• Title/Summary/Keyword: Nuclear security

Search Result 397, Processing Time 0.021 seconds

Evaluation and Forecast of North Korea's Nuclear Policy through Libya Model (리비아 모델을 통한 북한의 핵 정책 평가와 전망)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.113-122
    • /
    • 2018
  • The issue of security on the Korean peninsula is facing the greatest upheaval in 2018 with the inter-Korean summit and the US-North Korea summit. North Korea has pursued the parallel policy developing military and economic at the same time. However, North Korea is changing its route to give up nuclear weapons and focus on the economy through summit talks. Since the change in North Korea is similar to that of Libya in the past, it is necessary to analyze why North Korea is trying to abandon its nuclear program and how the process is flowing compared to the case of Libya. The Libya model was constructed and analyzed in terms of international and domestic perpectives and recognition of the situation by leadership. North Korea's nuclear policy was evaluated based on the Libya model. The nuclear development of Libya and North Korea has caused diplomatic and economic pressures from the international community and ultimately led to instability of the regime. Two countries have tried to abandon nuclear program in order to solve the instability of the regime, also gain the economic reward insead. Libya took economic benefits and secured some of the stability of the regime, but the regime collapsed under the wave of democracy due to the influx of foreign capital and ideas. North Korea will seek diplomatic and economic gains with the example of Libya, but will try to limit as much as possible the culture of democracy and the full opening that can be incidental.

  • PDF

A Study on the Formation and Development of Collective Security System and the Possibility of Security System Shift in East Asia (집단안보체제의 형성 및 발전요인과 동아시아 안보체제의 변화 가능성 연구)

  • Oh, Dongkeon
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.1-29
    • /
    • 2023
  • For the last 70 years, the U.S.-led bilateral security system, or "Hub-and-Spokes" system, has been applied to Northeast Asia, and the system has been successfully settled in terms of stability and economic achievements of the region. Given the increasing complexity of the security environment of East Asia, it is plausible to consider the possibility of a security system shift from bilateral alliances to collective security. In order to analyze the driver of collective security system, this study developed three factors of formation and development of collective security system - main threat, intensity of the threat, and confidence among countries in the system - by reviewing international political theories related to security cooperation. Comparing the formation, development, and achievements of NATO and SEATO, the study figures out that the existence of the main threat, the high intensity of the threat, and the strong confidence among countries in the security system are the primary drivers for a successful collective security system. Based on the result, the study also analyzed the possibility of a security system shift in East Asia. Considering contemporary international conflicts such as U.S.-China strategic competition, Russia-Ukraine War, and growing threats posed by North Korean nuclear and missiles, the study anticipates that the necessity of a collective security system that will replace the current security system of the region would arise. Still, although some issues between countries should be overcome, the growing intensity of the threats will promote cooperation among countries by improving their confidence.

  • PDF

A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks

  • Shon, Tae-Shik;Park, Yong-Suk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.597-611
    • /
    • 2009
  • With the advent of ubiquitous computing society, many advanced technologies have enabled wireless sensor networks which consist of small sensor nodes. However, the sensor nodes have limited computing resources such as small size memory, low battery life, short transmission range, and low computational capabilities. Thus, decreasing energy consumption is one of the most significant issues in wireless sensor networks. In addition, numerous applications for wireless sensor networks are recently spreading to various fields (health-care, surveillance, location tracking, unmanned monitoring, nuclear reactor control, crop harvesting control, u-city, building automation etc.). For many of them, supporting security functionalities is an indispensable feature. Especially in case wireless sensor networks should provide a sufficient variety of security functions, sensor nodes are required to have more powerful performance and more energy demanding features. In other words, simultaneously providing security features and saving energy faces a trade-off problem. This paper presents a novel energy-efficient security architecture in an IEEE 802.15.4-based wireless sensor network called the Hybrid Adaptive Security (HAS) framework in order to resolve the trade off issue between security and energy. Moreover, we present a performance analysis based on the experimental results and a real implementation model in order to verify the proposed approach.

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

An Estimation of Quantity of Unused Energy of River Water, Seawater and Treated Sewage as Heat Source and Its Availability in Large Facilities (대규모 시설에서 이용가능한 미활용 에너지의 부존량과 그 이용 가능성에 관한 조사연구-하천수.해수.하수처리수를 중심으로)

  • Heo, Jae-Yeong
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.423-446
    • /
    • 2003
  • While the demand for energy has shown a sharp increase recently, the supply seems to be limited by the fact that the conventional fossil fuel energy or nuclear energy has its own environmental problems such as, for example, global warming or nuclear waste disposal. To overcome such limited supply of energy, the utilization of natural thermal energy such as river water and seawater as well as treated sewage can be a substantial supplement. The potential use of the unused energy has become more and more feasible these days as the heat pump technology has been advanced. In the present study, the unused energy resources are estimated on regional and monthly basis for each resource by the method proposed here in order to establish the fundamental data for its utilization. The potential use of the unused energy is a1so discussed.

