• Title/Summary/Keyword: Security Program

Search Result 1,233, Processing Time 0.025 seconds

The Methodology and Case of Scientific System Engineering Management Process in Defense Space Program

  • Park, Heonjun
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.4
    • /
    • pp.7-10
    • /
    • 2021
  • Including 425 Program, which is Korean military surveillance and reconnaissance satellite, there were mostly civil-driven space programs in Korea. However, there are increasing numbers of military demand-driven space program in nowadays. Furthermore, it is positive effects on launch vehicle development in Korea that the termination of Korea-U.S. missile guideline. In this paper, it emphasizes the needs of system engineering(SE) management method which meets both defense system's characteristics and space's characteristics. These characteristics are such as non-fixable after the launch, the security issue in defense system. And it also introduces SE tool, methodology and its philosophy. There are several functions that data management, issue management, risk management, and technical requirement management. Also describing its implications and direction of improvement.

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

An Offensive Change of Japan's Defense Strategy and Strategic Implication to the South Korea Navy: Focusing on the Japan's Amphibious Rapid Deployment Brigade Creation (일본 방위전략의 공세적 변화가 한국 해군에 주는 전략적 함의 - 일본 '수륙기동단(水陸機動團)' 창설에 대한 분석을 중심으로 -)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.42
    • /
    • pp.83-113
    • /
    • 2017
  • After defeat in World War II, Japan's Peace Constitution committed the country to forego the acquisition of offensive military capabilities. However, in the midst of the post-cold war period, Japan began to change its security posture in line with the so-called 'normal state theory', which called for a more robust defense posture and expanded security activities. The second Abe administration promoted these security policies by issuing a National Security Strategy as well as a new National Defense Program Outline(NDPO) in 2013 and by establishing new security institutions such as the National Security Council. The Abe administration also adopted the new concept of a 'Unified Mobile Defense Force' in the 2013 which replaced the 'Dynamic Defense Force' as a new criteria for the Self-Defense Force's acquisition of military capabilities. In this new concept of military capabilities, the Ground Self-Defense Force is planning to replace existing divisions with mobile divisions and to form 'Amphibious Rapid Deployment Bridge' for the first time in 2018, which has long been taboo in Japan. Japan has experience a Marine Corps in the past. Likewise, an offensive changes in the military strategy can change the spectrum of strategy and 'Amphibious Rapid Deployment Bridge' plays a big role in this. Furthermore, Japan is increasing the Coast Guard's budget and capabilities in preparation for contingencies around the Senkaku islands (called the Diaoyu in Chinese). The South Korea navy should utilize Japan's changing security posture to deter immediate threat such as North Korea's military provocations and potential enemy threat such as China, Japan, Russia.

The Effects of Strategic Human Resource Management on Job Stress and Occupational Commitment of Security Workers (전략적 인적자원관리가 시큐리티업무 종사자의 직무스트레스와 직업몰입에 미치는 영향)

  • Song, Eun-Il;Lee, Jong-Ho
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.181-202
    • /
    • 2018
  • This study was conducted to investigate the effect of strategic human resource management on job stress and occupational commitment of security workers. A sample of 188 persons was extracted using the SPSS 18.0 program as a significant sampling method for the security worker. Frequency analysis, correlation analysis, and multiple regression analysis were conducted according to the purpose of the data, and the following conclusions were drawn. First, strategic human resource management has a significant effect on job stress. Second, strategic human resource management has a significant impact on occupation. Third, job stress had a significant effect on occupation commitment. That is, two factors of strategic human resource management and job stress play a decisive role in occupation commitment, and job stress plays an important role as a parameter. In conclusion, if we select the factors of strategic human resource management needed for each organization and develop new methods and competitiveness, it will be very helpful for qualitative growth of security industry.

A Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries (금융보안 리스크 기반의 IT도급 정책 연구)

  • Choi, Chang-Lai;Yun, Jang-Ho;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.681-694
    • /
    • 2014
  • For the continuous financial incidents occurred in 2011, Korean government has announced the amendment on electronic finance supervision regulation including human resources, organization and budget. The major part of the regulation is mainly focused on human resources and budget. It states that company has to employ at least 5 percent of IT staff out of total staff, and at least 5 percent of security staff in IT staff employment number. Budget for security should be at least 7 percent of total IT budgets. This paper studies IT outsourcing policy based on operational risks of financial industries caused by amendment of regulation. This paper provides the policy decision procedure for resolving the 3rd party problems and suggests the effective operation policy to 3rd party for the program quality improvement and case studies at the IT task classification.

The Effects of Basic Income Security on Poverty Elimination and Life Independence in Income Security Policies (소득보장 정책에서의 기본소득 보장이 빈곤해소와 생활자립에 미치는 영향)

  • Kim, Sung-Ki
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.77-88
    • /
    • 2019
  • This study is empirically intended to look into the effects of basic income security on poverty elimination and life independence in income security policies. To achieve this, poverty elimination and life independence through the national pension and basic pension as old-age pension for basic income security and the unemployment benefit and livelihood benefit as employment insurance were determined as dependent variables. The 10th data from Korea Welfare Panel Study were used in the statistical package program to analyze these variables. The overall findings showed that the national pension and basic pension as part of the old-age pension had a positive effect on poverty elimination and life independence. The unemployment benefit and livelihood benefit of employment insurance were not significant and they were rejected. And poverty elimination had a significant effect on life independence and it was adopted. Consequently, the old-age pension is a pensionable income security policy given to all the elderly with lower income, which it is very useful for guaranteeing a basic income. Poverty elimination leads to life independence through the guarantee of a certain basic income, suggesting that they are closely related to each other.

An Effective Feature Generation Method for Distributed Denial of Service Attack Detection using Entropy (엔트로피를 이용한 분산 서비스 거부 공격 탐지에 효과적인 특징 생성 방법 연구)

  • Kim, Tae-Hun;Seo, Ki-Taek;Lee, Young-Hoon;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.63-73
    • /
    • 2010
  • Malicious bot programs, the source of distributed denial of service attack, are widespread and the number of PCs which were infected by malicious bot program are increasing geometrically thesedays. The continuous distributed denial of service attacks are happened constantly through these bot PCs and some financial incident cases have found lately. Therefore researches to response distributed denial of service attack are necessary so we propose an effective feature generation method for distributed denial of service attack detection using entropy. In this paper, we apply our method to both the DARPA 2000 datasets and also the distributed denial of service attack datasets that we composed and generated ourself in general university. And then we evaluate how the proposed method is useful through classification using bayesian network classifier.

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

The Impact of Fairness of Industrial Security Practitioners on Willingness to Comply with Workplace Silence and Security Policies (산업보안업무 종사자의 조직공정성이 직장내침묵과 보안정책준수의지에 미치는 영향)

  • Shin, Hyun Goo
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.57-75
    • /
    • 2018
  • The purpose of this study is to provide basic data to improve the working environment of industrial security workers by analyzing the effects of organizational fairness of workers in industrial security work on silence in workplace and will to adhere to security policy. The data used in this study consisted of a total of 190 respondents. Statistical analysis of correlation and multiple regression analysis was performed using the SPSS 18.0 statistical program, The results of the study are as follows. First, it can be seen that the more silent the workers in the industrial security work are not being treated fairly, the higher the silence in the workplace. Second, the factors of distribution and interaction fairness affect the will to comply with the security policy, so fair distribution and fair treatment of the compensation can increase the willingness of the industrial security worker to adhere to the security policy. Third, it was found that the dominant silent factor influenced the will to adhere to the security policy, and the more the silence about the organization and its job, the lower the will to adhere to the security policy. The results of this study show that organizational fairness and silence in the workplace directly and indirectly influence the willingness to adhere to the security policy.

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.