Skip to product information
Introduction to Security Studies
Introduction to Security Studies
Description
Book Introduction
Why is security necessary? Security is fundamentally an activity and action designed to ensure safety.
The tragedy that occurred in Itaewon on October 29, 2022, was truly heartbreaking.
The government belatedly added 'congestion and traffic guidance security work' to the scope of security business under the Security Business Act, and introduced measures to ensure safety in resolving congestion and traffic problems at various festivals and large-scale events.
But safety is not achieved through laws alone.
Each individual must become his or her own bodyguard, striving to protect the safety of himself or herself and his or her family through protective mindset and behavior.

index
Introduction 26

Chapter 1: The Concept of Security

Section 1: Security and Security Studies 32

Ⅰ.
The Meaning of Security 32

Ⅱ.
The Significance of Security Studies 35

1.
Concept of Security Studies 35

2.
Scope of Security Studies 36

Ⅲ.
The concept and characteristics of security 38

1.
Definition of security 38

2.
Concept of security 40

3.
Characteristics of the Guard 42

4.
Basic Principles of Security 46

Section 2 Purpose and Function of Security 49

Ⅰ.
The Role of Security 49

1.
Prevention of intentional harm (security) 50

2.
Prevention of unintentional hazards (safety) 50

3.
Health Care 51

4.
Mental Well-Being 52

Ⅱ.
Purpose of Security 53

1.
The Meaning of the President's (Head of Administration) Event 54

2.
Purpose of event security 55

Ⅲ.
Security Function 57

1.
Security Guard 57

2.
Security 60

3.
Mobile 61

4.
Prosecutor's Office 62

5.
Safety 63

6.
Communication 65

7.
Information 66

8.
Security 67

9.
Sword 68

10.
Duty 69

Section 3 Components of Security 70

Ⅰ.
Bodyguard (bodyguard) 70

1.
Bodyguard Qualifications 71

2.
Bodyguard's Attitude 74

Ⅱ.
Object of protection (person subject to protection) 76

1.
Person under protection and security 76

2.
Type 77 of protection targets

Ⅲ.
Security Opponent (Security Risk Factor) 79

1.
Classification by environmental factors 79

2.
Classification by hazard factor 81

Section 4 Classification of Security and Guards 83

Ⅰ.
Security Category 83

1.
Classification by security subject 83

2.
Classification by Mission 84

3.
Classification by means of transportation 85

4.
Classification by location 86

5.
Classification by personality (event) 87

Ⅱ.
Classification of Guards 89

1.
Classification by security subject 89

2.
Classification by security purpose 90

3.
Classification by security method 91

4.
Classification by security nature 92

Chapter 2 Security System

Section 1 Introduction 94

Section 2 Legal Basis for Security 95

Ⅰ.
Act on the Protection of the President, etc. Article 95

1.
Security Target 96

2.
Security Area 97

3.
Security and Safety Management 97

4.
Secret Keeping 98

5.
Compensation 98

6.
Request for dispatch and cooperation 98

7.
Carrying and Using Weapons 99

Ⅱ.
Former Presidential Security Service 100

Ⅲ.
Security Industry Act and Petition Police Act 102

1.
Security Industry Act 102

2.
Petition Police Act 104

Ⅳ.
Police Act and Police Officers' Duties Execution Act 105

V.
Order 106

1.
Enforcement Decree of the Act on the Protection of the President, etc. Article 106

2.
Presidential Security and Security Committee Regulation 106

Ⅵ.
International Treaties and International Law 108

1.
Convention 108 on the Prevention and Punishment of Crimes against Diplomatic Persons and Other Internationally Protected Persons

2.
Memorandum of Agreement between the ROK Armed Forces and the US Forces in Korea on Presidential Security Service No. 109

Section 3 Security Organization 110

Ⅰ.
Characteristics and Principles of Security Organizations 110

1.
Characteristics of the Security Service 110

2.
Principles of Security Organization Management 113

Ⅱ.
The nature of the security organization 116

1.
Professional Security Team 116

2.
Police Security Service 117

3.
Military Security Service 117

4.
Information Security Organization 118

Section 4: Security Systems in Major Countries 119

Ⅰ.
Book 119

Ⅱ.
Korea's security system 120

1.
Three Kingdoms Period 120

2.
Goryeo Dynasty 121

3.
Joseon Dynasty 123

4.
Republic of Korea 126

Ⅲ.
The American Secret Service 132

1.
Political System 132

2.
Security System 133

Ⅳ.
Japan's security system 138

1.
Political System 138

2.
Security System 139

V.
China's security system 143

1.
Political System 143

2.
Security System 144

Ⅵ.
Israel's Security System 146

1.
Political System 146

2.
Security System 147

Chapter 3 Theory of Security

Section 1 Introduction 150

Section 2: Security Work Performance Stages 151

Ⅰ.
Security Crisis Management 151

1.
The Significance of Security Crisis Management 151

2.
Characteristics of a Security Crisis 152

Ⅱ.
Security Procedure 154

1.
Crisis Management Step 154

2.
Security Procedure 155

Section 3: Basic Theory of Security 158

Ⅰ.
Basic Principles 158

1.
The Principle of Triple Security 158

2.
Principle of the Natural Barrier Effect 161

3.
Principles of Attentional and Correspondence Effects 164

4.
Bodyguard separation distance 165

5.
The Principle of Tentacle Distance 170

6.
Principle of Postural Expansion 172

7.
Principle of Response Time 173

Ⅱ.
Security Technique 174

1.
Security method 174

2.
Deceptive Guard 176

3.
Four Pillars of Destiny 179

4.
Principles of Protective Coloration 184

5.
Unification of Control Points 185

6.
Immediate Action 185

Ⅲ.
Security Code of Conduct 186

1.
Principle of Defense 186

2.
Principle of Self-Sacrifice 186

3.
Principle of Area Responsibility 187

4.
Principle 188 of Preservation of Persons Subject to Protection

5.
Principle of Covert Protection 188

Chapter 4: Security Preparation Stage

Section 1 Introduction 192

Section 2 Security Information 194

Ⅰ.
Threat 194

1.
Harm and Threat 194

2.
Scope of harm 195

3.
Motive for the sake of 197

4.
Characteristics of a Prayer for the Savior 199

Ⅱ.
Protective Intelligence 205

1.
The concept of security information 205

2.
Classification of Security Information 206

3.
Collection of security information 208

Ⅲ.
Threat Assessment 210

1.
The Significance of Threat Assessment 210

2.
Threat Analysis 211

3.
Threat Assessment 216

4.
Response to Threats 217

Section 3 Security Plan 221

Ⅰ.
Security Planning Concept 221

Ⅱ.
Establishing a Security Plan 222

1.
Structure of the Security Plan 222

2.
Individual Mission 225

3.
Deployment of security personnel 229

4.
Performance Security Plan 230

Ⅲ.
Security Plan Briefing 233

Section 4 Security Equipment 234

Ⅰ.
Classification by function 234

1.
Self-Defense Equipment 234

2.
Mobile Equipment 236

3.
Protective equipment 237

4.
Inspection equipment 238

5.
Surveillance Equipment 241

6.
Communications Equipment 241

7.
Other Equipment 242

Ⅱ.
Classification by operation 243

1.
Personal Equipment 243

2.
Public Equipment 243

Section 5: Security Uniform 244

Ⅰ.
Costume 244

Ⅱ.
Appearance 246

Chapter 5 Security Preparation Stage

Section 1 Introduction 248

Section 2: Selection Guard 249

Ⅰ.
The significance of advance guard 249

Ⅱ.
Characteristics of the Selection Guard 251

1.
Preventive 251

2.
Integration 251

3.
Safety 252

4.
Reserve 252

Ⅲ.
Selection Security Activity 253

1.
Preemptive Security Operation System 253

2.
Procedure for Pre-selection Security Service 254

3.
Preemptive Security Operation Focus 256

4.
Security Area 258

5.
Selection Activity Report 260

Section 3 Security and Safety Measures 262

Ⅰ.
Control Measure 262

1.
Access Control 263

2.
Entry Plan 263

3.
Parking Plan 264

4.
Non-refundable Operation Plan 264

5.
Metal Detector Operation Plan 264

6.
Control measures 265

Ⅱ.
Safety precautions 266

1.
Vulnerability Assessment 266

2.
Inspection activity 266

3.
Safety Measures 269

4.
Safety Maintenance 270

Ⅲ.
Information and Security Measures 272

1.
Information Activities 272

2.
Security Activities 273

Section 4 Emergency Measures 274

Ⅰ.
Emergency Measures 275

1.
The Significance and Importance of Emergency Preparedness 275

2.
Classification of Emergency Measures 275

Ⅱ.
Emergency Response 278

1.
Emergency Hospital (Choigi Hospital) 278

2.
First Aid 278

3.
Basic Lifesaving Techniques 280

Chapter 6 Security Implementation Stage

Section 1 Introduction 288

Section 2 Close Protection 289

Ⅰ.
The significance of close protection 289

1.
The concept of close protection 289

2.
Characteristics of Close Protection 291

3.
Bodyguard's Posture 293

Ⅱ.
Close-guard formation 295

1.
The significance of close-quarters security formations 295

2.
Close-guard formation 296

Section 3 Mobile Security 320

Ⅰ.
Book 320

Ⅱ.
Mobile Security Target 321

1.
Comfort 321

2.
Convenience 322

3.
