• Title/Summary/Keyword: Physical threats

Search Result 145, Processing Time 0.024 seconds

Development and Evaluation of Physical Fitness Program for Special Security Guards in Nuclear Power Plant (원자력발전소 특수경비원을 위한 체력훈련 프로그램의 개발 및 효과검증)

  • Jeong, Ho-won;Lee, Suk-ho
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.87-111
    • /
    • 2020
  • Special security guards working at nuclear power plants, one of the country's major facilities, serve as human protection to safeguard from threats to nuclear facilities and nuclear materials. The purpose of this study was to develop a physical fitness program for fitness management that is essential for the completion of missions of special guards. This program was designed to prepare the physical fitness test proposed by Jeong et al. (2019). Researchers conducted literature analysis, research meetings, expert meetings and pretests, and developed a 90-minute physical fitness program for 6 weeks, 3 times a week. In order to verify the effectiveness of the developed physical fitness program, the experiment was conducted on 29 subjects(control group: 15, exercise group:14). Specifically, a six-week physical fitness program was conducted for exercise groups, and the fitness test for a special security guard was conducted for all subjects before and after the experiment. As a result, it was found that the physical fitness program was effective in improving the performance of 20m shuttle run, leg tuck, 20m sprint & carry, and medicine ball back throw. Until recently, problems of neglecting fitness management of security guards have been pointed out. It is expected that the physical fitness program proposed by this study will be a practical alternative for security guards' fitness management.

A Study on Job Analysis and Physical Fitness of Special Security Guard in Nuclear Power Plant (원자력발전소 특수경비원의 직무분석과 체력에 관한 연구)

  • Jeong, Howon;Kim, Sora;Chae, Hyeonsoo
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.83-105
    • /
    • 2018
  • Special security guards play the role to safely operate and manage nuclear power plants from unintended internal and external threats. Physical fitness management of special security guards is one of the most important factors for improving and maintaining the level of physical protection. Thus, the purpose of this study is to analyze the physical fitness factor and physical fitness level required for mission accomplishment through job analysis of special security guards. The special security guards of Nuclear Power Plant in Korea were performing 7 jobs, 26 duties, 159 tasks. In order to accomplish theses tasks, the following physical fitness were required: muscle strength and muscle endurance of the hand, upper limb, lower limb and core, quickness, agility and Cardio function. The duties that require a lot of physical fitness were in the order of conducting arrest and self-defense, conducting unarmed defensive tactics, demonstrating proficiency with semiautomatic rifle, using protective equipment, performing emergency plan and defensive strategy, etc. The results of this study are expected to provide basic data necessary for establishing guidelines for fitness qualification and training of special security guards in the future and contribute to enhancement of physical protection of nuclear power plants.

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

"An Analysis Study of Factors for Strengthening Cybersecurity at the Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 요인 분석연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.64-65
    • /
    • 2023
  • The purpose of this study was to assess the current status of cyber security at the Busan Port container terminal and derive strengthening factors through exploratory research. In recent years, the maritime industry has actively adopted Fourth Industrial Revolution technologies, resulting in changes in the form of ports, such as automated and smart terminals. While these changes have brought positive improvements in port efficiency, they have also increased the potential for cyber security incidents and threats, including information leakage through cargo handling equipment and ransomware attacks leading to terminal operations disruption. Especially in the case of ports, cyber security threats can have not only local effects within the port but also physical damage and implications for national security. However, despite the growing cyber security threats within ports, research related to domestic port cyber security remains limited. Therefore, this study aimed to identify factors for enhancing cyber security in ports and derive future enhancement strategies. The study conducted an analysis focusing on the Busan Port container terminal, which is one of the leading ports in South Korea actively adopting Fourth Industrial Revolution technologies, and conducted a survey of stakeholders in the Busan Port container terminal. Subsequently, exploratory factor analysis was used to derive strengthening factors. This study holds significance in providing directions for enhancing cyber security in domestic container ports in the future.

  • PDF

Design and Implementation of Real-Time Indirect Health Monitoring System for the Availability of Physical Systems and Minimizing Cyber Attack Damage (사이버 공격 대비 가동 물리장치에 대한 실시간 간접 상태감시시스템 설계 및 구현)

  • Kim, Hongjun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1403-1412
    • /
    • 2019
  • Effect of damage and loss cost for downtime is huge, if physical devices such as turbines, pipe, and storage tanks are in the abnormal state originated from not only aging, but also cyber attacks on the control and monitoring system like PLC (Programmable Logic Controller). To improve availability and dependability of the physical devices, we design and implement an indirect health monitoring system which sense temperature, acceleration, current, etc. indirectly, and put sensor data into Influx DB in real-time. Then, the actual performance of detecting abnormal state is shown using the indirect health monitoring system. Analyzing data are acquired using the real-time indirect health monitoring system, abnormal state and security threats can be double-monitored and lower maintenance cost utilizing prognostics and health management.

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

The Important Factors in Security for Introducing the Cloud Services (클라우드 서비스 도입을 위한 보안 중요도 인식에 대한 연구)

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.33-40
    • /
    • 2012
  • The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.

An integrated framework of security tool selection using fuzzy regression and physical programming (퍼지회귀분석과 physical programming을 활용한 정보보호 도구 선정 통합 프레임워크)

  • Nguyen, Hoai-Vu;Kongsuwan, Pauline;Shin, Sang-Mun;Choi, Yong-Sun;Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.143-156
    • /
    • 2010
  • Faced with an increase of malicious threats from the Internet as well as local area networks, many companies are considering deploying a security system. To help a decision maker select a suitable security tool, this paper proposed a three-step integrated framework using linear fuzzy regression (LFR) and physical programming (PP). First, based on the experts' estimations on security criteria, analytic hierarchy process (AHP) and quality function deployment (QFD) are employed to specify an intermediate score for each criterion and the relationship among these criteria. Next, evaluation value of each criterion is computed by using LFR. Finally, a goal programming (GP) method is customized to obtain the most appropriate security tool for an organization, considering a tradeoff among the multi-objectives associated with quality, credibility and costs, utilizing the relative weights calculated by the physical programming weights (PPW) algorithm. A numerical example provided illustrates the advantages and contributions of this approach. Proposed approach is anticipated to help a decision maker select a suitable security tool by taking advantage of experts' experience, with noises eliminated, as well as the accuracy of mathematical optimization methods.

The Study on the Fragment Ejection Velocity and Spray Angle from a High Explosive Cylindrical Warhead (실린더형 HE 탄두 폭발 시 파편의 속도 및 발사각 추정방법 연구)

  • Hwang, Changsu;Park, Younghyun;Park, Seikwon;Jung, Daehan;Lee, Moonsik;Kang, Sunbu;Kim, Deuksu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.12
    • /
    • pp.904-912
    • /
    • 2019
  • We have studied the numerical analysis about the fragment ejection velocity and spray angle when the High Explosive warhead detonated at proximity distance at an aircraft. To study the physical quantities about the warhead components is very important to assessment the vulnerability of aircraft. Generally, the physical quantities about the components of a warhead such as the mass, length, diameter and charge to mass ratio are unknown. Therefore, it is required to estimate the physical quantities by using physical continuities of similar threats. The empirical formulas to understand the dependence among charge to mass ratio, length and diameter ratio were driven by using the physical parameters of similar threatening such as terrier, sparrow. As a result, we confirmed that the dead mass ratio was closed to 20% of warhead mass since the metal case of the proximity threat acts as a simple carrier. This implies that the effective length and diameter of High Explosive Compound is smaller than the length and diameter of warhead, and become a key to understand the large ejection gradient velocity and small spray angle of fragments within 6 degree.