• Title/Summary/Keyword: Security plan

Search Result 966, Processing Time 0.025 seconds

A study on the Highspeed Railway Route Selection -Focusing on 4 design tools- (수도권 고속철도 노선선정 연구 -설계4공구를 중심으로-)

  • Kim, Jong-Seok;Kim, Woo-Je
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.200-207
    • /
    • 2011
  • The research which sees accomplishes the capital region high-speed railway and examines investigates about process of railroad construction project and an advance service contents from to understand a progress process, change process and technical investigation of basic design and the execution plan at the time of route led and accomplishes the plan which is detailed the process which in the center researched. Also plan start method and application plan, clear the security of the plan air which is proper is necessary and dividing which design phase is, plan process construction etc. improvements sacrifice froze.

  • PDF

Standardization Model and Implementation of Event Type in Real Time Cyber Threat (실시간 위협에서 Event 유형의 정형화 설계 및 구현)

  • Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.67-73
    • /
    • 2006
  • The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes the basis which constructs the effective cyber attack response system. Especially at the time of security accident occurrence, It overcomes the problem of existing security system through a definition of the event of security system and traffic volume and a concretize of database input method, and propose the standardization plan which is the cornerstone real time response and early warning system. a general standardization plan of this paper summarizes that put out of threat index, threat rating through adding this index and the package of early warning process, output a basis of cyber threat index calculation.

  • PDF

Improvement Plan on Park Geun-Hye Government's Policy Implementation for Social Security (박근혜 정부의 사회안전 정책추진 발전방안)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.35
    • /
    • pp.87-124
    • /
    • 2013
  • This paper studies changes in people's social security awareness during Lee Myung-Bak government, and based on the result, suggests future Park Geun-Hye government's social-security-related administration management plan. In specific, the changes in people's social security awareness in the period of 2008 ~ 2012 have been analyzed, and the result has been utilized to draw suggestions on the future social-security-related administration management plan The result is as the following: First, comprehensive social-security-related policy must be continuously pushed. In terms of the fact that social security is closely related to people's daily lives and life itself, every major component of social security cannot be overlooked. Therefore, comprehensive administration management and policies on each of those components are necessary. Second, social security policies must be reinforced enough for people to actually witness. In case of crime rate, 57.1% of people are pointing it as one of the main causes of social unrest; therefore, this national anxiety must be met with focusing awareness on the subject nation-widely and with thorough national defense preparedness. Third, mutual cooperation between social-security-related branches, and systematic management within the each branches are required. In order to systematically manage every aspect of social security, not only the big agencies - such as Ministry of Security and Public Administration, Ministry of National Defense, Prosecution Service, or National Police Agency -, but most of other parts of administration must cooperate as well. Fourth, consistency in social security policies is necessary. As Park Geun-Hye government's administrative slogans are, "secure and integrated society," "establishing a foundation for happy unification era," which are similar to that of previous administration, the administration should be consistent on its social-security-related politics, rather than differentiating themselves from the previous administration.

  • PDF

A Study on Improvement Plan of Training System for the Specialization of Port Security Guard (항만보안 인력의 전문화를 위한 교육시스템 개선방안)

  • Lee, Jung Hun;Lee, Min Hyung;Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.13-21
    • /
    • 2014
  • It is needless to say that the port security is very important owing to the geographic setting of Korea and the possibility of the provocation by North Korea. In addition, The security management is necessary for the port and the domain of maritime to block the inflow from overseas because of the increase of international crime as terrorism. The training system for port security guard should be constructed to secure the specialization of the manpower for the efficient port security management. But the training system of port security manpower is not unified and the training is not carried out, therefore it is necessary to improve the training system of port security manpower. In this study, the improvement plan of training system is suggested as follows. First, the unification of the legislation of port security should achieved to establish the guidance of training for port security guard. Second, the specialized training per activities should be done. And lastly, the qualification system should be introduced for the specialization of port security manpower.

development plan of nuclear cyber security system (원전 사이버보안 체계 개발 방안에 대한 연구)

  • Han, Kyung-Soo;Lee, Gang-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.471-478
    • /
    • 2013
  • Industrial control system was designed mainly in the form of analog in early days. However, necessity of digital system engineering is increasing recently because systems become complicated. Consequently, stability of digital systems is improved so most industrial control systems are designed with digital. Because Using digital design of Industrial control system is expanded, various threatening possibilities such as penetration or destruction of systems are increasing enormously. Domestic and overseas researchers accordingly make a multilateral effort into risk analysis and preparing countermeasures. In this paper, this report chooses common security requirement in industrial control system and nuclear control system through relevant guidelines analysis. In addition, this report suggests the development plan of nuclear cyber security system which will be an essential ingredient of planning approvals.

A Study on Development of National Examination Security Service (국가시험 보안업무의 발전적 방안연구)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.75-95
    • /
    • 2018
  • The purpose of this study is to find the development of the examination security business plan based on the problem that guards are now aware of examination security service. To achieve the purpose of this study, the interview was conducted by interviewing interviews with five field related graduates and seven field specialists who are currently engaged in the examination for more than six years. The guard who perform national examination security service proposed a development plan of national examination security services as follows. First, the security guards at the national examination must complete an education program suitable for the nature of the workplace. Second, disaster and emergency response training should be added. Third, national examination security guards should be provided with mental training, search equipment and advanced equipment. Fourth, The National Examination Security Service should be specified in the Security Law so that laws and regulations can actively respond. Fifth, the related organization (contracting party) must raise the cost of service according to reality after realizing the property. Sixth, The national security service should ensure that security guards who have completed the security guards' training will be recruited.

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.

A Study on Security for IPv6 and ATM (IPv6및 ATM에서의 보호에 관한 연구)

  • 박영호
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.29-38
    • /
    • 2002
  • This paper presents IPv6, ATM, and IP/ATM security systems for computer network. IPv6 uses authentication header and ESP to provide security services. Authentication header provides integrity and authentication services and ESP provides integrity, authentication and confidentiality services. User plan of ATM provides authentication, integrity, confidentiality and access control services and control plan of ATM provides authentication and integrity services. IP/ATM security services are also presented.

  • PDF

A Study on the Civil Military Enterprise System for the Employment of the Discharged (민간군사기업제도의 도입방안에 관한 연구)

  • Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.7-28
    • /
    • 2004
  • This paper is to introduce the foreign civil military enterprise system and to suggest a plan to improve the employment rate of the discharged soldiers who served for a long term and the welfare of soldiers highly. At first, Military Professional Resources Inc., Dyncorp Inc. and Cubic Inc. of the United States, Sandline International Inc. of England and ATCO Frontec Inc. and Ednoonton Inc. of Canada are introduced in this paper. And also, this paper is to analyze employment conditions and difficulties of the discharged soldiers and suggest to establish a institute of tentatively named 'Korean Civil Military Enterprise' in terms of the Government and the Department of Defense. This civil military enterprise is to plan and manage military projects, to research and develop drill manuals and military doctrines and policies and to evaluate and manage the military training. As a pattern of civil military enterprises, three types of Military Support, Military Consulting and Military Provider are presented. Moreover, in order to advance the civil military enterprise, diverse training programs(for public civil investigators, guard advisors, special security guards and security staffs) to utilize all sorts of special military fields are developed.

  • PDF

The Improvement Plan of a Cash Transportation Structure (현금수송구조의 개선방안)

  • Hong, Weon-Yong
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.409-423
    • /
    • 1997
  • Cash is apt to cause a accident in circulation process regardless of a time, a place and a subject due to its particularity. I propose a good service through circulation harmony by remodeling the system of the structure of cash supply and demand. And I propose accident prevention countermeasure by removing a caxh accident by the simplification, specialization and soientification of money business. I discuss the present condition and the points of cash transportation structure in Chapter 2 and the improvement plan of cash transportation structure in Chapter 3, and conclude in Chapter 4.

  • PDF