• Title/Summary/Keyword: Military security

Search Result 900, Processing Time 0.023 seconds

A Study on Employment of Discharged Military Personnel -Establishment and Management of Private Military Company- (제대군인 취업에 관한 연구 - 민간기업 취업을 중심으로 -)

  • Kim, Ki-Hoon
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.283-311
    • /
    • 2011
  • The Republic of Korea, ranked as the 5th military power according to the size of its ground troops, discharges more than 200,000 manpower to the society annually; more than 13,000 of them are officers. The re-employment rate of discharged military personnels, who experience early retirement of 5 to 15 years compared to general public officers, is very low, only amounting to 53.2%. On the other hand, major developed countries exhibit great national scale of effort to take responsibility in helping the settlement of the soldiers who have dedicated their career for their countries. The re-employment rate amounts to 94%. Fully acknowledging such disparity, this paper examines various policies on discharged members support of developed countries, and aims to suggest developmental model on employment support designed for discharged members in the Republic of Korea.

  • PDF

A Study on Development Direction of ROK Army Logistic System (군(軍) 물류체계(物流體系) 발전방향(發展方向) 제언(提言) - 육군(陸軍)을 중심(中心)으로 -)

  • Cho, Byung-Man
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.659-685
    • /
    • 2016
  • At this research, author discusses about ROK Army military supplies distribution system and suggests a direction of development as follows in order to achieve maximum efficiency. First, Develope a scientific technique to estimate quantity of repair part for futher demanding at the budgetting and procurement planning stage. Second, Introduce an Logistic Revolving Fund in other to reduce the procurement lead time & assure flexible procurement all year round. Third, Reestabilish supply step stages and reduce stock level which is authorized stock amount in logistic support unit. Fourth, Estabilish civilian - military integrated military supplies distribution system to improve the efficiency of logistics.

  • PDF

IPSec based Network Design for the Mobile and Secure Military Communications (이동성과 보안성 만족 군용 통신을 위한 IPSec 기반 네트워크 설계)

  • Jung, Youn-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1342-1349
    • /
    • 2010
  • Full-mesh IPSec tunnels, which constitute a black network, are required so that the dynamically changing PT (Plain Text) networks can be reachable across the black network in military environments. In the secure and mobile black networks, dynamically re-configuring IPSec tunnels and security policy database (SPD) is very difficult to manage. In this paper, for the purpose of solving mobility and security issues in military networks, we suggest the relating main technologies in association with DMIDP (Dynamic Multicast-based IPSec Discovery Protocol) based on existing IPSec ESP (Encapsulating Security Payload) tunnels and IPSec key managements. We investigate the main parameters of the proposed DMIDP techniques and their operational schemes which have effects on mobility and analyze operational effectivemess of the DMIDP with proposed parameters.

Cyber Defense Analysis and Improvement of Military ecosystem with Information Security Industry (국방 사이버 방호체계 구축 생태계 취약점 분석 및 개선방안)

  • Baek, Jaejong;Moon, Byoung-Moo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1263-1269
    • /
    • 2014
  • Since the cyber defense has been dependent on commercial products and protection systems, in aspect of the recent trends, our cyber defence ecosystem can be more vulnerable. In case of general defense weapon companies, they have to be observed by the government such as certain proprietary technologies and products for the protection from the enemy. On the contrary, most cyber weapon companies have not been managed like that. For this reason, cyber attack can reach to the inside of our military through the security hole of commercial products. In this paper, we enhanced a military cyber protection ecosystems out of enemy attacks and analyze the hypothetical scenarios to evaluate and verify the vulnerability, and finally more securable ecosystem of military protection system is presented politically and technically.

Cyber Threat Military Response Strategy Using Information Security Risk Management (정보보안 위험관리를 활용한 사이버 위협 군사 대응 전략)

  • Jincheol Yoo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.173-179
    • /
    • 2023
  • The 4th Industrial Revolution technology has emerged as a solution to build a hyper-connected, super-intelligent network-oriented operational environment, overcoming the obstacles of reducing troops and defense budgets facing the current military. However, the overall risk management, including the increase in complexity of the latest inform ation technology and the verification of the impact with the existing information system, is insufficient, leading to serious threats to system integrity and availability, or negatively affecting interoperability between systems. It can be inhibited. In this paper, we suggest cyber threat response strategies for our military to prepare for cyber threats by examining information security risk management in the United States in order to protect military information assets from cyber threats that may arise due to the advancement of information technology.

