• Title/Summary/Keyword: Security Cooperation

Search Result 886, Processing Time 0.031 seconds

A Study on the Efficient Countermeasures of Military in Accordance with Changing Security Environments (4차 산업혁명에 따른 군사보안 발전방안 연구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.47-59
    • /
    • 2020
  • The Army, which is dreaming of a military leap forward through the fourth industrial revolution, needs to also consider the side effects and adverse functions of the fourth industrial revolution. In particular, this study conducted an analysis of whether it was consistent with the global technological trend of normal 'military security'. This paper focuses on the countermeasures that could result from 4th industrial revolution by utilizing the text-mining technique and social network technique of big data. 1. Active promotion of a convergence program with private, public, militaryand industrial, academic, and solidarity, 2. Information Sharing for International Cooperation and Cooperation in Cyber security, 3. Military Innovation and Military Unsymmetric Cyber security innovation, 4.The Establishment of Military Security Convergence Interface Management System in accordance with the Fourth Industrial Revolution, 5. Cooperation in the transition from technology engineering to social technology, 6. Establishing a military security governance system in the military, 7. Specifying confidential military digital data We look forward to providing useful information so that the results of this study can help develop the military and enhance military confidentiality.

A Study on the Changes of US Policy in International Defense Industry Cooperation and the Fure Korea-US Defense Industry Cooperation (미국의 국제 방산협력 정책 변화와 한미 방산협력 방안 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.35-44
    • /
    • 2014
  • It has been shown that the lack of sufficient defense industry cooperation between Korea and the US. The severe imbalance in defense trade between tow countries and Korea's weak defense industrial base has been a problem. This paper suggests the enhancement of defense industry cooperation with the US as a defense policy. The US policy has been changed to utilize the globalization of defense industries. The following cases were analyzed to show the policy change; The security of supply arrangement with 6 countries, the defense cooperation treaty with the United Kingdom and Australia. the defense Memorandum of Understanding with 23 countries, and the international cooperation with 8 countries for F-35 JSF program. Korea government needs to sign a defense MOU with U.S. and the defense industries are recommended to increase the opportunities of weapon system co-development and co-production. So that the Korea defense industry may improve competitiveness and to overcome the current weaknesses.

Analysis of Security Effectiveness in according to DS-MAC attack (DS-MAC 공격에 따른 보안 영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4606-4611
    • /
    • 2011
  • In this paper, it is reviewed vulnerability of security in DS-MAC communication protocol of sensor network, and analyzed in the respect of security effectiveness, which is consumed at each stage of communication procedure in according to vulnerability of denial of service and modification attack. In this paper, we present about the respect of security effectiveness of transmission and reception in case of operation mode with or without authentication scheme between sensor node.

Development and Design of New BESA Algorithm for Network Security in Multimedia Communication (멀티미디어 통신망의 네트워크 보안을 위한 새로운 BESA 알고리즘 개발 및 설계)

  • Park, Ryoung-Keun;Lee, Seung-Dae;Kim, Sun-Youb
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.5
    • /
    • pp.1069-1075
    • /
    • 2007
  • New BESA cryptographic algorithm is suitable network environment and wire/wireless communication network, on implement easy, security rate preservation, scalable & reconfigurable. Though proposed algorithm strengthens security vulnerability of TCP/IP protocol and keep security about many user as that have authentication function in network environment, there is important purpose. So that new BESA cryptographic algorithm implemented by hardware base cryptosystem and en/decryption is achieved at the same time, composed architecture.

  • PDF

Strategy for South Korea-Vietnamese Military Cooperation in the field of defense (한(韓)·베트남 군사협력 추진전략 : 방산분야를 중심으로)

  • Lee, Kang Kyong
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.105-112
    • /
    • 2018
  • South Korea and Vietnam have been engaged in extensive political, economic and cultural exchanges since the establishment of diplomaticties in 1992. In March 2018, Moon Jae-in, President of South Korea, made an official visit to Vietnam, a key partner of the New Southern Policy and discussed comprehensive cooperation measures, including expanding trade volume and measures to establish peace on the Korean Peninsula. At the defense ministers' meeting held in April 2018, the two countries signed a joint defense and defense cooperation statement, which included promotion of maritime security, defense cooperation, UN PKO activities, excavation of remains, and joint military cooperation. Currently, Vietnam is facing territorial disputes with China over the South China Sea, and is stepping up military modernization and military buildup to counter this. In particular, Vietnam is strengthening its external military cooperation beyond ideology with the U.S., Russia, India and France to strengthen its maritime power. Against this backdrop, the bilateral cooperation between South Korea and Vietnam needs to expand beyond the traditional economic and cultural exchanges to military cooperation. The study aims to review the relationship between South Korea and Vietnam on the 26th anniversary of the normalization of diplomaticties and seek ways to develop military cooperation with Vietnam, which has grown to the next China. To that end, it analyzed Vietnam's security environment and military strategy and presented strategies for promoting military cooperation focusing on defense areas.

