• Title/Summary/Keyword: 군사적 위협

Search Result 160, Processing Time 0.028 seconds

The Necessity of Korea-Japan Security Cooperation in order to Overcome North Korea's Nuclear Treats: Challenge & Conquest (북한 핵위협 극복을 위한 한일 안보협력 필요성 : 도전과 극복)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.89-99
    • /
    • 2018
  • In the year 2018, South Korea faces a crucial decision with regard to reunification. Starting from inter-Korean and US-North summits held from April through June, A rough journey for North Korea's "Complete, verifiable and irreversible dismantlement" began. Although South Korea insists that North Korea's Nuclear 'CVID' is the only minimum condition in the process of peaceful reunification, North Korea and other countries who support North Korea, including China and Russia, will possibly claim that North Korea's Nuclear 'CVID' will minimize their political and military positions internationally. Despite representatives from each country agreeing to North Korea's denuclearization, it is inevitable that many challenges still need to be resolved during the process. From the perspective of the Chinese government, North Korea is not a country that stimulates international conflicts. Instead, China can utilize North Korea as their political and tactical leverage against the US in order to compete for hegemonic power in Asia. In order to reject the emerging supremacy of China and resolve uncertainties in the denuclearization agreement and implementation process, I suggest the necessity of 'Korea-Japan Security Cooperation' as a 'second alternative' to achieve the North Korea's Nuclear 'CVID'.

  • PDF

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

A Social Historical Study on Security System of Goryo Period (고려시대(高麗時代) 시위제도(侍衛制度)에 관한 사적고찰(史的考察))

  • Kim, Chang-Ho;Min, Jae-Ki
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.107-128
    • /
    • 2008
  • It was started that Shiwe-goon was organized from Shilla-end to Goryeo foundation a country in powerful families existence merely royal household by stably plan means in the reign of Taejo. Generally Shiwe-goon was dutie king' personal danger of protection. Shiwe-goon was organized castle of guarding, stand by king and royal household side armed strength to going on a trip and general armed-organization was collapsed for Goryeo-end continued existence. Goryeo era of Shiwe-organization was divided central army and region army. Two-goon(Eungyang-goon, Yongho-goon) was undertaken king of Shiwe army and six-we(Chunwoo-we, Geumoh-we, Gammoon-we, Jeoawoo-we, Shinoh-we, Hongwe-we) was undertaked capital of guard and the border of defense duty. Central army of commanders was called Sangjanggoon, Daejanggoon. Sangjanggoon and Daejanggoon was discussed military officer of conference apparatus in Jungbang. Jungbang was got afterward Mooshinjungbeon happened military of statesman grasping political power with authority a main stay. Mooshinjungkwen era was appeared modernistic mean of privately guarding organization in Dobang and Naedobang. According as Shiwe-organization was charged military organization as a part of sovereign power and grasping strength of authority- maintenance for security and guarding duty. As a conclusion, national sovereign of guard was achieved not only personal life and body guard protection but also country of welfare protection in country-welfare dimension an inch of non-error. Also national sovereign of guard was considered guarding apparatus of allowance the largest duty and country-welfare direct connection with actual fact recognition in constancy effort.

  • PDF

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

Nuclear Weapons and Extended Deterrence in the U.S.-ROK Alliance (핵무기와 한·미 핵 확장억제 능력)

