• Title/Summary/Keyword: Cyber-military

Search Result 143, Processing Time 0.022 seconds

A Study on the Concept of Military Robotic Combat Using the 4th Industrial Revolution Technology (4차 산업혁명 기술을 활용한 군사로봇 전투개념 연구)

  • Sang-Hyuk Park;Seung-Pil Namgung;Sung-Kwon Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.397-401
    • /
    • 2023
  • The study presents milestones for the Korean military to win the future battlefield based on the 4th Industrial Revolution. Chapter 1 deals with the necessity of research on how advanced countries operate industrial technology in the defense sector based on the 4th Industrial Revolution. Chapter 2 examines the current technology status of the 4th Industrial Revolution in Korea and the concept of Korean combat. Chapter 3 analyzes the military robotic technology of advanced military countries through examples of unmanned combat robots in the United States, Israel, and Germany. In the end, in future battles, it will be possible to dominate the battlefield only by taking a leap into a super-connected and super-intelligent military based on a high-tech platform. Our military should also research and develop military robotics in accordance with the characteristics of each combat system, and further expand and develop the concept of combat performance to protect our core capabilities and centers from enemy cyber, electronic warfare, and space attacks.

A study on the Application of Effects-based Operation in Cyberspace (사이버공간에서의 효과중심작전 적용방안 연구)

  • Jang, Won-gu;Lee, Kyun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.221-230
    • /
    • 2020
  • The effects-based operation, which would reduce unnecessary efforts and meaningless sacrifices incurred during a war and simultaneously reach the will of the enemy leadership by strategic attacks, was discarded for the reason that it was difficult to apply it to military power except for airpower. However, cyberspace, which can be thoroughly logical and calculated, can be suitable for conducting effects-based operations. This study examined a way to carry out effects-based operations in such cyberspaces. It laid the foundation for overcoming the limitations of effects-based operations revealed in previous battle cases and executing the operations in cyber battlespace where the boundary between physical and cyberspaces gradually disappeared. Futhermore, it demonstrated that effects-based operations could be carried out in cyberspace by establishing a military strategy, which could conduct the operations through an analysis of previous cyber-attack cases.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

Analysis of Improving Requirement on Military Security Regulations for Future Command Control System (미래 지휘통제체계를 위한 보안 규정 개선 요구사항 분석)

  • Kang, Jiwon;Moon, Jae Woong;Lee, Sang Hoon
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.69-75
    • /
    • 2020
  • The command control system, like the human brain and nervous system, is a linker that connects the Precision Guided Missile(PGR) in information surveillance and reconnaissance (ISR) and is the center of combat power. In establishing the future command and control system, the ROK military should consider not only technical but also institutional issues. The US Department of Defense establishes security policies, refines them, and organizes them into architectural documents prior to the development of the command and control system. This study examines the security architecture applied to the US military command control system and analyzes the current ROK military-related policies (regulations) to identify security requirements for the future control system. By grouping the identified security requirements, this study identifies and presents field-specific enhancements to existing security regulations.

The Effect of interpersonal competency based self-understanding and acceptance of others, self-leadership and stress-coping on military adjustment (자기이해와 타인수용에 기반한 대인관계능력과 셀프리더십, 스트레스대처수준이 군생활적응에 미치는 영향)

  • Lee, Jung-Won
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.51-60
    • /
    • 2018
  • This study would like to know the relationship among interpersonal competency based self-understanding and acceptance of others, self leadership, stress-coping and military adjustment. For this, 1289 military trainee in the army training station were surveyed. In results, The first, the acceptance of others did not have a significant effect on the perform-will, but had a significant effect on the job satisfaction and self leadership. The self-understanding had a significant effect on perform-will, job satisfaction and self leadership. The second, self leadership mediated between interpersonal competency and military adjustment. The third, in case of the perform-will, the moderating effect was showed in self leadership when the stress coping level was high. But in case of the job satisfaction, it was showed in both high group and low. Implications of this study is that the interpersonal competency based self-understanding and acceptance of others, self leadership and stress coping can be the positive potential variables on the military adjustment.

A study on the cyber common operation picture for situational awareness in cyberspace (사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구)

  • Kim, Kook-jin;Youn, Jae-pil;Yoon, Suk-joon;Kang, Ji-won;Kim, Kyung-shin;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.87-101
    • /
    • 2022
  • Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.

The Changes in the Future War Patterns and ROK's Response (미래 전쟁양상의 변화와 한국의 대응)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.115-152
    • /
    • 2017
  • This paper is to analyse the changes in the future war patterns and ROK's response. To this end the paper is composed of 5 chapters titled instruction; concept, characteristics, types, and evolution of war; changes in the war patterns of the future; Korea's response strategies for the future war. Truth can be immutable, but everything else changes. War has begun with human history, and today there are still wars in places all over the world. As ages change from agricultural society to industrial society to knowledge and information society, aspects(patterns) of war have also changed. Future warfare includes the 5th dimensional war(in the ground, the sea, the air, the universe, the cyber), the network-centric, the precision strike, the rapid maneuver, the non-gunpowder, the non-lethal, the unmanned robot, the informational & cyber, the asymmetric, the non-linear, and the parallel etc. In response to these changes in the pattern of wars, the ROK military should seek (1)to build a future-oriented military force, (2)to continuously develop military innovation and preparedness, and (3)to develop and establish a paradigm for acquiring the power of technology. A Roman strategist, Vegetius said, "If you wish peace, prepare for war." This is a universally accepted maxim in international society today. We must never forget that peace we desire is given when we have the will and ability to keep.

The Effect of the PAIR Leadership Program on the Behavioral Change Will, Interpersonal efficacy, Self-Regulation for the Military Alternative Social Workers Maladjusted (PAIR 리더십 프로그램이 부적응 사회복무요원들의 행동변화의지, 대인관계 효능감 및 자기관리에 미치는 영향)

  • Lee, Jeong-Hwa;Lee, Jung-Won
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.117-124
    • /
    • 2018
  • The purpose of this study was to evaluate the effects of PAIR leadership program which can make one's own for solving problems of conflicts through understanding of self and the environmental. For this, the PAIR leadership were administered in 10 sessions for 60 minutes with 16 of the adjustment soldiers and 20 of the maladjustment soldiers of the military alternative social workers. The pre-post on the behavioral change will, interpersonal efficacy and the self-regulation level were assessed. The results were as the PAIR he maladjustment soldiers group reported significantly higher score on level of the behavioral change will, interpersonal efficacy and the self-regulation. Also the adjustment soldiers reported significantly on interpersonal efficacy and the self-regulation. This results suggest that the PAIR readership program can be applied effectively for promotion of the behavioral change will, the self-regulation.

The Israel-Iran Conflict: Historical Background and Modern

  • Kim Seung-Hyun
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.309-317
    • /
    • 2024
  • The conflict between Iran and Israel has been a major source of instability and security threats in the Middle East. This study analyzes the historical background and modern aspects of the Israel-Iran conflict, examining its root causes, nuclear issues, proxy wars, cyber warfare, economic sanctions, and the role of the United States. The research employs qualitative methods, including literature review and case analysis, using various sources such as academic papers, government reports, and media articles. The findings suggest that the conflict is deeply rooted in historical, religious, and political factors, and has escalated since the 1979 Iranian Revolution. The study highlights the need for dialogue, negotiation, and international mediation to resolve the conflict and maintain regional stability. The Israel-Iran conflict also provides valuable lessons for addressing the North Korean nuclear issue, emphasizing the importance of dialogue, international cooperation, and confidence-building measures.

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF