• Title/Summary/Keyword: Cyber Capability

Search Result 83, Processing Time 0.022 seconds

Proposal for the 『Army TIGER Cyber Defense System』 Installation capable of responding to future enemy cyber attack (미래 사이버위협에 대응 가능한 『Army TIGER 사이버방호체계』 구축을 위한 제언)

  • Byeong-jun Park;Cheol-jung Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.157-166
    • /
    • 2024
  • The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, robots, unmanned vehicles, AI(Artificial Intelligence), etc. and utilize them in combat. The use of various unmanned vehicles and AI is expected to result in the introduction of equipment with new technologies into the army and an increase in various types of transmitted information, i.e. data. However, currently in the military, there is an acceleration in research and combat experimentations on warfigthing options using Army TIGER forces system for specific functions. On the other hand, the current reality is that research on cyber threats measures targeting information systems related to the increasing number of unmanned systems, data production, and transmission from unmanned systems, as well as the establishment of cloud centers and AI command and control center driven by the new force systems, is not being pursued. Accordingly this paper analyzes the structure and characteristics of the Army TIGER force integration system and makes suggestions for necessity of building, available cyber defense solutions and Army TIGER integrated cyber protections system that can respond to cyber threats in the future.

Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features (국방 사이버 무기체계와 기존 재래식 무기체계의 핵심기술 수준 및 특성 비교 연구)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.985-994
    • /
    • 2016
  • Since the inauguration of Defense Acquisition Program Administration(DAPA) in 2006, the national defense core technology research & development business has not only pertained to the weapons systems development but also to the improvement of the national science & technology capability via the acquisition of cutting-edge technologies. Furthermore, it has been closely related to the promotion of the defense industry and the mutual improvements of defense and civil technologies. The cyber warfare weapon system, a newly added national defense weapon system field since 2015, has become a promising weapon system branch for improving the national defense power as well as the national defense industry as shown in the case of Israel. By utilizing the existing result of the national defense core technology level, in order to establish the direction of technology planning of the cyber warfare weapon system, this paper analyzes the technology level and features of the cyber warfare weapon system in various aspects via comparisons with other weapons systems. The result of these analyses shows that the cyber warfare weapon system possesses a relatively high technology level due to the technology accumulation in the civilian sector while the relatively slow inclusion to the national weapons systems and the lack of the correspondence case regarding aggressive cyber responses in the defense sector yields a relatively low national rank. However, the technological gap between South Korea and the most advanced country in the field of cyber warfare technology is analyzed to be among the lowest, which indicates that with efficient and effective pursuits in terms of pthe weapons systems acquisitions as well as the core technologies research & development business, an outstanding cyber warfare capacity can be obtained in a short time.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

Instrumentation Performance Measurement Technique for Evaluating Efficiency of Binary Analysis Tools (바이너리 분석도구 효율성 평가를 위한 Instrumentation 성능 측정기법)

  • Lee, Minsu;Lee, Jehyun;Kim, Hobin;Ryu, Chanho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1331-1345
    • /
    • 2017
  • Binary instrumentation has been developed for monitoring and debugging executables without their source codes. Previous efforts on the binary instrumentation are mainly focused on its capability and accuracy, but not on efficiency for practical application. In particular, criteria and measurement methodologies for evaluating and comparing the efficiency of binary investigation tools and algorithms do not estimated yet. In this paper, we propose the instrumentation primitives which are a unit functionality and measurement methodology. Through the empirical experiments by adopting the proposed methodology on DynamoRIO and Pin, we show the feasibility of the proposal.

A study on the effect of design education on the operating of the long distance education -Focused on the Multimedia department of Seoul Digital University- (원격교육의 강의 운영에 따른 디자인 학습효과에 관한 연구 -서울디지털대학교 멀티미디어학부를 중심으로-)

  • Jung, Dong-Bae
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.279-288
    • /
    • 2004
  • There are 17 cyber universities granted by the Ministry of Education & Human Resources Department. Most of them have Design department and their educational purpose is practical education. However, their educational process is limited of teaching how to operate computer or production tools and has not offered practical training to students for pre-designer. But it does not mean that students in cyber university are lacking in capability of design. About hundreds of students will graduate from cyber university with a certificate of the completion of a design course on February in 2005. They look for achievement contrary to negatively social view. Because according to the record of 2004 Multi-media major in Seoul Digital University, 73% of them has worked in design field. The purpose of Cyber university is not to instruct a designer but do a lifelong education. I studied how to educate students in cyber university. In other words, I researched an educational methodology in cyber university for practical skill in design, an educational effect in various design contents, an educational process for current designers and beginners, a required education in reality, an limitation of online and an unique contents for design education. And then, I discussed how students in cyber university accept the value of design in online contents and improve their design abilities.

