 넷째, 대테러 방지법제정을 위한 민영화의 역할의 중요성이다. 이상에서 살펴본 바와 같이 우리나라의 대테러 전문가 양성을 위한 민간시큐리티의 역할증대 방안에서 본 연구자는 무엇보다도 국가주도형에서 민간시큐리티 관련 분야와 상호 협력하는 체제 또한 학계와 관련하여 상호 보완하는 산 학 관의 협력 체제를 구축해 나가는 것이 절실히 필요하고 위에서 제시한 바와 같이 총론적 접근보다는 대테러의 체계적 연구가 시급히 요구되는 것이 현실이다. 다양한 대테러 전문가를 양성하고 시큐리티 관련 종사자들의 의식전환과 대테러 교육 기자재 및 교육내용을 구축해서 특정단체 권한이 아니고 인권침해 최소화 할 수 있는 다각적 검토 연구가 후속연구를 계속해서 연구되어져야 할 것이라 사료된다.

  • PDF

보안 마이크로 웹페이지 기반 전장 스마트 지도 (Security Micro-web Page Based Battlefiled Smart Map)

  • 허준;하선주;차신;은성배
    • 대한임베디드공학회논문지
    • /
    • 제12권4호
    • /
    • pp.259-266
    • /
    • 2017
  • GPS was developed for military purposes. As a result, it is used as a military important means such as guided weapons and strategy / tactics. However, GPS depends on the communication infrastructure and is affected by interference signals. In this paper, we propose a secure micro - web page - based smart map that can enhance security without relying on communication infrastructure on the battlefield. The proposed system consists of general smartphone, security QR, central server and smart map. Only use the network when downloading the security key and SmartMap before the task starts. During operation, the smartphone transmits and receives data using a secure QR. The security QR inserts the security code to prevent forgery and falsification and confirms whether the data is authentic by checking whether the smart phone is forged or not. As a result of implementation, we solved communication security problem of existing technology by using location based service without relying on communication infrastructure.

Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph

  • Dai, Fangfang;Zheng, Kangfeng;Wu, Bin;Luo, Shoushan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1920-1937
    • /
    • 2015
  • Network environment has been under constant threat from both malicious attackers and inherent vulnerabilities of network infrastructure. Existence of such threats calls for exhaustive vulnerability analyzing to guarantee a secure system. However, due to the diversity of security hazards, analysts have to select from massive alternative hardening strategies, which is laborious and time-consuming. In this paper, we develop an approach to seek for possible hardening strategies and prioritize them to help security analysts to handle the optimal ones. In particular, we apply a Risk Flow Attack Graph (RFAG) to represent network situation and attack scenarios, and analyze them to measure network risk. We also employ a multi-objective genetic algorithm to infer the priority of hardening strategies automatically. Finally, we present some numerical results to show the performance of prioritizing strategies by network risk and hardening cost and illustrate the application of optimal hardening strategy set in typical cases. Our novel approach provides a promising new direction for network and vulnerability analysis to take proper precautions to reduce network risk.