• Title/Summary/Keyword: 군사적 위협

Search Result 160, Processing Time 0.026 seconds

A Study on the Effect of Trust in the Army Perceived by University Students on Perception of National Security (대학생이 지각하는 군 신뢰가 안보의식에 미치는 영향에 관한 연구)

  • Chun, Kyung Kook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.13-25
    • /
    • 2020
  • The most important responsibility of a government is to protect citizen lives and its own territory from outside threats. Especially recent political changes surrounding the Korea Peninsula seriously threaten the korean national security. To copy the situation, perception of national security based on citizen's trust in the army is needed. Accordingly survey analysis on effect of trust in the army on perception of national security had been conducted on students of a university located in Ulsan. Result of the statistical analysis as follows. First, while social contribution and military abilities among trust in the army are highly evaluated, integrity and characteristics of organizational culture are low evaluated. Second, all the correlation coefficients among studying variables are significantly positive. But correlation coefficient between social contribution and perception of national security is relatively low. Third, integrity, characteristics, and military abilities has a significant and positive effect on perception of national security, but social contribution has no significant effect.

Prospects about Nuclear Electro Magnetic Pulse developed by North Korea (북한의 핵전자기파(NEMP)탄 개발에 대한 전망)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.159-164
    • /
    • 2017
  • The international community recognizes North Korea's nuclear and missile provocation as a real threat. This is due to the analysis and evaluation that has developed nuclear electro magnetic pulse of domestic and overseas North Korea experts, intelligence agencies related to electro magnetic pulse. Electro magnetic pulse experts are concerned about North Korea's nuclear electro magnetic pulse in the following aspects. First, industrial, military, medical, and living facilities in modern society are constructed with electrical and electronic systems. So, All electrical and electronic appliances will become neutralization if North Korea's nuclear electro magnetic pulse was set off over the world(i.e. Korean Peninsula, United States etc). Second, North Korea will judge that possibility of criticism by the international community is low from the point of view of an attacker. Because nuclear electro magnetic pulse aim to destroy only the electronic equipment of the opposite nation and cause damage rather than taking life. Finally, nuclear electro magnetic pulse is more threatening than weapons like mass destruction because it does not need to hit targets accurately and can strike a wide area with nuclear weapon of the low technology levels. In this respect, we will analyze and evaluate nuclear and missile development and make a prospects about nuclear electro magnetic pulse developed by North Korea.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

A Study on the Effects of Influencing Factors in the Security Environment of Military Organizational Members on Information Security Stress and Security Compliance Behavior Intention (군(軍) 조직구성원의 보안환경 영향요인이 보안 스트레스와 보안준수행동에 미치는 영향 연구)

  • Park, Eui Cheon;Jeon, Ki Seok
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.93-104
    • /
    • 2021
  • Today, due to the development of the 4th industrial revolution such as artificial intelligence, the security threat of the military organization is increasing. A study that can contribute to complying with military security is needed by studying the effects of influence factors occurring in this changing or newly emerging security environment on information security stress and security compliance behavior intention. In previous studies, task overload, task complexity, task uncertainty, and task conflict were extracted among environmental influencing factors that cause security stress. We empirically analyzed how these influencing factors affect security stress and whether they play a mediating role in security stress. As a result of the analysis, it was analyzed that the security stress was affected in the order of task overload, task conflict, and task uncertainty. Information security stress did not significantly affect security compliance behavior intention, but it was found to mediate the effect of task overload on security compliance behavior intention. This causes information security stress due to heavy security work in the military organization, which ultimately leads to lower security compliance behavior. Therefore, the security policy to manage this situation should be promoted first.

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF

A Study on the Method for Judging the Required Protection Capacity through Decision Making (의사결정론을 통한 방호요구수준 판단방안 제시에 관한 연구)

  • Lee, Sung-Hak;Park, Sang-Woo;Baek, Jang-Woon;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.2
    • /
    • pp.167-174
    • /
    • 2019
  • Protective facilities are the last means of ensuring the survivability of personnel and assets, and there is a greater amount of matters to consider than those of general buildings. However, the Defense Military Facilities Criteria and the Ministry of the Interior and Safety, Ordinance No. 20, are only considering the expected enemy threats. In this study, we use objective and statistical methods to refine the consideration of the required capacity of protection based on the opinions of the experts. Specifically, the study adopts the Delphi technique associating the experts related to 30 defense military facilities criteria. The first-round questions were open-ended, and it compiled the points to consider related to the bulletproof and explosion - proof design. The second questionnaire was applied as closed questionnaire with 7 points scale methods. As a result of the factor analysis on the opinions of the experts, it was confirmed that the protection requirement level was due to METT + TC.

Mid-term Requirement of 'Elements of Depot Maintenance' draft (창정비요소 개발 과정정립을 통한 창정비요소개발 발전을 위한 제언)

  • Ahn, Jung-Jun;Kim, Jong-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.638-647
    • /
    • 2018
  • We have to prepare for the existing threats from North Korea and potential threats in the future. It is important to utilize our resources as effectively as possible to build military power that brings victory in a war. Based on a sustainable required operational capability, weapons systems at the acquisition stage need to maintain a combat-readiness posture and ensure operational sustainability. To achieve this, establishment of procedures that develop elements of depot maintenance at the beginning, which enables economical and effective depot maintenance during that stage, is essential. First, the requirement paper needs to develop the concept of the depot maintenance requirement through the pre-study outlined by this paper. Second, at the system development stage, a Development Plan of Depot Maintenance draft should be proposed. This is the initial paper that can develop the elements of depot maintenance, and it should be verified by a field test. Third, each force's logistics command should write a Depot Maintenance Direction draft and a Mid-term Requirement of Elements of Depot Maintenance draft with the proven Development Plan of Depot Maintenance draft. Also, the verified paper needs to be realized and renewed by the time the Requirement of Elements of Depot Maintenance draft is completed. In conclusion, the procedures explained above will contribute to build an economical and effective military power in a reality faced with a resource shortage and threats from the enemy.

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF

India's External Outreach in the Maritime Context (인도의 태평양 해양 진출 의미와 영향)

  • Joshi, Devendra Kumar
    • Strategy21
    • /
    • s.39
    • /
    • pp.242-250
    • /
    • 2016
  • 본 논문은 왜 인도해군이 인도양을 벗어나 태평양 해역으로 진출하려는지에 대한 이유를 설명한다. 인도는 거대한 섬 국가이자, 해양국가이다. 이에 인도해군(Indian Navy: IN)은 인도양에서의 해양안보(maritime security) 활동을 주도하고 있으며, 이는 이 해양에서 발생되고 있는 다양한 비군사적 위협에 대한 기여로 나타나고 있다. 예를 들면 아덴만 해적퇴치작전 등이다. 인도는 지리적으로 중국 등의 대륙국가와 국경을 접하고 있으나, 태평양 연안국가들과 긴밀한 양자간 관계를 유지하고 있으며, 아울러 다양한 다자간 협력체에 적극적으로 참가하고 있다. 후자의 경우 EAS, ARF, ASEAN 등의 협력체이다. 또한 인도는 경제, 사회문화적으로 태평양 연안국가들과 동질성을 갖고 있다. 그 동안 인도해군은 태평양에 대한 많은 기여와 관심을 갖고 있었으며, 이는 서태평양해군심포지움(WPNS) 업저버 국가 등의 다양한 활동 확대에서 발견되고 있다. 인도는 동방정책(India's Look East Policy)를 외교정책으로 채택하고 있으며, 이는 태평양에서의 해양안보에 대한 기여와 참여를 의미한다. 이는 최근까지 왜 인도해군이 중국, 아세안, 한국, 일본 및 호주 등과 긴밀한 해양협력 관계를 유지하고 있는지에 대한 주된 이유를 설명한다. 이러한 인도해군의 기여는 태평양 해양에서의 해양 평화와 번영에 기여할 것으로 전망된다.

A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments (센서네트워크 환경에서 경량화된 키 교환 및 상호인증 라우팅 프로토콜)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung;Min, So-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7541-7548
    • /
    • 2015
  • Wireless Sensor Networks is the technology which is used in explore role for military purposes, as well as various fields such as industrial equipment management, process management, and leverage available technologies by distributing node into various areas. but there are some limitations about energy, processing power, and memory storage capacity in wireless sensor networks environment, because of tiny hardware, so various routing protocols are proposed to overcome it. however existing routing protocols are very vulnerable in the intercommunication, because they focus on energy efficiency, and they can't use existing encryption for it, Because of sensor's limitations such like processing power and memory. Therefore, this paper propose mutual authentication scheme that prevent various security threats by using mutual authentication techniques and, Key generation and updating system as taking into account energy efficiency.