• Title/Summary/Keyword: terror response

Search Result 57, Processing Time 0.021 seconds

A Study on the Improvement of Aviation Security System for the Prevention of Terrorism in Aircraft - Focusing on the Prevention, Preparedness, Response and Punishment Regulations of the Aviation Security Act -

  • Moon, Hyeon-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.189-195
    • /
    • 2020
  • The whole world is anxious that aircraft could be used as a tool for terrorism after 9/11. The disappearance of Malaysia Airlines is again adding to fears about aircraft. Because these aircraft attacks cause many human casualties, the purpose of the study is to analyze the problems in the current air security system and to present alternatives. The methodology of the study used a literature research methodology to review the current status of aircraft terrorism and related regulations, such as current aviation-related laws and anti-terrorism laws, and prior studies. The purpose of the Chapter is to present an aviation security system that promotes the safety of air traffic through the prevention of aircraft terror by presenting the roles and improvement measures of aviation security personnel, foreign police officers, intelligence agencies, and legal blind spots and flaws.

Response plan against cyber terror on Korean electricity sector (우리나라 전력계통의 사이버테러 대응방안 고찰)

  • Kang, Sun-Hee;Sohn, Yoon-Tae;Kim, Sung-Hak
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.124-126
    • /
    • 2007
  • 전력계통 보안관제센터는 전력IT의 사이버테러 위험을 줄이고 보안을 강화하는 것이다. 이를 위해 전력산업 관계기관은 해킹 바이러스와 같은 사이버공격에 대한 대응을 고도화하기 위해 전력거래소 내 전력계통보안관제센터(ES-ISAC)에 실시간 관제 대응센터를 만들고 시스템 성능의 지속적인 업그레이드 작업과 다른 시스템과의 연동을 확대함으로써 사이버침해 사고에 대한 예측력을 향상시키는 작업을 추진해야 한다. 침입기술, 웜 바이러스 샘플 분석과 같이 침해사고 정보수집을 보다 능동적으로 하고 모든 정보에 대한 백업시스템을 구축함으로써 안정적인 센터운영을 기해야 한다.

  • PDF

Algorithm of certificate security based-on using query language (사용자 질의어를 이용한 개인 인증 보안 알고리즘)

  • Lee, Chang-Jo
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.45-51
    • /
    • 2011
  • Certificate security oriented cyber certificate is important tool for the purpose of offering user-authentication service based on on-line system. In the paper, we analyzed management implement which could make the efficient use of certificate security oriented cyber terror response. This algorithm called SOL(Security Oriented Language) will make efficient use of the service about authentication consisting of the basis in the age of information through efficient management and partial use of each certificates. Especially, SOL could be used efficiently by grafting a small group of on-line system which is operated with particular purposes.

A Study on the Supply Chain Security and Risk Management Strategies of Global Companies (글로벌 기업의 공급사슬보안 및 위험관리전략에 관한 연구)

  • Yang, Jung-Ho
    • Management & Information Systems Review
    • /
    • v.27
    • /
    • pp.149-172
    • /
    • 2008
  • Since the 9/11 terror attack, the event which caused supply chain disruption, supply chain security has becomes more important than ever before. Furthermore, such company's logistics strategies conflicting supply chain security as increased global sourcing, JIT manufacturing are increasing supply chain vulnerability. It could burden for global companies to strengthen supply chain security because not only it requires additional investment cost but also changes of companiy's global logistics strategy. However, on the other hand, supply chain visibility and resilience can be improved through supply chain security. In addition, it allows companies to stabilize supply chain structure as well as rapid and flexible response to market demand. The key issue is balancing between efficiency and supply chain security. To do this, identifying risk elements under the supply chain and assessing vulnerability of each supply chain components should be performed before developing efficient supply chain security management system without obstructing supply chain efficiency.

  • PDF

A Study on the Emotional design approach and the Value of the Space for Healing the Trauma - Focus on the periodical characteristics and changes - (트라우마(trauma)를 치유하는 공간의 가치와 디자인접근에 관한연구 - 시대별 특성과 변화에 대한 관찰을 중심으로 -)

  • Woo, Ji-Yeon
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.2
    • /
    • pp.206-215
    • /
    • 2010
  • The negative memories which come from tragic events such as war, terror or various conflicts in modern cities have been threatening the mental health of city-dwellers. This thesis focuses on 'healing public space' that will help recover the life of city-dwellers who sustain various trauma. For this, the author investigated the significant memorial space through 1980-2010 from site visits, interviews, and related theses and books and then extracted necessary information from each period. This thesis aims to find the changes of the memorial concepts and visitor's reaction for last 30years. 1)1980-: Healing concept and visitor's positive response 2)1990-: Healing by emotional experience approaches to the memorial museum such as narrative approach, exhibition media using 5senses, interactive display and preserving trace, 3)early 2000-: Healing by architectural experience 4)2002-: present: Healing projects by various programs. Steady advances in memorial design for healing trauma are due to the efforts for emotional design approach to eeply move the visitors and the efforts have to be continued. The study emphasize the importance of attracting eople by experimental, emotional design contents not just by aesthetic and functional public design ideas.

A Case of Psychogenic vomiting (七情吐) patient who showed loss of the weight due to Maladjustment in a Military life (군대생활 부적응으로 급격한 체중감소를 나타낸 칠정토(七情吐) 환자 치험 1례)

  • Yoo, Jong-Ho;Kim, Joo-Ho;Kim, Geuu-Woo;Koo, Byung-Soo
    • Journal of Oriental Neuropsychiatry
    • /
    • v.17 no.3
    • /
    • pp.131-141
    • /
    • 2006
  • Psychogenic vomiting (七情吐) is the disease of vomiting due to seven emotions that joy, anger, melancholy, anxiety, grief, fear and terror being the response of the mind to the environmental stimuli. We experienced a 21year-old man who had a psychogenic vomiting due to maladjustment in a military life, and whose condition was improved through oriental medical treatment. We treated the patient with Herbal medications and Giungoroen (至言高論)-wise saying and lofty opinion). Giungoroen is psychological therapy that promotes patient's recognition of disease and will to cure it through conversation. After being treated, the patient showed that symptoms (vomiting, nausea, abdominal discomfort, insomnia, a depressed mood, a feeling of uneasiness) was improved considerably. Tills result suggests that oriental medical treatment bas good effect on psychogenic vomiting due to adjustment disorder.

  • PDF

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

Countermeasure to the Stages of Crisis Management in the Bioterrorism (생물테러리즘의 위기관리방안)

  • Lee, Kwang-Lyeol
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.235-242
    • /
    • 2009
  • This study aims to examine terrorism by biological agents. These days terrorism evolved so rapidly that more than one terror occurs a day in global society as we are on the edge of so-called New-terrorism. One of new examples of new terrorism is Bioterrorism by biological agents. In order to address Bioterrorism we should conduct a study to examine things to be prepared at ordinary times and future plans. As an effort to develop countermeasures against Bioterrorism, anti-terrorism laws should be made on Prevention phases anti-terrorism funding laws as well. Other Bioterrorism laws need to be made. On Response phases initial reaction task force should be ready for making positive initial reaction. A special hospital for CBR(Chemical, Biologlcal, and Radiological) warfare needs to be designated to practice medicine. Biological~safety-Levels should be constructed by IV levels. Effective public promotion network should be built. On Recovery phases evaluation system needs to be suggested and international cooperative network should be established.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.