• 제목/요약/키워드: Department of Security Service

검색결과 685건 처리시간 0.026초

A Study on Measures of Professional Ethics Education for the Department Related to Guard (경호 관련학과 직업윤리교육 방안 연구)

  • Choi, Pan-Am
    • Journal of the Society of Disaster Information
    • /
    • 제7권3호
    • /
    • pp.240-246
    • /
    • 2011
  • The professional ethics for the guard is defined as the professional ethics that the person working as a guard to have. The professional ethics education builds the certainty and confidence about professional ethics recognition as well as behavior for guards so that helps the successful performance of the job. Therefore, this study tried to consider previous researches, understand the current professional ethics education for the department related to the guard and the case studies of incidents due to lack of professional ethics education to suggest the measures of activating professional ethics education. First, it is to consider the specialty of the guard to build the guard-martial spirit. Second, the professional ethics education must be out of the central culture study but develop as a major subject. Third, the quality and professionalism of the responsible professor of the professional ethics subject shall be considered. Forth, the professional ethics education must be performed not only at school but also continuously through the various ethics programs of the work places as well as organizations.

A study on the integrated management model of the national disaster resources (국가 방재 자원 통합 운영 모델에 관한 연구)

  • Lee, Changyeol;Kim, Taehwan;Park, Giljoo
    • Journal of the Society of Disaster Information
    • /
    • 제9권3호
    • /
    • pp.358-364
    • /
    • 2013
  • Conventional disaster resources management systems among the several institutes are not mutually connected. In case of NDMS(National Disaster Management System), the data of the system is confined to the resources of the local governments and not connected with any other disaster resource management systems. Therefore, it is difficult to find the needed resources, when the large scale disaster is occurred. In this paper, we developed the integrated model of the distributed resources management framework considering the current resource management environment among the institutes. It is loosely coupling model under the centralized system, called IDRM(Integrated Disaster Resource Manager). The system will be verified with the test sites including Korea Expressway Corporation, JeonBuk local government, and Korea Construction Equipment Association. Via the field testing, the system will be the base of the real available system in the future.

A Study of the standard disaster field manuals based on the situations (상황 기반 표준 현장조치 행동 매뉴얼 체계에 관한 연구)

  • Park, GilJoo;Lee, ChangYeol;Kim, TaeHwan
    • Journal of the Society of Disaster Information
    • /
    • 제14권4호
    • /
    • pp.474-479
    • /
    • 2018
  • Purpose: This study focus on the disaster response process in the disaster field manuals. The process reflects the several kinds of disaster situation scenarios under the defined disaster types. Method: Firstly we defined the situation concept from the emergency types. And then, we makes each disaster response process based on the situations. Results: There are several kinds of the disaster response process in a disaster fields manuals. The most of the process has the duplicated SOP's among the situation types. In this paper, we developed the situation code sand then apply the codes to the process. As a result of the work, we defined one the disaster response process which includes the situational code in the each SOP. Conclusion: This study developed the several kinds of the disaster response process based on the disaster situation types. It makes that we can easily respond to the disaster.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • 제9권3호
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

A Study of the Standard Structure for the Social Disaster and Safety Incidents Data (사회재난 및 안전사고 데이터 분석을 위한 표준 구조 연구)

  • Lee, Chang Yeol;Kim, Taehwan
    • Journal of the Society of Disaster Information
    • /
    • 제17권4호
    • /
    • pp.817-828
    • /
    • 2021
  • Purpose: In this paper, we propose a common dataset structure which includes the incidents investigation information and features data for machine learning. Most of the data is from the incidents reports of the governmental part and restricts on the social disaster and safety areas. Method: Firstly, we extract basic incidents data from the several incident investigation reports. The data includes the cause, damage, date, classification of the incidents and additionally considers the feature data for the machine learning. All data is represented by XML standard notation. Result: We defined the standard XML schema and the example for the incidents investigation information. Conclusion: We defined the common incidents dataset structure for the machine learning. It may play roles of the common infrastructure for the disaster and safety applications areas

A Study on the Major Country's Domestic Intelligence Operation and Architecture: Focusing on UK, USA, France and Korea (주요 국가의 국내정보 활동 및 조직체계 연구 : 영국·미국·프랑스·우리나라의 국내정보기구를 중심으로)

  • Moon, Kyeong-Hwan
    • Korean Security Journal
    • /
    • 제41호
    • /
    • pp.153-183
    • /
    • 2014
  • Nowadays, proactive intelligence activities are required because of enhanced nation wide threats of terrorism and complexity of multidimensional factors of national security. South Korea not only need to draw up plans of information sharing among agencies for more effective national intelligence activities, but also have to evaluate the structure of Domestic Intelligence Agency and its right direction of activities. In this vein, this paper conducts comparative studies of structures and range of activities of intelligence Agencies by reviewing U.K, U.S.A, and France cases and suggests a potential model of 'domestic information specified agency' that we can adopt and methods to share information among agencies. The focus of this paper is on the reviewing of necessity of establishing new 'domestic information specified agency' which will mainly conduct anti-terrorism and counterintelligence activities, and its appropriate form. After reviewing the cases of U.K, U.S.A. and France, we conclude that overcoming the people's distrust about an invasion of freedom and rights caused by centralized and integrated independent intelligence agency is a prerequisite. Disputable issues of FBI, DHS, and South Korea's intelligence agency cases suggest that plans for restoring trust have to be considered if a new 'domestic information specified agency' is established in NIS. If it is established under government ministries such as MSPA focusing on implementing anti-terrorism and counterintelligence activities, organizations such as NCTC, NIC, that can carry out information sharing and cooperating with agencies concerned have to be established. Additionally, measures to solve structural problems caused by carrying out law enforcement functions by domestic information specified agency should be considered.

  • PDF

A Study on Smart Network Utilizing the Data Localization for the Internet of Things (사물 인터넷을 위한 데이터 지역화를 제공하는 스마트 네트워크에 관한 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제18권6호
    • /
    • pp.336-342
    • /
    • 2017
  • Traffic can be localized by reducing the traffic load on the physical network by causing traffic to be generated at the end of the packet network. By localizing traffic, the IoT-based sensitive data-related security issues can be supported effectively. In addition, it can be applied effectively to the next-generation smart network environment without changing the existing network infrastructure. In this paper, a content priority scheme was applied to smart network-based IoT data. The IoT contents were localized to efficiently pinpoint the flow of traffic on the network to enable smart forwarding. In addition, research was conducted to determine the effective network traffic routes through content localization. Through this study, the network load was reduced. In addition, it is a network structure that can guarantee user quality. In addition, it proved that the IoT service can be accommodated effectively in a smart network-based environment.

A study on Prevent fingerprints Collection in High resolution Image (고해상도로 찍은 이미지에서의 손가락 지문 채취 방지에 관한 연구)

  • Yoon, Won-Seok;Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • 제10권6호
    • /
    • pp.19-27
    • /
    • 2020
  • In this study, Developing high resolution camera and Social Network Service sharing image can be easily getting images, it cause about taking fingerprints to easy from images. So I present solution about prevent to taking fingerprints. this technology is develop python using to opencv, blur libraries. First of all 'Hand Key point Detection' algorithm is used to locate the hand in the image. Using this algorithm can be find finger joints that can be protected while minimizing damage in the original image by using the coordinates of separate blurring the area of fingerprints in the image. from now on the development of accurate finger tracking algorithms, fingerprints will be protected by using technology as an internal option for smartphone camera apps from high resolution images.

Entry Types and Locational Determinants of North Korean Workers in Cross-border Regions between North Korea and China (중국 대북 접경지역의 북한 노동력 진입 유형과 요인)

  • Lee, Sung-Cheol;Lee, Yong-Hee;Kim, Boo-Heon
    • Journal of the Economic Geographical Society of Korea
    • /
    • 제22권4호
    • /
    • pp.438-457
    • /
    • 2019
  • The main purpose of this paper is to identify the entry types and locational determinants of North Korean workers in cross-border regions between North Korea and China. More specifically, the paper has attempted to divide the entry type of them in the regions into two; 1) entry via transactions between Chinese traders with North Korea and North Korea trade companies, and 2) entry via transactions between Korean-Chinese middlemen and North Korean trade companies. Also, it has analyzed main factors of their locational determinants in the spatial contexts of the regions. There have been changes in two perspectives in terms of the entry paths and types of them in accordance with the transformation of characteristics of United Nations sanction against North Korea from 'call-upon' to 'decide' after UN Security Council Resolution 2094 in 2013. Firstly, main agents who have dealing with North Korean trade companies which have right to dispatch North Korean workers have been changed from Chinese traders into Korean-Chinese brokers who are specialized in the introduction of North Korean workers with one-stop service from visa administrative to labor managements. Secondly, there has been a transfer of North Korean workers in the regions from formal to informal workers who has been admitted into China with a short stay or a tourist visa, and then remained illegally to be employed in China. Therefore, as demands on service which is able to guarantee the security of North Korean informal workers and their managements have increased, Korean-Chinese brokers have been stimulated in the regions after the operation of real international sanctions against overseas North Korean workers. In addition, the main factors of their locational determinants in cross-border regions between North Korea and China are could be analyzed in three perspectives; 1) an increase in real wages in accordance with the reform of the Chinese social insurance system after 2011, 2) the structural vulnerability of labor markets in the regions, 3) the utilization of stable and manageable workers.