• Title/Summary/Keyword: Operational Security

Search Result 368, Processing Time 0.031 seconds

A Legal Study on the Promotion of the In-Flight Security Officers System

  • Jin, Seong Hyun;Jeon, Seung Joon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.100-105
    • /
    • 2021
  • The purpose of this study is to provide in-flight security in situations where aviation security is constantly threatened by the increase in illegal interference in aircraft and the threat of terrorism that still exists. It is to identify legal operational problems such as education and qualification of the original system and to propose improvement measures. To this end, the need for revision based on relevant laws and guidelines such as "Operation Guidelines for In-Flight Security Officers" is to be discussed based on international standards such as ICAO and Federal Air Marshal. The research method was based on interviews with SEMs such as cabin managers, which focused on ensuring the legal status of In-Flight Security Officer, establishing relationships with captains, and improving education and training.

Evaluating the Operational Capabilities and Security of the IoBT Network Architecture (IoBT 네트워크 환경에서 작전 영역의 보안 대응 체계 연구)

  • Kang, Hae-Young;Lee, Jemin Justin;Kim, Yu-Kyung;Go, Myong-Hyun;Lee, Kyungho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.140-143
    • /
    • 2021
  • IoBT시장은 2023년까지 317억 달러로 성장할 것으로 예측되며, 센서 및 웨어러블 디바이스와 같은 IoBT 장비의 수가 급격히 늘어나고 있다. IoBT 장비들로부터 수집된 생체 정보와 같은 민감한 데이터를 효율적이고 안전하게 처리하기 위해 많은 노력이 필요하다. 하지만 초경량화, 저전력화된 IoBT 장비들은 보안적인 측면에서 취약한 상황이다. 본 논문은 Fog computing을 적용하여 전장과 지휘관 사이에서 결심 및 통제에 필요한 시각화 자료를 신속하게 제공하고 IoBT 장비의 보안 사항과 공격에 따른 완화 기법을 수행할 수 있는 새로운 네트워크 아키텍처를 제공하고자 한다.

Information security risk: Application of the conjoint analysis (정보 보안 위험: 컨조인트 분석 활용 사례 연구)

  • Pak, Ro-Jin;Lee, Dong-Hoon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.2
    • /
    • pp.207-215
    • /
    • 2011
  • This Risk analysis on information related assets is conducted primarily according to the standards the Korea Information and Telecommunications Technology Association (TTA) or the International Organization for Standardization (ISO). The process is made of asset analysis, threat analysis, vulnerability analysis, and response plan analysis. The risk for information related assets belongs to the operational risks suggested by BIS (Bank for International Settlements) and the information related losses can be estimated in terms of BIS' suggestion. In this paper it is proposed that how to apply the method proposed by BIS to estimate the loss of information assets.

Following the Cold War, both the United States' military operational concept and the Republic of Korea Army's developmental study (탈냉전기 미국의 군사작전 개념과 한국군 발전방향 연구-합동작전을 중심으로)

  • Lee, Se-Han
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.121-163
    • /
    • 2004
  • Science technique development expanded into, not only land, sea, and air operations but also those of airspace, and cyber battle spaces. It is generally accepted at this time that space centric operations currently cannot be effectively divided from air operations. However, science and technology advancements make it possible to integrate Army, Navy, Airforce, and Marine forces into effective operations as never before. The Republic of Korea Armed Forces needs to establish a more effective joint concept. The US military, considered by many experts as the most effective in the world, understands the necessity of joint operations and accordingly has highly developed its own concept of joint operations. The US joint operational concepts demonstrated their effectiveness during the Iraqi War by dominating the battlefield through effective use of all combat and non-combat power. Following the US Iraqi War experience, the US Department of Defense continued to enhance Joint Capability through the acceleration of US Military Transformation involving all components. The future national security of the Republic of Korea, faced with the peculiarity of communist threat in the form of North Korea, and the conflicting interest of four strong powers; the United States, China, Japan, and Russia, depends on small but strong armed forces employing all available combat power through effective National and Military Strategy, and considering domestic and international constraints. In order to succeed in future wars, military operations following joint operational concepts must effectively employ all available combat power in a timely manner. The Republic of Korea Armed Forces must establish a joint forces concept in order to integrate all available combat power during employment. Therefore we must establish military operations that develop the military structure and organization, doctrine, weapon systems, training and education of our armed forces based on the key concept of joint operations.

  • PDF

The Influence of Shoppers' Security Need Sufficiency and Customer Satisfaction on the Quality of Security Services in Large Shopping Centres (대형쇼핑몰 보안서비스품질이 고객안전욕구충족 및 고객이용만족에 미치는 영향)

  • Lee, Jong-Hwan;Kang, Kyoung-Soo
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.41-63
    • /
    • 2010
  • This study aimed to asses the relationship between shoppers' security need sufficiency and customer satisfaction on the quality of security services in Shopping Mall. This study gathered data from 485 citizen in five shopping centres at KyungKi areas. Collected data was analysed by factor analysis, reliability analysis, path analysis and multiple regression analysis with SPSS WIN 16.0. The results of the study yielded the following four perspectives. First, secure equipment and the service quality of security officers in the shopping malls have a decisive effect on customers psychological stability and crime prevention. Second, they are a strong influence upon customer satisfaction and operational security. Especially, the professionalism of the staff has a marked effect. Third, the service quality of security officers and secure equipment in the malls have an effect on operational security services and efficiency of secure services. Finally, this dissertation showed that the quality of secure equipment services and officers' mild In summary, the conclusion of this study is that secure equipment service, officers' mild manner and professionalism of the security officers affect the customer satisfaction measurement directly. They also affect customer satisfaction through psychological stability and the prevention of crime indirectly. In other words, the good quality of security in the shopping centres affects the using of facilities definitely.

