• Title/Summary/Keyword: 사이버국방

Search Result 126, Processing Time 0.037 seconds

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Measures for Training Military Information Security Professional Personnel for Cyber Security (사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안)

  • Lee, Kwang-ho;Kim, Heung-Taek
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.145-151
    • /
    • 2017
  • The Cyberspace of the Republic of Korea Army is continuously threatened by enemies. Means for responding to such cyber threats are ultimately Military information security professional personnel. Currently, however, there are only a handful of advanced information security professional persons in Republic of Korea Army, and a lack of systematic training is inadequate. Therefore, in this thesis, we surveyed the information security professional human resource policies of USA, UK, Israel, and Japan. In addition, the policy to train professional human resources specialized in defense cyber security, we proposed training of specialist talent of 4 steps and medium and long term plan, step-by-step training system sizing, introduction of certification system.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Study on the Intrusion Tolerance System Applied in the Object Oriented Middleware Environment (객체지향 미들웨어 환경하에서 응용화된 침입감내시스템에 관한 연구)

  • Kim, Young-Soo;Choi, Heung-Sik
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.558-565
    • /
    • 2003
  • 오늘날 대부분의 컴퓨터 시스템에 대한 사이버 공격은 특정 어플리케이션이 제기능을 발휘하지 못하도록 하기 위한 의도로 행해진다. 이러한 사이버 공격을 방어하기 위한 현행 정보보호시스템은 어플리케이션으로의 접근을 보호하는 기능을 갖는 형태로 하드웨어, 네트워크, 운영체제 등의 인프라를 보호하기 위한 시스템이 대부분이다. 본 논문은 사이버 공격에도 불구하고 어플리케이션이 서비스를 지속할 수 있는 침입감내시스템을 제안하고 설계 구현하였다. 제안 시스템은 어플리케이션의 기능과 침입감내 기능을 분리하고 다양한 보안 메커니즘을 통합하고 있는 미들웨어 기반의 시스템이다. 일상 생활에 많은 영향을 미치는 중요한 서비스인 경우에는 시스템의 기능 중 서비스의 지속성이 가장 중요하다. 제안한 침입감내 시스템은 향후 침입감내기능이 필요한 국방, 의료, 금융 시스템과 같은 사회기반시스템의 구축에 많은 부분이 활용될 것으로 생각한다.

  • PDF

A Study on Command and Control Through Cyber Protection Function Analysis (사이버 방호기능 분석을 통한 지휘통제에 관한 연구)

  • Choi, Seho;Oh, Haengrok;Yun, Joobeom
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.

Security Threat Trend based on Drone Embedded System and Network Protocol (드론 임베디드 시스템 및 네트워크 프로토콜 기반 보안위협 동향)

  • Sang-Hyeon Park;In-Su Jung;Jin Kwak
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.190-191
    • /
    • 2023
  • IoT(Internet of Things) 기술을 기반으로 한 드론은 사용자의 요청에 따라 데이터 처리, 수집, 송·수신 등에 고도화된 ICT(Information and Communications Technology) 기술을 활용하고 있다. 또한, 드론은 ICT 기술이 발전함에 따라 문화, 소방, 국방 등 다양한 분야에 적용되어 사용자에게 편의를 제공하고 있다. 그러나, 드론에 적용되는 ICT 기술과 드론에 탑재되는 기술들이 고도화됨에 따라 드론 모듈 내 펌웨어 및 무선 네트워크를 대상으로 한 보안위협이 증가하고 있다. 따라서 본 논문은 드론의 보안위협에 대응하기 위하여 드론 임베디드 시스템 및 네트워크 프로토콜을 대상으로한 최신 보안위협 동향을 분석한다.

A study on the current status of defense AI in major foreign countries (해외 주요국의 국방AI 현황 연구)

  • Lee Ji-Eun;Jisun Lee;Ryu chong soo
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.1
    • /
    • pp.19-24
    • /
    • 2023
  • The future battlefield is expected to be very different from what it is today because of the development of new technologies. In particular, it becomes difficult to predict the war's outcome as AI and robots, whose performance is improved, participate in the battlefield. Accordingly, major countries including the US and China regard AI as the key technology and game changer that changing national competitiveness and future wars. Therefore, they are concentrating their efforts at the national level to occupy advance related technologies and to develop AI weapon systems. For this reason, countries are preparing strategies and policies to defense AI, and are actively expanding infrastructure, such as establishing organizations. In Korea, Defense AI is also being promoted. But, it suffers from a lack of governance that manages and controls integrally. Nevertheless, a significant consensus is forming on the necessity of establishing a defense AI center. In this study, we analyzed the status of defense AI promotion in major foreign countries such as the US, UK, and Australia, and suggested some implications for the establishment of defense AI policies.

  • PDF

21세기의 사이버 군대와 대리전쟁

  • O, Je-Sang
    • Defense and Technology
    • /
    • no.7 s.257
    • /
    • pp.38-43
    • /
    • 2000
  • 전문가들은 예측하기를 미래의 전장은 적을 육안으로 거의 보지 못하고 싸우게 될 것이라 한다. 그리고 군사적으로 주요 요충지마다 로봇 병사가 지키게 될 것이다. 미래전쟁체계는 컴퓨터를 기반으로 하는 체계들로 구성되어 있기 때문에 컴퓨터 체계자체를 지키는 보안 및 안정성이 중요한 무기로 등장할 것이다. 적군의 컴퓨터 해커가 상대의 컴퓨터를 마비시키는 바이러스, 칩변조, 소프트웨어 변조, 시한폭탄 소프트웨어 바이러스, 허위정보 등을 투입할 수도 있다

  • PDF

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF