• Title/Summary/Keyword: 국가안보

Search Result 605, Processing Time 0.026 seconds

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

India's External Outreach in the Maritime Context (인도의 태평양 해양 진출 의미와 영향)

  • Joshi, Devendra Kumar
    • Strategy21
    • /
    • s.39
    • /
    • pp.242-250
    • /
    • 2016
  • 본 논문은 왜 인도해군이 인도양을 벗어나 태평양 해역으로 진출하려는지에 대한 이유를 설명한다. 인도는 거대한 섬 국가이자, 해양국가이다. 이에 인도해군(Indian Navy: IN)은 인도양에서의 해양안보(maritime security) 활동을 주도하고 있으며, 이는 이 해양에서 발생되고 있는 다양한 비군사적 위협에 대한 기여로 나타나고 있다. 예를 들면 아덴만 해적퇴치작전 등이다. 인도는 지리적으로 중국 등의 대륙국가와 국경을 접하고 있으나, 태평양 연안국가들과 긴밀한 양자간 관계를 유지하고 있으며, 아울러 다양한 다자간 협력체에 적극적으로 참가하고 있다. 후자의 경우 EAS, ARF, ASEAN 등의 협력체이다. 또한 인도는 경제, 사회문화적으로 태평양 연안국가들과 동질성을 갖고 있다. 그 동안 인도해군은 태평양에 대한 많은 기여와 관심을 갖고 있었으며, 이는 서태평양해군심포지움(WPNS) 업저버 국가 등의 다양한 활동 확대에서 발견되고 있다. 인도는 동방정책(India's Look East Policy)를 외교정책으로 채택하고 있으며, 이는 태평양에서의 해양안보에 대한 기여와 참여를 의미한다. 이는 최근까지 왜 인도해군이 중국, 아세안, 한국, 일본 및 호주 등과 긴밀한 해양협력 관계를 유지하고 있는지에 대한 주된 이유를 설명한다. 이러한 인도해군의 기여는 태평양 해양에서의 해양 평화와 번영에 기여할 것으로 전망된다.

International Environmental Security and limitations of North-East Asian Countries (국제 환경안보와 동북아 국가들의 한계)

  • Choi Byung-Doo
    • Journal of the Korean Geographical Society
    • /
    • v.39 no.6 s.105
    • /
    • pp.933-954
    • /
    • 2004
  • This paper considers critically the conceptual development of international environmental security, and to explore some limitations which seem to have made difficult the construction of regional environmental governance among North-East Asian countries. The recently emerging concept of environmental security has turned the traditional or realistic meaning of security to the neo-liberal and the political-economic one. On the basis of a reconsideration of these newly developed meanings of security, this paper has reviewed critically some work which have focused on the concepts of environmental regime and of environmental governance. To formulate a true environmental governance, it is suggested that we need a theoretical analysis on the economic and political contexts and a practical development of civil society. From this point of view, the economic structure of labour division, the political tension and military opposition in the region, and the immaturity and exclusiveness of civil consciousness can be pointed out as some limitations of environmental security to be constructed in the North-East Asian region. A true environmental security in this region requires formation of reciprocal economic relationship, development of regional institutions for political trust among countries, and improvement of interaction between non-governmental organizations (NGOs).

A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'- (포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 -)

  • Kim Tai Jin
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.115-126
    • /
    • 2022
  • This study studied the working relationship between national crisis management and national defense elements from a comprehensive security perspective. The elements of national defense are presented in the Integrated Defense Act. Therefore, by presenting the principles, problems, and alternatives of integrated defense, the study was conducted with the aim of protecting the lives and property of the people in the event of a national crisis and strengthen national security. As a theoretical background, an analysis frame was envisioned based on the four stages of crisis management in the 'Comprehensive Crisis Management Model' and the 'Basic Guidelines for National Crisis Management'. Through this, four domestic and foreign case studies were conducted. As a result of the study, it can be confirmed that related laws, organizations, and public awareness must be provided in order for the national defense elements at each stage of national crisis management to work well. For the completeness of national crisis management, it was suggested that the enactment of the Framework Act on National Crisis Management, the establishment of an integrated defense plan, linked training, C4I for communication, strengthening the capabilities of local government heads, and national defense elements of firefighters.

