• 제목/요약/키워드: Security Planning

검색결과 470건 처리시간 0.025초

Design and Implementation of Low-Cost Articulate Manipulator for Academic Applications

  • Muhammad Asim Ali;Farhan Ali Shah
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.17-22
    • /
    • 2024
  • The objective of this work is to design a low cost yet fully functional 4-DOF articulate manipulator for educational applications. The design is based on general purpose, programmable smart servo motors namely the Dynamixel Ax-12. The mechanism for motion was developed by formulating the equations of kinematics and subsequent solutions for joint space variables. The trajectory of end-effector in joint variable space was determined by interpolation of a 3rd order polynomial. The solutions were verified through computer simulations and ultimately implemented on the hardware. Owing to the feedback from the built-in sensors, it is possible to correct the positioning error due to loading effects. The proposed solution offers an efficient and cost-effective platform to study the trajectory planning as well as dynamics of the manipulator.

해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 - (The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement))

  • 최윤수
    • 시큐리티연구
    • /
    • 제1호
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

국내 사이버테러 정책수립을 위한 전략적 접근방안 : 영국의 사이버테러 정책을 중심으로 (A strategic Approach for Establishing Korea's Cyber Terrorism Policy : Focusing on the UK's cyber terrorism policy)

  • 김병화
    • 시큐리티연구
    • /
    • 제51호
    • /
    • pp.173-195
    • /
    • 2017
  • 최근 국내는 보안통제가 강화됨에도 불구하고 사이버공간에서 국가의 주요기반 시설이 해킹당하는 사례가 증가하고 있다. 우리나라는 인터넷 등 고도화된 정보통신기술을 갖추고 있으나 북한 및 테러단체의 사이버테러로 위협을 받고 있다. 그럼에도 불구하고 국내의 사이버테러와 관련한 정책은 법과 제도적 장치가 미비하여 제대로 된 사이버테러 정책 및 전략계획을 수립하는데 한계가 있다. 따라서 본 연구는 좀 더 현실에 적합하고 효율적인 정책수립을 위한 시사점을 제시하고자 하였다. 연구의 목적을 달성하기 위해 전략기획의 이론적 분석틀에 따라 영국의 사이버안보 전략을 국내의 사이버안보 정책과 비교분석하였다. 그 결과 몇 가지 문제점이 도출되었다. 첫째, 국내의 사이버안보 정책은 외적환경을 고려하지 않았다. 둘째, 국내의 사이버안보의 목표설정과 정책 간의 연계성이 부족하고 모호하여 혼란을 초래하고 있다. 셋째, 국내 사이버안보의 세부 집행계획을 각 부처별로 수립함에 따라 부처 간의 혼재 등 부작용이 발생할 개연성 높은 것으로 나타났다. 넷째, 국내의 사이버안보 정책에 대한 평가와 환류는 평가 기준을 마련하는데 한계가 있는 것으로 나타났다. 따라서 국내의 사이버테러 대응을 위한 실효성 있는 정책수립을 위해서는 사이버안보정책의 전략적 접근을 통하여 장기적인 측면에서 비전과 구체적인 목표를 설정하고, 목표에 따라 임무를 제시하여 효율적인 집행계획을 수립할 필요가 있다. 그리고 국내 사이버안보정책의 문제점을 보완 개선하기 위해서는 지속적인 평가와 환류가 필요하다.

  • PDF

웹 취약점 스코어링 기법의 advanced 모델 연구 (A Study On Advanced Model of Web Vulnerability Scoring Technique)

  • 변으뜸;임종인;이경호
    • 정보보호학회논문지
    • /
    • 제25권5호
    • /
    • pp.1217-1224
    • /
    • 2015
  • 웹 취약점 분석은 기업이 웹 애플리케이션의 보안 문제점을 파악하고 개선하는데 도움을 주며 미래창조과학부는 취약점 분석 평가 기준을 배포하여 이를 지원하고 있다. 그러나 기준에서 제시하는 방법으로는 취약 항목에 대한 구분은 가능하지만 취약점 항목의 위험을 분석하기에는 부족하여 효과적인 대응이 어렵다는 문제점이 있다. 본 연구에서는 국내외 취약점 스코어링 기법에 대해 분석하고 올바른 웹 취약점 분석 평가를 위한 스코어링 방법을 제시하고자 한다.

