• Title/Summary/Keyword: Security ability

Search Result 580, Processing Time 0.026 seconds

A Study on efficiency of security police through cooperation with private sector (민간영역과의 공조에 의한 경비경찰 효율화에 관한 연구)

  • Kim, Jin-Hyeok
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.119-140
    • /
    • 2009
  • It seems that security police's business to secure safety of state and citizens has existed since the mankind began to create a community. State was not fully responsible for such security business from the beginning. The business was carried out autonomously by the private sector for a long period. However, as the state system had been strengthened, the public sector absorbed the function. But in the modern society where various risks exist, safety of society could not be guaranteed only by public police. Accordingly, cooperation with the private sector is indispensable. In the limit of public police, autonomous organization of security companies and general citizens is expanding its scope. As a result, they should exercise partnership as a tripod to build social safety net. Security police failed to secure manpower exclusively responsible for security, despite various businesses and excessive mobilization. Accordingly, their professionalism and ability to cope with crisis are being questioned. In particular, efficiency of security police is becoming a more urgent issue in an era of international terrorism. Private sector can be classified into security companies and private autonomous organization. In case of security companies, the problem is quality and business ability of guards compared to a rapid external growth such as quantitative expansion and advancement into various businesses. In terms of pure private activity, the necessity of understanding of public police activity and conditions for organizational and continuous activity should be prepared. To tide over such problems and effectively achieve the common goal, changes in the method of employment, new establishment of security police department, and strengthening of professionalism and crisis management ability are necessary in the public police sector. In case of security companies, improvement of relations with public police through joint education, strengthening of business ability and activation of business cooperation through these matters are necessary. To maximize activity of pure private sector, it needs to establish reserve police, manage such private autonomous organization and bolster publicity with citizens.

  • PDF

The Implementation of Probabilistic Security Analysis in Composite Power System Reliability (복합전력계통 신뢰도평가의 확률론적 안전도 도입)

  • Cha, Jun-Min;Kwon, Sae-Hyuk;Kim, Hyung-Chul
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.5
    • /
    • pp.185-190
    • /
    • 2006
  • The security analysis relates to the ability of the electric systems to survive sudden disturbances such as electric short circuits or unanticipated loss of system elements. It is composed of both steady state and dynamic security analyses, which are not two separate issues but should be considered together. In steady state security analysis including voltage security analysis, the analysis checks that the system is operated within security limits by OPF (optimal power flow) after the transition of a new operating point. On the other hand, dynamic security analysis deals that the transition will lead to an acceptable operating condition. Transient stability, which is the ability of power systems to maintain synchronism when subjected to a large disturbance, is a principal component in dynamic security analysis. Usually any loss of synchronism will cause additional outages. They make the present steady state analysis of the post-contingency condition inadequate for unstable cases. This is the reason of the need for dynamics of systems. Probabilistic criterion can be used to recognize the probabilistic nature of system components and shows the possibility of system security. A comprehensive conceptual framework for probabilistic static and dynamic assessment is presented in this paper. The simulation results of the Western System Coordinating Council (WSCC) system compare an analytical method with Monte-Carlo simulation (MCS). Also, a case study of the extended IEEE Reliability Test System (RTS) shows the efficiency of this approach.

University Students Impact of Martial-Arts Training on Self-Realization among Security Majors (경호전공 대학생의 무도수련이 자아실현에 미치는 영향)

  • Son, Sung-Rak;Jung, Sung-Suk;Wang, Sug-Won;Jang, Ye-Jin
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.101-118
    • /
    • 2008
  • The subjects in this study were 500 students who were selected from a population that consisted of security majors who took courses in martial arts in four different four-year-course universities. After a survey was conducted, the answer sheets from 451 students were analyzed except 49 incomplete ones. The collected data were analyzed with SPSS Ver. 12.0 program. Frequency analysis, t-test and one-way ANOVA were utilized, and LSD and regression analysis were employed to make a post-hoc comparison. All the hypotheses formulated in this study were verified at the a=.05(Chronbach's alpha) level of significance. The findings of the study were as follows: First, as for relations between demographic characteristics and self- realization, the college students investigated were statistically different according to gender in three subvariables of self-realization that included ability development, ability display and attainment of ideal. Age and academic year made a significant difference to their ability development and attainment of ideal, and they differed statistically significantly in terms of ability development according to black lebel test. Second, concerning connections between the degree of martial-arts training and self-realization, training term, one of the subvariables of the degree of martial-arts training had a positive correlation to their ability development and attainment of ideal at the 5% level of significance, and training time was positively correlated to their ability development at the 5% level of significance. Third, training term, one of the subvariables of the degree of martial- arts training, had an impact on ability development, and that exerted a firsthand influence on attainment of ideal as well.

  • PDF

Factors Affecting the Security Ability of Port Logistics Organization Members (항만물류조직구성원들의 보안능력에 영향을 미치는 요인)

  • Kang, Da-Yeon
    • Journal of Navigation and Port Research
    • /
    • v.43 no.3
    • /
    • pp.179-185
    • /
    • 2019
  • Currently, despite having active movements related to port logistics security, there is lack of awareness, education, and security systems related to port technology. Before implementing port logistics security, a mutual authentication agreement should be reached through the establishment of an integrated network that can share port logistics security information in real time. In order to achieve port competitiveness and strengthen logistics service, establishment of national strategy for logistics security is necessary. However, there is an urgent need to raise the security consciousness among the port logistics organization members and enhance the information security ability which is a crucial feature of the port logistics organization. Therefore, the objective of this study is to analyze the factors affecting the information security capacity of port logistics organization members. Even though the analysis rejected the hypothesis that security regulations affect security awareness, the security activities and security awareness were significantly correlated. It also has a positive impact on the relationship between security norms and security abilities, and security awareness and security abilities.

