• Title/Summary/Keyword: 테러방지

Search Result 104, Processing Time 0.022 seconds

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.

A Study on the Justifiable Use of Weapons by Private Security: Focusing on Multi-user Facilities (민간 경비원(보안요원)의 정당한 무기사용 방안 연구: 다중이용시설을 중심으로)

  • Oh, Hangil;Ahn, Kyewon;Na, Yeji
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.293-294
    • /
    • 2023
  • 2023년 8월 3일 다중이용시설과 운송시설이 맞닿아 있는 서현역 부근의 다중이 밀집한 장소에서 차량돌진 및 흉기난동의 묻지마 범죄가 발생하였다. 차량을 인도로 몰아 보행자를 들이받은 뒤 백화점 내부로 들어가 흉기를 휘둘러 차량돌진으로 5명, 흉기난동으로 9명의 피해자가 발생하였다(리차드김, 2023). 서현역의 묻지마 범죄 이후, '살인예고 지도' 서비스의 등장하면서 많은 이용객이 상시 붐비는 번화가 및 백화점 등의 다중이용시설을 이용하는 시민들의 불안감이 전국적으로 크게 확산하고 있다(김잔디 & 최윤선, 2023). 급격히 늘어나는 국민의 불안감으로 정부에서는 '묻지마 범죄'를 '이상동기범죄'로 명명하고 근절을 위해, 사실상 테러와 비슷한 수준의 강력한 대책을 추진하고 있다(강은민, 2023). 이상동기범죄에 따른 강력한 대책으로 국무조정실(대테러센터), 경찰청 등 관계부처의 다중이용시설 대한 안전대책들이 강구되어지고 실정에서 「경비업법」에 따라 시설의 위험발생을 방지하는 업무를 담당하고 있는 민간 경비원에게 이용객의 안전을 보호하고 피해를 최소화하기 위한 일선 역할이 중요해졌다. 하지만, 이상동기범죄에 대한 일선의 초동대응이 인력과 장비, 정당방위에 대한 법제도의 뒷받침 미흡 등으로 인해 민간 경비원의 실질적인 대응이 어려운 실정이다. 많은 사람의 왕래가 있는 다중이용시설에서의 민간 경비원 최소 경력배치 기준, 현행범 제압을 위한 무기사용 기준, 이용객 보호를 위한 경비원 위력 사용 기준 등의 제도적으로 마련되어 있지 않아 민간 경비원이 범죄로부터 시설 이용객을 보호하는 것은 쉽지 않은 것이 현실이다. 따라서 본 연구에서는 다중이용시설 묻지마 범죄 등의 위험성과 민간 경비원의 무기사용과 관련한 법제도적 한계점을 고찰하여, 이에 대한 개선방안을 제시하고자 한다.

  • PDF

The Study of Establishing the Multi-pass Eurasian Railroads (유라시아 철도의 다중경로 구축에 관한 연구)

  • Hahm, Beom-Hee;Huh, Nam-Kyun;Hurr, Hee-Young
    • Korean Business Review
    • /
    • v.21 no.2
    • /
    • pp.137-170
    • /
    • 2008
  • This study is presenting the logistics strategy in the international logistics markets which makes competition and corporation among north-east Asian countries to establishing the multi-pass Eurasian railroads. The countries located in north-east area of Eurasia like China, Japan, Russia and Korea are paying higher costs and disutility to the transportations and communications due to repeated conflicts and confrontations causes from the politic problems. They are being used surface transportation for most of all logistics between Europe and Asia except special merchandises because of characteristic of cargo to be air, the Silk Road remains vestige only which was main logistic passage to this area since BC. So far the Trans-Siberian Railway is being used by Russia mostly as north of Eurasian transport because of difficulties of service. The Trans-China Railway built in 1992 is not accomplishing as a international logistic passages. It is expected to take a long lead time because of characteristic of resource development and poor logistic infrastructure to the countries like Uzbekistan, double landlocked country, Mongolia and Azerbaijan, the countries do not be adjacent to the sea, even they have great economic jump-up plans through the development of their own resources. The Shanghai Cooperation Organization(SCO) start to sail officially in 2001 is constructed with China, Russia, Tadzhikistan, Kyrgyzstan, Kazakhstan and Uzbekistan as regular members of 6 countries and Mongolia, India, Pakistan, Afghanistan and Iran as observers 5 countries. It is started as a military alliance to protect terror, but now, it is expended to cooperate with the traffic, transportation, trade and share of energies. The Russia is doing their best to activate TSR as a government target to developnorth area equivalently, and economic develop of far-east Siberia. And also it is agreed provisionally to improve and repair of rail road between Nahjin and Hassan to connect TSR and TKR( Trans-Korea Railroad) by Russia, North Korea and South Korea with Russian's aggressive efforts. The development plan of this area is over lapped with GTI(Greater Tumen Initiative) promoted by UNDP, and is a cooperated project by 5 countries of South Korea, Mongolia, China, Russia and North Korea, subject to review the appropriation of energy, tour, environment, rail road connection between Mongolia and China and establishing a ferry route to north-east Asia. It is Japanese situation to pay attention to Russia and China even they have been supplying large-scope of infrastructure in Mongol area without any charges, target to get East Asia Main Rail Road to connect Mongolia and Zalubino of Russia. In case of the program for the Denuclearization of North Korea is not creeping, it will be accelerated to connect the TKR and TSR, TKR and TCR by somehow attending United States, including developing program promoted by UN ESCAP. As the result, Korean peninsular will continue the central role of competition and cooperation as in the past, now and future of north-east Asia, as of geographical-economics and geographical-politics whether it is requested or not wanted by neighbor countries.

