• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.027 seconds

Effect on NCOs and students of self-leadershiployment career (부사관과 학생들의 셀프리더십이 취업진로에 미치는 영향)

  • Kwon, Jung-Min;Lee, Han-Kyu
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.109-118
    • /
    • 2017
  • The study examines whether there is support for undergraduate students of Department of NCOs leadership needs and self-perceived any casualty, the purpose being placed to identify the cause-and effect relationship between student's behavior and these self-appointed leadership needs parameters. To study this end, the men and women college students Military major in Busan district using the convenience of the student sample extraction to extract the 362 students. Setting the model to achieve the object of the study, and then through a structural equation model (SEM) were studies a causal relationship among variables. Result on the basis of the research study model verification method as described above what is derived from this study were as follows. First, self-leadership is confirmed in the career planning of clarity on the impact of career beliefs centered strategies(+) target-oriented strategy(+), and independent self-reliance, check-centered strategies(+), constructive thinking strategies(+), ERA=centric strategy(+), in the natural course flexibility, compensation strategies(+), constructive thinking strategies(+) improve professional skills appeared to affect the check-centered strategies(+), ERA-centered strategies(+). Second, self-leadership is general satisfaction at the impact of major satisfaction natural reward strategies(+), the curriculum meets the natural reward strategies(+) target-oriented strategy(+) recognition satisfy the natural reward strategies(+) target-oriented strategy(+) appeared to affect this. Third, career beliefs Major General satisfaction in the impact on satisfaction Career Planning Clarity(+), an independent self-reliance(+), career flexibility(+)improve professional skills(+), the curriculum satisfies independent self-reliance(+), career flexibility(+) improve professional skills(+), the self-satisfied recognized independent trust(+), career flexibility(+), career planning clarity(+) it appeared to influence this.

A study on development strategies for military spiritual education complying with the era of peace and prosperity on the Korean Peninsula (한반도 평화와 번영시대에 부합하는 군 정신전력 교육 발전방안)

  • Kim, Nam-Seok;Park, Hyo-Sun
    • Journal of National Security and Military Science
    • /
    • s.15
    • /
    • pp.1-30
    • /
    • 2018
  • This study focused on how to supplement and develop military spiritual education in response to promotion of peace and prosperity and Change of Security Environment on the Korean Peninsula. In order to succeed in the peace and prosperity on the Korean Peninsula policy, Strengthening the military spiritual education is necessary. This study was analyzed through the survey and the results are as follows: First, the awareness level of military spiritual education is more than 68%. Second, the satisfaction level of education has been quit motivated, but, the respondents demands various methods of eduction. Third, the current mental power scores showed no significant difference for environmental change. In addition, based on the results of the research, the problem of military spiritual education is as follows. It is not enough to secure the identity that can firmly support the era of peace and prosperity on the Korean peninsula. Poor budget support might hinder improving poor education facilities and outdated equipment. Furthermore, there is a lack of research on future-oriented educational system in support of traditional education methods of repetition-type repeated education and unification. Therefore, we deducted the following development strategies for the military spiritual education in this paper. First, it is necessary to strengthen the military spiritual education to support the era of peace and prosperity on the Korean Peninsula. Second, for enhancing educational environments, the educational facilities and equipments should be improved by understanding the characteristics of the education target. Third, the integrated management of military research institutes specialized in military spiritual education should be pursued as a system development for ensuring the continuous effect of education. In conclusion, continuous attention and research are needed to establish national perspective and national security perspective, raise the military spirit and utilize various education development programs in order to develop efficient military spiritual education in the future.

  • PDF

Improvement Strategies on Protocol & Security Systems of International Conferences (국제회의 의전경호체계 개선방안)

  • Joo, Il-Yeob
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.67-93
    • /
    • 2016
  • This study aims to analyze protocol & security systems of international conferences such as 2010 Seoul G20 Summit, 2012 Seoul Nuclear Security Summit and to propose Improvement strategies. The results derived from this study are as follows. First, it is necessary to support the establishment of international conference laws. We should select a major agency for 'International Conference Industry Promotion Act', coordinate of the system of international conference laws, resolve potential conflicts, maintain consistent on support organization of international conferences. Second, it is necessary to coordination among different ministries that control security relevant laws. We should solve clashes possibility between a few laws on security system which is closely related to protocol & security of international conference. Third, it is necessary to produce a joint protocol handbook of government for establishing protocol & security system of international conferences. We should try to confirm protocol & security system of international conferences through publishing a joint protocol handbook of government from their own protocol handbook of the executive, the legislature, etc. Forth, it is necessary to build and strengthen expertise of PCOs(professional convention organizers). We should find and assist several PCOs for achieving government policy that develop industrial foundation on international convention and train human resources on international convention expected next generation of promising industries.

  • PDF

Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed

  • Shin, Jinsoo;Choi, Jong-Gyun;Lee, Jung-Woon;Lee, Cheol-Kwon;Song, Jae-Gu;Son, Jun-Young
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3319-3326
    • /
    • 2021
  • As a form of industrial control systems (ICS), nuclear instrumentation and control (I&C) systems have been digitalized increasingly. This has raised in turn cyber security concerns. Cyber security for ICS is important because cyber-attacks against ICS can cause not only equipment damage and loss of production but also personal and public safety hazards unlike in general IT environments. Numerous risk analyses have been carried out to enhance the safety of ICS and recently, many studies related to the cyber security of ICS are being conducted. Many existing risk analyses and cyber security studies have considered safety and cyber security separately. However, both safety and cyber security perspectives should be considered when analyzing risks for complex and critical ICS facilities such as nuclear power plants (NPPs). In this paper, the STPA-SafeSec methodology is selected to consider both safety and security perspectives when performing a risk analysis for NPPs in order to assess impacts on the safety by cyber-attacks against the digital I&C systems. The STPA-SafeSec methodology was applied to a test-bed system that simulates a condensate water (CD) system in an NPP. The process of the application up to the development of mitigation strategies is described in detail.

