• Title/Summary/Keyword: security training

Search Result 1,010, Processing Time 0.03 seconds

A Study on development of special security service (특수경비업무 발전방안에 관한 연구)

  • Ha, Jung-Hoon
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.35-56
    • /
    • 2016
  • The purpose of this study is to find the development of the special security business plan based on the problem that guards are now aware of special security service. In order to achieve the objectives of this study, we analyzed the data after expert survey and interview conducted by seven experts engaged in special security services more than 10 years. The guard who perform special security service proposed a development plan of special security services as follows. First, the current education system for new employees' training is required to improve the educational program of 60 hours in subjects related to special security duties by reorganization. Second, the special security service training for guards also appropriate to switch to 9-hour training program for three months through an educational organization controlled by country. Third, the special security guards should be proceeding the practical programs required in the field and quality education in the different section by competent and professional instructors. Fourth, the retirement age for special security guard stipulated in the Security Services Industry Act that needs to be readjusted upward by considering the social environment. Sixth, there needs to be organized the Special Security Association for development associated with the special security service and to protect the rights of special security guards.

  • PDF

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

Automated Cyber Threat Emulation Based on ATT&CK for Cyber Security Training

  • Kim, Donghwa;Kim, Yonghyun;Ahn, Myung-Kil;Lee, Heejo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.71-80
    • /
    • 2020
  • As societies become hyperconnected, we need more cyber security experts. To this end, in this paper, based on the analysis results of the real world cyber attacks and the MITRE ATT&CK framework, we developed CyTEA that can model cyber threats and generate simulated cyber threats in a cyber security training system. In order to confirm whether the simulated cyber threat has the effectiveness of the actual cyber threat level, the simulation level was examined based on procedural, environmental, and consequential similarities. in addition, it was confirmed that the actual defense training using cyber simulation threats is the same as the expected defense training when using real cyber threats in the cyber security training system.

A study of the need for education and first aid recognition level of Security major students (경호전공 대학생의 응급처치 인식 수준 및 교육 필요성에 관한연구)

  • Kang, Kyoung Soo;Choi, Pan Am
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.2
    • /
    • pp.220-230
    • /
    • 2013
  • In this study, we investigated the recognition of the first aid of guard major college students are trained to deal well and flexibly to the situation of unforeseen circumstances, you are trying to present the teaching methods and effective importance of first aid. Analysis of data collected in this study is as follows: The results obtained using the statistical program SPSS18.0. First, education has not been done properly, there is no difference between the average score of people who did not receive the people who received the fact of first aid veritable we are specialized in, the second education systematic is needed, training of first aid has not been properly implemented, problems of education there were many. Third, because there is no difference in the level of knowledge by training institutions of first aid, the places where there is training of first aid, there is no effect on the knowledge level. Therefore, it can be the need training first aid practical to enhance the ability to proactively address the situation of contingencies.

A DCT Learning Combined RRU-Net for the Image Splicing Forgery Detection (DCT 학습을 융합한 RRU-Net 기반 이미지 스플라이싱 위조 영역 탐지 모델)

  • Young-min Seo;Jung-woo Han;Hee-jung Kwon;Su-bin Lee;Joongjin Kook
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.11-17
    • /
    • 2023
  • This paper proposes a lightweight deep learning network for detecting an image splicing forgery. The research on image forgery detection using CNN, a deep learning network, and research on detecting and localizing forgery in pixel units are in progress. Among them, CAT-Net, which learns the discrete cosine transform coefficients of images together with images, was released in 2022. The DCT coefficients presented by CAT-Net are combined with the JPEG artifact learning module and the backbone model as pre-learning, and the weights are fixed. The dataset used for pre-training is not included in the public dataset, and the backbone model has a relatively large number of network parameters, which causes overfitting in a small dataset, hindering generalization performance. In this paper, this learning module is designed to learn the characterization depending on the DCT domain in real-time during network training without pre-training. The DCT RRU-Net proposed in this paper is a network that combines RRU-Net which detects forgery by learning only images and JPEG artifact learning module. It is confirmed that the network parameters are less than those of CAT-Net, the detection performance of forgery is better than that of RRU-Net, and the generalization performance for various datasets improves through the network architecture and training method of DCT RRU-Net.

  • PDF

Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study

  • Hakami, Mazen;Alshaikh, Moneer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.299-309
    • /
    • 2022
  • Human factor represents a very challenging issue to organizations. Human factor is responsible for many cybersecurity incidents by noncompliance with the organization security policies. In this paper we conduct a comprehensive review of the literature to identify strategies to address human factor. Security awareness, training and education program is the main strategy to address human factor. Scholars have consistently argued that importance of security awareness to prevent incidents from human behavior.