  • PDF

Challenges of Republic of Korea Navy : How to Cope with Old and New Threats from North Korea and Others. (북한 및 지역 해양안보 위협 극복과 대한민국 해군발전)

  • Bai, Hyung-Soo
    • Strategy21
    • /
    • s.37
    • /
    • pp.32-64
    • /
    • 2015
  • This paper examines the types and trends of North Korea's military provocations and regional maritime threats against South Korea, and is focusing on the Republic of Korea's naval development and modernizations by the Republic of Korea Navy (ROKN) on future actions, what directions of the ROKN has taken thus far in response, as well as an examination of how the ROKN might respond to vulnerabilities identified throughout modern history. Importantly, this paper does not consider the domestic, bilateral, multilateral, regional and global political dimensions of the situation on the Korean Peninsula; nor does it consider the North Korea's transitional power politics, but including North Korea's nuclear program and submarine-launched ballistic missile developments, as a caveat, this paper is based on open sources in Korean and English language, and thus information concerning provocations is indicative only.

Predictive maintenance architecture development for nuclear infrastructure using machine learning

  • Gohel, Hardik A.;Upadhyay, Himanshu;Lagos, Leonel;Cooper, Kevin;Sanzetenea, Andrew
    • Nuclear Engineering and Technology
    • /
    • v.52 no.7
    • /
    • pp.1436-1442
    • /
    • 2020
  • Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear infrastructure systems are vital to government, businesses, society and citizen's lives. It is crucial to design nuclear infrastructure for scalability, reliability and robustness. To do this, we can use machine learning, which is a state of the art technology used in various fields ranging from voice recognition, Internet of Things (IoT) device management and autonomous vehicles. In this paper, we propose to design and develop a machine learning algorithm to perform predictive maintenance of nuclear infrastructure. Support vector machine and logistic regression algorithms will be used to perform the prediction. These machine learning techniques have been used to explore and compare rare events that could occur in nuclear infrastructure. As per our literature review, support vector machines provide better performance metrics. In this paper, we have performed parameter optimization for both algorithms mentioned. Existing research has been done in conditions with a great volume of data, but this paper presents a novel approach to correlate nuclear infrastructure data samples where the density of probability is very low. This paper also identifies the respective motivations and distinguishes between benefits and drawbacks of the selected machine learning algorithms.

A Study on Models for Strengthening Infrastructure Protection through Analysis of Cyber Intrusions (침해사고 분석을 통한 기반시설 보호 강화 모델 연구)

  • Yoon, Oh Jun;Han, Bok Dong;Park, Jeong Keun;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.29-36
    • /
    • 2015
  • The hacking threats made against the Korea Hydro & Nuclear Power(KNDP) and the leakage of critical information on nuclear power safety raised the public awareness on the importance of protecting and managing national infrastructure necessary for sustaining the state and society. Cyber security activities and relevant institutions in the ROK, however, are still insufficient, because of which there is a possibility that similar incidents would reoccur and cause serious damages. Hence, a grave and direct threat is posed to the national security of the ROK. In this thesis, I would like to give my analysis and assessment on the recent cyber intrusions against infrastructure at home and abroad, measures established in response and their implementation, and the deficiency of the existing infrastructure protection system ; and lastly propose measures to reinforce infrastructure protection of the ROK.

A study on the cyber security assessment modeling of critical infrastructure (핵심기반시설 사이버 보안 평가 모델링 기법 연구)

  • Euom, Ieck-Chae
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.105-113
    • /
    • 2019
  • The purpose of this study is to analyze cyber security risk modeling of critical infrastructure, draw out limitations and improvement measures. This paper analyzed cyber security risk modeling of national critical infrastructure like as electricity sector, nuclear power plant, SCADA. This paper analyzed the 26 precedent research cases of risk modeling in electricity sector, nuclear power plant, SCADA. The latest Critical Infrastructure is digitalized and has a windows operating system. Critical Infrastructure should be operated at all times, it is not possible to patch a vulnerability even though find vulnerability. This paper suggest the advanced cyber security modeling characteristic during the life cycle of the critical infrastructure and can be prevented.

A Study on Bush Administration’s Foreign Policy of North Korea (부시행정부의 대북정책에 관한 소고)

  • Lee, Gang-Eon;Jang, Myeong-Sun
    • Journal of National Security and Military Science
    • /
    • s.3
    • /
    • pp.169-196
    • /
    • 2005
  • The point of Bush administraion’s foreign policy is to support the promotion and stability of Democracy in Iraq and counter terrorism and spread of WMD with his strong propulsive force caused by his reelection. In such an environment, there are his leadership, his team, himself, Kim Jung Il, and a new understanding of North Korea after September 11 as the effective factors of Bush administration’s policy toward Pyongyang. Bush administration’s foreign policy of North Korea also shows the process of North Korea’s nuclear weapon program and the future scenario of the Korean Peninsula with "the persistence of solving North Korea’s nuclear weapon program such as the method having done in Lybia", "the holding unconditional talks with Pyongyang, and "the continual concerns with human rights in North Korea." The purpose of Bush administration’s foreign policy of North Korea is to make North Korea do not support terrorism rather than remove the nuclear weapon in North Korea. The process of outlining South Korea’s policy toward North Korea must be considered for "national interest" with reasonable analyses not just hopes For this, South Korea must access systematically human rights of North Korea, prepare projects for a daring approach on North Korea, and strengthen South Korea’s defense ability toward North Korea with deep alliance with U.S and systematize the mutual understanding channel between U.S and South Korea. In conclusion, South Korea must try to get specific methods and practices about Bush administration’s foreign policy of North Korea with national wisdom

  • PDF