Development of the framework for quantitative cyber risk assessment in nuclear facilities

  • Kwang-Seop Son;Jae-Gu Song;Jung-Woon Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2034-2046
    • /
    • 2023
  • Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quantitatively assess cyber risks. However, this can be challenging due to limited historical data on threats and customized Critical Digital Assets (CDAs) in nuclear facilities. Previous works have focused on identifying data flows, the assets where the data is stored and processed, which means that the methods are heavily biased towards information security concerns. Additionally, in nuclear facilities, cyber threats need to be analyzed from a safety perspective. In this study, we use the system theoretic process analysis to identify system-level threat scenarios that could violate safety constraints. Instead of quantifying the likelihood of exploiting vulnerabilities, we quantify Security Control Measures (SCMs) against the identified threat scenarios. We classify the system and CDAs into four consequence-based classes, as presented in NEI 13-10, to analyze the adversary impact on CDAs. This allows for the ranking of identified threat scenarios according to the quantified SCMs. The proposed framework enables stakeholders to more effectively and accurately rank cyber risks, as well as establish security and response strategies.

Security Problems in Aircraft Digital Network System and Cybersecurity Strategies (항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략)

  • Lim, In-Kyu;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.633-637
    • /
    • 2017
  • Cyber attacks on aircraft and aeronautical networks are not much different from cyber attacks commonly found in the ground industry. Air traffic management infrastructure is being transformed into a digital infrastructure to secure air traffic. A wide variety of communication environments, information and communications, navigation, surveillance and inflight entertainment systems are increasingly threatening the threat posed by cyber terrorism threats. The emergence of unmanned aircraft systems also poses an uncontrollable risk with cyber terrorism. We have analyzed cyber security standards and response strategies in developed countries by recognizing the vulnerability of cyber threats to aircraft systems and aviation infrastructure in next generation data network systems. We discussed comprehensive measures for cybersecurity policies to consider in the domestic aviation environment, and discussed the concept of security environment and quick response strategies.

Effect of Security Culture on Security Compliance and Knowledge of Employees (조직의 정보보안 문화 형성이 조직 구성원의 보안 지식 및 준수의도에 미치는 영향 연구)

  • Hwang, Inho;Kim, Daejin;Kim, Taeha;Kim, Jinsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.1-23
    • /
    • 2016
  • This study proposes an alternative to minimize insider-caused security threats that are relatively difficult to control and cause high uncertainty in information security management. Therefore, we investigate the relationship between organizational effort and the security understanding of employees to eventually enhance security compliance intention among employees. We develop a research model and formulate hypotheses on the basis of past findings. Accomplished questionnaires are collected from 526 employees working in organizations where information security policy is being implemented. In addition, we prove the hypotheses using a structural model. After reviewing the structural model, the security knowledge of employees and information security culture are determined to positively influence the security compliance intention of employees. Moreover, top management support, security policy, security visibility, and security education programs are proven to be antecedent factors in establishing a security culture in organizations. The findings of this study could guide organizations in formulating information security strategies to enhance the security compliance intention of employees.

Classical Literature Analysis: Government Development Strategies for Improving Economy in Joseon Dynasty Period

  • Eungoo KANG
    • Journal of Koreanology Reviews
    • /
    • v.3 no.1
    • /
    • pp.1-6
    • /
    • 2024
  • The Joseon Dynasty lasted for 618 years, from 1392 to 1910, and is regarded as one of the development periods of Korea in various areas, including politics, culture, economy, and society. During this period, the government undertook various measures to try to change the state of the economy and generally transform people's living standards. These were some of the strategies founded on Confucianism, which focused on the right way to govern and manage the economy to attain prosperity for the society. The present study explores government development strategies for improving the economy in Joseon Dynasty period using comprehensive literature analysis via Kci, Scopus, Web of Science databases. Indeed, agricultural transformations during the Joseon dynasty clearly show that knowledge and innovation were critical for encouraging agricultural growth. Therefore, today's South Korean government can implement technological advancement and research to improve its agricultural value chain and food security. Many farmers lack knowledge about improved methods of practicing agriculture or have inadequate capital to invest in research and development; these issues can be dealt with by the relevant government agencies putting in place necessary policies and creating awareness through educational programs and articles.

The Structure Model between Private Security Company's Relationship Characteristics, Service Quality and Consumer Behavior (민간경비업체의 관계적 특성, 서비스품질과 소비행동의 구조적 관계)

  • Kim, In-Jae
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.57-88
    • /
    • 2013
  • The study aims at identifying, through structure model, the relationship characteristics between a private security company and its service customer as well as the relationship between the service quality and the consumer behavior, thereby providing the practical services that may attract new customers and maintain the existing customers in the competition to survive in the same industry and also may raise the loyal customer base, providing academic fundamental data to set up aggressive relationship marketing strategies. To achieve such purposes above, the research was conducted with 229 subjects, the users of a private security company's service as the employees of the stores located in Cheonan area, using the convenience sampling. The data was treated, using the statistics program, SPSS Windows 18.0 Version for frequency analysis and reliability analysis. Additionally, the confirmative factor analysis and covariance structural analysis were made, using AMOS 18.0 Version. Through the data analysis following the research methods above, the conclusion was acquired as follows: First, the relationship characteristics of a private security company makes influence on service quality. Second, the service quality of a private security company makes influence on consumer behavior. Third, the relationship characteristics of a private security company makes influence on consumer behavior. Fourth, the service quality makes an influence as the mediate effect between the private security company's relationship characteristics and consumer behavior.

  • PDF