A study on the evaluation of electronic security systems using the AHP (AHP를 이용한 전자경비 시스템의 평가에 관한 연구)

  • 정호원;강인배
    • Korean Management Science Review
    • /
    • v.13 no.2
    • /
    • pp.49-59
    • /
    • 1996
  • The use of advanced electronic security system is growing quickly to protect properties and life. However, customers cannot select appropriate configuration of the system because there are no objective evaluation methods to measure the security ability of the system. Furthermore, the system suppliers cannot propose quantitative value of security ability of the system. This study suggests an objective evaluation and selection method that customers and suppliers can use to base his or her decision when choosing the most appropriate configuration of the system. Our method identifies 6 characteristics and 20 sub- characteristics of the electronic security system, calculates their weights, and decides the best configuration. We use AHP (Analytic Hierarchy Process) to assign the weights of characteristics. Finally, this paper gives an example to compare four alternative configurations of the system.

  • PDF

How Do Children Interact with Phishing Attacks?

  • Alwanain, Mohammed I
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.127-133
    • /
    • 2021
  • Today, phishing attacks represent one of the biggest security threats targeting users of the digital world. They consist of an attempt to steal sensitive information, such as a user's identity or credit and debit card details, using various methods that include fake emails, fake websites, and fake social media messages. Protecting the user's security and privacy therefore becomes complex, especially when those users are children. Currently, children are participating in Internet activity more frequently than ever before. This activity includes, for example, online gaming, communication, and schoolwork. However, children tend to have a less well-developed knowledge of privacy and security concepts, compared to adults. Consequently, they often become victims of cybercrime. In this paper, the effects of security awareness on users who are children are investigated, looking at their ability to detect phishing attacks in social media. In this approach, two Experiments were conducted to evaluate the effects of security awareness on WhatsApp application users in their daily communication. The results of the Experiments revealed that phishing awareness training has a significant positive effect on the ability of children using WhatsApp to identify phishing messages and thereby avoid attacks.

On Enhanced e-Government Security - Network Forensics

  • Wei, Ren
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.173-184
    • /
    • 2004
  • E-Government security is crucial to the development of e-government. Due to the complexity and characteristics of e-government security, the viable current approaches for security focus on preventing the network intrusion or misusing in advanced and seldom concern of the forensics data attaining for the investigation after the network attack or fraud. We discuss the method for resolving the problem of the e-government security from the different side of view - network forensics approaches? from the thinking of the active protection or defense for the e-government security, which can also improve the ability of emergence response and incident investigation for e-government security.

  • PDF

A Study on a Countermeasure Program using the Martial Arts for a Security Guard Caused by an Accidental Situation (우발상황시 경호무도 대응방안)

  • Park, Jun-Seok;Kang, Young-Gil
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.327-340
    • /
    • 2003
  • As a countermeasure under accidental occurrence situation, First, as application form of martial arts, A security guard foster ability that can protect a target person of guard and own body under accidental occurrence situation through incessant martial arts practice. To achieve this purpose, incessant training mental power and physical strength reinforcement should be kept on to prevent, therefore make a safety control function for such as weapon, small arms, explosive, vehicles terror etc. happened under accidental occurrence situation. Second, according to the contents of training based on the classification category of martial arts for security guard under accidental situation, a security guard must keep safety distance necessarily lest a target person of gurad should be attacked by attacker, therefore, intercept an attack opportunity if a safety distance between a target person of guard and attacker is not kept. Third, It is to practice confrontation techniques based on the type of attack. A security guard must develp situation disposal ability that can cope properly with the attack using empty hands, murderous weapon, small arms, explosive by case or individual or mass of threat that impose danger and injury in a target person's body of guard.

  • PDF

Methodology of Log Analysis for Intrusion Prevention based on LINUX (리눅스 기반 침입 방지를 위한 로그 분석 방법 연구)

  • Lim, Sung-Hwa;Lee, Do Hyeon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.33-41
    • /
    • 2015
  • A safe Linux system for security enhancement should have an audit ability that prohibits an illegal access and alternation of data as well as trace ability of illegal activities. In addition, construction of the log management and monitoring system is a necessity to clearly categorize the responsibility of the system manager or administrator and the users' activities. In this paper, the Linux system's Security Log is analyzed to utilize it on prohibition and detection of an illegal protrusion converting the analyzed security log into a database. The proposed analysis allows a safe management of the security log. This system will contribute to the enhancement of the system reliability by allowing quick response to the system malfunctions.

A Plan to Improve Core Job Skills through the Level Management System : Focusing on the X-ray Screening Rating System (수준관리체계를 통한 핵심 직무역량 향상 방안 - 보안검색요원 판독등급제 중심으로 -)

  • Kim, Dong Min;Baek, Jeong Seon
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.4
    • /
    • pp.677-689
    • /
    • 2023
  • Purpose: The purpose of this study is to design a x-ray screening rating system to improve X-ray screening ability, which is a core job competency of security screener at Incheon International Airport, and to verify its effectiveness through empirical analysis to suggest ways to improve the level management system. Methods: In this study, the effectiveness of the research model was analyzed using T-test tests for effect analysis based on the empirical analysis results derived through the competency evaluation model, the screening rating system. Results: The results of this study are as follows. The average score for regular education before the implementation of the x-ray screening rating system was 94.1 points, but after the implementation of the x-ray screening rating system, the average score for regular education was 95.5 points, an average of 1.4 points increased. In addition, the proportion of those with 95 or more points classified as high scorers also increased significantly from 51.1% to 69.3%. Conclusion: The X-ray screening rating system of security inspectors will systematically manage the level of screening ability, which is a key job competency, and play a strong role in improving competency, while preventing security accidents through early identification and intensive training of level-lowers.