• Title/Summary/Keyword: Security Program

Search Result 1,233, Processing Time 0.024 seconds

Study on the Security Officials in the Study of the Working Environment and Education (경호공무원의 근무환경과 교육에 관한 연구)

  • Jo, Sung-Gu;Kim, Dong-Je;Choi, Jong-Gwang;Park, Ju-Hyeon
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.247-268
    • /
    • 2013
  • Country is security agencies with the launch of the Park Chung Hee government president security service act was enacted since installed successfully now undergoing a large-scale international events reborn professional Security agencies, including the North and the Northeast, but the conflict continues because of the national reduce the threat to the security without a destination. However countermeasures against these threats is emphasized, but in an effort to raise the country is security officials security agencies working environment and training for these studies have not performed in this study was started. In order to achieve this purpose, president security service and the seoul police agency personnel working in the field for 45 people who were interviewed, recently developed by utilizing Nvivo 8 program to improve working conditions in the analysis of organizational culture 51(78.46%), Image 7(10.93%), physical and mental 6(9.37%) were categorized, educational institutions in the direction of a police constable 56(76.71%), educational psychology 12(16.43%), theory of education 5(6.84%) were categorized as high. We look at the research results suggest that the authority of the president security service president security service officials in tissue culture officials were struggling to belong to an organization, you need to induce a change in culture has been raised, the current president of the Security Service, as well as specialized police constable training within the organization establish the necessary institutions respectively.

  • PDF

A Study on the Curriculum of Department Security Secretarial Programs in Korea University (국내 대학 경호비서학과의 교육과정 특성에 관한 연구 - 4년제 대학을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.1-21
    • /
    • 2007
  • This study aims to analysis and measure on the curriculum of security programs in Korean university as the private security system. Civil security demand social safety life by the police protection and private security system. The private security or the civil guards shows rapid growth by the social development and improve the quality of life. But the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. Then the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyze current situation of civil body and security guard training industry and to seek an educational model. For that, we examine in 'Do the professional training organizations meet social demand for the body and security guards'? And, 'What kind of training has to be provide for the body and security guards'? and 'What the qualifications of the trainers'? Then, 'What are the differences in training courses between private organizations and universities'? 'Is there differences in the job placement among the trainers of private organizations and universities'? etc.. Conclusion, the social demand common curriculum for the body and security guard will be drawn from the analysis of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. Then we have to a standard curriculum for the successful training education system to provide social security.

  • PDF

COTS-Based Development of Power System Data Visualization Program (COTS기반의 전력계통 데이터 시각화 프로그램 개발)

  • Oh, Sea-Seung;Jang, Gil-Soo;Moon, Seung-Il
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.184-186
    • /
    • 2007
  • Visualization has a strong capability to manage and display a large volume of data. It makes system analysis more intuitive and helps an operator in monitoring system status, understanding its phenomena, identifying its problems, and performing corrective action to maintain the security of the system. In this paper visualization program is developed based on a COTS-based software development concept in a distributed environment using open-source application software and development tools.

  • PDF

Study on the Association between Personal Information Protection Legislation and Information Security Product (개인정보보호 관련 법령의 내용과 보안제품 분포간의 연관성 분석)

  • Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1549-1560
    • /
    • 2015
  • For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.

A Measures to Converge Manage an Efficient Information Security Management System for Information Security Experts Manpower (정보보호 인력양성을 위한 효율적인 정보보호관리체계의 융합 관리 방안)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.81-86
    • /
    • 2014
  • The development in IT technology has brought about various services that are on offer based on a new service model. But such new services have increased security risks. The government is operating a program to foster experts in information security to protect assets from the threat of such risks, too. Society's awareness on the importance of information security has also grown, leading to various courses to train such personnel, including membership clubs for the fostering of such specialists. This study seeks to suggest a method that efficiently manages the convergence of running a curriculum on ISMS(information security management systems) and a club that focuses on information protection. Such converged information security courses are expected to contribute to a safer IT-based society.

A study on the Safety Monitoring Theory and Application for the Human Security (인간보호를 위한 안전모니터링 이론과 적용에 관한 연구)

  • Lee, Tae Shik;Seo, Jung Pyo;Seok, Geum Cheol;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.29-36
    • /
    • 2012
  • This paper focused on the new theory and algorithm improving the citizen's safety which they experience to change from the developing country to the developed country, and analyzed the gained and applicate results, and show the theories and application's evidence for the incident prevention of citizen's life and house. The Safety Monitoring Theory for human security, show the six theories for which they are analyzed and reduced the accident's death, as is the priority of the disaster prevention activity, its decision, continuous minimization of the accident's death number, the environment security, the personal security, the community security. This study is applied to educate and exercise the disaster prevention and safety management's program which applied the seven step's model of the safety monitoring, show on continuously improvement effects through the case study of the personal's and team's monitoring during five years.