A Scheme of Training the MND Information Security Manpower (국방 정보보호 인력 양성 방안)

  • 박상서;최운호
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.69-81
    • /
    • 2001
  • As soon as possible, our military have to trainning the information security manpower for Cyber Warfare, it should be block the foreign infowarrior to go by way of other country from our system. An emergency, we can protect our military information system and this thesis provide checkpoint about how we consider about trainning the infowarrior for future war.

  • PDF

The Effect of Reward and Security Awareness on User Intention of Knowledge Portal Service for ROK Army (보상과 보안의식이 육군지식포탈 사용자 의도에 미치는 영향)

  • Lee, Jong-Gill;Ku, Xyle
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.2
    • /
    • pp.36-48
    • /
    • 2019
  • As the importance of Knowledge Management System (KMS) in the military increases, Republic of Korea Army (ROK Army) developed Army Knowledge Portal. Although the members in the military are encouraged to use the portal, few members currently use it. This study was conducted to find variables to predict the user's intention to use the portal, which contributes to activating the use of Army Knowledge Portal in the army. On the basis of Technology Acceptance Model (TAM), ten variables such as perceived ease of use, general information security awareness, information security awareness, expectation for external rewards, expectation for relationships, sense of self-worth, attitude toward compliance with security policy, attitude toward knowledge sharing, intention of non-combat knowledge sharing, and intention of combat knowledge sharing were considered as independent variables. 105 participants on active duty who currently use or have experience to use the portal participated in this study. The results indicated that general information security awareness and information security awareness increases compliance with the information security policy. In addition, the attitude toward knowledge sharing is enhanced by expectations for relationship and sense of self-worth. Based on the results, the authors propose the need for policy alternatives to reinforce the reward system and security policy, which activates the use of Knowledge Portal Service for ROK Army.

Information Security Model in the Smart Military Environment (스마트 밀리터리 환경의 정보보안 모델에 관한 연구)

  • Jung, Seunghoon;An, Jae-Choon;Kim, Jae-Hong;Hwang, Seong-Weon;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.199-208
    • /
    • 2017
  • IoT, Cloud, Bigdata, Mobile, AI, and 3D print, which are called as the main axis of the 4th Industrial Revolution, can be predicted to be changed when the technology is applied to the military. Especially, when I think about the purpose of battle, I think that IoT, Cloud, Bigdata, Mobile, and AI will play many role. Therefore, in this paper, Smart Military is defined as the future military that incorporates these five technologies, and the architecture is established and the appropriate information security model is studied. For this purpose, we studied the existing literature related to IoT, Cloud, Bigdata, Mobile, and AI and found common elements and presented the architecture accordingly. The proposed architecture is divided into strategic information security and tactical information security in the Smart Military environment. In the case of vulnerability, the information security is divided into strategic information security and tactical information security. If a protection system is established, it is expected that the optimum information protection can be constructed within an effective budget range.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Trends of Joint Operational Environment and their Implications (합동작전환경의 추세와 적용방안)

  • Jo, Gyu-Pil
    • Journal of National Security and Military Science
    • /
    • s.3
    • /
    • pp.73-120
    • /
    • 2005
  • Today's world is generation of Transformation. The Term "Transformation" is widely used in many nations and international organizations such as U.S. and NATO to describe the course of change undertaken by militaries to respond to the new and emerging security environment. Transformation involves all elements of the defense enterprise including Operational Environment, Operational Concepts, Doctrine, Structure and Technologies, within a supportive Cultures context. An Operational Environment is defined as "a composite of conditions, circumstances, and influences that affect the employment of military forces and bear on the decisions of the unit commander." The context for developing future military concept and capability lies essentially within the anticipated boundaries of the operational environment in a collective sense. The joint operational environment is essential to the nation's defense. It describes volatile, complex, and dangerous environment in which the military personnel. organizations, and material will operate. Implications coming forth from joint Operational Environment are but a starting point - many others exist. More and better Implications will come forth as people think about massages of Operational Environment, experiment its characteristics, learn to deal with its threats and scenarios, apply their experience and judgement, and then consider what is required of Korean military doctrine, organizations, training and education, material development, and leadership for operations in the joint Operational Environment.

  • PDF