• Title/Summary/Keyword: 군사적 위협

Search Result 160, Processing Time 0.027 seconds

The Political and Cultural Restrictions in Building a Security Mechanism in Northeast Asia (동북아지역 내 안보협력체형성을 가로막는 정치, 문화적 장애요인)

  • Kang, Ryang
    • Strategy21
    • /
    • s.42
    • /
    • pp.347-370
    • /
    • 2017
  • 동북아시아지역에서 집단안보와 관련된 지역협력체가 형성되기 어려운 이유에는 먼저 체제와 이념이 다른 국가들 사이에서의 강한 지정학적 역학관계가 작동하고 있고, 두 번째로 개별국가 내부의 사회이념과 정치체제의 차이로 인한 이질성이 매우 강하며, 세 번째로 새롭게 형성되고 있는 미-중 관계의 대립적 구도가 군사안보적인 차원에서의 과도한 경쟁관계를 유발하고 있는 동시에, 네번째로 북한의 지속적인 핵과 미사일위협이 지역을 넘어 범세계적인 위협요인으로 작용하고 있으며, 다섯 번째로 장기간 미해결상태에 있는 도서 분쟁이 항시 관련국가들 사이에서의 과도한 민족주의적 갈등을 유발시키고, 이로 인한 적대적인 갈등관계가 지속되고 있는 점 등을 동시대적인 현실적 차원에서의 정치적 장애요인들로 규정해 볼 수 있다. 동시에 이런 현실적 차원에서의 정치적 장애요인들의 근원적인 발생요인으로도 평가될 수 있으며, 특히 동북아 개별국가들이 내세우고 있는 강력한 민족주의 성향과 과거사와 연관된 역사인식에 따른 문화적 이질성의 내면에 존재하는 낭만적 민족주의요소가 동북아 개별국가들 간의 신뢰형성과정을 강력하게 가로막고 있음을 지적할 수 있다. 19세기말에 동북아에 유래된 낭만적 민족주의에 대한 비교국가 차원에서의 심도 있는 분석과 이를 통한 절충점의 발견은, 역설적이지만, 세계 어느 지역보다도 극심한 갈등과 대립국면이 심화된 동북아지역 내의 국가들이 군사안보 및 정치경제차원에서의 보다 원활한 협력관계를 도모하기 위한 첫 단계로서의 공동의 장을 마련할 수 있는 주요한 동기가 될 수 있다.

소련의 헬기(2)

  • Gang, Geuk-Su
    • Defense and Technology
    • /
    • no.9 s.151
    • /
    • pp.56-64
    • /
    • 1991
  • 과거 지상군이 기동수단으로 각종 차량을 운용하였듯이, 미래 2000년대의 전장에서는 헬기가 주요 기동수단의 하나로 발전할 것이라는 점도 의심의 여지가 없을 것이다. 이러한 전망에서 우리는 김일성 부자의 군사적 위협에 대처하고 주요 무기체계의 자급이란 목표달성을 위해, 앞서정부가 황무지에서 군용차량 자급을 이룩해낸 70년대의 방위산업 투자를 다시한번재현하여, 2000년대 "공중기동차량" 자급을 이룩할수 있도록 서둘러 정부차원의 항공산업 육성책을 마련해 추진하여야 할것이다

  • PDF

사이버전 대응을 위한 국방 정보보호환경 분석과 보안관리모델 연구방향 고찰

  • Choi, Kwang-Bok
    • Review of KIISC
    • /
    • v.21 no.6
    • /
    • pp.7-15
    • /
    • 2011
  • 국방 정보보호환경은 IT기술의 발전과 함께 사이버 공간이 제5의 전장으로 부각되면서 해킹을 통한 군사자료유출, 시스템 파괴 등 외부로부터의 지속적인 위협에 직면해 있다. 본 논문에서는 이러한 사이버전 위협에 효과적으로 대응하기 위한 방안으로 보안사고사례, 조직, 제도, 인력양성, 법규 및 제도 등 국방 정보보호환경을 분석하고 이를 바탕으로 정보체계의 보안수준을 진단하기 위한 보안관리모델 개발의 필요성과 ISMS 방법론을 고려한D-ISMS(Defence ISMS) 연구방향을 고찰한다.

North Korea's cyber attack threat analysis research (Based on the type of attack technology) (북한의 사이버 공격 위협 분석 연구 (공격 기술의 유형 중심으로))

  • Kim, Jin Gwang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.107-110
    • /
    • 2020
  • 북한의 사이버 공격은 매년 증가하고 있으며 공격 수행인력 또한 6,800여 명으로 지속 늘어나고 있어 우리에게 큰 위협이 되고 있다. 그럼에도 불구하고 현재까지 북한의 사이버 공격사례 분석은 각각의 사건에 대한 개별 현황분석밖에 되지 않아 큰 시각에서의 공격 기술 유형이 어떻게 변화하였는지와 관련된 연구가 필요하다. 이에 따라 본 논문에서는 우선 사이버전의 일반사항 및 공격 기술을 확인하고 최근 3년간 발생한 북한의 사이버 공격사례를 조사하여 세부적으로 사용된 주요 공격 기술의 유형을 확인하고자 한다.

  • PDF

The Influence of Watching Military Life Experience TV Program ('Real Man') on University Students' Military Image and Security Awareness (군생활체험 TV프로그램 '진짜사나이' 시청이 대학생의 군 이미지와 안보의식에 미치는 영향)

  • Cho, Sang-Hyeok
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.147-158
    • /
    • 2016
  • The purpose of this study was to investigate the influence of watching 'Real Man' program on university student s' military image and security awareness. For the purpose of the study, 392 university students in Seoul, Chungcheong and Jeolla were selected. With the collected data, factorial analysis, t-test, frequency analysis, one-way analysis of variance, and multiple regression analysis were performed through SPSS 21.0. First, according to personal characteristic and watching degree, there were differences in military image and security awareness. There were significant differences in rationality, coherence, familiarity, violence, authority among sub factors of military image and in perspective about policy towards North Korea, persepectives about North Korea, military threats of North Korea, security will among sub factors of security awareness. Second, military image of university students who watched 'Real Man' had an influence on security awareness. Military image had an meaningful influence on perspective about North Korea, military threats of North Korea, security will among sub factors of security awareness.

Analysis report for readiness posture against north korea nuclear threat - Focused mainly in non-military area of government readiness posture - (북한의 핵위협 대비태세 분석 - 정부의 비군사분야 대비태세를 중심으로 -)

  • Kim, In-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.205-227
    • /
    • 2015
  • The Korean Peninsula is put in a position to carry out a highly strategic game vis-a-vis nK, which is asserting itself as a nuclear power amongst Northeast Asia's complex dynamics. While the international community recognizes nK's possession of nuclear weapons as released secret based on nK's three nuclear tests, shrewd strategic thinking is needed by ROK to secure itself as a non-nuclear nation in order to assume a responsible role to the international community, while simultaneously being ready to respond at all times for nK's military provocations. ROK must continue with its twofold strategy, by firm response to military confrontation with nK and maintaining flexible policy of tolerance in the areas of economy and ethnicity. Various strategic options to overcome nK's nuclear threats have been presented to ROK, whose possession of nuclear weapons have been difficult, and nK's nuclear capability is a real threat to ROK's national security. We must be able to respond to nK's nuclear threats strictly from ROK's national security perspective. This thesis aims to propose a response policy for nK's nuclear capability and nK's nuclear attack based on analysis of such nuclear damage, ROK Government's response posture against nK's nuclear threats, centered around ROK Government's non-military response posture.

  • PDF

An Empirical Study for Efficient Preparation for Enhancing North Korean Nuclear Threat: Focusing on non-military field (북핵 위협 고도화에 효율적 대비를 위한 실증적 연구: 비군사 분야를 중심으로)

  • Kim, Eung-Soo
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.255-279
    • /
    • 2017
  • The development of North Korea's nuclear weapons has worsened to the sixth nuclear test in 2017, and despite the sanctions of the international community including our government, we have not been able to offer clear solutions and alternatives, and the current measures are not enough in case of North Korea is using nuclear weapons. This study suggests how we should be prepared against the use of nuclear weapons under the premise that North Korea will never give up development of nuclear weapons under any circumstances. The first chapter outlines the current status of our preparedness if North Korea makes a nuclear attack. The second chapter analyzes and evaluates the power of nuclear weapons and North Korea's nuclear weapons threat. In the third chapter, we analyze North Korea nuclear attack and analyze the wartime emergency situation and civil defense posture. Finally, in order to implement the solutions presented in the text, we will identify priorities and summarize further developments.

  • PDF

Optimized Evaluation of Counter Drone System for Defending National Major Facilities through a Thinking Process of RMA (군사혁신(RMA) 사고과정을 적용한 국가중요시설 대드론체계 평가점검표 최적화)

  • Sang-Keun Cho;Ki-Won Kim;In-keun Son;Cook Rhie;Hyun-Ho Choi;Kang-Il Seo;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.789-793
    • /
    • 2023
  • Evalution of counter drone systems is conducted in order to designate plausible countermeasues against possible drone threats, assess the level of safety of national major facilities and derive complementary measures for detected weakness. Recently drone threats by North Korea have heavily impacted ROK(Republic of Korea) people and it has been stronly stressed to build efficient counter drone system for make the society protected and secured against drone threats. The researchers has conducted field investigations for some of national major facilites. There is, however, no standardized evaluation checklist, so we have proposed an evaluation checklist for counter drone systems though thinking process of RMA(Revolution in Military Affairs). This paper is to introduce the evaluation checklist for properly diagnosing each counter drone system.

Changes in the Paradigm of Future International Order and Prospects for Security on the Korean Peninsula (미래 국제질서 패러다임 변화와 한반도 안보전망)

  • Lee, Woong;Jung, Min-Sub;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.39-43
    • /
    • 2020
  • Currently, the nation's military is facing a real threat due to a reduction in military service resources and shorter service periods. Based on the military view that puts security first, the military tried to draw its impact and implications on the future army by reflecting the general objective content that the Ministry of National Defense and other government agencies and international agencies share. In other words, this study looks at the direction of the perception of mainstream perspectives (realism, liberalism) on international order, and presents the direction and framework for establishing future security strategies for the Korean Peninsula on the basis of military relevance that reflects the essential characteristics of military organizations contributing to national security on the theory and prospects of international order.

A study on the security threat and security requirements for multi unmanned aerial vehicles (무인기 군집 비행 보안위협 및 보안요구사항 연구)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.195-202
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) have mostly been used for military purposes but with the progress in ICT and reduced manufacturing costs, they are increasingly used for various private services. UAVs are expected to carry out autonomous flying in the future. In order to carry out complex tasks, swarm flights are essential. Although the swarm flights has been researched a lot due to its different network and infrastructure from the existing UAV system, There are still not enough study on security threats and requirements for the secure swarm flights. In this paper, to solve these problems, UAV autonomous flight technology is defined based on US Army Corps of Engineers (USACE) and Air Force Research Laboratory (AFRL), and swarm flights and security threat about it are classified. And then we defined and compared security requirements according to security threats of each swarm flights so as to contribute to the development of secure UAC swarm flights in the future.