• Title/Summary/Keyword: Security plan

Search Result 974, Processing Time 0.026 seconds

A Study on Confrontation a Plan of Policing Policy with the Development Globalization (세계화의 진전에 따른 치안정책의 대응방안)

  • Lee, Jin-Moon
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.251-272
    • /
    • 2000
  • Attempts have also been made to locate security in the so-called 'policingdivision of labour' In order to understand this, it is necessary to identify some of the links which exist between public police organizations and the private security sector. Such links can be divided into six types : 1) Interpersonal links, 2) Joint operations, 3) Exchange of services, 4) Granting of special powers, 5) Public bodies hiring private personnel, 6) New organizational. Van Reenen provides a useful outline of the different dimensions of future Glibalization of policing. Developments, he suggests, are likely to proceed in four directions : 1) Co-operation : at this level, the nature and powers of national police systems are not required to change, co-operation occurring between self-standing forces. 2) Horizontal integration : this arises when officers obtain authority to operate in another country, or where government officials from one country get authority over the police in another country. 3) Vertical integration : this exists when a police organization is created which can operate within the area of the EC as a whole. 4) Competition : the internationalization of policing in Europe presents itself, more and more, as a market in which different policing systems trade their products.

  • PDF

A Study of Authentication Algorithm in Electronic Commerce (전자상거래에서의 인증 알고리즘에 관한 연구)

  • Kim Young-Sun
    • Management & Information Systems Review
    • /
    • v.6
    • /
    • pp.1-19
    • /
    • 2001
  • Partial transactions which use computer networks are formed in the cyberspace due to rapid progress of communication and computer technology. Electronic business transactions have security problems according to the special quality of opening networks, while it can be approached easily by anyone without being tied to time and places through Internets. To revitalize the electronic business transactions, security technology which can establish its security and trust is the prior task and both safe information communication and better information security service offer are essential factors. The method to exchange information through Internets must be made after confirming one another's exact connection in the mutual identity certification to prevent a lot of threat which can occur in the use of password techniques. To satisfy these electronic business transactions, we intend to increase understanding of authentication algorithm provided with authentication function of messages and users as well to plan safety and trust of business information and contents in the electronic business transactions.

  • PDF

The Security Policy for Big data of US Government (미정부의 빅데이터를 위한 보안정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.403-409
    • /
    • 2013
  • This paper review about big data policy and security issue of US government. It is introduced Big data R&D initiative strategy and plan, NITRD program, and big data strategy of government. It is presented operation environment of big data in US government, big data information for military operation, major research organization and topic, security guideline and so on.

A Study on Private Security in the 1980s (1980년대의 민간경비연구)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.43-51
    • /
    • 2016
  • In the 1980s, private security was established in the framework of institutional framework with the Security Industry Act which was enacted in 1976. The agents who brought in the development of the private sector in 1980 enjoyed a boom in the global economy, affected by its high-flying dollar value, low international interest rate, low oil prices, and the blooming economy. In addition, the semiconductor, computers and communications equipment that was promoted in accordance with the e-Literacy plan were raised. Following the economic development of various events such as Seoul International Trade Fair, "86 Asian Games," and "88 Seoul Olympic Games," private security expenses were enhanced by increasing awareness of civilian expenses. Also, in the 1980s, Korean investment in foreign companies, including Japan's Secom, or Korean technology, brought many changes to the private security. Meanwhile, the cost of security, which has been centered around human expenses, has brought about the era of mechanized spending, or machine security expenses. The purpose of this study is to systematically analyze the social environment surrounding the private security in the 1980s and systematically analyze the important factors that contribute to private security.

