• Title/Summary/Keyword: Security Initiative

Search Result 88, Processing Time 0.026 seconds

Design and Implementation of Interference-Immune Architecture for Digital Transponder of Military Satellite (군통신위성 디지털 중계기의 간섭 회피 처리 구조 설계 및 구현)

  • Sirl, Young-Wook;Yoo, Jae-Sun;Jeong, Gun-Jin;Lee, Dae-Il;Lim, Cheol-Min
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.7
    • /
    • pp.594-600
    • /
    • 2014
  • In modern warfare, securing communication channel by combatting opponents' electromagnetic attack is a crucial factor to win the war. Military satellite digital transponder is a communication payload of the next generation military satellite that maintains warfare networks operational in the presence of interfering signals by securely relaying signals between ground terminals. The transponder in this paper is classified as a partial processing transponder which performs cost effective secure relaying in satellite communication links. The control functions of transmission security achieve immunity to hostile interferences which may cause malicious effects on the link. In this paper, we present an efficient architecture for implementing the control mechanism. Two major ideas of pipelined processing in per-group control and software processing of blocked band information dramatically reduce the complexity of the hardware. A control code sequence showing its randomness with uniform distribution is exemplified and qualification test results are briefly presented.

Northeast Asia in Russia's Pivot to the East (СЕВЕРО-ВОСТОЧНАЯ АЗИЯ В ПОВОРОТЕ РОССИИ НА ВОСТОК)

  • Kanaev, Evgeny
    • Analyses & Alternatives
    • /
    • v.1 no.1
    • /
    • pp.44-64
    • /
    • 2017
  • Russia's push in the Asia-Pacific region stems from its interests that have the national, regional and global dimensions. In their turn, the aims of this policy are civilizational, geopolitical, economic and prospective, with a long-term outlook. In the course of their achievement, cooperation with Northeast Asia's countries will play one of the key roles owing to the factors of geographic proximity, Northeast Asia's economic potential, risk hedging and a growing influence Northeast Asia exerts upon the global development. A new cooperation paradigm between Russia and the states of Northeast Asia should be based upon establishing and cementing self-reproducing ties. This is the central aim of Russian initiatives in relations, with Japan, the Republic of Korea, Democratic People's Republic of Korea, Mongolia and China. However, numerous obstacles ranging from Russia's absence in the regional free trade agreements and supply-production chains of value-added production to the permanent international instability generated by Pyongyang's missile-nuclear developments hamper the practical implementation of this task. Realizing the necessity to give an additional impetus to this new cooperative paradigm, Russia has to develop directions with an apparent consolidating effect. The most promising may be the establishment of a permanent security forum based upon Northeast Asia Peace and Security Mechanism chaired by the Russian Federation. The urgency of this measure and its expected support stem from the necessity to strengthen security in Northeast Asia, a task neither the US-led hub-and-spoke system nor ASE-AN-led multilateral dialogue venues have been able to resolve. The issues addressed at the security forum must include the unification of approaches to North Korean nuclear issue and producing a document specifying actions of the claimants on the disputed maritime territories in the "direct contact" situations. At the expert level, Russia has elaborated on the idea to establish such a forum outlining the spectrum of the key directions of cooperation. With the urgency in the establishment of this dialogue venue, its agenda has to be coordinated with the agendas of the existing security systems presented by the US alliances and the ASE-AN-led multilateral negotiations. The practical implementation of this initiative will strengthen security in Northeast Asia as its challenges will be resolved in the pre-emptive way based on coordinated approaches. Therefore, Russia as the Eurasian state will be one of the role players in the advent of the Asian century.

  • PDF

Why Should the ROK Navy Maintain the Course toward the Construction of a Mobile Task Fleet? : From the perspectives of Capability, Doctrine, and the Organizational Identity (한국해군 기동함대 전력건설방향의 당위성: 능력, 교리, 조직정체성을 중심으로)

  • Lee, Sang-Yup
    • Strategy21
    • /
    • s.31
    • /
    • pp.85-119
    • /
    • 2013
  • This paper asks whether the Republic of Korea (ROK) Navy should continue to focus on building ocean-going naval ships when it faces the threats of North Korean provocations in littoral areas. My position is that the ROK Navy should keep pursuing ocean-going capabilities. I provide explanations why it should do so from the perspectives of three important dimensions: capability, doctrine, and organizational identity. First, I argue that the distinction between a littoral navy and an ocean-going navy is an unnecessary dichotomy. It may lead to inefficiency in national security. The military posture should be designed in a way that it can address all external threats to national security regardless of whether they are from North Korea or not. Such capability is the one that the ROK Navy has tried to acquire with the 'Blue Water Navy' initiative since the 1990s. Second, also from the perspective of lately developed military doctrines that emphasize jointness and precision strike capability, ocean-going capabilities such as the mobile task fleet program have become a must, not an option, given today's security situations on and around the Korean peninsula. Lastly, I draw attention to the fact that the 'Blue Water Navy (BWN)' initiative meant more than just capability to the ROK navy. The BWN represents the ROK navy's organizational identity that the navy has defined since the 1980s as it emphasized promoting national interest and international standing as part of its organizational essence. Furthermore, the phrase 'blue water navy' took on symbolic meanings to the people that are associated with South Korean-ness including sovereignty, national pride, standing in the world and hopes for the future. Since 1990s, many scholars and experts have made the case for the necessity of improving South Korea's naval capability based on different rationales. They emphasized the protection of Sea Lines of Communication (SLOCs), the economic value of the sea, the potential danger associated with territorial disputes over islands, and increasing naval power of neighboring countries since the end of the Cold War. This paper adds to this debate by trying to explain the matter with different factors including naval doctrines and organizational identity. Particularly, this paper constitutes a unique endeavor in that it incorporating constructivist elements (that is, identity politics) in explaining a national security matter.