  • PDF

Realization of Futuristic Aviation Security of Incheon International Airport by implementing Smart Security Project (Smart Security 추진을 통한 인천국제공항의 미래 항공보안 구현)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.492-497
    • /
    • 2021
  • Smart Security is the global initiative of Airports Council International in collaboration with airports, airlines and governmental agencies. Its main objective is to create a step change in passenger and cabin baggage screening, escalating security costs and constantly evolving threats. Incheon International Airport should adopt and deploy smart security systems not only to strengthen aviation security but also increase passenger's experiences and operational efficiency by way of seamless security screening that it will lead to establish the best security environment to prevent terrorism and acts of unlawful interference.

Design and Evaluation of Information Broker Architecture for Network-Centric Operational Environment (네트워크 중심 작전 환경을 위한 정보 브로커 아키텍처 설계 및 평가)

  • Park, Jejun;Kang, Dongsu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.668-677
    • /
    • 2016
  • The information superiority through effective networking is a core element that accelerates command decision for mission completion. Our military wants to acquire capabilities of effective information sharing with Network-Centric Operational Environment(NCOE) for Network-Centric Warfare (NCW). In this paper, we suggested an information broker for overcoming current limits and maximizing future expandability and possibility of information sharing capacities. The information broker, which is an intermediate layer between users and information providers, provides the functions for mediating and managing information and for ensuring security of the system. We evaluated the consistency of proposed architecture and the implementation of the operational architecture design concept using existing design frameworks.

Daily Unit Commitment Scheduling of Power System with Energy Storage System (전력저장장치를 고려한 일간 최적 기동정지계획 수립연구)

  • Song, Ha-Na;Jang, Se-Hwan;Kim, Hyeong-Jung;Roh, Jae-Hyung;Park, Jong-Bae
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.4
    • /
    • pp.717-725
    • /
    • 2011
  • In the power system with an electric storage system that can increase utilization rate of the source of such new renewable energy, this paper introduces the approach on the daily unit commitment scheduling that determines simultaneously optimum operational condition and output of thermal generators and electric storage device. The unit commitment is one of the most important issues in economic operation and security of short-term operational plan of the power system. It is to determine on/off status of generator to minimize operational cost during the given period. The committed generator should satisfy various operational limitation such as estimated demand by system, spinning reserve condition within minimum operational cost. In order to determine on/off or charge/discharge/idle condition and output level of units and electric storage system, the MILP(Mixed Integer Linear Programming) is suggested. The proposed approach is the mixed method between LP(Linear Programming) and IP(integer programming) which seeks the value of real number and integer that maximize or minimize function objective within given condition. The daily unit commitment problem with the electric storage system is applied to MILP algorithm through linearization and formulation process. The proposed approach is applied to the test system.

Proposal of a framework for evaluating the operational impact of cyber attacks on aviation weapons systems(EOICA) (항공무기체계 사이버공격에 대한 작전영향성평가 프레임워크 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Lee, Soo-jin;Lim, Jae-sung
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.35-45
    • /
    • 2020
  • Cyber attacks on the aviation weapon system, a state-of-the-art asset, have become a reality and are approaching as a constant threat. However, due to the characteristics of embedded software of the current aviation weapon system, it is managed and operated without connection to the network in peacetime, so the response management to cyber attacks is relatively weak. Therefore, when a cyber attack becomes a reality, it is urgent to prepare and evaluate measures for the adverse effects that such attack will have on the execution of the Air Tasking Order(ATO). In this paper, we propose a framework for operational impact assessment in order to avoid confusion in ATO execution and systematic response to cyber attacks on aviation weapons systems. The proposed framework is designed to minimize the negative impact on operations against cyber attacks that may occur under no warning by analyzing the impact on air operations for each aviation weapon system and standardizing countermeasures for this. In addition, it supports the operational commander to make a quick decision to command for the execution of the operation even in a situation where a cyber attack occurs.

A Study on Contents Security Method Based on a Content Delivery Network (CDN 환경에서 콘텐츠 보안 방법 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.51-56
    • /
    • 2008
  • Is caused by with growth etc. of the digital contents circulation market which leads suddenly accommodates in order to control the network traffic which increases and the researches which are various are being advanced the explosive evidence and a electronic transaction of the Internet user. The present paper protects a digital contents and a copyright from CDN system environments which will appear the center of new network service with the plan for the dispersive DRM system of CDN bases plans. Respect this dispersion DRM package formats which provide a stronger security characteristic in the contents which is stored the operational process of the dispersive DRM system for to be defined, CDN system and of existing interoperability they present.

  • PDF