• Title/Summary/Keyword: Security Plans

Search Result 320, Processing Time 0.022 seconds

A Study on the Consultation for Technology Leakage Victim Using NLP

  • KANG, In-Seok;LIM, Heon-Wook
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.33-39
    • /
    • 2020
  • Purpose: The purpose of this study is that victims of technology leaks and people concerned about leaks complain of stress over security concerns. However, there are no psychological treatments among the government's comprehensive plans to prevent technology leaks. Therefore, the government intends to present education methods using the NLP (Neuro Linguistic Program), a collective counseling technique, to heal the psychological injury of the victims. Psychological counseling methods include cognitive behavioral therapy, psychoanalytic behavioral therapy, humanism therapy, art therapy, and other psychological therapies. Among them, NLP (Neuro Linguistic Programming) method was used. NLP has three concepts: neuron, language, and programming, and is used as a general method for group counseling. Research design, data and methodology: In relation to composition, Chapter 1 explained the purpose and necessity of the study, Chapter 2 explained the types of psychological counseling and NLPs to help understand the study, introduced the prior study related to the development of collective counseling programs through NLP, and Chapter 3 developed a security psychological counseling education program. In addition, FGI(Focus Group Interview) was conducted for professionals. Results: Corporate counseling considered most in this study should satisfy client, counselor and manager differently from individual counseling. For this purpose, the result was composed of 11 times. In order to derive personal problems for clients, they consisted of finding, loving, expressing, and emancipating self. And, It solved the leakage anxiety to suggest a professional solution for the counselor. In addition, this course helps them become familiar with counseling techniques for becoming a good security administrator. Lastly, it was configured to leave the result for the manager to suggest the organizational development method through this training. The implication of this study is to derive psychological counseling methods for security officers. Most companies in the field of security counseling complain about technology leakage stress. There is currently no psychotherapy support project under the policy. And It was developed because it can expect sales improvement from security consultation. Conclusions: In conclusion, the results were organized to be left to the manager so that he could suggest how to develop the organization through this time.

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

A Study on the Improvement of Metal Detector Equipment Standards by Aviation Security Level (항공보안 등급별 금속탐지장비 기준 개선 방안 연구)

  • Ryu, Hanseul;Park, Hanjun;Kim, Yosik;Choi, YongHun
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.1
    • /
    • pp.95-101
    • /
    • 2021
  • The detection sensitivity of a Walk Through Metal Detector (WTMD) currently being developed and operated in Korea differs from one manufacturer to another, making it difficult for them to be used based on Aviation Security level. In addition, the FAA 3-GUN Test approved by the domestic aviation authority for aviation security supervision is a single test object. There is no Operational Test Piece (OTP) consisting of multiple test objects for the operation of aviation security for a WTMD. This paper, the detection sensitivity of a WTMD applied by a commercial OTP was measured and detection sensitivity standards for a WTMD were developed based on results of measurement. Furthermore, institutional plans to maintain the same detection sensitivity for domestic aviation security were made through suggestions for Korean standards OTP development methods, taking characteristics of the aviation field into consideration.

Improvement Plans for Protection Specialist Guard Certification Performance test System (신변보호사 자격검정 실기시험제도의 개선방안)

  • Kang, Dong Beom;Kim, Woo Jun
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.13-21
    • /
    • 2016
  • At the present moment when around 60 years have passed after the introduction of private security, there are security instructor and protection specialist guard as government official recognition qualification. This study discussed problems of secondary performance test system among qualification certification items which have been implement ed as government official recognition qualification since 2013. Current qualification certification for protection specialist guard is composed of primary academic test and secondary performance test. Since it is estimated that it is high time to increase clients' satisfaction and public reliability through strict qualification certification for protection specialist guard. Following improvement plans are intended to suggest. First, it is a plan to divide and diversify difficulties of performance test evaluation events. Second, it is a plan to diversify evaluation criteria of performance test. Third, it is a plan to make criteria for selecting specialized performance test evaluation committee. Fourth, it is a new plan of exclusion system to avoid any relation between performance test evaluation committee and applicants. In this respect, institutional improvement should be followed in order to improve specialty of qualification certification of performance test system for protection specialist guard.

Analysis on the Operation Status of National Education Information System (교육행정정보시스템의 운영실태분석)

  • Lee Dae-Sik;Jeong Ju-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.115-122
    • /
    • 2006
  • The purpose of this paper is to suggest the improving plans about the system as searching an effective managing devices for NEIS with analysis of managing condition. For the plans, questionnaire was performed in the five sections to primary and secondary school teachers. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. The results are following: First. in spite of satisfaction with function of C/S, it have been some problems such as frequent patch and down of server. Secondly, although the introduction of NEIS was done in hurry without gathering teachers' opinions and sufficient research of system, it has been expected to settle down normally with correction and security. Thirdly, positive reaction was generally showed in research on satisfaction of specific task for school affairs and educational matters. Fourthly, most of teachers have known the functions of NEIS and recognized its convenience. Although they has not thought it reduced their work, they have realized it's convenient for dealing with statistics. Lastly, they think of NEIS as the essential system for the age of information, in spite of problems such as reveal of personal data and security. Therefore, we should keep eyes to problem of an invasion of human right. In addition, study deep into NEIS should be conducted with consistent security for the system. In order to it. technical and legal system should be carried out side by side.