피싱 메일 공격조직에 대한 프로파일링 사례 연구 (A Profiling Case Study to Phishing Mail Attack Group)

  • 이재일;이용준;권혁진
    • 인터넷정보학회논문지
    • /
    • 제21권2호
    • /
    • pp.91-97
    • /
    • 2020
  • 최근 국방, 안보, 외교 분야 관련자를 대상으로 하는 피싱 공격이 급증하고 있다. 특히 해킹 공격조직 Kimsuky는 2013년 이후 피싱 공격을 통해 공공기관의 주요 정보 수집을 위한 활동을 하고 있다. 본 논문에서는 피싱 메일 공격조직에 대한 프로파일링 분석을 수행하였다. 이를 위해 피싱 메일 공격의 유형을 분류하고 해킹 공격조직의 공격방식에 대한 분석을 하였다. 상세한 프로파일링 분석을 통해 공격조직의 목적을 추정하고 대응방안을 제시하였다.

합동작전환경의 추세와 적용방안 (Trends of Joint Operational Environment and their Implications)

  • 조규필
    • 안보군사학연구
    • /
    • 통권3호
    • /
    • pp.73-120
    • /
    • 2005
  • Today's world is generation of Transformation. The Term "Transformation" is widely used in many nations and international organizations such as U.S. and NATO to describe the course of change undertaken by militaries to respond to the new and emerging security environment. Transformation involves all elements of the defense enterprise including Operational Environment, Operational Concepts, Doctrine, Structure and Technologies, within a supportive Cultures context. An Operational Environment is defined as "a composite of conditions, circumstances, and influences that affect the employment of military forces and bear on the decisions of the unit commander." The context for developing future military concept and capability lies essentially within the anticipated boundaries of the operational environment in a collective sense. The joint operational environment is essential to the nation's defense. It describes volatile, complex, and dangerous environment in which the military personnel. organizations, and material will operate. Implications coming forth from joint Operational Environment are but a starting point - many others exist. More and better Implications will come forth as people think about massages of Operational Environment, experiment its characteristics, learn to deal with its threats and scenarios, apply their experience and judgement, and then consider what is required of Korean military doctrine, organizations, training and education, material development, and leadership for operations in the joint Operational Environment.

  • PDF

세계 식량전망과 한국의 식량대책 (World Food Perspective and Food Security in Korea)

  • 김광호
    • 한국작물학회:학술대회논문집
    • /
    • 한국작물학회 1998년도 21세기 한반도 농업전망과 대책(한국작물학회.한국육종학회 공동주관 심포지움 회보)
    • /
    • pp.189-209
    • /
    • 1998
  • Food resources have been supplied more and more by crop land expansion, technological Improvement for higher crop yield, establishment of irrigation system, and input of fertilizers, chemicals and others, to sustain a world population increase currently about 6 billion. Food demand will be significantly increased in the 21st century due to population increases of 90 million per year and more consumption of meat with per capital income increase. But food production increase will be limited by difficulty of crop/irrigation land expansion and small or decreasing effectiveness of fertilizer use. Development of new techniques for higher yield per ha is only one way to meet future food demand increase. Optimistic prospect for food demand/supply balance was reported by FAO until 2010, and IFPRI until 2020. However, Worldwatch Institute warned world food supply will be less than expected demand by 500 million tons of cereal grains in 2030. It is necessary to establish a national plan to meet expected worldwide shortage of food resources in 21 century. What planning should be under taken to meet the upcoming century of food shortage in Korea whose food self-sufficiency rate is only $30{\%}$. It is recommended that (1) keep paddy field area as much as 1,100 thousand ha, (2) expansion of barley and wheat cultivation on all paddy area in winter season, (3) continue development of new technology to get international superiority of food resources produced in Korea, (4) expand nationwide the importance of food security under the current financial crisis encountered In Korea, and for food security in the future unified Korean peninsula.

