• Title/Summary/Keyword: 방어목표

Search Result 123, Processing Time 0.025 seconds

An Analysis of the Characteristics of China's Naval Strategy to Become a Maritime Power: Focusing on analyzing the "goals, methods, and means" of strategy (해양강국 달성을 위한 중국 해군전략의 성격 분석: 전략의 "목표·방법·수단"을 이용한 분석을 중심으로)

  • Kim, nam-su
    • Maritime Security
    • /
    • v.2 no.1
    • /
    • pp.1-42
    • /
    • 2021
  • Controversy continues over the offensive nature of China's naval strategy to become a maritime power. Therefore, the purpose of this study is to identify the characteristics of China's naval strategy to become a maritime power by using the three elements of strategy and predict China's military actions in the future. For this purpose, research was conducted by considering the three elements of strategy and the distinct characteristics of naval strategy, and it was found that China's naval strategy was overall aggressive, but there was an imbalance in the pursuit of aggression between each strategic element. Offensive nature was prominent in terms of the methods, but there were limitations in the goals and means, such as the need to cooperate with neighboring countries to become a maritime power and the lack of military technology and operational continuity. The prospects for China's future military actions derived from the imbalance between these strategic elements are as follows. ① The risk of all-out military conflict with the US is low for now. ② China may use its naval power to force or cause limited military clashes against neighboring countries within the first island chain. ③ Accidental military conflicts with the US and neighboring countries may occur over naval confrontation over territorial disputes.

  • PDF

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

The Study on the North Korea's Provocation (북한의 대남 도발 사례분석)

  • Kim, Woo Sung
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.79-89
    • /
    • 2014
  • North Korea's provocations is continued. Although Kim Il Sung, Kim Jong Il, Kim Jong Un regime was shift. The crisis is activated, but that there are no changes. Until now, there are the possibilities of war in the Korean peninsula. If we analyse a major provoked crisis committed by North Korea, the enemy's intention is clear. Since the Korean War, South and North Koreas remain limited military conflict continued. North Korea's provocative behavior so far can be summarized as the following. First, the provocative form has changed variously. Second, the risk analysis of the case, the goal is most often provoked by the military purposes. Third, North Korea is a war and peace strategy on both sides. Fourth, try to cover up the provocation. Each crisis event occurs when the peninsula side of North Korea by hiding his intention to blame the behavior of the operation has been shown to act.

Reliability Analysis for Decoy using Maintenance Data (정비 데이터를 이용한 기만체계 신뢰도 분석)

  • Gwak, Hye-Rim;Hong, Seok-Jin;Jang, Min-Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.82-88
    • /
    • 2018
  • The decoy defensive weapon system is a one-shot system. Reliability is maintained through periodic inspection and high reliability is required to confirm whether or not the functioning is normal after launch. The maintenance cycle of a decoy was set up without target reliability and reliability prediction during the development period. However, the number of operations in the military has been increasing, necessitating the optimization of the maintenance cycle. Reliability is analyzed using the maintenance data of a decoy operated for several decades and the optimal maintenance cycle is suggested. In chapter 2, data collection and classification methods are presented and analysis methodology is briefly introduced. In chapter 3, the data distribution analysis and fitness verification confirmed that applying the Weibull distribution is the most suitable for the maintenance data of the decoy. In chapter 4, we present the analysis result of percentile, survival probability and MTBF and the optimal maintenance cycle was derived from the reliability analysis. Finally, we suggest the application methods for this paper in the future.

Development of the Safety Case Program for the Wolsong Low- and Intermediate-Level Radioactive Waste Disposal Facility in Korea (중·저준위 방사성폐기물 처분시설을 위한 Safety Case 종합프로그램의 개발)

  • Park, Jin Beak;Jeong, Jong Tae;Park, Joo-Wan
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.12 no.4
    • /
    • pp.335-344
    • /
    • 2014
  • The safety case program has been prepared for the development of the disposal facility of low- and intermediate-level radioactive waste in Korea. For the development of the radioactive waste disposal facility, this program can be applied for the safety demonstration of the facility and for the safety judgment of development step based on the international standards and domestic development environment. Systematic safety approach of this program includes the safety strategies such as optimization, robustness, demonstrability and defense-in-depth principle which are based on the safety principle and objectives. From the quality of assessment basis, safety arguments focused on the uncertainty management and the confidence building can assure the disposal safety during the step-wise safety assessment.

Review on the Working Hours of Radiation Work Plan for ECT through In-service Inspection (원전 가동중 ECT 검사 방사선 작업시간 고찰)

  • Chae, Gyung-Sun
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.1
    • /
    • pp.57-63
    • /
    • 2004
  • As a part of In-service Inspection works in a nuclear power plant, Eddy Current Testing through all the outage of nuclear power plants has been controlled by the radiation management. From the case study about the periodical ECT work, the exposed dose rate of worker has announced over the organized dose rate before the radiation work, it affects the personnel exposed dose management and radiation work permit issue. It is not easy to get some information about ECT related working hours, scope of work and how many workers to forecast the radiation working and the predict dose exposure. It should be need the data accumulation about ECT related radiation work to prepare the ALARA achievement and the radiation work plan for dose mitigation. We can discuss a few information about ECT related radiation working issue for the application of predict dose exposure on this paper.

