• Title/Summary/Keyword: 군사위협

Search Result 194, Processing Time 0.027 seconds

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

The Importance of Military Security -Mainly focused on the Battle of Gaeseong, the early part of the Korean War- (전투사례로 본 군사보안의 중요성 연구 - 6.25 전쟁 초기, 개성일대 전투를 중심으로-)

  • Kim, Gyu-Nam;Lee, Hyun-Hee
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.51-58
    • /
    • 2016
  • "History is a mirror" means that we should be prepared for the threats of enemies through learning from repeating history. Currently South Korea is facing various provocations, including North Korea's nuclear weapons and missile s. For the protection of the life and property of its people, South Korea should regard North Korea as a main enemy and be fully prepared for the threats. The Korean War was a war between well-prepared North Korea and ill-prepa red South Korea. After Liberation, North Korean army incorporated the Chinese Communist army, placed battle equi pment with the support of the Soviet army, and finished corps-level training while South Korea at that time did not finish battalion-level training. In wartime and peacetime, an army should improve military security by concealing its own information and find its enemy's information. North Korea carefully prepared for the war, collecting information about the organization, deployment and operation of the South Korean army. South Korean army failed to cope with it and had hard times in its early battles. In this paper, I will emphasize the importance of military security, focusing on the Battle of Gaeseong, the early part of the Korean War.

A Study on North Korea's UAV Threat and Response Stance (북한의 무인기 위협과 대응 자세)

  • Hyeonsik Kim;Chanyoung Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.227-233
    • /
    • 2023
  • Along with the 4th Industrial Revolution, the impact of "unmanned" is affecting all fields around the world, and in particular, in the military sector, "unmanned" is so important that it occupies a part of the main combat system. Recently, the South Korean military is facing a crisis due to the North Korea's UAV incident that invaded our airspace and descended to Seoul. In response, the South Korea military declared its willingness and countermeasures to capture and destroy North Korea's UAV. However, as the technological development of UAV continues and the utilization plan is expanding, the countermeasures for UAV at the current level can be useless. Also, the threat from North Korea is not just UAV. North Korea has practically a nuclear power and is set to conduct its seventh nuclear test, and its missile technology is also being advanced, with 38 arounds of 67 missile tests conducted in 2022 alone. It is also developing five key strategic weapons that can pose a fatal threat to Korea, and North Korea's strong conventional forces are located around the NLL(Northern Limit Line), and the port of Long Range Artillery is facing the Seoul metropolitan area. It is important to respond to North Korea's UAV threats, which are now receiving much attention, but it will be necessary to comprehensively analyze and clearly prioritize North Korea's threats and use a limited budget to respond to them.

A study on the security threat and security requirements for multi unmanned aerial vehicles (무인기 군집 비행 보안위협 및 보안요구사항 연구)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.195-202
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) have mostly been used for military purposes but with the progress in ICT and reduced manufacturing costs, they are increasingly used for various private services. UAVs are expected to carry out autonomous flying in the future. In order to carry out complex tasks, swarm flights are essential. Although the swarm flights has been researched a lot due to its different network and infrastructure from the existing UAV system, There are still not enough study on security threats and requirements for the secure swarm flights. In this paper, to solve these problems, UAV autonomous flight technology is defined based on US Army Corps of Engineers (USACE) and Air Force Research Laboratory (AFRL), and swarm flights and security threat about it are classified. And then we defined and compared security requirements according to security threats of each swarm flights so as to contribute to the development of secure UAC swarm flights in the future.

How to Neutralize China's Advanteges in a South China Sea Conflict for the U.S. Navy and Its Implications for Republic of Korea Navy (남중국해 분쟁 관련 미국 해군의 제한사항과 극복방안, 한국 해군에의 함의)

