• Title/Summary/Keyword: Security plan

Search Result 979, Processing Time 0.026 seconds

A study on the improvement of hiring system in the military human resources: introduction of modified blind hiring (군 인적자원 채용제도 개선에 관한 연구 : 수정형 블라인드 채용의 도입 검토)

  • Jung, Jung Kyun;Park, Cheol
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.93-99
    • /
    • 2019
  • In the Republic From the national interest in the recent hiring scandals in the public institutions such as the Financial Supervisory Service, Gangwon Land, and so on, people were outraged by the fact that the competition opportunities were not secured although they should be equally secured to compete with anyone with their capabilities in the fair process. Hence, the government made the public institutions blind hiring to be mandatory, which eliminated writing the academic background, GPA, and English score in the application form and selected the new employees only with job competencies in the public institutions in 2017. In 2018, the prosecution did their best for the investigation on hiring scandal with the strong will to cut the scandal upon announcement of 5-year anti-corruption master plan. Amid this controversy, this study tries to suggest the further direction in the hiring military human resources upon introduction of blind hiring system, reviewing the needs to introduce blind hiring system in the military, the governmental guideline according to the mandatory blind hiring in the public institutions, and the application status of modified blind hiring in the military.

A Study on National Strategy For Countering the New Terrorism As Network War (네트워크 전쟁의 도래와 테러리즘의 새로운 흐름 - 국가대응전략을 중심으로 -)

  • Ahn, Hee-Nam;Jang, Ki-Boong
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.137-159
    • /
    • 2008
  • In the 21st century, the Information Revolution caused unpredictable kinds of complications. Human society conducts a tactical network war like Swarming. Network war simultaneously consists of merits such as global monitoring and anti-dictatorship campaign, and violent demerits like terrorism. It has been becoming a generalization of terrorism of the present time to build a brotherhood and ideology to commit terrorism. This is considered as new terrorism, a form of network war. Theses days, terror organizations including Al Qaeda establish a brotherly network to commit terrorism when and where they want. New terrorism is a novel form that harms unspecified individuals. In fact, many countries have been experiencing damage from new terrorism. It is becoming an urgent issue to every country to prepare a suitable plan that cope with new terrorism. This dissertation provides defense strategy in macro and micro aspect as a responding scheme to new terrorism.

  • PDF

A Study on the Prediction of Power Demand for Electric Vehicles Using Exponential Smoothing Techniques (Exponential Smoothing기법을 이용한 전기자동차 전력 수요량 예측에 관한 연구)

  • Lee, Byung-Hyun;Jung, Se-Jin;Kim, Byung-Sik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.2
    • /
    • pp.35-42
    • /
    • 2021
  • In order to produce electric vehicle demand forecasting information, which is an important element of the plan to expand charging facilities for electric vehicles, a model for predicting electric vehicle demand was proposed using Exponential Smoothing. In order to establish input data for the model, the monthly power demand of cities and counties was applied as independent variables, monthly electric vehicle charging stations, monthly electric vehicle charging stations, and monthly electric vehicle registration data. To verify the accuracy of the electric vehicle power demand prediction model, we compare the results of the statistical methods Exponential Smoothing (ETS) and ARIMA models with error rates of 12% and 21%, confirming that the ETS presented in this paper is 9% more accurate as electric vehicle power demand prediction models. It is expected that it will be used in terms of operation and management from planning to install charging stations for electric vehicles using this model in the future.

A Study on the Legal and Institutional Improvement Plan for Cyber Correspondence (사이버 대응태세 구축을 위한 법·제도적 개선방안 연구)

  • Lee, Yong Seok;Lim, Jong In
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.61-66
    • /
    • 2019
  • Cyber space is a place where free activities are guaranteed. However, it is also true that not all individuals and countries strive for peaceful cyberspace, and that there is a growing tendency to gain unfair advantage through this space. Therefore, the state should reform laws and institutions to keep cyberspace safe. By establishing the "Basic Law on Cyberspace" which includes the law of the state law on cyberspace, it is necessary to be able to recognize and respond to the direction of the national legal discipline on cyberspace. The development of digital forensics is an urgent task due to the rapid development of IT. However, if the law is delayed for various reasons, some of the existing laws should be amended to improve the stability of the law in accordance with the circumstances. To this end, it is necessary to revise the "Information and Communication Infrastructure Protection Act", "Information and Communication Network Enhancement and Information Protection Act", "Integrated Defense Law", "Establishment of Defense Information Infrastructure Infrastructure and Defense Information Resource Management Act".

The Quantification of Considerations related with Decision-making in Ground Operation : Focusing on Evaluating Avenues of Approach in IPB (지상작전과 연관된 의사결정 고려요소의 정량화 방안 : 전장정보분석의 접근로 평가요소를 중심으로)

  • Han, Seung Jo;Lee, Seungmin
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.129-136
    • /
    • 2019
  • The main tasks of commander and staffs in ground operations are a continuation performing the process of making decisions in various situations. Since the current decision-making process is largely dependent on qualitative methods, it is difficult to integrate with the decision-making tools associated with the 4th Industrial Revolution. The purpose of this study is to suggest the process of deriving the relative importance of the evaluation factors using the AHP with focusing on assessing the avenues of approach in IPB related to the ground operation plan. The most important aspect of IPB is the evaluation of the avenues of approach. Evaluation factors include target accessibility, observation and seasons, concealment and cover-up, ease of maneuverability, and ease of transition to adjacent access roads. The existing methods are the comparison method with evaluation factors and the analysis with the advantages and disadvantages. However, it has been criticized that they regard evaluation factors as equal importance. The results show that target accessibility has the highest score related with priority when considering the criteria.