  • PDF

A Study on the Necessity of Establishing the National Cyber Security Act through a Comparative Legal Analysis (국내 관련 법과 비교 분석을 통한 국가사이버안보법안의 제정 필요성 연구)

  • Kim, Sung-Hyun;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.9-35
    • /
    • 2018
  • During the recent years, cyber attacks have been increasing both in the private sector and the government. Those include the DDOS cases in 2009, the Blue House cyber attack, bank hackings etc. Cyber threats are becoming increasingly serious. However, there is no basic law related to cyber security at present, and regulations related to cyber security are scattered in various domestic laws. This can lead to confusion in the application of the law and difficult to grasp the regulations related to cyber security. In order to overcome this situation, the bill on the prevention and countermeasures against cyber crisis was initiated in 2006, but it has been abrogated. Since then, it has been repeatedly proposed, but it has been abrogated repeatedly due to the overlapping of existing laws and concerns about infringement of personal information. The most recent initiative was the National Cyber Security Act, which was initiated by the government in January 2017. The act focuses on resolving the absence of a basic law related to cyber security, strengthening its responsiveness in the event of a cyber security crisis, and fostering security strength. Therefore, this study seeks to contribute to the establishment of National Cyber Security legislation as a basic law of cyber security by examining the necessity of National Cyber Security legislation through comparative legal analysis with existing domestic laws related to cyber security and suggesting policy implications.

Strengthening Trend of Coast Guards in Northeast Asia (동북아 해양경찰 증강 동향)

  • Yoon, Sungsoon
    • Strategy21
    • /
    • s.43
    • /
    • pp.175-199
    • /
    • 2018
  • Recent marine territorial disputes in the East China Sea and the South China Sea have come to us as a great threat. China, which has recently established the China Coast Guard and has rapidly developed maritime security forces, is trying to overcome the various conflict countries with its power. Japan is also strengthening intensively its maritime security forces. Since Korea, China, and Japan are geographically neighboring and sharing maritime space in Northeast Asia, there is no conflict between maritime jurisdiction and territorial rights among the countries. The struggle for initiative in the ocean is fierce among the three coastal nations in Northeast Asia. therefore, Korea needs more thorough preparation and response to protect the marine sovereignty. As the superpowers of China and Japan are confronted and the United States is involved in the balance of power in strategic purposes, the East Asian sea area is a place where tension and conflict environment exist. China's illegal fishing boats are constantly invading our waters, and they even threaten the lives of our police officers. The issue of delimiting maritime boundaries between Korea and China has yet to be solved, and is underway in both countries, and there is a possibility that the exploration activities of the continental shelf resources may collide as the agreement on the continental shelf will expire between Korea and Japan. On the other hand, conflicts in the maritime jurisdictions of the three countries in Korea, China and Japan are leading to the enhancement of maritime security forces to secure deterrence rather than military confrontation. In the situation where the unresolved sovereignty and jurisdiction conflicts of Korea, China and Japan continue, and the competition for the strengthening of the maritime powers of China and Japan becomes fierce, there is a urgent need for stabilization and enhancement of the maritime forces in our country. It is necessary to establish a new long-term strategy for enhancing the maritime security force and to carry out it. It is expected that the Korean Coast Guard, which once said that it was a model for the establishment of China's Coast Guard as a powerful force for the enforcement of the maritime law, firmly establishes itself as a key force to protect our oceans with the Navy and keeps our maritime sovereignty firmly.

An Empirical Investigation on the Effect of Logistics Security in Import and Export Risk Management (물류보안이 수출입 리스크관리에 미치는 영향에 관한 실증연구)

  • Yi, Hong-Won;Kim, Jae-Bong
    • Journal of Navigation and Port Research
    • /
    • v.38 no.3
    • /
    • pp.317-325
    • /
    • 2014
  • The government of South Korea has introduced various security measures in the supply chain, such as CSI (including a 24-hour rule) and AEO (Authorized Economic Operator), in compliance with global security trends and the war on terror. However, many participants in the import and export process are still unfamiliar with the purposes and functions of CSI, the 24-hour rule, and AEO. As such, considering these risks as obstacles or as factors that interfere with the import and export process, this study suggests proper management schemes, which can identify, measure and evaluate these risks.