  • PDF

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

A Research on Extension Device of Korea Private Security Market (한국 민간경비 시장의 과제와 활성화 도입방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.173-198
    • /
    • 2008
  • As we took a look at above, this researcher suggest following device to extend Korea's private security industry's area. First, it is necessary to extend private investigation law's area grafting private security together. Second, it is necessary it is necessary to think of private security's role related key figure law, corresponding terror law, Presidential Security Service Guard law. Third, as a draft of a proposed law related prevention flowing out of industry techniques among industry security related law, passed, it is necessary private security's diversity, subdivision, composition through an enterprise security, and private security industry area's grafting together. Fourth, a research about private security company's investment and professional area's bringing up as well as business's extension device should be groped for the security consulting though total system management service. Fifth, there are no big difference education course and purpose, duty about a security police man law and security law's unification, so it is necessary to drive forward actively unification through government organization's cooperation. Sixth, a paradigm shift should be occured about private security service among policeman, citizen, and private security guards. Seventh, it is considered the role of security association is important. Lastly about a matter communication between the National Police Agency, and Security Association, not only look at from an authority's angle, collecting information, corresponding ability but now it is considered to grope each other cooperation device together among organizations not only the National Police Agency but also, National Organization, National Intelligence Service, the prosecution, Presidential Security Service Guard, Army etc.

  • PDF

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

North Korean Nuclear & Ballistic Missile Threats and U.S. Strategy: Shaping the Strategic Environment by Synchronizing Sticky and Sharp Power with Allies (북한의 핵, 탄도미사일 위협과 미국의 전략: 동맹국과의 경제적, 군사적 수단의 동기화를 통한 전략적 환경의 조성)

  • Moon, Chong-Hwa
    • Strategy21
    • /
    • s.37
    • /
    • pp.242-274
    • /
    • 2015
  • 2015년 5월 수중발사 탄도미사일(SLBM) 발사시험을 통해 북한은 전 세계의 이목을 또 다시 집중시켰다. 북한은 2013년 제3차 핵실험을 감행한 이후 최근까지도 탄도미사일과 로켓 발사 등의 무력도발을 지속해 왔다. 이와 같은 북한의 무력도발은 한반도의 안정뿐만 아니라 미국 본토의 안보에도 매우 부정적인 영향을 미치고 있다. 지금까지 미국은 북한의 핵미사일 개발 저지를 위해 경제적 또는 군사적 방안들을 선별적으로 적용해 왔다. 그러나, 이러한 미국의 노력에도 불구하고 북한은 여전히 핵미사일을 개발하겠다는 꿈을 포기하지 않고 있는 것이 사실이다. 본 논문은 북한의 핵미사일 개발에 대한 미국의 대안적 전략(Alternative Strategy)을 제시하는데 그 목적이 있다. 필자는 대안적 전략 제시에 앞서 북한의 핵과 탄도미사일 개발현황을 내용(Contents)과 맥락(Context) 차원에서 분석하고 미 오바마 행정부의 대북전략을 비판적으로 검토하였다. 그리고 대안적 전략으로 동맹국과 함께 경제적(Sticky Power), 군사적(Sharp Power) 수단의 동기화(Synchronizing)를 통해 북한이 감당하기 힘든 전략적 환경을 조성(Shaping the Strategic Environment)하는 것이 '북한의 핵개발 포기' 라는 전략목표를 달성하는 방안 임을 강조하고 있다. 미국이 대안적 전략목표를 달성하기 위해서는 경제적 수단으로 ① 북한의 자금세탁 및 위조지폐 발행국 지정, ② 북한을 지원하는 모든 해외자산에 대한 제재조치, ③ 북한의 테러지원국 재지정, ④ 북한 제재를 위한 미국의 입법추진, ⑤ 대량살상무기 관련 금수품목의 확대를 적용함과 동시에 군사적 수단으로 ① 대량살상무기 비확산 활동 강화, ② 대탄도미사일 전략 개발 및 정보(ISR: Intelligence Surveillance and Reconnaissance) 공유, 맞춤형 억제전략(TDS: Tailored Deterrence Strategy)의 구체화 등을 통한 한·미 군사 억제방안의 강화, 그리고 ③ SM-3, THAAD(Terminal High Altitude Area Defense) 등 한·미·일 3자간 MD(Missile Defense)체제의 구축 등을 동기화하여 적용해야만 할 것이다. 미국의 대안적 전략은 ① 북한의 핵미사일 개발에 대한 중국의 협력방지, ② 한·중간 경제관계의 악화, ③ 한·일간의 역사적 긴장관계라는 위험요소를 내포하고 있는 것 또한 사실이다. 따라서 미국이 대안적 전략목표인 '북한의 비핵화' 달성을 위해서는 이와 같은 위험요소를 완화시키는 노력도 병행되어야 할 것이다. 끝으로, 미국은 북한의 김정은이 핵미사일 개발 포기라는 상이한 방향의 전략적 결정을 할 경우에 대비하여 한·미 연합훈련의 보류, 북한에 대한 경제제재조치 해제 등 북한과의 협상 가능성도 열어두고 이에 대해서도 철저하게 준비해 나가야 할 것이다.