  • Kim, Tae-Sung
    • Strategy21
    • /
    • s.46
    • /
    • pp.277-303
    • /
    • 2020
  • 2000년 이후 중국 해군은 빠르게 성장하고 있고 이러한 해군의 성장과 더불어 중국은 남중국해 내 도서를 군사기지화 하고 대함 미사일을 개발하고 있다. 이는 제1도련선 내 중국의 해양통제를 위한 노력으로써 인도-태평양 지역 내 미 해군 전력 및 기지에 심각한 위협으로 작용하여 미국의 해양 지배력을 약화시키는데 기여하고 있다. 이를 극복하기 위해서 미국은 인도-태평양 지역내 동맹국과 파트너국들과 함께 시간, 공간, 전력(화력, 군수) 측면에서 작전개념을 발전시켜야 한다. 우선 시간적인 측면에서 중국의 위협에 신속하게 대응하기 위해서 인도-태평양 지역내 국가들의 공중전력(UAVs)과 해상전력(Aegis ships)을 활용하여 대중 정보공유 체계를 강화시켜야 한다. 다음으로 공간적인 측면에서 중국의 위협으로터 인도-태평양 지역 내 미해군의 전력 및 기지를 보호하기 위해서 미 해군 전력을 일본과 호주로 분산 배치시키고 동맹국과 파트너국들의 이지스함, 잠수함 및 무인 수중전력을 적극 활용해야 한다. 전력 측면에서는 해상 기반 화력과 지상 기반 화력을 통합하여 화력의 치명성을 강화해야 하고 인도와의 협력 및 인도-태평양 지역내 함정 손상통제 시설의 확충을 통해서 해상 군수지원 능력을 발전시켜야 한다. 이러한 미 해군의 작전개념 발전 방향이 주는 한국 해군에의 함의는 다음과 같다. 첫째, 미·중간 남중국해 분쟁 발생시 중국의 미사일 위협으로부터 한국 내 위치하고 있는 한·미 해군 전력 보호를 위해 미사일 방어체계(이지스함, 사드 등)를 발전시켜야 한다. 둘째, 대중 감시·정찰 및 미 항공모함단 방호 전력으로 활용 가능한 한국형 원자력 잠수함을 개발해야 한다. 셋째, 미국 뿐만 아니라 인도-태평양 지역내 파트너 국가들을 포함하는 연합훈련을 확대·발전시킴으로써 남중국해내 중국의 해양통제 노력에 대응해야 한다. 넷째, 인명손실을 최소화하고 효율적으로 해군력을 현시할 수 있는 무인 수중·수상체계를 지속적으로 발전시켜 나가야 한다.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

A Study on the Improvement of Naval Combat Management System for the Defense of Drone

  • Ki-Chang Kwon;Ki-Pyo Kim;Ki-Tae Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.93-104
    • /
    • 2023
  • Recently, the technology of drones is developing remarkably. The role of military drones is so great that they can cause serious damage to the enemy's important strategic assets without any damage to our allies in all battlefield environments (land, sea, air). However, the battleship combat management system currently operated by the Korean Navy is vulnerable to defense because there is no customized defense system against drones. As drones continue to develop, they are bound to pose a major threat to navy in the future. This paper proposes a way for the warfare software of naval combat management system sets a combat mode suitable for anti-drone battle, evaluates the threat priority in order to preemptively respond to drone threats and eliminate drone threats through automatic allocation of self-ship-mounted weapons and sensors, and through a test of the improved warfare software in a simulated environment, it was proved that the time to respond to the drone was improved by 62%.

Measures to Strengthen Korea-Japan Cyber Security Cooperation: Focusing on Joint Response to North Korean Cyber Threats (북한 사이버 위협에 대응하기 위한 한일사이버 안보협력 강화방안)

  • Tae Jin Chung
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.199-208
    • /
    • 2023
  • South Korea and Japanese governments have never responded cooperatively to North Korea cyber threats in the past 10 years or even before that. There are two reasons: First, The historical and political conflicts between the two countries were so deep that they did not discuss their mutual needs. Second, officially, Japan had not been subjected to a North Korean cyberattack until 2022 . In particular, the issues of comfort women and forced labor during World War II were holding back the reconciliation between the two countries. With the inauguration of the Yoon Seok-yeol administration, Korea-US relati ons improved dramatically. Tensions in Northeast Asia reached their peak due to the conflict between the US and China. It has become a situation where peace cannot be garaunteed without close cooperation between Korea and Japan led by the United States.

Analysis of Protection Capability of a Conical Shaped Protector (유한요소해석을 이용한 원뿔형 대응체 방호 효과 분석)

  • Kim, Heecheol;Kim, Jongbong;Jeong, JinHwan;Yoo, Yo-Han
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.563-571
    • /
    • 2018
  • In order to effectively protect a penetrator, the conically shaped protector was proposed and the protection capability was investigated. The collision and penetration of the penetrator with the protector were analyzed using dynamic finite element analysis. The post impact behaviors of the penetrator, i.e., flying velocity and the change of attitude angle, were monitored to investigate the protection capability. The flying velocity and the attitude angle are used to investigate the deviation and the penetration power respectively. The effect of rotation speed of the protector and the collision position on the protection capability is investigated in the viewpoint of deviation and attitude angle when penetrator colliding with our tank.