• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.031 seconds

Increasing demand formaritime security measures to streamline the maritime security (해양경비수요 증대에 따른 해양경비 효율화 방안)

  • Seo, Jin-Seok
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.13-21
    • /
    • 2014
  • Three sides by the waters of the country in which the topography of the peninsula is a treasure trove of natural resources in the country to recognize the importance of the sea and maritime territorial and maritime policy for the protection of rights, such as to promote the country striving to strengthen haeyangryeok. However, marine activities is 200 sea miles exclusive economic zone of the stage (EEZ) and the continental shelf extends as the, EEZ waters of the overlapping jurisdiction, Books sovereignty, marine scientific research and development, including the continental shelf surrounding the deepening relationship between the neighboring countries and complex understanding including international cooperation and coexistence between countries to be competitive. This time the Coast Guard 's maritime sovereignty existing patron driven from the accident prevention safety management system, from our sea, has been kept firmly. However, due to the new issue of disaster lies in the fate of marine police became dismantled. This real time so that you can be reborn as a marine police force structure. Structure to change the way the rescue operation. Expenses, Shore, you will need to increase the professionalism of pollution.

Revitalization Solutions for Industrial Security Activities in Universities (대학 내 산업보안활동 활성화 방안)

  • Jeong, Duke-Young;Jung, Byung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.314-324
    • /
    • 2010
  • As our nation's economy had grown in size and its possession of the cutting-edge science and technology had increased over the years, the damages received from the outflow of our industrial technology has become a serious issue. As of today, the outflow of Korea's industrial technology has reached a serious level, but in reality there were no adequate countermeasures carried out against it. Also, it is not too much to say that the effort to prevent the outflow of the university-developed industrial technology, which is one of the main pillars for the development of the nation's technological prowess, had been carried out in passive and lukewarm manner. Therefore, as a part of the industrial security activity, we have analyzed the overall situation and major cases related to industrial security activities that have been carried out so far, in order to emphasize the importance of those universities. Also, we tried to find appropriate solutions for the universities to invigorate the industrial security activities needed.

A Study on the Technology Trends for Implementation of Homeland Security (국토안보 구현을 위한 기술 동향 연구)

  • Jeong, Seung-Hui;Han, Jong-Wook;Choi, Yong-Seok;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.991-997
    • /
    • 2009
  • Recently, many countries are developing and investing in various homeland security technologies against terrorism. The importance of homeland security has been growing because of nuclear weapon threat from North Korea, the burning of cultural assets, and violence crimes. Therefore, in this paper, we have described and analyzed the trends related to homeland security technology. The main techniques toward homeland security are aggregation technology, integration technology, collaboration technology, categorization technology, intelligence technology, and mining technology. Those are likely to become the growth potentials until fade out of threat. Therefore, we require more government policies to support a budget enlargement.

  • PDF

Food Security and Children′s Nutritional Status of the Households Supported by the National Basic Livelihood Security System (국민기초생활보장사업 수급 가정에서의 식품공급안정성과 아동의 영양상태)

  • 오세영;김미연;홍민지;정해랑
    • Journal of Nutrition and Health
    • /
    • v.35 no.6
    • /
    • pp.650-657
    • /
    • 2002
  • In order to provide basic data for the means to improve food situation and nutritional status of those supported by the National Basic Livelihood Security System (NBLSS), we examined household food insecurity and nutritional status of children under the support of NBLSS. This study included 209 children aged 3-12 years (99 boys and 110 girls) and their caretakers. We measured house food insecurity using Radimer/cornell Scale, children's body sizes and nutrient intake by semi-quantitative food frequency questionnaire, and caretakers' nutritional management skills. Only 9.6% of the households were in food secured (FS) while 8.1% were in household food insecured, but without hunger (HFI), 42.1% were in adult food insecured with hunger (AFI), and 40.2% were in child hungry (CH). Important predictors of food security were nutritional management skills of the caretakers as well as their education, but neither income nor food expenditure of the households. Mean energy intake of the children was 86.0% of the Korean Recommended Dietary Allowance (RDA). Intakes of protein, phosphorous, vitamin A and B$_1$ were relatively high ranging from 112.3% to 124.4% of the RDAs while those of calcium, iron, niacin, vitamin C were low showing 74.8-83.3% of the RDAs. Height, weight and weight/height ratio were close to the reference levels. Lower nutrient intakes of children were observed as the households were more food insecured. However, nutrient intakes and body sizes of children did not differ as a function of household socioeconomic status representing by income, food expenditure and caretakers' education. Results of this study suggest the importance of food security and nutritional management skills for the children's nutrient intakes. Concerning this matter, a need for nutrition education in the program for NBLSS was discussed.