  • PDF

ISP(Internet Service Provider) 네트워크의 정량적인 위험분석을 위한 시스템 설계 및 구현 (Design and Implementation of Quantitative Risk Analysis System for ISP Network)

  • 문호건;최진기;김형순
    • 정보보호학회논문지
    • /
    • 제14권2호
    • /
    • pp.101-111
    • /
    • 2004
  • ISP 네트워크의 보안수준 진단과 대응방안을 수립하기 위해서는 네트워크상의 정보자산에 대한 취약점과 위협 요인을 식별하고, 피해 발생시 예상되는 손실의 정도를 산정하는 위험분석 절차가 필수적이다. 하지만, 기존의 위험분석 방법론 및 도구들은 대부분 방법론적 분석절차와 수단만을 제공하며, 개별 시스템의 취약점 및 위협요인의 변동정보를 실시간으로 반영할 수가 없다. 따라서. 본 논문에서는 네트워크 침입탐지 시스템과 취약점 분석 시스템의 탐지 정보들을 실시간으로 수집, 분석하여 네트워크 자산에 발생할 수 있는 위험의 가능성을 찾아내고, 정량적인 위험수준을 평가하는 시스템을 제안한다. 또한, 실험을 통해 시스템의 성능수준을 제시하였다.

Determinants of Improving the Financial Security of Retired Women in Malaysia

  • ZAINUDDIN, Halimatul Nadia;MOHAMAD, Nor Edi Azhar;RAJADURAI, R. Jegatheesan V.;SAPUAN, Noraina Mazuin;SANUSI, Nur Azura
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제9권6호
    • /
    • pp.11-21
    • /
    • 2022
  • The perspectives on aging women's financial security during their retirement years are based on their behavior, planning, and decision-making processes during their working years. Elderly women are considered vulnerable and have a longer life expectancy, lower-income, and limited financial understanding compared to males; therefore, drastic steps need to be taken to improve their financial stability and quality of life. The current study sought to determine the most important contributors to retired women's financial health by measuring the value of four factors/variables: capability, opportunity, willingness, and biopsychosocial. This study used a mixed model approach, with qualitative analysis in the first phase involving a focus group discussion session, a pilot analysis, and quantitative analysis for phase two involving the distribution and collection of questionnaires completed by retired women. The surveys were distributed across Malaysia in five distinct zones and yielded 339 usable replies to support the theory. The outcomes of the Multiple Regression Analysis in Malaysia revealed that capability, opportunity, and biopsychosocial factors are significant predictors of retired women's financial security, whereas the willingness indicator lacked statistical significance.

군사보안 관점에서 본 '발지전투' 패인 분석 (The study of the defeat factor of'the Battle of the Bulge' Focus on Military Security)

  • 김성우
    • 융합보안논문지
    • /
    • 제15권6_1호
    • /
    • pp.25-31
    • /
    • 2015
  • 전쟁에서 승리하느냐 실패하느냐는 국제정세나 국민의 애국심과 단결력, 상대적 전투력 등 여러 요인에 의해 결정된다. 여기에서는 제2차 세계대전 초기 독일 프랑스 전역에서의 독일군 기동계획과 전쟁 말기인 1944년 겨울 발지전투를 군사보안 관점에서 성공과 실패 요인을 분석하고자 한다. 앞에서 제시한 각각의 전역은 독일이 아르덴느 산맥을 돌파하여 연합군의 주요부대를 타격했던 것은 동일하나 초기작전은 전격전의 전형적인 모습을 보여준 반면에 발지전투는 유사한 기동계획을 기획하고 시행했지만 결과는 독일의 패망을 앞당기는 촉매제 역할을 하게 되었다. 전장에서 승리하기 위해서는 적의 정보운용 능력을 역이용하거나 거부하고 아군은 적으로부터 방해받지 않고 정보를 수집, 처리, 전파할 수 있는 유리한 위치를 갖는 것이다. 이는 적보다 어떻게 정보를 효과적으로 운용하는 것이 전장 승리의 요체인가를 보여준다. 제2차 세계대전시 독일 프랑스 전역과 발지 전투에서의 독일군 기동계획은 아주 유사하게 기획되고 시행되었다. 그러나 그 결과는 극단적으로 달랐다. 작전계획을 기획하고 결심하는 과정에서 군사보안과 정보수집 등이 얼마나 중요한 것인지를 잘 보여주는 역사적 사실의 하나이다.