ISPS Code에 규정된 항만시설 보안평가를 시행하기 위한 방법론에 관한 연구
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 김영균 | - |
dc.date.accessioned | 2017-02-22T02:22:50Z | - |
dc.date.available | 2017-02-22T02:22:50Z | - |
dc.date.issued | 2005 | - |
dc.date.submitted | 2006-03-03 | - |
dc.identifier.uri | http://kmou.dcollection.net/jsp/common/DcLoOrgPer.jsp?sItemId=000002174308 | ko_KR |
dc.identifier.uri | http://repository.kmou.ac.kr/handle/2014.oak/8305 | - |
dc.description.abstract | It has been identified through this study that a security assessment which is undertaken in advance of establishing a port facility security system should be performed correctly in order to ensure that the system is set up in accordance with the ISPS Code. Also it was found that an appropriate methodology is required to undertake the port facility security assessment in a correct manner. The risk assessment methodology applied in the safety fields has been adopted as the methodology for the security assessment for this study. This study looks at seven stages of risk assessment. At first stage, the identification and evaluation of important assets and infrastructure requiring protection is carried out. Such undertakings are needed to clearly identify the function of the assets and infrastructure within the port facility, ascertain ones that are to be protected from security threats or security incidents, decide on their relative importance, and determine which ones are to be subjected to the security assessment. All identified assets and infrastructure should be included in the evaluation. Three parts should be considered in the evaluation. First, the role or objective of the assets and infrastructure in the operation of the port facility should be considered. The next consideration should be the effect of destruction. Finally, the ability to recover from destruction of the assets and infrastructure should be considered. At second stage, an on-site security survey is carried out. An on-site security survey is a process through which the present security conditions of the port facility and of the important assets and infrastructure within port facility can be identified. When conducting such on-site security survey, security procedures, security organizations, security equipments and systems, and the security ability of the port facility personnel having specific security duty should be considered. At third stage, the identification of the possible threat scenarios and security incidents to the important assets and infrastructure is carried out. The security incidents that had occurred in the past and the security rule or regulations for the security in force should be considered at the time of identifying the security threats and incidents. And the consultation with the security expert authority should also be carried out. At fourth stage, the assessment of consequence and vulnerability is carried out. The consequence and vulnerability should be evaluated to confirm the effect of identified security incident and the probability of the target to the attack. Five elements are included in the consequence assessment: death and injury, economic impact, environmental impact, national defense impact, and symbolic effect. And the vulnerability assessment should be evaluated in two parts: accessibility and organic security. The results of the on-site security survey carried out at the second stage should be considered in the vulnerability assessment. At fifth stage, the security risk level is determined. The security risk level should be determined based on the level of consequences and vulnerability. The security risk is classified into three levels: mitigate, consider and document. "Mitigate" means that mitigation strategies should be developed to reduce risk for that threat scenario. "Consider" means that the threat scenario should be considered and mitigation strategies should be developed on a case-by-case basis. "Document" means that the threat scenario does not need a mitigation measure at this time and therefore need only to be documented. At sixth stage, the mitigation targets and implementation methods is determined. The mitigation targets should be identified based on the security risk level. And the mitigation methods to be implemented for that target should be decided based on the effectiveness and possibility of the methods. Generally, it is required to consider the mitigation strategies in lowering vulnerabilities in advance than the mitigation strategies in lowering consequences. At seventh stage, the security risk reassessment is carried out. And the confirmation of mitigation measures is carried out based on the result of the reassessment. A security risk reassessment to the mitigation measures determined at the sixth stage should be practiced to confirm whether the measures can actually reduce the security risk level. The reassessment should be started from the fourth stage. If the security risk level is not reduced as the result of the reassessment, another mitigation measures should be considered for implementation. If the security risk is reduced as the result of the reassessment, the mitigation measures should be adopted and planned to be put into action in the port facility security system. | - |
dc.description.tableofcontents | Abstract VI 제1장 서론 1 제1절 연구의 배경 1 제2절 연구의 목적 4 제3절 연구의 방법 및 구성 5 제2장 ISPS Code의 제정 및 내용에 대한 분석 6 제1절 ISPS Code 제정 배경 6 제2절 ISPS Code 채택 및 SOLAS 협약에 반영된 과정 6 제3절 ISPS Code의 신속한 채택 및 발효가 가지는 의미 7 제4절 SOLAS 제11-2장의 구성 및 내용 8 1. SOLAS 제11-2장의 구성 8 2. SOLAS 제11-2장 각 규칙의 내용 요약 9 제5절 ISPS Code 구성 및 내용 18 1. ISPS Code의 종류 및 성격 18 2. ISPS Code의 구성 19 3. ISPS Code A편의 내용 20 4. ISPS Code B편의 내용 37 제3장 항만시설 보안평가 모델의 구축 49 제1절 위험성 평가 분야의 선정 49 제2절 위험성 평가에 연관된 개념들에 대한 정의 50 제3절 사고와 손실의 인과 관계에 대한 이론적 전개 54 제4절 위험성 평가 58 1. 위험성 평가의 이론적 전개 58 2. 위험성 평가 방법의 종류 60 제5절 위험성 평가 시행 방법 62 1. 운영중인 시스템이나 수행중인 작업에 대한 전개 62 2. 위험파악 62 3. 발생결과 평가 63 4. 빈도/가능성 평가 63 5. 위험성 산정 및 등급 결정 63 6. 개선대책 수립 65 7. 개선대책에 대한 위험성 재평가 66 제6절 ISPS Code에서 요구하는 항만시설 보안평가 67 1. ISPS Code에 규정된 항만시설 보안평가 요건 67 2. 항만시설 보안평가의 목적 및 의의 70 제7절 항만시설 보안평가 70 1. 항만시설 보안평가의 구성 요소 70 2. 항만시설 보안평가와 연관된 개념들에 대한 정의 71 3. 항만시설 보안평가 모델 구축 72 제4장 항만시설 보안평가 모델의 적용 75 제1절 보호해야 할 주요대상 식별 및 우선순위 평가 75 1. 목적 75 2. 식별 및 평가 기준 75 3. 우선순위 평가 방법 76 4. 우선순위 평가결과에 대한 관리 79 제2절 현장보안상태 확인 79 1. 목적 79 2. 현장보안상태 확인방법 79 제3절 위협 시나리오 및 보안사건 식별 80 1. 목적 80 2. 식별 방법 81 제4절 심각성 및 취약성 평가 84 1. 목적 84 2. 평가 방법 84 제5절 보안위험성 등급 평가 87 1. 목적 87 2. 평가 방법 87 제6절 완화조치 대상 선정 및 완화조치 방법 결정 88 1. 목적 88 2. 시행 방법 88 제7절 보안위험성 재평가 및 완화조치 확정 89 1. 목적 89 2. 재평가 시행 방법 89 제8절 항만시설 보안평가 실제 적용 사례 90 1. 대상 항만시설 90 2. 항만시설 보안평가 90 제5장 결론 114 제1절 연구 결과의 요약 114 제2절 연구 결과의 시사점 117 제3절 연구의 한계와 향후 과제 118 참고문헌 120 | - |
dc.language | kor | - |
dc.publisher | 한국해양대학교 대학원 | - |
dc.title | ISPS Code에 규정된 항만시설 보안평가를 시행하기 위한 방법론에 관한 연구 | - |
dc.title.alternative | A Study on the Methodology for Undertaking the Port Facility Security Assessment of the ISPS Code | - |
dc.type | Thesis | - |
dc.date.awarded | 2005-02 | - |
dc.contributor.alternativeName | Kim | - |
dc.contributor.alternativeName | Young-Kyoon | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.