• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.031 seconds

An Exploratory Study on the Role of Disaster Managers - Based on disaster management officers at the local government - (재난관리자의 역할에 관한 탐색적 연구 - 지방자치단체의 재난관리 실무책임자를 중심으로 -)

  • Bang, Ki Sung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.35-42
    • /
    • 2012
  • Despite the importance of disaster management officers of disaster management agencies at the local government to protect the lives of civilians and their properties, there is a lack of research or literature in their roles and responsibilities. In fact, there is a urgent need to set clear roles and responsibilities for them. This study scrutinizes how to disaster managers should behave in specific setting that differentiates from other administrative managers based on domestic and foreign literature review. Although, the role of disaster manager seem to be similar to administrative manager, there are some differences particularly in the areas that disaster manager has to work as an expert in saving lives and properties that has to be further emphasized. When working on disaster management process of prevention and resoration, the key task are based on mid and low level officers. On the other hand, preparedness and response process that involve rapid decision making and cooperation with other department, persuasion of local residents and resource pooling are carried out by mid and high level managers because it requires control capacity and decision making skills.

Extracting the Risk Factor of Ground Excavation Construction and Confidence Analysis using Statistical Test Procedure (지반굴착공사 위험요소 도출 및 통계적 검정 방법을 통한 신뢰성 분석)

  • Kim, Dong-Min;Kim, Woo-Seok;Baek, Yong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.11-17
    • /
    • 2017
  • The case study on ground subsidence was conducted and the cause of ground subsidence was evaluated, main cause were insufficient site exploration, inaccurate strength parameters, defective temporary wall, insufficient reaction for boiling and heaving, excessive excavation and so on. Risk factors during excavation were identified from the cause of ground subsidence and risk factors were site exploration, selecting excavation method, structure analysis, measurement plan, excavation method construction, underground water level change, natural disaster and construction management. The survey of the experts on risk factors identified was conducted to evaluate the importance of risk factors, and confidence analysis was performed to evaluate the significance level between survey result and survey respondent using Chi-square Test.

A Study on Enforce the Policy of User Certification in Public Certificate System (공인인증서 시스템의 사용자 인증정책 강화에 관한 연구)

  • Kim, In-Bum;Hwang, Joo-Yong;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.69-76
    • /
    • 2010
  • public certification is some kind of electric ID which can prove the valid user, based on open KEY. usually it had been used in the field of government complaint, e-commerce, financial. but recently it expands the its use range through computerization of work process of diversity fields such as e-sports, property, medical industry. because of this reason, importance for user certificate process is gradually rose. The purpose of this paper is looking at the method for user certification of public certificates and draw a way for enforce the user certification process by Vulnerability Analysis. To draw the alternative we study the Authentication Principle and policy structure of public certification system by researching references, has drew the limitation for policy of certification. we provide the guideline to enforce the user certification through conclusion which has been drew from previous step.

A Study on Army NCO institutions for excellence manpower acquisition - Department College of NCO in connection with the acquisition workforce Revitalization - (우수 인력획득을 위한 육군 부사관 제도 연구 -인력획득과 연계한 전문대학의 부사관학과 활성화 중심으로-)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.111-120
    • /
    • 2013
  • Army NCO roles and responsibilities in conjunction with the Defense Reform 2020 plan to perform a pivotal role in the bag the past tradition inherited bag and development, transition the mission commander helpers battle conductor, mainly functional experts, management experts from the bag to show PowerIt has a pivotal role as a transition. It embodies the director and the military organization of work within the scope of the statutes and rules, such as planning and implementation as the core of the Power which is most frontline officers, the NCO instructions and control through education and functional personnel to maintain the best Power will. Propose the measures that can be overcome by considering the importance of key personnel, operating personnel NCO in the military organization and analysis of the issues, the problem of the NCO system. The social awareness to be able to build a system to obtain a stable workforce through effective operations for changes in the revival, especially in the Department College of NCO activated mutual development challenges were present.

Cyber Threats Prediction model based on Artificial Neural Networks using Quantification of Open Source Intelligence (OSINT) (공개출처정보의 정량화를 이용한 인공신경망 기반 사이버위협 예측 모델)

  • Lee, Jongkwan;Moon, Minam;Shin, Kyuyong;Kang, Sungrok
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.115-123
    • /
    • 2020
  • Cyber Attack have evolved more and more in recent years. One of the best countermeasure to counter this advanced and sophisticated cyber threat is to predict cyber attacks in advance. It requires a lot of information and effort to predict cyber threats. If we use Open Source Intelligence(OSINT), the core of recent information acquisition, we can predict cyber threats more accurately. In order to predict cyber threats using OSINT, it is necessary to establish a Database(DB) for cyber attacks from OSINT and to select factors that can evaluate cyber threats from the established DB. We are based on previous researches that built a cyber attack DB using data mining and analyzed the importance of core factors among accumulated DG factors by AHP technique. In this research, we present a method for quantifying cyber threats and propose a cyber threats prediction model based on artificial neural networks.

The study on Analysis of Influence factors on Items in Apartment House Maintenance Cost (공동주택 관리비 항목별 영향요인 분석 연구)

  • Lim, Nam-gi;Park, Chan-jeong;Jung, Sang-jin
    • Journal of the Korea Institute of Building Construction
    • /
    • v.2 no.1
    • /
    • pp.155-162
    • /
    • 2002
  • In this research, I finally came to a conclusion analyzing the connection among managing of each items in management expenses, the size of each complex and stories, and the term of using. (1) In the managing cost regarding to the management manner, although the managing cost of self-governing management is less imposed than the one of commission management, there is slight difference between those Costs. And it is more important to consider the effectiveness of management than to emphasize reduction of management cost. (2) The higher the stories, the higher the managing cost of elevator per the unit area. It Is caused by the fact that the father the distance of the elevator operating, the higher the electric charges. (3) The third of one of total management cost goes to pay the personnel expenses. So I found that the effective management of the expenses is available to reduce management cost. (4) The higher the stones, the lower the cost of personnel expenses including the cleaner cost. (5) The sum of costs assigned in repairment and management increases in proportion to the term of using. The costs assigned in special repairment and management are interacting to each other. (6) To reduce the management cost, we have to cut down the personnel in security guard that occupies one third of total management cost with application to the joint security system and operation of the self-governing guard. Through this process, it will be easy to accomplish the rationalization of contract with an outside order. Because the improvement of management service is not only the responsibility of owner but also the one of dwellers. And it Is imperative to realize the importance of cooperation and trust between the owner and dwellers. And the establishment of effective managing system which has convenience and rationality must be settled without delay.

A Study of Password Management System for Improves the Availability and Efficiency (효율성과 가용성을 향상시킨 패스워드 관리시스템 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.150-153
    • /
    • 2013
  • By the development of IT, most business has been processed on the IT solution-based servers has increased Therefore, the importance of security of the server is highlighted. And the need for password management server efficient and safe is raised. There is a need to change at least 8 characters to mix the numbers and letters and password change passwords on a regular basis, you need a password for each system account is set in a different way, but the continuation of the system there is a tendency to password problems occur problems caused by the limits of the introduction of human resources and introduction basis occurs. The password management feature, though it is expensive is partially providing integrated access control solutions at home and abroad, there is a drawback that stresses the traffic on the server. Future, we conducted a study of password management solutions for the server of the server is determined IT transformation trend of non-IT field to accelerate, is continuously increasing it accordingly.

  • PDF

Lessons from the comparison of responses to MERS outbreak in Korea and WNV outbreak in the United States: Focused on interorganizational collaboration and information sharing (미국의 웨스트 나일 바이러스 극복 사례가 우리나라 메르스 사태에 주는 교훈: 조직간 협업과 정보공유를 중심으로)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.145-162
    • /
    • 2017
  • In 2005, the Republic of Korea suffered from the outbreak of MERS(Middle East respiratory syndrome), leaving 186 infectees and 38 casualties. Responding to this crisis, Korean government revealed many problems in emergency management policies and was widely criticized. A similar case in emergency management and infectious disease control is the 1999 outbreak of West Nile Virus(WNV) outbreak in the United States. During this period, the state of Oregon effectively responded to WNV through collaboration between state and local government, being considered as a model case of emergency management. This article aims to find insights in emergency management and infectious disease control by analyzing and comparing the responses of Korean MERS outbreak and Oregon's WNV outbreak focusing on interorganizational collaboration. Insights found in this study include the role of control tower, the importance of information sharing and disclosure, the role of existing systems and social networks, and sustainable intergovernmental collaboration.

  • PDF

Design of a Reliable Data Diode System (신뢰성 있는 단방향 데이터 전송 시스템 설계)

  • Kim, Dongwook;Min, Byunggil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1571-1582
    • /
    • 2016
  • One of the issues, which is dealed with in undirectional data transmission technology, is reducing the packet loss in TCP based data transfer. We can decrease the packet loss by using several well known error correction approaches. Although we utilize those previous approaches, the packet loss by both link errror and buffer overflow could be occurred. In this paper, we propose the RED(REliable Data diode). RED also uses the TCP proxy approach for supporting the TCP based data transfer which is similar with the existing unidirectional data transmission technologies. The RED transmission system could alleviate the packet loss caused by buffer overflow by exploiting the delaying transmission of TCP packets. Furthermore, in order to reduce the packett loss caused by link error in the unidirectional transmission link, the RED transmission system transmits one or more duplicated packets to the RED reception system by considering both the remaining resources and packet importance.

Selective encryption technique according to class classification in LoRa environment (LoRa 환경에서의 Class 분류에 따른 선택적 암호화 기술)

  • Lee, Nam-gon;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.285-287
    • /
    • 2017
  • Currently, the world of data communication is not simply communication between server and user in a wired way, but using wireless environment, various devices communicate with each other in a wider and diverse environment to generate a large amount of data. In this environment, IoT is now located deep in our lives, and IoT technologies are used in many tasks, but the data used in IoT is exposed without sufficient protection from malicious behavior. Most of these devices do not have enough computing power to cope with malicious attacks. In this paper, we aim to make all devices that have sufficient computing power and safety from simple sensors to be able to have security according to the situation. The proposed technology is based on the importance of the device and computing power, and it is possible to select the encryption technology selectively and to improve security.

  • PDF