Review of Contamination and Monitoring of On-site Groundwater at Foreign Nuclear Power Plants due to Unplanned Release (비계획적 방출에 의한 해외 원전 부지 지하수 오염 및 감시 기술현황 분석)

  • Sohn, Wook;Lee, Gab-Bok;Yang, Yang-Hee
    • Journal of Radiation Protection and Research
    • /
    • v.38 no.2
    • /
    • pp.124-131
    • /
    • 2013
  • Utilities have tried to ensure that radiological hazards to the environment and residents are kept as low as reasonably achievable by monitoring and controlling planned releases. However, since groundwater contamination was reported to occur due to unplanned releases mostly in the United States nuclear power plants, the interest of the stakeholders has increased to a point where it is now one of the most important issues in the United States nuclear power industry. This paper aims to help to implement an effective on-site groundwater monitoring program at domestic nuclear power plants by briefing the experiences of the United States nuclear power plants on groundwater contaminations and groundwater monitoring, and responses of the United States nuclear industry and regulator body for them.

Arousing the Need to Remove the 'Shadow Encroaching Phenomena on the Essence' in Ad Expression by Interdisciplinarily Applying Ethicality (윤리의식의 학제적 적용을 통한 광고 표현에서의 '그림자에 의한 실체의 잠식 현상' 제거 필요성 환기)

  • Kim, Chulho
    • Journal of Digital Convergence
    • /
    • v.16 no.2
    • /
    • pp.351-359
    • /
    • 2018
  • The purpose of this research is to arouse attention to the importance of eliminating the 'Shadow Encroaching Phenomena on the Essence' in advertising expression by interdisciplinarily applying ethicality. This research shows that when advertising expression is planned and executed without enough consideration of ethicality, short-term effectiveness to reach goals can be increased, but it is easy to induce an unintended 'Shadows' Boomerang Phenomena'. This research also proposes that such processes arouse consumers' ethical defense mechanisms, possibly causing the 'Shadow Encroaching Phenomena' in the end. In conclusion, this research proposes the following. First, the pursuit of commercial profit in a capitalistic society must be done under the premise of securing a consensus of ethicality in a common society. Second, under the premise of an integrated process of education, sharing, execution, and confirmation of ethicality, companies can achieve both the micro-practical goal of profit pursuit and the macro-environmental goal of ecological sympathy.

The Social Capital Improvement at Nuclear Education for Foreigners with Action Learning (액션러닝을 이용한 원자력 교육의 사회적 자본 증가에 관한 고찰: 외국인 교육생 중심)

  • Kim, Hyeon-Jin
    • Journal of Radiation Protection and Research
    • /
    • v.38 no.1
    • /
    • pp.10-21
    • /
    • 2013
  • Action Learning is a teaching-learning method to solve a problem through which members in a team discuss the problem and a facilitator supports the members in the team. The Action Learning makes learners develop human-relationship skills, which are connected to the value of social capital in the modern society. The purpose of this study is to clarify the relationship between action learning and social capital with 17 participants who joined in a nuclear education course opened in the Korea Atomic Energy Research Institute. The result showed that the action learning positively influenced the social capital among members in the team. Consequently, it is easily recognized that action learning is one of positive teaching-learning methods to achieve educational purposes of a organization and should be more developed in the future.

Monte Carlo Calculation of Thermal Neutron Flux Distribution for (n, v) Reaction in Calandria (몬테칼로 코드를 이용한 중수로 Calandria에서의 $(n,\;{\gamma})$ 반응유발 열중성자속분포 계산)

  • Kim, Soon-Young;Kim, Jong-Kyung;Kim, Kyo-Youn
    • Journal of Radiation Protection and Research
    • /
    • v.19 no.1
    • /
    • pp.13-22
    • /
    • 1994
  • The MCNP 4.2 code was used to calculate the thermal neutron flux distributions for $(n,\;{\gamma})$reaction in mainshell, annular plate, and subshell of the calandria of a CANDU 6 plant during operation. The thermal neutron flux distributions in calandria mainshell, annular plate, and subshell were in the range of $10^{11}{\sim}10^{13}\;neutrons/cm^2-sec$ which is somewhat higher than the previous estimates calculated by DOT 4.2 code. As an application to shielding analysis, photon dose rates outside the side and bottom shields were calculated. The resulting dose rates at the reactor accessible areas were below design target, $6 {\mu}Sv/h$. The methodology used in this study to evaluate the thermal neutron flux distribution for $(n,\;{\gamma})reaction$ can be applied to radiation shielding analysis of CANDU 6 type plants.

  • PDF