  • PDF

Decision on Replacing Components of Security Functions in COTS Based Information Systems in Security Environment Utilizing ARP (AHP 기법을 이용한 보안환경을 고려한 COTS 기반 정보시스템의 보안기능 컴포넌트 대체 수준 의사결정)

  • Choi, Myeong-Gil;Hwang, Won-Joo;Kim, Myoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.579-588
    • /
    • 2009
  • Enterprises and governments currently utilize COTS (Commercial off-the-Shelf) based information systems which are a kind of component based systems. Especially, COTS are widely utilized as components of information security systems and information systems. This paper suggests an appropriate adaptation level and a cost effective priority to replace security functional components in security environment. To make a cost effective decision on adapting security functional components, this paper develops a hierarchical model of information security technologies and analyzes findings through multiple decision-making criteria.

Analysis of Domestic Security Solution Market Trend using Big Data (빅데이터를 활용한 국내 보안솔루션 시장 동향 분석)

  • Park, Sangcheon;Park, Dongsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.492-501
    • /
    • 2019
  • To use the system safely in cyberspace, you need to use a security solution that is appropriate for your situation. In order to strengthen cyber security, it is necessary to accurately understand the flow of security from past to present and to prepare for various future threats. In this study, information security words of security/hacking news of Naver News which is reliable by using text mining were collected and analyzed. First, we checked the number of security news articles for the past seven years and analyzed the trends. Second, after confirming the security/hacking word rankings, we identified major concerns each year. Third, we analyzed the word of each security solution to see which security group is interested. Fourth, after separating the title and the body of the security news, security related words were extracted and analyzed. The fifth confirms trends and trends by detailed security solutions. Lastly, annual revenue and security word frequencies were analyzed. Through this big data news analysis, we will conduct an overall awareness survey on security solutions and analyze many unstructured data to analyze current market trends and provide information that can predict the future.

A Study on the Formation and Development of Collective Security System and the Possibility of Security System Shift in East Asia (집단안보체제의 형성 및 발전요인과 동아시아 안보체제의 변화 가능성 연구)

  • Oh, Dongkeon
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.1-29
    • /
    • 2023
  • For the last 70 years, the U.S.-led bilateral security system, or "Hub-and-Spokes" system, has been applied to Northeast Asia, and the system has been successfully settled in terms of stability and economic achievements of the region. Given the increasing complexity of the security environment of East Asia, it is plausible to consider the possibility of a security system shift from bilateral alliances to collective security. In order to analyze the driver of collective security system, this study developed three factors of formation and development of collective security system - main threat, intensity of the threat, and confidence among countries in the system - by reviewing international political theories related to security cooperation. Comparing the formation, development, and achievements of NATO and SEATO, the study figures out that the existence of the main threat, the high intensity of the threat, and the strong confidence among countries in the security system are the primary drivers for a successful collective security system. Based on the result, the study also analyzed the possibility of a security system shift in East Asia. Considering contemporary international conflicts such as U.S.-China strategic competition, Russia-Ukraine War, and growing threats posed by North Korean nuclear and missiles, the study anticipates that the necessity of a collective security system that will replace the current security system of the region would arise. Still, although some issues between countries should be overcome, the growing intensity of the threats will promote cooperation among countries by improving their confidence.

  • PDF

A Study on Routing Performance Improvement through Cooperation Authentication Technique (협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.71-79
    • /
    • 2016
  • The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.

Northeast Asia in Russia's Pivot to the East (СЕВЕРО-ВОСТОЧНАЯ АЗИЯ В ПОВОРОТЕ РОССИИ НА ВОСТОК)

  • Kanaev, Evgeny
    • Analyses & Alternatives
    • /
    • v.1 no.1
    • /
    • pp.44-64
    • /
    • 2017
  • Russia's push in the Asia-Pacific region stems from its interests that have the national, regional and global dimensions. In their turn, the aims of this policy are civilizational, geopolitical, economic and prospective, with a long-term outlook. In the course of their achievement, cooperation with Northeast Asia's countries will play one of the key roles owing to the factors of geographic proximity, Northeast Asia's economic potential, risk hedging and a growing influence Northeast Asia exerts upon the global development. A new cooperation paradigm between Russia and the states of Northeast Asia should be based upon establishing and cementing self-reproducing ties. This is the central aim of Russian initiatives in relations, with Japan, the Republic of Korea, Democratic People's Republic of Korea, Mongolia and China. However, numerous obstacles ranging from Russia's absence in the regional free trade agreements and supply-production chains of value-added production to the permanent international instability generated by Pyongyang's missile-nuclear developments hamper the practical implementation of this task. Realizing the necessity to give an additional impetus to this new cooperative paradigm, Russia has to develop directions with an apparent consolidating effect. The most promising may be the establishment of a permanent security forum based upon Northeast Asia Peace and Security Mechanism chaired by the Russian Federation. The urgency of this measure and its expected support stem from the necessity to strengthen security in Northeast Asia, a task neither the US-led hub-and-spoke system nor ASE-AN-led multilateral dialogue venues have been able to resolve. The issues addressed at the security forum must include the unification of approaches to North Korean nuclear issue and producing a document specifying actions of the claimants on the disputed maritime territories in the "direct contact" situations. At the expert level, Russia has elaborated on the idea to establish such a forum outlining the spectrum of the key directions of cooperation. With the urgency in the establishment of this dialogue venue, its agenda has to be coordinated with the agendas of the existing security systems presented by the US alliances and the ASE-AN-led multilateral negotiations. The practical implementation of this initiative will strengthen security in Northeast Asia as its challenges will be resolved in the pre-emptive way based on coordinated approaches. Therefore, Russia as the Eurasian state will be one of the role players in the advent of the Asian century.

  • PDF