A Study on Privacy Protection in Financial Mydata Policy through Comparison of the EU's PSD2 (유럽 PSD2 시행에 따른 금융분야 마이데이터 정책의 개인정보보호 강화 방안 연구)

  • Song, Mi-Jung;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1205-1219
    • /
    • 2019
  • As the ability to use data becomes competitive power in the data-driven economy, the effort to create economic value by using personal data is emphasized as much as to protect personal data. EU's PSD2(the second Payment Service directive) became the initiative of the Open Banking trends all over the world, as it is the Mydata policy which protects the data subject's right by empowering the subject to control over the personal data with the right to data portability and promotes personal data usages and transfer. Korean government is now fast adopting EU's PSD2 in financial sector, but there is growing concerns in personal data abuse and misuse, and data breach. This study analyzes domestic financial Mydata policy in comparison with EU's PSD2 and focus on Personal information life-cycle risks of financial Mydata policy. Some suggestions on how to promote personal information and privacy in domestic financial Mydata Policy will be given.

The Nuclear Security Summit Achievements, Limitations, and Tasks against Nuclear Terrorism Threat (핵테러리즘 위협에 대한 핵안보정상회의 성과, 한계 및 과제)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.73-81
    • /
    • 2017
  • In April 2009, in the wake of President Obama's Prague speech, the international community held four nuclear sec urity summits from 2010 to 2016 to promote nuclear security and prevent nuclear terrorism. The Nuclear Security S ummit has made significant progress in preventing terrorists from attempting to acquire nuclear weapons or fissile materials, but it still has limitations and problems. To solve this problem, the international community should resume the joint efforts for strengthening bilateral cooperation and multilateral nuclear security regime, and the participating countries should strive to protect their own nuclear materials and fulfill their commitments to secure nuclear facilitie s. Second, the United Nations(UN), the IAEA(International Atomic Energy Agency), International Criminal Police Or ganization(INTERPOL), the Global Initiative to Combat Nuclear Terrorism(GICNT), and the Global Partnership(G P) must continue their missions to promote nuclear security in accordance with the five action plans adopted at the Fourth Nuclear Security Summit. Third, the participating countries should begin discussions on the management and protection of military nuclear materials that could not be covered by the Nuclear Security Summit. Fourth, the intern ational community must strive to strengthen the implementation of the Convention on the Physical Protection of Nuc lear Material(CPPNM) Amendment and International Convention for the Suppression of Acts of Nuclear Terrori sm(ICSANT), prepare for cyber attacks against nuclear facilities, and prevent theft, illegal trading and sabotage invo lving nuclear materials.

Theoretical Approach to the Family Business Management (가족기업(Family Business) 경영에 관한 이론적 논의)

  • 문숙재
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.6
    • /
    • pp.317-334
    • /
    • 1997
  • The purpose of this Study is to theoretically discuss the Family Business. Family Business means a business that is owned and managed by one or more family members. Family Businesses are seen as an avenue to achieve economic security, as motivations for a productive society, and as a method for individuals to receive a monetary return for their talents and initiative. The presence of family business as a predominant business structure in the all of country's economy and their association economic contributions have been documented elsewhere. The overall objectives of this study are to introduce in the Home economics and Home Management field what the Family Business is, concretely to identify the definition of Family Business and related concepts-Home Based Business & Home Based work-, to study the interface of family and business functions within a single family. This study is to examine a clear understanding of the relationship between family functioning and business viability in families who own and operate businesses. Such understanding will be helpful in enhancing the stability and security of families who own and operate business and in developing policies and programs that foster Family Business and assist in their contributions to community and economic development. Also to understand the family and business environments and their interaction can enhance the opportunities and satisfactions for family members who are involved in business together. Results from this study will allow researchers a unique view of the Family business management and will contribute to individual and group well-being in both family and work settings.

  • PDF

The content based standard data search technology under CALS integrated data environment (국방 CALS 통합 데이터 환경을 위한 내용 기반의 표준 데이터 검색 기술 개발)

  • Jeong, Seung-Uk;U, Hun-Sik
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.261-283
    • /
    • 2004
  • To build up the military strength based on information oriented armed forces, the Korean ministry of national defense (MND) promotes the defense CALS (Continuous Acquisition and Life cycle Support) initiative for the reductions of acquisition times, improvements of system qualities, and reductions of costs. These defense CALS activities are the major component of the underlying mid and long term defense digitization program and the ultimate goal of program is to bring a quick victory by providing real-time battlefield intelligence and the economical operations of the military. The concept of defense CALS is to automate the acquisition and disposition of defense systems throughout their life cycle. For implementing defense CALS, the technology for exchange and sharing CALS standard data that is created once and used many times should be considered. In order to develop an efficient CALS information exchange and sharing system, it is required to integrate distributed and heterogeneous data sources and provide systematic search tools for those data. In this study, we developed a content based search engine technology which is essential for the construction of integrated data environments. The developed technology provides the environment of sharing the CALS standard data such as SGML(Standard Generalized Markup Language) and STEP(Standard for The Exchange of Product model data). Utilizing this technology, users can find and access distributed and heterogeneous data sources without knowing its actual location.

  • PDF