• Title/Summary/Keyword: Military Organization

Search Result 279, Processing Time 0.026 seconds

Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation (우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점)

  • Cho, Sang Keun;Zhytko, Andrii;Park, Sung Jun;Kwon, Bum June;Seo, Kanh ll;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.435-439
    • /
    • 2022
  • ROK has a lot to benchmark from how Ukraine is fighting Russia back with its tactical wins. They have taken a targeted strategy to strike Russia's top generals with high precision. To carry out this strategy, Ukraine is operating a Special Operations Force, which utilizes US/NATO forces, civilian and own resources for maximum impact. Of note, they utilize Starlink for seamless connection from detection, decision-making to strike to maximize operational efficiency. As ROK faces security threat of weapons of mass destruction, Ukraine's military intelligence organization set-up, weapons system and operations can provide some guidance on how to leverage its various SOF as well.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

A Study on Validity of the Transformational Leadership for the Crews of mine Sweeper (해군 소해함정 승조원의 변환적 리더십 유효성에 관한 연구)

  • Ham, Won-Yong
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.2
    • /
    • pp.125-141
    • /
    • 2010
  • This research is to review various theories on leadership and to apply the transformational leadership that is suitable for military organization to captains of small naval vessels. The research comprehends types and adaptability of the leadership of captains, analyzes problems of them, and suggests the more desirable ways to develop leadership. In order to achieve these objects of the research, positive analyses were conducted through research on various documentations and survey. The first procedure was to survey the status of leadership on mine sweeper prior to the education on transformational leadership. The second procedure is to survey the result of the education on transformational leadership. Also, in order to understand the difference among the controlling groups, random vessels were selected for surveying the effectiveness of the application of transformational leadership on the same period of time.

A Study on Critical Success Factors in Implementing Military Hospital Information Systems (군 병원정보시스템 구현의 중요성공요인 분석 연구)

  • Kim, Jun-Woo;Kim, Seoung-Ki;Jeon, Dong-Jin
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.81-113
    • /
    • 2005
  • IT has affected the hospital management via information systems and multimedia systems such as hospital information systems(HIS) and Order Communication System(OCS). A large number of researches have been done on the topic of success factors of information systems implementation, but a few on the topics of hospital information systems. Thus in this study, the success factors of the military hospital information systems implementation was analysed. To this end, a number of previous researches were reviewed and about 71 items of success factors were deduced. For doing empirical analysis, a questionnaire with 71 items was prepared and sent to proper organizations. The statistical analysis such as factor analysis was applied to about 400 of them returned. The six success factors and 20 sub success factors were resulted from factor analysis. The six success factors include systems management factor, technology and organization factor, the efficiency of IT department factor, technology application factor, outsourcing factor and environment factors. This study finds the outsourcing and environment factors are very important factors as much as other success factors which previously were mentioned.

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

A Study on the Design of Metadata Elements for Management of Oral History Archives about Sexual Slavery by Japan's Military (일본군 '위안부' 구술기록의 관리를 위한 메타데이터 요소 선정에 관한 연구)

  • Bong, Ji Hyeon;Nam, Young Joon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.1
    • /
    • pp.225-250
    • /
    • 2019
  • The oral record related to the sexual slavery by Japan's military is considered important evidence as it can grasp the damage situation and actual condition at that time. Therefore, systematic and integrated management of the organization's oral records is necessary. For this purpose, this study proposed metadata elements for the management of oral records. The metadata proposed in this study consists of 16 upper elements and subelements, respectively. The suggested upper elements consist of 6 "essential elements" and 10 "optional elements." The essential elements are "title," "date," "format," "creator," "content," and "rights."

A Study on the Improvement of the Records Management Reference Table in the MND USFK Base Relocation Office (주한미군기지 이전사업단의 기록관리기준표 개선방안)

  • Kim, Yong-Chan
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.1
    • /
    • pp.95-115
    • /
    • 2019
  • The relocation project of the US military base in South Korea is a large-scale national project aimed at ensuring a stable presence of US troops stationed in South Korea and strengthening the future-oriented Korea-US Alliance by relocating the US military base scattered across the country to Pyeongtaek. The purpose of this study is to examine the classification of records produced by various agencies involved in the relocation project, including the MND USFK Base Relocation Office that is the main body of the project, and provide basic data for systematic records management in the future. This study aims to ensure the people's right to know and achieve the objective of the transmission of the military documentary heritage at a macro level.

Application Of Probability Filter For Maintenance Of Air Objects

  • Piskunov, Stanislav;Iasechko, Maksym;Yukhno, leksandr;Polstiana, Nadiia;Gnusov, Yurii;Bashynskyi, Kyrylo;Kozyr, Anton
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.31-34
    • /
    • 2021
  • The article considers the possibilities of increasing the accuracy of estimates of the parameters of the trajectory of the target with the provision of a given probability of stable support of the air object, in particular, during its maneuver. The aim of the work is to develop a filtration algorithm that provides a given probability of stable tracking of the air object by determining the regular components of filtration errors, in particular, when maneuvering the air object, and their compensation with appropriate correction of filter parameters and estimates of air object trajectory parameters.

Anti-Jamming and Time Delay Performance Analysis of Future SATURN Upgraded Military Aerial Communication Tactical Systems

  • Yang, Taeho;Lee, Kwangyull;Han, Chulhee;An, Kyeongsoo;Jang, Indong;Ahn, Seungbeom
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3029-3042
    • /
    • 2022
  • For over half a century, the United States (US) and its coalition military aircrafts have been using Ultra High Frequency (UHF) band analog modulation (AM) radios in ground-to-air communication and short-range air-to-air communications. Evolving from this, since 2007, the US military and the North Atlantic Treaty Organization (NATO) adopted HAVE QUICK to be used by almost all aircrafts, because it had been revealed that intercepting and jamming of former aircraft communication signals was possible, which placed a serious threat to defense systems. The second-generation Anti-jam Tactical UHF Radio for NATO (SATURN) was developed to replace HAVE QUICK systems by 2023. The NATO Standardization Agreement (STANAG) 4372 is a classified document that defines the SATURN technical and operational specifications. In preparation of this future upgrade to SATURN systems, in this paper, the SATURN technical and operational specifications are reviewed, and the network synchronization, frequency hopping, and communication setup parameters that are controlled by the Network (NET) Time, Time Of Day (TOD), Word Of Day (WOD), and Multiple Word of Day (MWOD) are described in addition to SATURN Edition 3 (ED3) and future Edition 4 (ED4) basic features. In addition, an anti-jamming performance analysis (in reference to partial band jamming and pulse jamming) and the time delay queueing model analysis are conducted based on a SATURN transmitter and receiver assumed model.

A study on the AC and PMI model for the Defense computer network

  • Yoon, H.S.;Kim, S.C.;Song, J.S.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.977-980
    • /
    • 2001
  • This paper is a study on the AC and PMI model for the defense computer network. It is suggested that the organization plan of PMI model is a proper model for the characteristics of military system and military defense network security demands based on defense PKI system. Futhermore, it will be presented both various types of defense AC and AC according to the role and clearance in PMI. Defense AC will provide strong users' authentication and Role Based Access Control to give more secured and trusted authentication service by using users' attribute such as role and clearance.

  • PDF