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.

The Legal Study of Prohibited Items on Aeroplane for the Aircraft Safety and Security (항공안전보장.질서유지를 위한 항공기반입금지 물품 관리.감독에 관한 입법적 개선방안)

  • Chang, In-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.33-66
    • /
    • 2014
  • While the numbers of overseas travelers has been increased rapidly each year, the numbers of passengers in the aircraft also has continued to be increased gradually. In the mist of these increasing numbers, such accidents as threatening an aircraft safety like riot, aircraft hijacking and terrorism have happened constantly. In these circumstances, South Korean government has prescribed "Aviation on Security Act" in accordance with the Convention on International Civil Aviation and other international agreements. This act aims to prevent illegal activities and illegal items on the aircraft to ensure the safety and security of civil aviation. However, this act is not sufficiently regulating all the illegal crimes and illegal items on the flight. For the worse, there is a lack of effective supervisory capacity. Likewise, the inherent problems of the current laws relating to the prevention of the illegal items on the aircraft are appearing on the surface continually. Above all, illegal items on the aircraft are directly connected to the issue of aviation safety and security as well as a safe utilization of the flight service. Thus, when there occurs a serious accident on board, it surely would be led to a huge economic loss not mentioning the loss of lives following the accident. Therefore safety of the flight passengers cannot be guaranteed without ensuring the safety of aircraft facilities and good supervisory mechanism of illegal items on the aircraft. Accordingly, establishing a safe operation order tends to influence economy and tourism of a country in no small measure. Therefore, it is an urgent issue to settle down a reasonable and adequate supervisory regulations regarding the prevention of the illegal items on the aircraft. Consequently, in this article, I studied on a reasonal and effective mechanism to control the prevention of the illegal items and illegal acts on the aircraft in order to ensure a safety and security of civil aircraft.

Analysis of Household Textbooks for MiddleㆍHigh School in Colonial Age (식민지 시대 '가사교과서'에 관한 연구: 1930년대를 중심으로)

  • Jun Mi-Kyung
    • Journal of Korean Home Economics Education Association
    • /
    • v.16 no.3
    • /
    • pp.1-25
    • /
    • 2004
  • This study analyzes the external forms of the household textbooks and also the contents of them used at girls' middleㆍhigh schools during the period of Japanese ruling over Korea. To this end, 8 household textbooks published from 1928 to 1937 were analyzed. The results of the study are summarized as follows. 1. The household subject had become the one of the most important subjects to girl students as the practical uses were emphasized in educational area during the period. As a result. the classes of the household were the second in hours, following the class of Japanese (the national language) to girl students. 2. The contents of the household textbooks were intended to contain 'the modern' and 'the newest'. The students were also suggested to apply the contents of the textbooks to real home life. Many pictures, photos and illustrations were included in household textbooks to help students to understand the contents of the subject. 3. The purposes of the household class were the reformation of the living conditions and home economics. 4. The external characteristics of the household textbooks during the period were as follows. - Written in Japanese vertically and the size of the textbook was A5 (150/210) with pulp paper of good quality - The type style of the body of the textbooks was Ming-style type- The sequent order of the textbooks was the outer cover, the title page, pictorial, introduction, table of contents, the body, appendix and the back cover. 5. The household textbooks consisted of the first volume and the second volume. The first volume contained clothing and textiles, food and nutrition and housing. Taking care of the aged. nursing. child care, household economy and home management were included in the second volume. 6. The household textbooks were designed to make women the housewives.

  • PDF