A Study Related on Relationship between New Terrorism's and Security Strategy for Korea (뉴테러리즘의 민간시큐리티 연계와 발전방안)

  • Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.1-13
    • /
    • 2008
  • Conclusion is like below. First, as a private security area's mutual relationship and development device, it is necessary to bring up corresponding-terror expert. Second, a privatized corresponding-terror research center is necessary. Third, the importance of privatization's role for the corresponding-terror prevention law establishment. It is considered that a diversified examination research that can minimize a violation of human rights by bringing up various corresponding-terror expert, paradigm shift of workers related security area, and construct corresponding- terror education equipment as well as education content, it is not a special group's authority, should be continued by a following research. Academical area of terrorism's construction is necessary. You need to approach by private initiatively boldly with the academic world as an active mutual cooperation politically, culturally, socially, internationally, etc, rather than developing national institute initiatively. Also, in a following research, an academical research about a correlation of crime, war, terror should be done deeply, variously. It is necessary to establish an academic foundation of terror study.

  • PDF

The Vulnerability Improvement Research Using Pseudo-Random Number Generator Scheme in EncFS (의사 난수 생성 방식을 이용한 EncFS의 취약점 개선 연구)

  • Jeong, Won-Seok;Jeong, Jaeyeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1539-1550
    • /
    • 2016
  • In modern society, the number of applications, which needs storage, is increased. Among them, the advance of FinTech increased the importance of storage encryption. FinTech storage, storing sensitive information, should be kept secure. Unless the storage is kept, many users will be damaged monetarily. To prevent this problem, we should encrypt the storage. A EncFS, which is one of the most popular storage encryption application, uses different IVs for each block to provide higher levels of security in the encryption algorithm. However, there is a vulnerability related to the usage of same IVs. In this paper, we propose a technique that decrypts the ciphertexts without knowing the secret key by using the vulnerability. Moreover, we show that the EncFS is not secure under IND-CPA model and propose a new scheme which is secure under IND-CPA model.

A Study on the Laws and Regulations in Korea through the Analysis of Cybersecurity Workforce Developing Laws and Regulations in U.S. (미국 사이버보안 인력 양성 법·규정 분석을 통한 국내 법·규정 개선 방안 연구)

  • Hong, Soonjwa;Kim, Joonsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.123-139
    • /
    • 2020
  • In 1987, Computer Security Act was enacted, requiring computer security awareness and practical training for federal workforce. This is the beginning of US development of federal cybersecurity workforce. It has been strengthening the development of federal cybersecurity workforce policy by establishing OPM regulations and OMB circulation in cases where it is difficult to define by law. Through GISRA 2000 and FISMA 2002, which has been improved, it played a central role for development of federal cybersecurity workforce for more than 10 years. Since then, FISMA 2014 has been enacted as a necessity for supplementing technology and policy. In 2014, the importance of cyber security personnel in US federal agencies has been increased even more, by enacting a single law on cybersecurity workforce twice. We will review the current state of Korea's development of cybersecurity workforce by reviewing and analyzing the development and federal cybersecurity workforce in the United States.

