• Title/Summary/Keyword: Security Strategy

Search Result 937, Processing Time 0.032 seconds

ROK's maritime security strategic concept and cooperation direction for the ROK Navy and Coast Guard (한국의 해양안보전략개념과 해군·해경 간 협력의 발전방향)

  • Chung, Samman
    • Strategy21
    • /
    • s.42
    • /
    • pp.258-292
    • /
    • 2017
  • This paper is designed to make a national strategic concept for the ROK's maritime security and to explore cooperation directions for the ROK Navy and Coast Guard in order to implement the newly-made maritime security strategic concept. As strategy is composed of three main categories(goals, ways, means), the goal of the ROK's maritime security strategy is 'Safe and Affluent Sea' and the way to realize the goal is the principle of cooperative leverage, and the means as tasks to implement the strategic concept are maritime safety, maritime security, and maritime stewardship. The concept of national fleet as used in the US is applied to promoting the cooperation between the ROK Navy and Coast Guard. Thus, under the newly-established maritime security strategic concept along with the national fleet model, followings are suggested as policy proposals for facilitating mutual cooperation between the ROK Navy and Coast Guard in dealing with not only traditional threats but also non-traditional treats at sea and from the sea as well. First, the ROK Navy and Coast Guard has been making efforts to enhance interoperability between the two sea services. However, the mutual cooperations have been focused mainly on areas on operational level rather than policy level. Therefore, the two sea services are recommended to enlarge exchanges and cooperation in policy areas. Second, there are still demands for further cooperation areas between the two sea services in command and communications. The interoperability in C2 between the two needs to be upgraded even to the areas of anti-terrorist activities ar sea, ASUW, ASW, maritime interdiction, etc. Third, mutual comparability between the two needs to be reflected in the maritime forces development to ensure the comparability in UNREP and other logistics areas. Fourth, the standardization of logistical materials and equipments is needed as a way of sustaining operational capability and logistical capacity for the ROK Navy and Coast Guard as well. Fifth, the ROK Navy and Coast Guard are recommended to participate more actively in international maritime cooperation activities such as PASSEX. Sixth, Complementary laws and regulations need further to be revised and to be newly made for collectively managing swiftly maritime accidents and natural disasters at sea.

Revitalization Strategy of Information Security Industry Using Cognitive Map Analysis (인지지도분석을 통한 정보보호 산업 활성화전략)

  • Lee, Jung Mann;Cho, Ilgu;Rim, Myung Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.177-194
    • /
    • 2016
  • This study analyzed President Park's speeches and the government's industry policy in the field of information security using cognitive map. The relationship analysis between policy tool variables and policy goal variables was employed to derive revitalization strategy of information security. This paper found that entrepreneurship revitalization has very strong causality with expansion of domestic market and global market. But, on the other hand, HR development has very weak causality with job creation and future growth driver because the labor market in the information security industry is poor and its transfer rate to other industry is very high. This study showed that this cognitive map could be characterized by a scarcity of feedback loops and a strong emphasis on the positive loops in the structure of virtuous circle. In this paper, we also constructed a comprehensive cognitive map on the policy vision of information security, showing that there are a risk of cyber threat, an opportunity of new fusion security market, information security reinforcing circle, global economic circle, and domestic market circle.

International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations

  • Grygorov, Oleksandr;Basysta, Albina;Yedeliev, Roman;Paziuk, Andrii;Tropin, Zakhar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.332-338
    • /
    • 2021
  • Civil aviation cybersecurity challenges are global in nature and must be addressed using global best practices and the combined efforts of all stakeholders. This requires the development of comprehensive international strategies and detailed plans for their implementation, with appropriate resources. It is important to build such strategies on a common methodology that can be applied to civil aviation and other interrelated critical infrastructure sectors. The goal of the study was to determine the methodological basis for developing an international civil aviation cybersecurity strategy, taking into account existing experience in strategic planning at the level of international specialized organizations. The research was conducted using general scientific and theoretical research methods: observation, description, formalization, analysis, synthesis, generalization, explanation As a result of the study, it was established the specifics of the approach to formulating strategic goals in civil aviation cybersecurity programs in the documents of intergovernmental and international non-governmental organizations in the aviation sphere, generally based on a comprehensive vision of cybersecurity management. A comparative analysis of strategic priorities, objectives, and planned activities for their implementation revealed common characteristics based on a single methodological sense of cybersecurity as a symbiosis of five components: human capacity, processes, technologies, communications, and its regulatory support. It was found that additional branching and detailing of priority areas in the strategic documents of international civil aviation organizations (by the example of Cybersecurity Strategy and Cybersecurity Action Plan) does not always contribute to compliance with a unified methodological framework. It is argued that to develop an international civil aviation cybersecurity strategy, it is advisable to use the methodological basis of the Cyber Security Index.

A Study on Israel's Strategic Culture in the Middle East War Korea's Security Strategy Implications (중동전쟁의 이스라엘 전략문화 고찰과 한국의 안보전략적 함의)

  • Lee Jeong Han;Bae Il Soo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.121-126
    • /
    • 2024
  • Israel craves peace and freedom. Israel has won many wars and conflicts militarily. They have developed strategic thinking based on the data, unique culture, and peacetime preparation system accumulated so far, and the strategic culture based on it contributes to fostering elite strong forces by presenting directions to security strategies.The strategic culture formed by Israeli beliefs, behavioral patterns, and identity influenced strategic thinking and the usefulness of security strategies. The purpose of this study is to redefine the concept of strategic culture by referring to the methodological discussion of strategic culture theory and to examine how useful strategic culture has provided strategic thinking and security strategies. In addition, based on the impact of Israel's strategic culture on security strategy, I would like to present implications for Korea's security strategy.

