• 제목/요약/Keyword: 군사보안

검색결과 264건 처리시간 4.013초

Evaluation and Forecast of North Korea's Nuclear Policy through Libya Model (리비아 모델을 통한 북한의 핵 정책 평가와 전망)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • 제18권3호
    • /
    • pp.113-122
    • /
    • 2018
  • The issue of security on the Korean peninsula is facing the greatest upheaval in 2018 with the inter-Korean summit and the US-North Korea summit. North Korea has pursued the parallel policy developing military and economic at the same time. However, North Korea is changing its route to give up nuclear weapons and focus on the economy through summit talks. Since the change in North Korea is similar to that of Libya in the past, it is necessary to analyze why North Korea is trying to abandon its nuclear program and how the process is flowing compared to the case of Libya. The Libya model was constructed and analyzed in terms of international and domestic perpectives and recognition of the situation by leadership. North Korea's nuclear policy was evaluated based on the Libya model. The nuclear development of Libya and North Korea has caused diplomatic and economic pressures from the international community and ultimately led to instability of the regime. Two countries have tried to abandon nuclear program in order to solve the instability of the regime, also gain the economic reward insead. Libya took economic benefits and secured some of the stability of the regime, but the regime collapsed under the wave of democracy due to the influx of foreign capital and ideas. North Korea will seek diplomatic and economic gains with the example of Libya, but will try to limit as much as possible the culture of democracy and the full opening that can be incidental.

  • PDF

Effect of Cognitive-Bias (Anchoring Bias) to N. Korea on Reunification Perception (북한에 대한 인지편향(기준점편향) 이 통일인식에 미치는 영향)

  • Han, Seung Jo;Bae, Young Min
    • Convergence Security Journal
    • /
    • 제21권1호
    • /
    • pp.201-208
    • /
    • 2021
  • The purpose of this study is to investigate reunification perception among groups with different cognitive bias(anchoring bias) through empirical studies. This study assumes that cognitive bias occurs according to the content of N. Korea provided in school education, and that the cognitive bias formed in youth creates a difference in perception of N. Korea and reunification. For empirical study, a survey of reunification awareness conducted by the Institute for Peace an Unification Studies-Seoul National University was used, and the two groups are divided into A-group that chose "anti-communism or security" and B-group that did "reunification interests, multi-culturalism and understanding North Korea" according to N. Korea content which was encountered in school education during adolescence. A-group recognized N. Korea as a hostile target even after becoming an adult, while B-group regarded N. Korea as a one of dialogue and cooperation. This analysis illustrates the existence of cognitive bias between the two groups because of N. Korea content which was given in school education. A-group had a lower percentage than B-group in terms of the benefits of reunification to S. Korea and the need for more dialogue and compromise with N. Korea. However, there was no difference between two groups in terms of acceptance of N. Korean defectors. This research result could be a reference to the direction of school education policies relating to reunification in that early school education affects reunification awareness and perception related with N. Korea even in adulthood.

A Study on Effective Peacekeeping Activities of Korean Police in International Conflict Areas (국제 분쟁지역에서 한국경찰의 효과적인 평화유지활동에 관한 연구)

  • Park, Jong-Hyun
    • Convergence Security Journal
    • /
    • 제20권4호
    • /
    • pp.227-236
    • /
    • 2020
  • Peacekeeping operations (PKO), which were based mainly on military operations in the Cold War era, have become diverse in the post-Cold War era. The history of the PKO of Korean police began in 1994 as two policemen were deployed to Somalia for rebuilding law and order in this country, but the role of Korean police in PKO has been limited so far, compared to that of Korean military. At this point when global conflicts escalate does the UN urge its 193 member states to conduct diverse PKO. In particular, maintaining law and order as the primary duty of police is required strictly for law enforcement while the warring country is being rebuilt. In this regard, some member states such as US, China, and Germany have deployed police force in order to play its role in a direct or indirect manner. On the contrary, the extent of the contribution of Korean police in PKO is too insignificant to measure. To this end, here in the present study were analyzed first the trend of global conflicts and the circumstance of law and order in the conflict regions. Then the PKO of police from countries including Republic of Korea, US, China, and Germany were compared, and so was the chronological change of PKO. Last, a measure to expand the capacity of Korean police and for its active role in PKO was proposed.