Effects of Illumination on Satisfaction of Night Use at Urban Neighborhood Park (조명이 도시근린공원의 야간이용만족도에 미치는 영향)

  • 최연철;김진선
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.29 no.1
    • /
    • pp.92-99
    • /
    • 2001
  • This study analyzed the effects of illumination on psychological accessibility from a view of satisfaction of night use at urban neighborhood park for actual night users. For this, we have classified the effects of illumination as five sampled independent variables from 12 effects of illumination, and tested the relationship with satisfaction of night use of a dependent variable by multiple regression analysis. The results of this study are as follows; 1) The effects of illumination for night use at urban neighborhood park were divided into five factors; (1) direct effect, (2) effect of promoting use, (3) effect of ensuring security, (4) effect of preparing landscape in the night time, and (5) psychological effect. Among independent variables indicating characteristics of effects of each illumination, uneasiness at night use was high. 2) In a multiple regression model, when other conditions were not changed, the value of security of night use (X\ulcorner) had maximumly an affect on the value of dependent. And, the value of danger to meet the depraved(X\ulcorner) had minimally an affect on the value of dependent variable. 3) For the contribution of security of nigh use(X\ulcorner) and brightness of present using space(X$_4$) to satisfaction of night use(Y) of dependent variable, they had a nearly equal effect on that, and showed about 2 times importance compared to familiarity with park(X\ulcorner) and the beauty of park(X\ulcorner). Also, they showed about 7 times contribution to satisfaction of night use compared to danger to meet the depraved(X\ulcorner), which had minimally an affect on the value of dependent variable, as the most important variables. 4) For the effects of illumination on satisfaction of night use, the effect of ensuring security - pursues security of park for the general rather than security for the specific class or subject - and direct effect to offer proper brightness in using space relatively affected on it much compared to psychological effect, effect of preparing landscape in night time, and effect of promoting use. A research on the psychological effects among the variables related to illumination as well as physical circumstances such as the height, location, direction of illumination should be studied.

  • PDF

A Study on the Factors Affecting Switching Intention of Public Certificate Storage : Focused on Smart Certificate(USIM) (공인인증서 저장매체의 전환의도에 영향을 미치는 요인에 관한 연구 : 스마트인증(USIM)을 중심으로)

  • Kim, Kwanghoi;Seo, Hyungho;Yu, Hoon;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.16 no.1
    • /
    • pp.99-118
    • /
    • 2017
  • Growing importance of online security on certification, many of the web-related security technology introduced day by day. Especially, using smart certificate (USIM) is recognized as one of the most safe and convenient method for the security of public certificate. The purpose of this study is to find the factors that affect the Intention of switching to smart certificate for the general public who use public certificate service. Based on migration theory, this study determined the relationship between pull factors, push factors and mooring factors which can affect the intention of switching to smart certificate. To empirically analyze the proposed hypothesis, the statistical analysis were conducted based on the response from 350 public certificate service users using SPSS 22.0 and Smart PLS 2.0. The results of this study can be summarized as follows. First, system quality, one of the pull factors has positive influence on perceived ease of use. On the other hand, the other pull factor, service quality has positive influence on both perceived ease of use and perceived usefulness. Second, push factors, user experience and information security awareness have positive influence on perceived ease of use only. Third, mooring factor, switching cost does not have influence on switching intention while perceived usefulness has positive influence on. The results of this research can be used for whom has interest to the switching intention of public certificate service for online security and provide the proper understanding about smart certificate service mechanism.

A Study on Evaluation of Information Security Awareness and Security Level about Legislative Authority (입법기관의 보안성 평가와 정보보호 인식 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.269-273
    • /
    • 2010
  • 7.7 DDoS incident due to recent events and the emerging importance of privacy and Privacy laws are being discussed in the National Assembly. In this study, Legislative Assembly Secretariat support organization focused on using the system, such as the Internet network and the administrative, technical and physical security elements on the status of confidentiality, availability, integrity and security criteria to identify and follow and We are analyzing. In addition, the Internet, including network and use the system primarily for use, Legislative support agency, The National Assembly Secretariat staff awareness about information security and privacy on the survey for compliance with codes of conduct and We are analyzing. Through this analysis of legislative support agencies' security status, and social responsibility as an institution will wish to encourage the role.

  • PDF