A Study on Smart Grid and Cyber Security Strategy (지능형 전력망 도입과 사이버보안 전략)

  • Lee, Sang-Keun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.95-108
    • /
    • 2011
  • Smart Grids are intelligent next generating Electric Power System (EPS) that provide environment-friendliness, high-efficiency, and high-trustworthiness by integrating information and communication technology with electric power technology. Smart grids help to supply power more efficiently and safely than past systems by bilaterally exchanging information between the user and power producer. In addition, it alleviates environmental problems by using renewable energy resources. However, smart grids have many cyber security risks because of the bilateral service, the increase of small and medium-sized energy resources, and the installation of multi-sensors or control devices. These cyber risks can cause critical problems within a national grid through even small errors. Therefore, in order to reduce these risks, it is necessary to establish a cyber security strategy and apply it from the developmental stage to the implementation stage. This thesis analyzes and recommends security strategy in order to resolve the security risks. By applying cyber security strategy to a smart grid, it will provide a stepping-stone to creating a safe and dependable smart grid.

A Study on the Asia-Pacific Security Strategy of the U.S. Navy (미 해군의 아시아 태평양 해양안보 전략에 대한 연구)

  • Jeon, Eun-seon;Go, Kyung-min;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.445-447
    • /
    • 2015
  • The situation in Northeast Asia is rapidly changed because of the territorial dispute between neighboring countries near the East China Sea, North Korean nuclear bomb tests, long-range ballistic missile launching tests frequently and deployment of Chinese Liaoning class aircraft carrier. Especially, unstable political situation of North Korea and Chinese A2/AD strategy by strengthening naval forces are the cause of replanning Asia-Pacific security strategy of Unites States. In this paper, it is surveyed and analyzed that changed Asia-Pacific security strategy of U.S. and rearrangement plan of U.S. Naval forces. And changed environmental situation influence on our security is analyzed.

  • PDF

Developing Pairs Trading Rules for Arbitrage Investment Strategy based on the Price Ratios of Stock Index Futures (주가지수 선물의 가격 비율에 기반한 차익거래 투자전략을 위한 페어트레이딩 규칙 개발)

  • Kim, Young-Min;Kim, Jungsu;Lee, Suk-Jun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.37 no.4
    • /
    • pp.202-211
    • /
    • 2014
  • Pairs trading is a type of arbitrage investment strategy that buys an underpriced security and simultaneously sells an overpriced security. Since the 1980s, investors have recognized pairs trading as a promising arbitrage strategy that pursues absolute returns rather than relative profits. Thus, individual and institutional traders, as well as hedge fund traders in the financial markets, have an interest in developing a pairs trading strategy. This study proposes pairs trading rules (PTRs) created from a price ratio between securities (i.e., stock index futures) using rough set analysis. The price ratio involves calculating the closing price of one security and dividing it by the closing price of another security and generating Buy or Sell signals according to whether the ratio is increasing or decreasing. In this empirical study, we generate PTRs through rough set analysis applied to various technical indicators derived from the price ratio between KOSPI 200 and S&P 500 index futures. The proposed trading rules for pairs trading indicate high profits in the futures market.

China's Maritime Strategy (중국의 해양전략)

  • Lee, Won-Bong
    • The Journal of Information Technology
    • /
    • v.12 no.1
    • /
    • pp.35-56
    • /
    • 2009
  • After Chinese reforms and market opening, China actively started working on ways to attach importance to the ocean and it's maritime strategy has been developed and carried out by external and internal factors. We can take two things as external factors attributed to China's marine strategy. The first one is maritime environment change in the East Asian region and the second one is the strategic importance of Taiwanese Straits and the South China Sea. And we can take about national strategy, security strategy, and change of foreign policy as internal factors. China recognizes the ocean as a major step to achieve a goal of national development. The main goal of China's marine strategy in the 21st century is to secure marine transportation and marine resources and to make peaceful maritime environment in the ocean to keep up with their economic development by opening itself to the world. China has strengthened their defense abilities to act against threat of national security by modernizing sea forces and increased national power by building up the marine power. It is expected that China will continue to seek more aggressive maritime strategy on matters of national security as well as pour heir efforts into making economic development and obtaining energy resources. This will also be one factor making new dynamics between countries in and around the East Asian region.

  • PDF

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

A Study of The ROK's Defense Exporting Strategies (한국의 방산수출 전략 연구)

  • Lee, Pil-Jung
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.141-190
    • /
    • 2011
  • Defense industry as 'a new dynamics of economic growth' policy implies driving policy of defense products' export. The purpose of this study is to suggest suitable strategies to meet with such policy in terms of region and individual nation. The strategies towards advanced region are joint sale strategy for the third countries, extension strategy of trade-off and development strategy of products to exploit niche markets. The strategies towards non-advanced regions are package strategy including exchange of economic development know-how, strengthening strategy of relationships to leading groups in national decision-making processes, exploit strategy of sales market through transfer discard and surplus equipments to other nations, government to government sale strategy towards countries holding low leveled equipment maintaining and management abilities. Finally, successive strategies require leaders' will, active sales diplomacy and active international cooperations of defense industry.

  • PDF