Control measures in Cyberspace in the light of Rimland theory (림랜드 이론으로 본 사이버공간 통제방안 (북한의 사이버전 사례연구를 중심으로))

  • Dong-hyun Kim;Soo-jin Lee;Wan-ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • 제22권4호
    • /
    • pp.11-16
    • /
    • 2022
  • Development of science technology make integrated CPS(Cyber-Physical System) appear. In CPS era, cyberspace and physical-space are hard to separate anymore, that is developing toward integrated CPS. The reality is not stopping, that is consistently changing and the concept of space is developing too. But several articles are considering for cyberspace and physical-space separately, and they are developing tailed alternative each case. The theorical approaching that is not considering reality is dwelled on past, and is dangerous from dropping down to floating cloud that is not considering progressed reality. This article is suggested to consider rimland theory to control measures in cyberspace. That is dedicated to integrated approaching from physical-space to cyberspace. And that is developing concreted controling measures in cyberspace. Especially, this article is suggested to policy alternative by analyzing north korea cyber warfare from rimland theory including human sources. Simplicity is the ultimate sophistication. This article make integrated approaching effects about cyberspace and physical-space to preparing in the CPS era.

A study on the transfer of discharged female soldiers to the reserve force: Focusing on the need for transfer and impact on reserve female soldiers (전역 여군의 예비역 편입에 관한 연구)

  • Jeon, Kiseok;Choi, Soonwon
    • Convergence Security Journal
    • /
    • 제24권2호
    • /
    • pp.167-174
    • /
    • 2024
  • While reserve forces play a critical role in modern warfare, the primary focus on reserve forces has been on men. Women's reserve forces have received little attention. The purpose of this study is to examine the need to increase the number of women in the reserve and the impact of increasing the number of women on active duty. The reasons for the need for women in the military are the decrease in the resources of the reserve force as well as the regular force due to the decrease in population, the development of fields where women can perform missions with advantages due to the changing patterns of warfare, and the changing situation of gender equality and the increasing role of women in society. However, it is currently optional, not mandatory, for female veterans to join the Reserve. The number of cadres entering the reserve may decrease as the number of active-duty women increases. Using a 2018 estimate of 13.9 percent of women transitioning to the Reserve, 194 of the 1,402 projected transitioning women in '27 will transition to the Reserve. This leaves an estimated shortfall of 1,208 reserve officers and NCO. This suggests that the policy of increasing the number of women on active duty could have a significant impact on the reserve force in the future, and further policy research is needed.

A study on Korea's defense export expansion strategy - Focusing on Korea-Poland Defense Export Case - (한국의 방산수출 확대 전략 연구 - 한·폴란드 방산수출 사례를 중심으로 -)

  • Geum-Ryul Kim
    • Convergence Security Journal
    • /
    • 제23권4호
    • /
    • pp.141-151
    • /
    • 2023
  • Since the end of the Cold War in the 1990s, European countries have cut defense costs and reduced armaments as an era of peace without large-scale wars continues, and as a result, the West's defense industry base has gradually weakened. On the other hand, South Korea, the world's only divided country, was able to achieve high growth in the defense industry as a result of continuous arms strengthening in the face of North Korea's nuclear and missile threats. With the rapid increase in demand for conventional weapons systems and changes in the structure of the global defense market due to the Russia-Ukraine war, Korea's weapons system drew great attention as a large-scale defense export contract with Poland was signed in 2022. In 2023, K-Defense ranked ninth in the world's arms exports and aims to become the world's fourth-largest defense exporter by 2027. Therefore, this study analyzed the case of Korea-Poland defense exports to derive problems, and presented development strategies related to export revitalization of K-Defense, a national strategic industry. In order for the defense industry to become Korea's next growth engine, it is necessary to establish a defense organization, prepare government-level measures to protect defense industry technology, and expand military and security cooperation with allies linked to defense exports.