The Reinforcing plan of private security capabilities (민간경비역량의 강화방안)

  • Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.19-28
    • /
    • 2015
  • Recently in the condition of increasing of cruel-hearted crime, it is limited to keep the community safe by only police force and expanding role of private security is required. But current private security law and relation law have many delimitations. So reinforcing of Private security capabilities is needed and several measures are required. Integration of private security law and private police guards is the foundation of rule introduced of specific rights of private guards. Also authority of the private security should be ruled in private security law to prepare the conditions of performed guard duties. In relation to this, questioning of a suspicious person by a patrolman should be granted to the private security. Strengthening authority of private security can be helpful in preventing crime and policing.

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

Enhancing on Security Monitoring & Control Redundancy Facilities Config uration & Operation in the COVDI-19 Pandemic Environment (코로나19 환경에서 무중단 보안관제센터 구성 및 운영 강화 연구)

  • Kang, Dongyoon;Lee, Jeawoo;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.25-31
    • /
    • 2021
  • The purpose of this study was to keep the Security Control Center, which operates under a shift system, uninterrupted during the COVID-19 virus epidemic. Security facilities responding to cybersecurity threats are essential security facilities that must be operated 24 hours a day, 365 days a day in real time, and are critical to security operations and management. If security facilities such as infectious disease epidemic, system failure, and physical impact are closed or affected, they cannot respond to real-time cyberattacks and can be fatal to security issues. Recently, there have been cases in which security system facilities cannot be operated, such as the closure of facilities due to the COVID-19 virus epidemic and the availability of security systems due to the rainy season, and other cases need to be prepared. In this paper, we propose a plan to configure a security system facility as a multiplexing facility and operate it as an alternative in the event of a closed situation.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

The nature of UN support of the Korea War (유엔의 6.25전쟁 지원과 성격 -신정공세 전후 유엔의 휴전교섭 노력을 중심으로-)

  • Yang, Yong-Jo
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.1-48
    • /
    • 2010
  • The purpose of this study is to examine and analyze the Untied Nations' efforts for peace on Korean peninsular after CCF's participation in Korean War. The Untied Nation tried to negotiate th peace plan between two sides from the end of 1950. Once the CCF's entry into the war had been confirmed, the war situation moved to a new phase, and the UN forces, which had guided the war in an effort to destroy the NKP A forces, and to punish North Korea, had to set up new guidelines to cope with the new situation. Accordingly, in late November, 1950, the UN forces camp, mainly the US Joint Chiefs of Staff and the United Nations Command, discussed various options, such as an expansion of the war up to the Chinese territory, a cease fire along the 38th Parallel, or a forced and inevitable evacuation. The Korean delegation to the UN insisted that "the unification of Korea should be achieved only by victory in the war. The Chinese intervention in the war is a Challenge to the UN in the same way as the North Korean invasion. The UN participation in the war was to repulse the invasion. With the same spirit we should drive back the Chinese Communists." The Korean delegation also emphasized to the friendly nations the political objective and will of unification, and that a cease fire at a threshold of unification might return us to the status quo ante bellum, and would be contrary to the Korean nation's desire. At that time, particularly, the US strongly considered the employment of nuclear weapons as one of the new strategies to cope with the Chinese invasion. The international effects of these casual remarks were realized almost at once. The British Prime Minister who had not wanted the expansion of war in the Far East, especially from the view point of the interest of NATO's security, visited Washington. so the conference had a very important meaning for the UN forces' new strategy. On the other hand, at the UN, on the 5th of December, the very day Truman and Attlee agreed to seek a cease-fire under UN auspices, a group of thirteen Asian and Arab states proposed to ask China and North Korea not to cross the 38th Parallel, and sounded out both sides about a cease fire along the 38th Parallel. The United States and the United Kingdom gave their assent, but China and North Korea gave no direct response. The CCF, who were securing the initiative of operation, were not agreeable with the proposal of the UN forces. The Untied Nation has tried to negotiate th peace plan between two sides from the December of 1950 and January of 1951. The Untied Nations' has achieved great results to negotiate for the peace plan on Korean peninsular after CCF's participation in Korean War. It's the results considering both the operation situation and political opinions.

  • PDF

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.