  • PDF

Application of Cyber Physical System (CPS) for Risk Management of a CO2 Storage Site (이산화탄소 저장부지 위해성 관리를 위한 가상물리시스템 적용성 평가)

  • Jeong, Jina;Park, Eungyu;Jun, Seong-Chun;Kim, Hyun-Jun;Yun, Seong-Taek
    • Economic and Environmental Geology
    • /
    • v.50 no.5
    • /
    • pp.363-373
    • /
    • 2017
  • In the present study, adaptability of cyber-physical system (CPS) for risk management of $CO_2$ storage site is examined and the subagging regression (SBR) method is proposed as a key component of the cyber-twin to estimate the risk due to potential $CO_2$ leakage. For these purposes, $CO_2$ concentration data monitored from a controlled $CO_2$ release field experiment is employed to validate the potentialities of the SBR method. From the validation study, it is found that the SBR method has robust estimation capability by showing minimal influence from anomalous measurements, and makes stable and sound predictions for the forthcoming $CO_2$ concentration trend. In addition, the method is found to be well suited as a tool of operational risk assessment based on real-time monitoring data due to the computational efficiency. The overall results suggest that the SBR method has potential to be an important component comprising the cyber twin of CPS for risk management of $CO_2$ storage site.

The Diagnosis and Prescription for Cybersecurity in Korea: Focusing on Policy and System

  • Park, Sangdon;Kim, Il Hwan;Kim, Jaehyoun;Lee, Kyung Lyul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.843-859
    • /
    • 2018
  • Cybersecurity has emerged as a serious problem in Korea and there have been relevant movements to improve domestic cybersecurity policy and system. However, discussions have yet to result in actual progress and the legislation for improvement of cybersecurity policy and system have been stagnant until now. As evidenced by the introduction of primary government legislation bill for national cybersecurity in 2017, the preparations for improvements to the policy and system are still in progress. However, we cannot be positive about the possibility of implementing these improvements during the process. Recognition of the importance of cybersecutiry has gradually risen and is more prevalent than in years past, however, in-depth discussions are not being made. In principle, misunderstandings about cybersecurity itself and insufficient understandings of the relevant legislation seem to cause such problems. Therefore, it is necessary to review key issues related to the improvement of cybersecurity policy and system and reconsider tasks for the future. Such issues include the relationship between cybersecurity and fundamental rights, establishing responsibility and capability of each of entities for cybersecurity, and the role of the military in cybersecurity. This type of in-depth discussion will be helpful for finding ways to improve upon cybersecurity policy and system. Moreover, this study aims to key issues with questionnaire survey and political and normative inquiry.

Verification of X-sight Lung Tracking System in the CyberKnife (사이버나이프에서 폐종양 추적 시스템의 정확도 분석)

  • Huh, Hyun-Do;Choi, Sang-Hyoun;Kim, Woo-Chul;Kim, Hun-Jeong;Kim, Seong-Hoon;Cho, Sam-Ju;Min, Chul-Ki;Cho, Kwang-Hwan;Lee, Sang-Hoon;Choi, Jin-Ho;Lim, Sang-Wook;Shin, Dong-Oh
    • Progress in Medical Physics
    • /
    • v.20 no.3
    • /
    • pp.174-179
    • /
    • 2009
  • To track moving tumor in real time, CyberKnife system imports a technique of the synchrony respiratory tracking system. The fiducial marker which are detectable in X-ray images were demand in CyberKnife Robotic radiosurgery system. It issued as reference markers to locate and track tumor location during patient alignment and treatment delivery. Fiducial marker implantation is an invasive surgical operation that carries a relatively high risk of pneumothorax. Most recently, it was developed a direct lung tumor registration method that does not require the use of fiducials. The purpose of this study is to measure the accuracy of target applying X-sight lung tracking using the Gafchromic film in dynamic moving thorax phantom. The X-sight Lung Tracking quality assurance motion phantom simulates simple respiratory motion of a lung tumor and provides Gafchromic dosimetry film-based test capability at locations inside the phantom corresponding to a typical lung tumor. The total average error for the X-sight Lung Tracking System with a moving target was $0.85{\pm}0.22$ mm. The results were considered reliable and applicable for lung tumor treatment in CyberKnife radiosurgery system. Clinically, breathing patterns of patients may vary during radiation therapy. Therefore, additional studies with a set real patient data are necessary to evaluate the target accuracy for the X-sight Lung Tracking system.

  • PDF

Impacts of Internet Blog Information on the Economic Landscape of Real Space: Case Study of Bookchon (지역에 대한 인터넷 블로그 정보와 지역 경제경관의 변화 - 서울 북촌을 사례로 -)

  • Lee, Keum-Sook;Seo, Wee-Yeun;Chae, Ji-Min
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.206-227
    • /
    • 2012
  • This study investigates the interaction mechanisms and processes between cyber space and real space. In particular, we analyze the relationships between changes on the economic landscape of the Bookchon region and the information supply and demand for this area on the Internet Blogs. In order to obtain the behavioral data about how people get information for Bookchon area and the reaction afterward, we perform questionnaire survey. The results of analysis reveal that there are significant connection between real space and cyber space, Internet Blog in particular. Internet Blog is the major media obtaining information about Bookchon area for major portion of people. Most people visit Bookchon after searching informations about it via Internet Blog. In particular, young generations who possess better capability to treat social media. At the same time, female, student, and office workers show these attitudes very strongly. We introduce a conceptual model for the interaction processes between cyber space and real space based on the survey data analysis, and propose a simple theoretical model for the dynamics of the total number of visitors about specific place with the experience of cyber space visit.

  • PDF