• Title/Summary/Keyword: Security plan

Search Result 972, Processing Time 0.036 seconds

A Study on Construction of Disaster Management System at a Large-scale Concert (대형공연 시 재난관리시스템의 구축에 관한 연구)

  • Min, Se Hong
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.4
    • /
    • pp.17-24
    • /
    • 2013
  • On this study, we extracted pending problem and controversial point from management of disaster such as terror for domestic massive performance and then, investigated countermeasure plan against disaster for massive performance through comparison and analysis between anti-disaster strategy of Korea and U.S. U.S are conducting security system actively for passenger of major facilities such as public institution. Nonetheless, In U.S that has the world's best security system, serious affair such as 911 terror and Boston marathon terror are continued to happen. When considering domestic situation that North Korea and South Korea are antagonistic to each other, it is judged when it is high time to prepare for threat of terrorism. Accordingly, On this study, through analyzing of latest terror attacks in U.S and disaster risk in the nation, we analyzed in detail countermeasure plan classified as legislation, operation of security system, instilling a sense. As the result of this analyzing, using by flow-chart, we suggested domestic optimized disaster management system for massive performance. Consequently, we propose to establish systematized disaster management system such as preliminary survey of disaster influence for massive performance.

A study on the improvement of BCM industry through legal systems (BCM(재해경감활동관리)산업 활성화를 위한 법·제도 개선 방안 연구)

  • Han, Jong-U
    • Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.93-100
    • /
    • 2015
  • Although many years passed since 'The Legislative bill on the support of voluntary activities of enterprises for disaster reduction'(hereinafter referred to as 'enterprise disaster reduction act') has been first enacted in 2007, BCMS is still not activated in our society. In contrast, after 911 Terror, importance of BCM is getting magnified and standardization research & institutionalization i s a lso proceeding i all over world. Lately, Disaster preventing activities is urgently needed like the sinking of 'Sewol ferry'. So the purpose of this paper is proposed for establishment of 'BCMS' and activation of the certificate system for Best-Run Business by analyzing the problem of 'enterprise disaster reduction act' and weak of activation as following. First, propel changing the policy of self-regulated participation to mandatory about the certificate system for Best-Run Business from public entity to government ministry and it is able to activate by propelling demo business of the certificate system for Best-Run Business. Second, public entity that has been given the certificate system for Best-Run Business by affiliating with Disaster Management Assessment of government management can be exempted from Disaster Management Assessment or those entity can arrange for connectivity acquisition method of 'Excellent rate'. Third, to publicize the activation of the law mentioned above, makes public entity r ecognizable by incorporating 'BCMS' into National safety management plan and establishment of National critical infrastructures security plan. Fourth, it should be reviewed to improving the related act regarding to inclusion of public organizations as well as private enterprises.

  • PDF

A Study on the Interior Environmental Planning Factors for Improving Safety and Security in Early Children Facilities (안전성 향상을 위한 유아시설 실내환경 계획요인에 관한 연구)

  • Byun, Gi-Dong;Kwon, Ju-Yeong;Ha, Mi-Kyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.2
    • /
    • pp.197-205
    • /
    • 2015
  • Recently in most homes, children are mostly cared in early childhood education facilities. However, the increased number of safety accidents on children cared in such facilities has become a social issue. For that, the purpose of this study is to suggest interior environmental planning elements to improve safety level of early childhood education facilities. This study was carried out by performing literature review analysis and survey. First, in total of 42 environmental planning elements that can be applied domestically were derived from analyzing safety related guidelines for children facilities located both domestically and internationally then a survey was carried out targeted for teachers and staffs in the facilities on importance of the factors. The results of this study are as followings. First, it is required to intensify the level of safety related training for teachers and staffs in the facilities including better treatment for them. Second, the necessity of safety environment by each space in such facilities is required to be approached upon the level of child activities. Third, facilities planning and finalizing planning are important for improving safety of early childhood education facilities. Forth, from factor analysis on the extracted environmental planning elements that are considered as important by the teachers from both day care centers and kindergartens, they were categorized in 5 groups including 'collision and fall prevention plan', 'physical characteristic consideration plan', 'evacuation safety plan', 'lock security plan' and 'outer control plan'. It is fair to say that constructing a better safety environment for children can be achieved by the environmental planning factors by this study.

Research on Deployment Strategy of Public Key Infrastructure for Developing Country: Focused on Malawi (개도국의 공개키기반구조 도입 전략에 관한 연구: 말라위를 중심으로)

  • Kim, Hyunsung;Choi, Hae-Won
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.45-51
    • /
    • 2016
  • The purpose of this paper is to plan deployment strategy of public key infrastructure for Malawi by considering the information and communication technology status on it. For this, we will review the information communication technology status on developing and least developed countries focused on Malawi and plan deployment strategy of mobile based public key infrastructure. First of all, we extract out security considerations for public key infrastructure, which is efficient for wireless communication, and design a new lightweight public key infrastructure apt to mobile device by considering Malawi's information communication technology status. Especially, the proposed mobile based public key infrastructure uses smartcards for all the processes of certificate. It could guarantee the same security as the wired counter part based on lightweight mobile device.

Application Plan of U.S Aviation Profiling for Prevention of Air Terrorism in Korea (항공테러 예방을 위한 미국 항공프로파일링 기법의 국내 활용방안)

  • Yang, Seung-Don;Yang, Young-Mo
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.33-56
    • /
    • 2014
  • This study is aim to make use of prevention of air terrorism and strengthen of air security in Korea. To achieve it. searching main feature in U.S aviation profiling. Aviation profiling in U.S used to Secure Flight, Screening Passengers by Observation Technique, Registered Travel Program. Through U.S Aviation Profiling, Prevention of air terrorism in Korea are as in the following. First, Through U.S Aviation Profiling, Information of terrorism constructed in advance and unification of constructed information. Second, Identifiying that institution exclusively for prevention of air terrorism. Third, Identifiying that human rights and privacy invasion to a minimun plan anout U.S aviation profiling. Finally, Identifiying that the spread of research development for prevention of air terrorism and strengthen of air security in Korea.

  • PDF

The study of the defeat factor of'the Battle of the Bulge' Focus on Military Security (군사보안 관점에서 본 '발지전투' 패인 분석)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.25-31
    • /
    • 2015
  • It depend on relative combat power, patriotism and cohesion of citizen to victory in the battlefield. This stu dy try to analysis why the Germany army fail 'the Battle of the Bulge'. The Germany army plan of maneuve r to attack the France army was surprise attack in the beginning of World War II. The Germany army have initiative to make breakthrough Ardennes Ridge. The operation of the Ardennes Offensive Operation and the Battle of the Bulge is the typical features of blitzkrieg shock. However, the results are extremely different. In the course of the operational planning and decision the course of action, military security is most important fa ctor. We can see the truth in 'the Battle of the Bulge'.

A study for improving database recovery ratio of Disaster Recovery System in financial industry (금융권 재해복구 시스템의 DB 데이터 복구율 향상을 위한 연구)

  • Kim, Jin-Ho;Seo, Dong-Kyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.655-667
    • /
    • 2014
  • A disaster is the time-excess case that computerized service can tolerate a failure and financial industry is being set up the disaster recovery system based on the disaster recovery plan and the business continuity plan for preparing these disasters. However, existing system can not guarantee the business continuity when it comes to cyber terror. This paper analyzes the building type and building technology of disaster recovery system for the financial fields. Also this paper explain the type of data backup using online redo log and type of archive log backup using WORM storage. And this paper proposes the model of improved data recovery combining above two types. Lastly this paper confirm the effectiveness and reliability for proposal rocovery model through the implementation of the test environment.

Implementation of Security Plan from .NET Remoting Environment (닷넷 리모팅 환경에서의 보안 방안 구현)

  • Kim, Young-Sear
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.4
    • /
    • pp.256-261
    • /
    • 2009
  • While .NET and J2EE bisects recent distributed environment, .NET displays "Remoting" as a technology to call remote object. Remoting is frequently used as a protocol in OLTP's WEB program development in form of RPC that exchange data in XML form under HTTP environment. Purpose of this research is to draw problems when applying security to .NET remoting technology that is recently used in web programming, and to find effective application plan by implementing. The main discussion is following. First, network layer security should be replaced to application layer security for better performance and flexibility. Second, the serialization procedure that is repeated in both remoting and encryption module should take place once. Lastly, implementation of "Surrogate" and "Compress" will be discussed that enables to eliminate unnecessary data(table relations, keys, etc) that is used in dataset object of .NET in order to reduce the size of data. It is possible to achieve improvement in speed by two times through immediate implementation in these cases. In order for easier use, component based framework should be supplied hereafter.

  • PDF