A study on Memory Analysis Bypass Technique and Kernel Tampering Detection (메모리 분석 우회 기법과 커널 변조 탐지 연구)

  • Lee, Haneol;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.661-674
    • /
    • 2021
  • Malware, such as a rootkit that modifies the kernel, can adversely affect the analyst's judgment, making the analysis difficult or impossible if a mechanism to evade memory analysis is added. Therefore, we plan to preemptively respond to malware such as rootkits that bypass detection through advanced kernel modulation in the future. To this end, the main structure used in the Windows kernel was analyzed from the attacker's point of view, and a method capable of modulating the kernel object was applied to modulate the memory dump file. The result of tampering is confirmed through experimentation that it cannot be detected by memory analysis tool widely used worldwide. Then, from the analyst's point of view, using the concept of tamper resistance, it is made in the form of software that can detect tampering and shows that it is possible to detect areas that are not detected by existing memory analysis tools. Through this study, it is judged that it is meaningful in that it preemptively attempted to modulate the kernel area and derived insights to enable precise analysis. However, there is a limitation in that the necessary detection rules need to be manually created in software implementation for precise analysis.

Legal System of Blockchain and Domestic and Foreign Blockchain Legal System - Focusing on Industrial Revitalization - (블록체인의 법률체계와 국내외 블록체인 법제 현황 -산업 활성화를 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.67-75
    • /
    • 2019
  • As 4th industrial revolution has emerged as a hot topic, the blockchain technology capable of enabling super intelligence as a premiere has been an attracting attention. With the interest in blockchains, various platforms using blockchains are emerging. Reflecting this trend, several countries including US, EU, China, and Japan are preparing blockchain and related laws or amending existing laws. In Korea, the platform business based on blockchain is being done, but the related laws are insufficient. In this study, we first present the legal system of the blockchain, examine each component, and then compare the current state of the legal system in US, EU, China, and Japan based on the blockchain legal system. Finally, we propose a brief improvement plan of the legal system for industrial development by commercialization of blockchain. In the future, we would like to study the individual legal system about the blockchain.

Developing an XR based Hyper-realistic Counter-Terrorism, Education, Training, and Evaluation System (확장현실(XR) 기반 초실감 대테러 교육훈련체계 구축 방안 연구)

  • Shin, Kyuyong;Lee, Sehwan
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.65-74
    • /
    • 2020
  • Recently, with the rapid development of eXtended Reality(XR) technology, the development and use of education and training systems using XR technology is increasing significantly. In particular, in areas that involve great risks and high costs such as military training and counter-terrorism training, the use of XR based simulators is preferred because they can improve training performance, reduce training costs, and minimize the risk of safety issues that may occur in actual training, by creating a training environment similar to actual training. In this paper, we propose a plan to build and evaluate an XR based hyper-realistic counter-terrorism education, training, and evaluation system to improve the ROK police's ability to respond to terrorist situations using the 5G and AR based Integrated Command and Control Platform previously developed by the Korea Military Academy. The proposed system is designed to improve counter-terrorism capabilities with virtual training for individual and team units based on hyper-realistic content and training scenarios. Futhermore, it can also be used as a on-site command and control post in connection with a simulation training site and an actual operation site.

Didactic Principles Of Education Students 3D-printing

  • Lukianchuk, Iurii;Tulashvili, Yurii;Podolyak, Volodymyr;Horbariuk, Roman;Kovalchuk, Vasyl;Bazyl, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.443-450
    • /
    • 2022
  • The method of studying 3D-technologies abroad and in Ukraine is considered. The analysis of educational resources and experience of use of the equipment in branch is carried out. The didactic principles of the educational process for 3D-printing specialists are determined. The use of FDM technology and the ability to minimize the occurrence of defects in the future have been studied. An analysis of the international experience of the educational process of relevant specialists in the field. The content of training for 3D printing specialists has been developed. The experience of using 3D-technologies is described and the list of recommendations for elimination of defects during production of products by means of additive technologies is made. The recommendations will be useful not only for beginners, but also for experienced professionals in additive technologies. The need to study such experience is the main condition for the development of enterprises in Ukraine that plan to automate their own production. A 3D printing engineer must know the basics of economics and marketing, because his responsibilities include optimizing workflows to reduce the cost and speed up printing. Therefore, the knowledge gained from practical experience presented and in building for learning 3D printing engineers by the authors will be important.

A Study on the Activation Plan of the Support Systems for SMEs' Technology Protection (중소기업 기술보호 지원제도의 활성화 방안 연구)

  • Kim, Sung-won;Park, Hyun-ae;Lee, Hwansoo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.1-17
    • /
    • 2020
  • As technology competition among companies has intensified, the importance of technology protection is increasing day by day. However, according to the status of technology leakage in Korea, the technology protection level of SMEs is weak. SMEs' technology leakage continues to occur, and the damage can be even more serious to SMEs. Thus, the government is operating various support systems for SMEs. However, despite the support system, the interest and use of SMEs is low. This study examines the current status of major support systems for SME technology protection in Korea, and empirically analyzes the recognition and expectation effects of companies on the support systems. Based on the results, this study discusses ways to improve the recognition and use of the support system. The results of this study will contribute to strengthening SMEs 'technology protection by increasing the utility and enhancing the utilization of the support systems.