• Title/Summary/Keyword: Security Case

Search Result 1,791, Processing Time 0.025 seconds

Security Measures against Assembly and Demonstration during International Conference - the Case of the Nuclear Security Summit - (국제회의 시 집회시위에 관한 안전관리 방안 - 핵 안보정상회의 개최를 중심으로 -)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.193-222
    • /
    • 2011
  • Our country successfully hosted the G20 summit in Seoul in November, 2010. Afterwards, however, the Yeonpyungdo shelling incident took place by the North, and the North Korean nuclear issue have strained interKorean relations. Our country is going to host the nuclear security summit, which is of great significance at this point of time. The nuclear security summit is to be attended by 47 countries. The participant countries of this summit is larger in number than those of the ASEM, APEC and the G20 summit that our country has ever hosted. That is a large-scale international conference that invites the UN, the IAEA and the EU, which are three major nuclear-related international organizations. A successful hosting of the nuclear security summit will serve as an opportunity to boost our country's national prestige, and is likely be beneficial to the settlement of the North Korean nuclear issue. Like other international submits in foreign countries, however, violent anti-globalization demonstrations are expected to occur when the nuclear security summit is held in April next year. The purpose of this study was to make a case analysis of demonstrations during multilateral international conferences hosted by foreign countries over ten years between 1999 and 2009, to examine the controversial points over the demonstrations, and ultimately to seek ways of ensuring safety against possible assemblies and demonstrations during the forthcoming nuclear security summit, which is scheduled to be held in April next year. The findings of the study on feasible security measures are as follows: First, information and intelligence gathering should be reinforced, and the inspection should be stepped up. Second, pacification among domestic NGOs and the supplementation of the existing legal devices are required. Third, publicity should be strengthened. Fourth, riot police officers should be selected as early as possible to bolster their education and training, and more reinforced emergency measures should be taken. It's needed to seek assistance from the military as one of emergency measures, and national defense readiness should be bolstered across the nation in collaboration with the Ministry of National Defense when the summit is near at hand. Finally, CBR countermeasures should be taken in preparation for CBR terrorism.

  • PDF

A Study on the Traffic Induction Security Plan: On the Case of Japan (교통유도경비 도입방안에 관한 연구: 일본사례를 중심으로)

  • Kim, Tae-Hwan
    • 한국경호경비학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.33-43
    • /
    • 2008
  • 최근 국민소득의 성장과 안전한 삶의 질에 대한 요구는 보다 높은 건설 현장이나 공사장, 도로, 그리고 각종 행사장에서의 안전 관리를 요구하고 있으나 현실은 이에 미치지 못하고 있다. 본 연구에서는 일본에서 시행되고 있는 교통유도경비 제도를 우리의 실태와 분석하여, 방안으로, 경비업과 관과의 상호협력체계마련과 민간자격제도 도입, 그리고, 교육프로그램 개발과 교육의 표준화, 법적지위의 확보에 대한 대안을 제시하였다.

  • PDF

Security Control of Power Systems (전력계통의 신뢰도제어 -상정사고해석을 중심으로-)

  • 양흥석;박영문
    • 전기의세계
    • /
    • v.26 no.3
    • /
    • pp.84-91
    • /
    • 1977
  • A modified version of algorithm and computer program is proposed to improve the currently available contingency analysis methode for the security control of power system. The underlying principle is based upon the reasonable modification of the current methods suggested by Stagg, Tinny, Alsac, and Stott in consideration of speed, aceuracy, reliability and convergency characteristics. The algorithm and program are desirgned especially for On-Line operation, although Off-Line applications are readily available. Several case studies on the Koren Power Company's 48-bus, 91-line system have shown that the method proposed is efficiently powerful in a sense of practical applicability.

  • PDF

Case of Security Coding Guide (보안 코딩 지침의 사례)

  • Shin, Seong-Yoon;Lee, Sang-Won;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.77-78
    • /
    • 2015
  • 본 논문에서는 S/W 개발 보안 지침의 사례로서 SQL 삽입에 대하여 설명한다. SQL 삽입은 입력 데이터 검증 및 표현에서 S/W 취약점 유형의 하나이다. 본 논문에서는 SQL 삽입에서 취약점 설명, 취약점 개념도, 보안 대책, 그리고 코드 예제까지 설명하도록 한다.

  • PDF

Improvement Plan on Park Geun-Hye Government's Policy Implementation for Social Security (박근혜 정부의 사회안전 정책추진 발전방안)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.87-124
    • /
    • 2013
  • This paper studies changes in people's social security awareness during Lee Myung-Bak government, and based on the result, suggests future Park Geun-Hye government's social-security-related administration management plan. In specific, the changes in people's social security awareness in the period of 2008 ~ 2012 have been analyzed, and the result has been utilized to draw suggestions on the future social-security-related administration management plan The result is as the following: First, comprehensive social-security-related policy must be continuously pushed. In terms of the fact that social security is closely related to people's daily lives and life itself, every major component of social security cannot be overlooked. Therefore, comprehensive administration management and policies on each of those components are necessary. Second, social security policies must be reinforced enough for people to actually witness. In case of crime rate, 57.1% of people are pointing it as one of the main causes of social unrest; therefore, this national anxiety must be met with focusing awareness on the subject nation-widely and with thorough national defense preparedness. Third, mutual cooperation between social-security-related branches, and systematic management within the each branches are required. In order to systematically manage every aspect of social security, not only the big agencies - such as Ministry of Security and Public Administration, Ministry of National Defense, Prosecution Service, or National Police Agency -, but most of other parts of administration must cooperate as well. Fourth, consistency in social security policies is necessary. As Park Geun-Hye government's administrative slogans are, "secure and integrated society," "establishing a foundation for happy unification era," which are similar to that of previous administration, the administration should be consistent on its social-security-related politics, rather than differentiating themselves from the previous administration.

  • PDF

A CC-Based Misuse Case Model for Security Requirements Derivation and Specification (보안요구사항 도출 및 명세를 위한 CC기반 Misuse Case 모델)

  • 장세진;최상수;이강수;최희봉
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.277-279
    • /
    • 2004
  • 정보화가 가속화되면서 정보시스템은 우리의 일상생활에서 점점 더 중요한 요소로 자리 잡아 가고 있으며 정보시스템에 대한 의미가 커져가고 있다. 이에 따라 정보시스템은 우리의 생활에서 없어서는 안 될 보호되어야 할 주요 자산으로 여겨지고 있다. 본 논문에 시스템의 신뢰성과 안전성을 제고하기 위하여 보안요구사항 도출 및 명세를 위한 CC 기반 Misuse Case 모델을 제시한다.

  • PDF

Criminal Psychological Analysis of Serial Killer Focused Study on On Bo Hyun's Women Kidnapping and Murder Case (연쇄 살인범에 대한 범죄심리학적 분석 -온보현 부녀자 납치${\cdot}$살인 사건을 중심으로-)

  • Oh, Yoon-Sung
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.215-233
    • /
    • 2003
  • The Serial murder is a serious social phenomenon that gives a shock to community and society, because of it's habituate and scheme. We could identify a happening of serial killing crime at Western society, especially in U. S, but hardly to find many cases in Korea except some of cases. We can easily prospect the happening of serial killing crime at Korea in the future, at least it exists that home and social disorganization cause by divorcing and hasty economic development. There will be a reserve criminal who have distorted personality effected by undesirable surrounding, therefore he may become a serial murder. This study examines criminal psychological analysis of On Bo Hwan's serial murder case in 1994 at Korea, according to criminal records and press report and his statement and confession. This paper also show his domestic background and growing atmosphere and human relation between his parents.

  • PDF

The Recommendation of Controls for Hospital Information System Using CRAMM: Case Studies of Two Korean Hospitals

  • Moon, Song-Chul;Han, In-Goo;Lee, Sang-Jae
    • Korean Management Science Review
    • /
    • v.17 no.1
    • /
    • pp.145-158
    • /
    • 2000
  • The medical records of diagnostic and testing information include sensitive personal information that reveals some of the most intimate aspects of an individual's life. The hospital information system (HIS) operates in a state of high risk which may lead to the possible loss to the IS resources caused by various threats. This research addresses twofold : (1) to perform asset identification ad valuation and (2) to recommend countermeasures for secure HIS network using case studies This paper applied a risk management tool CRAMM (Central Computer and Tele-communications Agency's Risk Analysis and Management Method) to assess asset values and suggest countermeasures for the security of computerized medical information of two large hospitals in Korea. CRAMM countermeasures are recommended at the reference sites from the network security requirements of system utilized for the diagnosis and treatment of patients. The results of the study will enhance the awareness of IS risk management by IS managers.

  • PDF

Terrorism using biological weapons and Countermeasures (생물무기에 의한 테러와 대응책)

  • Jo, Sung-Ho
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.287-307
    • /
    • 2004
  • Mass killing and injuring by purpose, the countries that is hurrying countermeasure preparation of investigators who enforce that necessity to compare to intimidation of doing creature weapon is common concerns of the several countries including advanced nation such as the United States of America. Development and use of biological weapon have increased too recently to private citizens unlike development of military purpose in country dimension. The latest WHO is preparing proposal of standard stroke model who each department solidifies preparedness for chemical biological and electronic weapon revising report about biological weapon. But in case of korea, confrontation plan that bamboo broom about possibility of attack to the common people and attack comparing actual state in case of attained nothing but is readying remedy about biological warfare partially in military dimension was not readied. The purpose of this article is a study on threat of bio-weapons and the countermeasure.

  • PDF

A Study on the Early-Age Strength Property of Concrete Using Liquid Admixture (액상형 조강제를 사용한 콘크리트의 초기강도 특성에 관한 연구)

  • Song, Tae-Hyeob;Lee, Sea-Hyun;Ryu, Deug-Hyun;Park, Cho-Bum
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05b
    • /
    • pp.469-472
    • /
    • 2006
  • Amount used of admixture fare is increasing for concrete economic efficiency and ability security. Security of economic efficiency and ability can expect by use of this admixture fare but is displaying a lot of problems on early age strength hold by hydrate delay relatively. Specially, in the case of construction site, concrete strength can speak that interrelation is high with mold removal of forms time. Therefore, is economical and need examination of plan that can secure robber within 3 days using admixture fare such as fly ash and blast furnace slage differential speech to secure function. In this study, adding liquid admixture within 1% of a binding agent quantity to examine these problem with physical characteristic after hardening ago specially, strength change at standard and air dry curing of observed change in priority. Air dried and water curing total strength enhancement effects appeared by thing which is in case of add test result liquid admixture by below 1% and strength deputy by passage of age could know is not big.

  • PDF