• Title/Summary/Keyword: 보안부대

Search Result 53, Processing Time 0.028 seconds

A study on the application and development direction of naval unit diagnosis system (해군 부대진단 제도의 적용과 발전방향에 대한 고찰)

  • Jang, Kyoung Sun;Lee, Yoou Kyung;Kwon, Pan Qum
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.59-68
    • /
    • 2020
  • The purpose of this study is to consider ways to stabilize the naval unit diagnosis system that has been implemented for five years. Check the historical process and theoretical background of the naval unit diagnosis system. This is to confirm the future direction of the naval unit diagnosis system research. Therefore, the importance of this system is confirmed and the direction of development is explained through application method. In particular, the study suggested the scientific development of analytical methods, the development of analytical programs, the development of leadership diagnostic programs, the increase of personnel in the unit diagnosis team, and the acquisition of expertise and reliability. In order for the naval unit diagnosis system to develop, internal and external continuous research is required.

A study on the governance of using soldier's smartphone Management system on the National Defense Cloud (국방 클라우드 기반 스마트폰 관리 시스템을 활용한 병사 스마트폰 거버넌스 방안에 관한 연구)

  • Moon, Seung-Joo;Lee, Jae-Du
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.60-62
    • /
    • 2022
  • 본 논문은 국방 클라우드를 기반으로 병사 스마트폰 사용에 대한 거버넌스의 방안을 연구한다. 2020 년부터 군 부대 내에서 병사의 스마트폰의 사용이 전면 시행되었다. 하지만 대량의 병사 스마트폰을 인적자원을 통해 관리하기 때문에 많은 인적자원 리소스가 필요하고, 보안이 중요한 부대 특성상 보안 점검을 사유로 인권침해가 발생하고 있다. 따라서 군 부대 특성을 고려한 거버넌스를 정의하고 도입할 필요가 있다. VMI(Virtual Mobile Infrastructure) 시스템을 이용한 국방 클라우드 기반 스마트폰 관리 시스템은 스마트폰을 군 보급품으로 지급하고 모든 스마트폰 프로세스 및 데이터를 중앙 서버를 통해 관리한다. 본 논문에서는 국방 클라우드 기반 스마트폰 거버넌스를 정의하고 중앙 서버를 통해 모든 스마트폰의 프로세스와 데이터를 관리함으로써 얻을 수 있는 기대효과를 관리적, 보안적 측면에서 연구하였다.

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

Research and Direction of Cyber Operation Education System for Fostering Common Situation Awareness about Cyber Operation -Focusing on non-Cyber Operations Unit Officer Education- (사이버작전에 대한 공통상황인식 함양을 위한 군(軍) 사이버작전 교육체계 연구 및 방향성 제안 -비(非)사이버작전부대 장교 교육을 중심으로-)

  • Lee, Sangwoon;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.13-22
    • /
    • 2019
  • The purpose of this study is to suggest the educational system and direction of cyber operations officers of non-cyber operations forces who do not specialize in cyber operations. In order to carry out cyber operations as a joint operation, non-Cyber Operations officers must also know about cyber operations, but there is no education system for them at present, Since there is almost no previous research on this, research in the relevant field is necessary. Therefore, the education system was developed based on the prior literature review, that is, the education system, that is, the necessity of education, the object of education, the goals and contents of the education, and the curriculum. In addition, the relevant experts confirmed the validity of each item with Delphi method, and as a result, some improvement was needed, but it was shown to be suitable as a whole. In addition, detailed educational program development can be developed based on this in the future.

Effects of Ancillary Actvities on Passenger Flows in Airport Terminals (공항청사의 부대시설이 여객동선에 미치는 영향)

  • 박창호
    • Journal of Korean Society of Transportation
    • /
    • v.2 no.1
    • /
    • pp.17-31
    • /
    • 1984
  • 공항의 용량측정은 수요군의 흐름에서 발생하는 소비시간분석을 요구하며 공항체계 의 대부분 시설에서는 흐름의 시간변위를 연속대기례에 의한 비효율적방법으로 예측할수도 있으나 청사내의 여객동선에 대해서는 여러 시설을 활용하려는 여객의 선택선호로 인하여 확률적 접근이 바람직하다. 본 논문은 공항의 청사내에서 부대시설에 의하여 소비되는 여객 의 이완시간을 예측하는 모형을 개발하였다. 총이완시간은 여객이 각 시설을 이용하는 확률 과 이용시간의 기대치에 대한 함수로서 계산되었으며 정상적인 여객의 동선이 이들 시설에 의하여 영향을 받을 경우에만 정의되도록 하였다. 이 이완도는 연속된 청사의 기능시설에 대한 여객동선분포의 입력과 출력을 설명하는데 쓰이게 되며 나아가서는 청사전반의 용량산 정을 위한 지표를 제공한다. 모형 검증을 위한 자료는 매표대와 보안검사대 사이의 부대시 설을 중심으로 수집되었으며 자료의 특성과 모형의 심요성이 논의되었다.

  • PDF

국가사이버보안정책에서 해킹에 대한 소고

  • Park, Dea-Woo
    • Review of KIISC
    • /
    • v.21 no.6
    • /
    • pp.24-41
    • /
    • 2011
  • 7.7 DDoS공격과 3.4DDoS공격, NH금융전산망마비사건, 네이트 해킹 사건 등은 해킹이 개인적 문제를 지나서, 사회와 국가적인 이슈로 부상되고 있다. 중국은 대학에서 해킹 기법을 가르치고, 인민해방군에 국가일꾼이란 소명의식을 주고 있다. 북한은 지도자의 지시로 노동당과 북한군에서 사이버부대를 직접 교육 운영하고 있다. 미국은 외국으로부터 사이버 공격을 당할 경우 이를 '전쟁 행위'로 간주해 미사일 등으로 대응한다는 방침을 세웠다. 이와 같이 해킹은 국가사이버보안 정책에서 다루어져야 할 필요성이 있다. 본 연구에서는 해커의 변천, 해킹기술과 방법, 해킹 툴, 그리고 해킹 사례를 살펴본다. 또한 해킹 동향 분석에서 해킹기술 동향 분석, 해커(사람) 동향 분석, 해킹 지역(국가) 동향 분석을 통하여 해킹 인력의 조직화, 해킹 기술의 집적화, 해킹 조직의 집중화 연구를 한다. 그리고 국가사이버보안정책에서 해킹에 대한 '국자사이버보안법 시행령' 제정, 국가사이버보안 자문회의, 국가사이버보안 협력회의, 해킹 프로세스 전략, 해킹 전략 추진 방법론, 사이버협력국, 해킹 작전국, 인력 양성국, 해킹 기술국에 관한 저자의 개인 의견을 제안한다.

주상복합 시스템 도입한 아파트로 차별화

  • Kim, So-Jin
    • 주택과사람들
    • /
    • s.205
    • /
    • pp.62-65
    • /
    • 2007
  • 사업부지 내의 조경, 녹지 공간을 최대한 확보하기 위해 고층으로 건축하면 쾌적한 친환경 주거지를 만들 수 있다. 이를 위해 주상복합 건축공법을 적용하고 각종 부대시설과 철저한 보안 시스템, 첨단 설비가 결합된다면 이상적인 아파트 주거 공간이 탄생한다. 편의성과 고급화, 첨단화를 지향하고 주거생활의 편리성을 극대화한 주상복합형 아파트에 대해 알아본다.

  • PDF

A study on the appropriateness of utilizing retired persons to military education and training sector (군사 교육훈련분야의 예비역 활용 적정성에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.27-34
    • /
    • 2014
  • This study is changing day by day in Korea, which reinforce the security environment and other advanced weapon systems and operate to secure it in excellent staff Reserves are being utilized in each group for the service pipe work required to determine the appropriateness of the Job Title, Retired military expertise and experience in utilizing the scarce human resources contribute to the improvement of the reinforcement of Power, Reserves required by each group's employment services and the need to normalize operations and annual operating plan objectives for determining the adequacy of the data to provide you with. In particular, the group has a direct impact on attack power can be trained to perform combat missions need to empower bag in bag research focuses on methods to improve and complement suggested.

Robust Digital Watermarking Using Chaotic Sequence (카오스 시퀀스를 이용한 견고한 디지털 워터마킹)

  • 김현환;정기룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.630-637
    • /
    • 2003
  • This paper proposed a new watermarking algorithm using chaotic sequence instead of conventional M-sequence for protecting copyright to the author. Robustness and security is very important for watermarking process. We use multi-threshold value according to the human visual system for improving robustness of watermarking to each subband images coefficient differently after wavelet transform. And then, we embedded watermark image to original image by multi-watermark weights which are made by random sequence generator. We detect watermark image from the difference data which is made from each wavelet subband images. We also simulate the efficiency from the various possible attacks. Chaotic sequence is better than M-sequence, because the one is very easy to make sequence and the chaotic sequence is changed easy according to the initial value. So, the chaotic sequence has the better security than the conventional M-sequence.

A Study on Army NCO institutions for excellence manpower acquisition - Department College of NCO in connection with the acquisition workforce Revitalization - (우수 인력획득을 위한 육군 부사관 제도 연구 -인력획득과 연계한 전문대학의 부사관학과 활성화 중심으로-)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.111-120
    • /
    • 2013
  • Army NCO roles and responsibilities in conjunction with the Defense Reform 2020 plan to perform a pivotal role in the bag the past tradition inherited bag and development, transition the mission commander helpers battle conductor, mainly functional experts, management experts from the bag to show PowerIt has a pivotal role as a transition. It embodies the director and the military organization of work within the scope of the statutes and rules, such as planning and implementation as the core of the Power which is most frontline officers, the NCO instructions and control through education and functional personnel to maintain the best Power will. Propose the measures that can be overcome by considering the importance of key personnel, operating personnel NCO in the military organization and analysis of the issues, the problem of the NCO system. The social awareness to be able to build a system to obtain a stable workforce through effective operations for changes in the revival, especially in the Department College of NCO activated mutual development challenges were present.