Anomaly Detection Scheme Using Data Mining Methods (데이터마이닝 기법을 이용한 비정상행위 탐지 방법 연구)

  • 박광진;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.99-106
    • /
    • 2003
  • Intrusions pose a serious security risk in a network environment. For detecting the intrusion effectively, many researches have developed data mining framework for constructing intrusion detection modules. Traditional anomaly detection techniques focus on detecting anomalies in new data after training on normal data. To detect anomalous behavior, Precise normal Pattern is necessary. This training data is typically expensive to produce. For this, the understanding of the characteristics of data on network is inevitable. In this paper, we propose to use clustering and association rules as the basis for guiding anomaly detection. For applying entropy to filter noisy data, we present a technique for detecting anomalies without training on normal data. We present dynamic transaction for generating more effectively detection patterns.

Study on the Security Officials in the Study of the Working Environment and Education (경호공무원의 근무환경과 교육에 관한 연구)

  • Jo, Sung-Gu;Kim, Dong-Je;Choi, Jong-Gwang;Park, Ju-Hyeon
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.247-268
    • /
    • 2013
  • Country is security agencies with the launch of the Park Chung Hee government president security service act was enacted since installed successfully now undergoing a large-scale international events reborn professional Security agencies, including the North and the Northeast, but the conflict continues because of the national reduce the threat to the security without a destination. However countermeasures against these threats is emphasized, but in an effort to raise the country is security officials security agencies working environment and training for these studies have not performed in this study was started. In order to achieve this purpose, president security service and the seoul police agency personnel working in the field for 45 people who were interviewed, recently developed by utilizing Nvivo 8 program to improve working conditions in the analysis of organizational culture 51(78.46%), Image 7(10.93%), physical and mental 6(9.37%) were categorized, educational institutions in the direction of a police constable 56(76.71%), educational psychology 12(16.43%), theory of education 5(6.84%) were categorized as high. We look at the research results suggest that the authority of the president security service president security service officials in tissue culture officials were struggling to belong to an organization, you need to induce a change in culture has been raised, the current president of the Security Service, as well as specialized police constable training within the organization establish the necessary institutions respectively.

  • PDF

Developing an XR based Hyper-realistic Counter-Terrorism, Education, Training, and Evaluation System (확장현실(XR) 기반 초실감 대테러 교육훈련체계 구축 방안 연구)

  • Shin, Kyuyong;Lee, Sehwan
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.65-74
    • /
    • 2020
  • Recently, with the rapid development of eXtended Reality(XR) technology, the development and use of education and training systems using XR technology is increasing significantly. In particular, in areas that involve great risks and high costs such as military training and counter-terrorism training, the use of XR based simulators is preferred because they can improve training performance, reduce training costs, and minimize the risk of safety issues that may occur in actual training, by creating a training environment similar to actual training. In this paper, we propose a plan to build and evaluate an XR based hyper-realistic counter-terrorism education, training, and evaluation system to improve the ROK police's ability to respond to terrorist situations using the 5G and AR based Integrated Command and Control Platform previously developed by the Korea Military Academy. The proposed system is designed to improve counter-terrorism capabilities with virtual training for individual and team units based on hyper-realistic content and training scenarios. Futhermore, it can also be used as a on-site command and control post in connection with a simulation training site and an actual operation site.

The Effect of Education Program for Security Personnel on Job Satisfaction (일반경비원 교육이 직무만족에 미치는 영향 - 시설경비원 신임 교육을 중심으로 -)

  • Lee, Young-Seok
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.277-300
    • /
    • 2008
  • The effect of satisfaction through job performance competency on management performance is enormous, for private security industry depends upon human resources generally till quite recently and often makes contact with clients. Although high-quality personnel who were taught professional education are held in high repute in private security industry, the studies of job satisfaction and recruit education for private security guards are insufficient. Consequently, this investigation analyzes the effect of recruit education program on job satisfaction searchingly for incumbent facility guards. The effect of recruit education program for facility personnel on job satisfaction is as follows. First of all, the differences of personal characteristics, training characteristics, work environment, job satisfaction are inspected in accordance with sociodemographic characteristics. After then, there is a remarkable contrast. Secondly, the former from among of learning expectation and self efficacy as personal characteristics has a positive effect on job satisfaction statistically. Thirdly, educational facility and contents as training characteristics have a positive effect on job satisfaction statistically. Finally, work environment including supervisor's support and maintenance has a positive effect on job satisfaction statistically.

  • PDF