Feature Extraction using Dynamic Time-warped Algorithms based on Discrete Wavelet Transform in Wireless Sensor Networks for Barbed Wire Entanglements Surveillance (철조망 감시를 위한 무선 센서 네트워크에서 이산 웨이블릿 변환 기반의 동적 시간 정합 알고리즘을 이용한 특징 추출)

  • Lee, Tae-Young;Cha, Dae-Hyun;Hong, Jin-Keun;Han, Kun-Hui;Hwang, Chan-Sik
    • Proceedings of the KAIS Fall Conference
    • /
    • 한국산학기술학회 2009년도 추계학술발표논문집
    • /
    • pp.185-189
    • /
    • 2009
  • 무선 센서 네트워크는 화산 감시, 전장 감시, 동물 서식지 감시, 건축물의 감시, 농장 관리, 의료분야등 다양한 분야에서 연구되고 있다. 국내에서도 국가 정책 사업으로 교량 및 건축물의 균열 감시, 표적의 침입 탐지 및 식별을 위한 무선 센서 네트워크 연구가 활발히 진행 중이다. 특히, 무선 센서 네트워크의 다양한 분야의 연구 중에서 철조망을 이용한 표적의 침입 탐지 및 식별에 관한 연구는 산업 시설, 보안지역, 교도소, 군사지역, 공항 등 다양한 분야에서 사용된다. 현재 철조망 감시는 대부분 유선 센서 노드를 통한 유선 센서 네트워크 환경에서 이루어지고 있다. 기존의 유선 센서 네트워크는 높은 데이터 전송률을 통해 수신되는 높은 정보의 신호를 이용하여 고속 푸리에 변환에 의한 신호의 주파수 분석 기법을 사용해 왔다. 하지만, 유선 센서 네트워크의 높은 데이터 전송률과 비교하여 무선 센서 네트워크의 센서 노드는 유선 센서 네트워크에 비해 매우 낮은 데이터 전송률을 가진다. 따라서 무선 센서 네트워크에서 수신되는 신호의 정보가 매우 낮고, 유선 센서 네트워크에서 사용된 고속 푸리에 변환에 의한 신호의 주파수 분석에 따른 주파수별 특징 추출을 할 수 없다. 따라서 본 논문에서는 철조망 감시를 위한 높은 데이터 전송률을 보장하는 유선 센서 네트워크에 비해 제한된 통신자원과 센서 노드의 낮은 데이터 전송률로 인해 수신되는 한정적인 신호의 정보를 이용한 무선 센서 네트 워크에서 철조망의 표적 침입 탐지 및 식별을 위한 특징 추출 알고리즘을 제안한다.

  • PDF

The Development of Attendance Management System Using the RFID (RFID를 이용한 출석관리 시스템 개발)

  • Park, So-Hee;Moon, Byeong-Cheoul
    • Journal of The Korean Association of Information Education
    • /
    • 제11권2호
    • /
    • pp.139-146
    • /
    • 2007
  • Today, using RFID(Radio Frequency Identification) card is extended in diversity as medical treatment, circulation market, military affairs, manufacture, security, etc. The RFID technology is an automatic identification method, relying on storing and remotely retrieving data for the purpose of identification using radio waves. This advantage of the RFID will be as a replacement for traditional Barcoding. Besides, book-lending system and attendance management system become the center of educational institution in interest. This paper presents a attendance management system using the RFID card which provides directly information of attendance for professors with mobile and students with web. Also, the students only have ID card that embed RFID tag which is recognized attendance through DB that storages to is received a information of student from RFID card Reader. And it is possible management or report for attendance and time table not only for professors by management program but also for students by web program.

  • PDF

A Study of Machine Learning based Hardware Trojans Detection Mechanisms for FPGAs (FPGA의 Hardware Trojan 대응을 위한 기계학습 기반 탐지 기술 연구)

  • Jang, Jaedong;Cho, Mingi;Seo, Yezee;Jeong, Seyeon;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • 제21권2호
    • /
    • pp.109-119
    • /
    • 2020
  • The FPGAs are semiconductors that can be redesigned after initial fabrication. It is used in various embedded systems such as signal processing, automotive industry, defense and military systems. However, as the complexity of hardware design increases and the design and manufacturing process globalizes, there is a growing concern about hardware trojan inserted into hardware. Many detection methods have been proposed to mitigate this threat. However, existing methods are mostly targeted at IC chips, therefore it is difficult to apply to FPGAs that have different components from IC chips, and there are few detection studies targeting FPGA chips. In this paper, we propose a method to detect hardware trojan by learning the static features of hardware trojan in LUT-level netlist of FPGA using machine learning.

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제21권9호
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.