  • PDF

Risk Assessment Improvement Method of Small Stream When Small Sized Hazard Infrastructures Survey (소규모 공공시설 조사시 세천의 위험도 평가 방안)

  • Jungsoo Rho;Kyewon Jun;Jaesung Shin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.23-35
    • /
    • 2023
  • Recently, the damage caused by natural disasters such as typhoons and localized torrential rains has been increasing rapidly. The Ministry of the Interior and Safety enacted a 「law on safety management of small sized infrastructures」 and local governments have to register small sized infrastructures with the National Disaster and Safety Management System (NDMS) until March 31st every year. Recently, each local government has ordered Safety inspections of small sized infrastructures and maintenance plans and six types of facilities, including small streams, small bridges, farm roads, access roads to village, inlet weirs, and drop structures are being surveyed and digitized into a database. Each facility is being evaluated for risk, and for those deemed hazardous, maintenance plans are being developed. However, since the risk assessment method of small sized infrastructures is not clear so that is conducted through visual investigation by field investigators, risk assessment is conducted in a subjective and ambiguous form. Therefore, this study presented a reasonable and quantitative risk assessment method by providing a quantitative evaluation indicator for small stream, which has the highest disaster risk among other small sized infrastructures, so that small sized hazard infrastructures can be selected to secure transparent evidence for improvement plans and action plans.

Affecting Factors on the Safety on School -Focusing on U.S Public School Security Guard Patterns- (학교 내 안전에 영향을 미치는 요인: 미국 공립학교의 경비활동 유형을 중심으로)

  • Shin, So-Ra;Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.137-163
    • /
    • 2013
  • This research will incorporate cases from U.S public schools to analyze the factors which influences the security within the school and efficient security patterns to suggest an adequate suggestion to elevate domestic school security system. This study is divided into two following models: a serious criminal offense model, which considers crimes occurred on campus as subordinate variables, and a school violence model, which considers as subordinate variables after limiting an act of delinquency and an a group action that can harm the safety of students, although they are not included in the categories of crimes. First, from analyzing the factors which influences security within school, the explanation power of serious crime offense safety model and school violence safety model is measured 12% and 11.3%. In serious crime offense safety model, the safety education for students, among the safety programs provided by schools(t=2.548, p=0.011), parent participation to school management(t=10.694, p=0.000), Security activities on campus(t=3.643, p=0.000), and CPTED activity(t=6.467, p=0.000) are statistically significant, as affecting factors on the safety from serious crimes. Similarly in school violence model, the safety education for students, among the safety programs provided by schools(t=3.228, p=0.001), parent participation to school management(t=12.034, p=0.000), security activities on campus(t=2.663, p=0.000), and CPTED activity(t=3.928, p=0.000) are statistically significant, as affecting factors on the safety from school violence. Second, according to the analytic results on figuring out the optimal pattern to heighten the security activities, the serious offence model's explanatory power was 4.4% and school violence safety model rated 3.9%. With the serious offense safety model, the activity factors which showed statistically significant in influencing safety from serious offenses were cooperation with local police force (t=2112, p=0.035), school policy management (t=3.309, p=0.001), security patrolling activity (t=2.548, p=0.011). In the school violence model, security activities initiated by the school which showed statistically significant from serious offenses were cooperation with local police force (t=2.364, p=0.018) and policy management (t=4.142, p=0.000). In accordance with the result of this study, education for students rather than education for teachers is more positive in terms of the safety on campus, and parent participation, like education, is consistently needed for the safety on campus. In case of CPTED activity, reinforcing plans should be prepared by intactly accepting examples in the USA. In case of security activity, plans that can increase visibility and reinforce cooperation with local police in a smooth way will provide a positive effect to the safety on campus.

  • PDF

A Study on Standardization of Biometrics Industry (생체인식 산업의 표준화에 관한 연구 II ( 시스템(보안) 표준 ; BS7799/IS0/IEC 17799를 중심으로 ))

  • 강병노;송수정;정수일
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2002.05a
    • /
    • pp.59-63
    • /
    • 2002
  • The purpose of this study is to carry out comparative analysis of the differences between the trend of biometrics-related system(security) standardization in the world and that of Korea, and to suggest ideal directions and building plans for domestic biometrics industry. Its purpose also includes constructing promptly a standardization of domestic biometrics industry based on the suggested standards.

  • PDF