Safety 322

4.
Defense 323

Ⅲ.
Mobile Security Plan 324

1.
Vehicle Selection 325

2.
Mobile Route Selection 326

3.
Driver Considerations 327

Ⅳ.
Mobile Security Force 329

1.
Simple Large 329

2.
Basic Large 330

3.
Extended Formation (Wing Formation) 331

V.
Mobile Situational Measures 332

1.
332 when stopping at an intersection

2.
333 when crossing the branch road

3.
Turning at an intersection 334

4.
Lane change 336

5.
Arrival 337

Section 4 Immediate Action 338

Ⅰ.
The Concept and Characteristics of Contingencies 338

1.
The Concept of Contingency 338

2.
Classification and Characteristics of Contingencies 339

Ⅱ.
The concept of immediate action 340

Ⅲ.
Step 344 of Immediate Action

1.
Warning (Sound Off) 344

2.
Cover 346

3.
Evacuate 346

4.
Enemy 347

Ⅳ.
Response Techniques for Each Prayer 349

1.
Firearms Attack Response Techniques 349

2.
Explosive Attack Response Techniques 349

3.
350 Countermeasures for Knife (Weapon) Attacks

Chapter 7 Security Evaluation Stage

Section 1 Evaluation of Security Activities 352

Ⅰ.
Event Results Evaluation 352

Ⅱ.
Security Results Report and Data Section 353

Section 2: Learning Security 354

Ⅰ.
Training 354

1.
Preparing the Training Program 354

2.
Training 355

Ⅱ.
Evaluation of Education and Training 358

Ⅲ.
Feedback 359

1.
Establishment of new security techniques 359

2.
Application to Events 360

Chapter 8 Security Environment

Section 1 Introduction 362

Section 2 Security Environment (Security Risk Factors) 364

Ⅰ.
Classification by environmental factors 364

1.
Social Environment 364

2.
Technical Environment 366

3.
Natural environment 368

Ⅱ.
Classification by hazard factor 369

1.
Human hazard factor 369

2.
Physical hazard 370

3.
Geographic hazard 370

Section 3: Forms of Harm 371

Ⅰ.
Human hazard 371

1.
Assassination 371

2.
Terrorism 373

3.
Kidnapping 375

4.
Insult 376

Ⅱ.
Cyberterrorism 377

1.
Cyberterrorism 377

2.
Information Security 381

Appendix

Ⅰ.
Act on the Protection of the President, etc. Article 386

Ⅰ- 1.
Enforcement Decree of the Act on the Protection of the President, etc. Article 393

Ⅰ- 2.
Presidential Security and Security Committee Regulation 410

Ⅱ.
Act on the Treatment of Former Presidents Article 416

Ⅱ- 1.
Enforcement Decree of the Act on the Treatment of Former Presidents Article 418

Ⅲ.
Convention 422 on the Prevention and Punishment of Crimes against Diplomatic Persons and Other Internationally Protected Persons

Reference 426

Search 432

Publisher's Review
Why is security necessary? Security is fundamentally an activity and action designed to ensure safety.
The tragedy that occurred in Itaewon on October 29, 2022, was truly heartbreaking.
The government belatedly added 'congestion and traffic guidance security services' to the scope of security services under the Security Services Act, and introduced measures to ensure safety in resolving congestion and traffic problems at various festivals and large-scale events.
But safety is not achieved through laws alone.
Each individual must become his or her own bodyguard, striving to protect the safety of himself or herself and his or her family through protective mindset and behavior.

Meanwhile, on July 31, 2024, Ismail Haniyeh, the top political leader of Palestinian Hamas, was killed by a remote-controlled explosion of a pre-planted explosive device at the Iranian guesthouse known as Neshat (the IRGC said the explosion was "a short-range projectile with a warhead of approximately 7 kg" from outside the residence).
The importance of basic information and security is just as great as the countermeasures against cutting-edge weapons.
Domestically, the Blue House, which had been used as the presidential office and residence for nearly 74 years since the establishment of the Republic of Korea government, returned to the people, and with the start of the Yoon Seok-yeol administration in 2022, there were changes such as the presidential office moving to Yongsan and the presidential residence moving to Hannam-dong.
Security must consider and devise methods to respond to the changing security environment in any situation.
Like a boat going against the current, you have to go forward step by step, fighting against the waves.

Before I knew it, the 8th revised edition of Introduction to Security Studies was published.
Just as I first began writing, with the intention of organizing my life's work, researching security crisis management systems and developing a systematic "security studies" based on them, even after publishing each revised edition, I always felt a lingering sense of regret in a corner of my heart.
I am glad that with the publication of this revised 8th edition, I feel that 『Introduction to Security Studies』 as a textbook has been completed to some extent, and the regret that I had felt has been relieved.

July 7, 2024
At Baekinjae at the foot of Mt. Bukhan
author
GOODS SPECIFICS
- Date of issue: August 30, 2024
- Format: Hardcover book binding method guide
- Page count, weight, size: 442 pages | 188*257*25mm
- ISBN13: 9788965416692

You may also like

카테고리