Analysis of the present state and Improvement of the Institute of Information Security Education for the Gifted (정보보호영재교육원 운영현황 분석 및 개선방안)

  • Yun, Bo-Ram;Hong, Do-Won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.441-449
    • /
    • 2016
  • Today, as a daily routine such as administration/finance is operated under information system and various cyber crime against national, public, and private institutions happen, demand for information security manpower is increasing. Hence, Ministry of Education has formed an Institute of Information Security Education for the Gifted to early discover talent in the field of information security and train professional personnel with specialty and ethics in 4 universities of country in 2014. But the nascent Institute of Information Security Education for the Gifted lack systematic analyses compared to Institute of Mathematics and Science Education for the Gifted that has existed from a long time ago. In this paper, we analyze the state of the Institute of Information Security Education for the Gifted in three parts: operation, selection, education and suggest an improvement to build a practical program for effective operations and education.

A Study on Development of Standard Modeling Education Program in Information Security : Focusing on Domestic University Cases (정보보호 교육과정 표준화모델 개발 연구 : 국내 대학 사례를 중심으로)

  • Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.99-104
    • /
    • 2018
  • Modern society has entered the era of the fourth industrial revolution beyond the information age. In other words, technology innovations such as life science, unmanned automobiles, drone, artificial intelligence, big data, robot technology, Internet of things, and nano-technology are leading the change of the world. In these technologies use and delivery of information is playing a key role, and the field of information security for the safe use of information has become an indispensable discipline. In this sense, it is necessary to standardize the curriculum of universities to foster security manpower to meet the needs of the era. In this paper, we develop and present a model to standardize the curriculum in the field of information security. Using this model, each educational institution will be able to select the necessary track or field to guide the students and cultivate information security manpower effectively.

  • PDF

An assessment of sanctions on North Korea and the prospect (대북 제재 조치 평가 및 전망)

  • Cheon, Seong- Whu
    • Strategy21
    • /
    • s.31
    • /
    • pp.5-26
    • /
    • 2013
  • The South Korean society has experienced many changes since the sinking of ROKS Cheonan. The government reviewed its defense posture and adopted the 5·24 Measure in its relations with North Korea. As a result, the people of South Korea became more conscious of security situations on the Korean peninsula while North Korea's economy suffered badly. Meanwhile, the South Korean government has taken a flexible stance toward North Korea in terms of exchange and cooperation since September 2011. The flexible stance was to manage inter-Korea relations in a stable manner and relieve the hardships of the North Korean people while preserving the spirits and purposes of the 5·24 Measure. The UN Security Council adopted twenty-six resolutions and statements on North Korea since June 25, 1950. They include thirteen U.N. Security Council resolutions including those concerning nuclear weapons or missile programs, nine Presidential statements, and four press statements. Resolution 82, the first U.N. resolution on North Korea, came when the Korean War broke out. Resolution 825, the first one related to nuclear or missile programs, was adopted in response to North Korea's withdrawal from the NPT. Apart from these U.N. resolutions, the United States has imposed separate sanctions against North Korea. North Korea's nuclear weapons program can be considered in comparison with that of Iran in terms of the consequences they create for the regional security. The Security Council has adopted six resolutions on Iran so far. One should note that the resolutions on Iran have had much stronger sanctions compared to those imposed on North Korea. That is, while the North Korea case may be viewed as a more serious threat to international security from the perspective of nuclear weapons development or proliferation, tougher sanctions have been placed on Iran. There are two approaches that South Korea should take in addressing the related issues. First, we should aim to reduce the gap between sanctions imposed on Iran and North Korea. It is difficult to understand that a country with more serious problems is rewarded with lighter sanctions. We should take measures through the Security Council Sanctions Committee to make individuals and groups in North Korea that play a central role in developing nuclear weapons and missiles subject to additional sanctions. Second, we have to change. Other countries in the international community have become tired of North Korea's nuclear issue and now they look to South Korea for initiative. We should correctly understand this current situation and play a leading role within our capacity. Knowingly and unknowingly, the notion that the North Korean nuclear issue may be left to South Korea has been spread around the international community. Although the situation is grave, we should try to open a new horizon in ushering in the unification era by taking the initiative with confidence that there is a looming hope ahead of us. For these tasks, we should stop thinking in the old way that has been ossified for the last two decades. We should not be pushed around by neighboring great powers in dealing with North Korea related issues anymore; we should take the initiative with resolution that we will play our role at the center of four great powers and with confidence that we can do it. Based on the confidence that the Republic of Korea has become a country with enough capacity to take the initiative, we should establish a 'National Grand Strategy' representing South Korea's strategic vision that the unification is the ultimate solution to the problems related to North Korea's nuclear weapons program.

  • PDF

Detection of invalidated sanity checks caused by undefined behaviors (정의되지 않은 행동에 의한 안전성 검사 무효화 탐지 기법)

  • Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.215-219
    • /
    • 2014
  • C programming language has undefined behaviors, which cause unintended execution of a program. When a programmer adds sanity checks without caring about undefined behaviors, compilers may misunderstand and invalidate the sanity checks. Thus, we propose an automated system to detect invalidated sanity checks by marking sanity checks in source code and checking the marks in binary code.