논단 - 한국농업의 취약한 식량안보

  • Kim, Yong-Taek
    • Life and Agrochemicals
    • /
    • s.252
    • /
    • pp.12-15
    • /
    • 2009
  • 과거와는 달리 국제곡물가격이 곡물수급에서만이 아니라 에너지수급에도 영향을 받는 복잡한 양상을 띠고 있다. 식량안보에 대한 보다 적극적인 인식과 대응책 마련이 미래 국가전략 수립에 중요한 과제이다.

  • PDF

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

Industrial Security Crime's Realities and Counter-Measure (산업보안범죄의 실태 및 대응방안)

  • Seo, Bong Sung;Lim, You Seok
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.141-149
    • /
    • 2015
  • Modern society is to have an significant impact on the competitiveness of the country in which the economic value is very high occupancy and ensure a state-of-the-art science and technology. The country's core technology or industry security crimes going seized state-of-the-art technology firms can threat of damage to the country's economic security. In particular, the defense industry serious crime that is directly related to national security. The company's core technology and trade secrets leaked once the industrial countries must prevent security breaches and offenses of strict punishment measures because it is impossible to recover. Also, some advanced countries directly has been operating industrial security crime for the country's economy and national security. In recent years, Nation core technology infringement cases are rapidly increasing in the country. In addition, industrial security crime threat to national security. Therefore, the industry security crimes damage to the national security that infringe on the business secrets of core technologies and businesses. It is necessary to identify that industry security crime associated with the visibility of the broad scope of intellectual property protection.

A Study on establishing the Role of Intelligence Agency on Cybersecurity - Focusing on Revision or Enactment of Cybersecurity related Bill - (정보기관의 사이버안보 역할 정립에 관한 연구 -사이버안보관련 법안 제·개정안을 중심으로-)

  • Yoon, Oh Jun;Kim, So Jeong;Jeong, Jun Hyeon
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2018
  • As the era of the 4th Industrial Revolution has progressed and the information and communication technologies have developed dramatically, the cyber threats will gradually become more intelligent and sophisticated. Therefore, in order to take systematic and prompt action in case of an accident while preparing measures against the threat, the role of intelligence agency is important. However, Korea is having difficulty in responding to the threats due to the lack of support for the national cybersecurity bill or the amendment bill of the National Intelligence Service. In this paper, I examine the cybersecurity function of the intelligence agency, the recent debate trends, and implications for the role of intelligence agency in our current situation. And then I intend to suggest some measures such as concentration on information gathering and analysis, enhancement of cyber threat prediction and response capacity, and strengthening of legal basis as a way to establish the role of intelligence agency for reinforcement of cybersecurity performance system.

  • PDF

Comparison of NSC system in the U.S., Japan, and the Republic of Korea (NSC(국가안전보장회의) 체제의 한미일 비교)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.29-50
    • /
    • 2013
  • With the recent global threats of terrorism as well as religious conflicts, Northeast Asian countries including South Korea, China, and Japan are experiencing particularly serious security crises as demonstrated by North Korea's threats of nuclear weapons testings and long-range missile launching as well as military provocation toward South Korea such as sinking of ROKS Cheonan and bombardment of Yeonpyeong island and the territorial dispute between China and Japan over Senkaku Islands(Diaoyu Islands). As a result, Park Geun Hye Administration of South Korea and the 2nd Abe Shinzo Cabinet of Japan, both recently established, are making efforts to improve their national security and crisis management policies. One of the key elements of such efforts is the strengthening of National Security Council(NSC) or its equivalent organization as the control tower of national security policy, modeled after the NSC of the United States. This paper compares NSC organization of Korea, the U.S., and Japan and draws policy insights focusing on the current political and national security situation South Korea is facing. Although organizational structure, function, and history of NSC of each country differs, it can be inferred from this comparison that NSC-type of organizations can play an important role as a control tower of security and emergency management policies.

  • PDF