  • Huntley, Wade L.
    • Strategy21
    • /
    • s.34
    • /
    • pp.236-261
    • /
    • 2014
  • The future role of nuclear extended deterrence in the security alliance between the United States and the Republic of Korea is currently a central concern. The gradually lessening role of reliance on nuclear weapons in US security policies broadly, combined with increasing North Korean nuclear capabilities and belligerence, raise fresh questions about the sufficiency of the "nuclear umbrella" as a pillar of the US-ROK defense posture. This article addresses the current and future role of nuclear extended deterrence in Korea in this dynamic context. The article reviews the longstanding trend toward reducing the overall size of the US nuclear arsenal, and assesses developments in US-ROK outlooks toward extended deterrence in response to the Obama administration's nuclear policies and North Korea's recent smaller-scale aggressions. The analysis finds that the challenges of deterrence credibility and allied reassurance are difficult and long-term. The analysis explains how these challenges emerge less from a shrinking US numerical arsenal size than from the sufficiency of specific nuclear and non-nuclear capabilities to meet emerging smaller-scale threats. The analysis also highlights the importance of broader strategic and political interaction in sustaining allied confidence in any joint security posture. The evaluation concludes that a strong US-ROK alliance relationship can be maintained while the size of the US nuclear arsenal continues to decline, in part because nuclear weapons in any deployment configuration are relatively ineffective means for deterring smaller-scale aggression. Nevertheless, continuing adjustment of the US-ROK extended deterrence posture to the evolving, complex and uncertain Korean peninsula security environment will remain an ongoing challenge. Finally, the article encourages further examination of the potential specific role ROK maritime forces might serve in enhancing deterrence of smaller-scale threats while minimizing risks of conflict escalation.

India's Maritime-Security Strategy: Pretext, Context and Subtext (인도의 해상 안보 전략: 구실, 맥락 및 숨은 의미)

  • Khurana, Gurpreet S
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.1-56
    • /
    • 2022
  • Why has India become a key actor in the maritime-configured Indo-Pacific region? There are some external factors, but for India, its geo-strategic frontier encompassing its geopolitical and maritime interests is expanding rapidly beyond its territorial space across both the Indian and Pacific oceans amidst an increasingly arduous geopolitical and security environment. India must, therefore, acquire the ability to influence events within this strategic arena using all facets of national power, including maritime-military power. Lately, therefore, New Delhi has invested much intellectual capital to review its maritime-security strategy. India's new strategy is premised on the concept of holistic security involving the 'softer' aspects of maritime-security, and a rekindling of maritime consciousness in India, a nation that has traditionally been beset by 'sea-blindness'. The strategy adopts a region-wide, inclusive, and a more proactive approach than hitherto, as is evident in its title 'Ensuring Secure Seas: Indian Maritime Security Strategy'. While it deals with the growing concern of new non-traditional threats in the Indian littoral and the need for military deterrence and preparedness, it also addresses the imperatives for India to seek a favorable and rules-based benign environment in its immediate and extended maritime periphery, including through multi-vectored strategic partnerships dictated by its enduring principle of strategic autonomy. For a more profound and comprehensive understanding of India's maritime-security strategy, this paper examines the key unstated and implicit factors that underpin the strategy. These include India's historical and cultural evolution as a nation; its strategic geography; its geopolitical and security perceptions; and the political directions to its security forces. The paper deals specifically with India's response to maritime threats ranging from natural disasters, crime and state-sponsored terrorism to those posed by Pakistan and China, as well as the Indian Navy's envisaged security role East of the Malacca Straits. It also analyzes the aspects of organizational restructuring and force planning of India's maritime-security forces.

  • PDF

An Estimation Method of the Operational Cost for Weapon Systems Acquisition (신무기체계구매에 따른 운영비의 추계 방법론 -항공기 중심으로-)

  • Kim, Hyung-Ki
    • Journal of the military operations research society of Korea
    • /
    • v.3 no.2
    • /
    • pp.103-117
    • /
    • 1977
  • 국방조직과 규모의 대형화와 군사위협에 따른 전략전술개념의 변동은 방위비의 부담을 가속화시킬 것이다. 군사력 증강소요의 제기와 국민경제에 의한 가용자원의 합목적적인 자원배분과정은 능률적인 정책과제의 선택과 결정을 위한 기본정보자료가 정책법정권자나 입안자들에게 요구된다. 따라서 신무체계의 구매우선순위 결정은 물론 기존 무기체계의 경제적 운용 기간에 대한 운영총괄비용의 추계방법론을 시도하였다. 이는 분석내용이나 결과의 사용에 대한 관점의 상이성을 제시해 주고 있다. 또한 신항공무기체계를 중심으로 운영총괄비용의 추계를 위한 일반적인 개념정립은 물론 비용산정의 구체적인 절차와 기법을 기구하였다.

  • PDF

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.