• Title/Summary/Keyword: Security Tactics

Search Result 53, Processing Time 0.024 seconds

Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period (사이버 무기체계 핵심기술 실현시기의 영향 요인 분석)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.281-292
    • /
    • 2017
  • It is demanded to promote research and development of cyber weapons system and core technology in response to the ongoing cyber attack of North Korea. In this paper, core technologies of the future cyber weapon system are developed and the factors affecting the realization timing of core technologies were analyzed. 9 core technology groups and 36 core technologies are derived. Afterwards, these core technology groups are compared to the operation phase of the joint cyber warfare guideline and the cyber kill chain of Lockheed Martin. As a result of the comparison, it is confirmed that the core technology groups cover all phases of the aforementioned tactics. The results of regression analyses performed on the degree of influence by each factor regarding the moment of core technology realization show that the moment of core technology realization approaches more quickly as factors such as technology level of the most advanced country, technology level of South Korea, technology transfer possibility from the military sector to the non-military sector(spin-off factor), and technology transfer possibility from the non-military sector to the military sector(spin-on factor) increase. On the contrary, the moment of core technology realization is delayed as the degree at which the advanced countries keep their core technologies from transferring decrease. The results also confirm that the moment of core technology realization is not significantly correlated to the economic ripple effect factor. This study is meaningful in that it extract core technologies of cyber weapon system in accordance with revision of force development directive and join cyber warfare guideline, which incorporated cyber weapon system into formal weapon system. Furthermore, the study is significant because it indicates the influential factor of the moment of core technology realization.

PRC Maritime Operational Capability and the Task for the ROK Military (중국군의 해양작전능력과 한국군의 과제)

  • Kim, Min-Seok
    • Strategy21
    • /
    • s.33
    • /
    • pp.65-112
    • /
    • 2014
  • Recent trends show that the PRC has stepped aside its "army-centered approach" and placed greater emphasis on its Navy and Air Force for a wider range of operations, thereby reducing its ground force and harnessing its economic power and military technology into naval development. A quantitative growth of the PLA Navy itself is no surprise as this is not a recent phenomenon. Now is the time to pay closer attention to the level of PRC naval force's performance and the extent of its warfighting capacity in the maritime domain. It is also worth asking what China can do with its widening naval power foundation. In short, it is time to delve into several possible scenarios I which the PRC poses a real threat. With this in mind, in Section Two the paper seeks to observe the construction progress of PRC's naval power and its future prospects up to the year 2020, and categorize time frame according to its major force improvement trends. By analyzing qualitative improvements made over time, such as the scale of investment and the number of ships compared to increase in displacement (tonnage), this paper attempts to identify salient features in the construction of naval power. Chapter Three sets out performance evaluation on each type of PRC naval ships as well as capabilities of the Navy, Air Force, the Second Artillery (i.e., strategic missile forces) and satellites that could support maritime warfare. Finall, the concluding chapter estimates the PRC's maritime warfighting capability as anticipated in respective conflict scenarios, and considers its impact on the Korean Peninsula and proposes the directions ROK should steer in response. First of all, since the 1980s the PRC navy has undergone transitions as the focus of its military strategic outlook shifted from ground warfare to maritime warfare, and within 30 years of its effort to construct naval power while greatly reducing the size of its ground forces, the PRC has succeeded in building its naval power next to the U.S.'s in the world in terms of number, with acquisition of an aircraft carrier, Chinese-version of the Aegis, submarines and so on. The PRC also enjoys great potentials to qualitatively develop its forces such as indigenous aircraft carriers, next-generation strategic submarines, next-generation destroyers and so forth, which is possible because the PRC has accumulated its independent production capabilities in the process of its 30-year-long efforts. Secondly, one could argue that ROK still has its chances of coping with the PRC in naval power since, despite its continuous efforts, many estimate that the PRC naval force is roughly ten or more years behind that of superpowers such as the U.S., on areas including radar detection capability, EW capability, C4I and data-link systems, doctrines on force employment as well as tactics, and such gap cannot be easily overcome. The most probable scenarios involving the PRC in sea areas surrounding the Korean Peninsula are: first, upon the outbreak of war in the peninsula, the PRC may pursue military intervention through sea, thereby undermining efforts of the ROK-U.S. combined operations; second, ROK-PRC or PRC-Japan conflicts over maritime jurisdiction or ownership over the Senkaku/Diaoyu islands could inflict damage to ROK territorial sovereignty or economic gains. The PRC would likely attempt to resolve the conflict employing blitzkrieg tactics before U.S. forces arrive on the scene, while at the same time delaying and denying access of the incoming U.S. forces. If this proves unattainable, the PRC could take a course of action adopting "long-term attrition warfare," thus weakening its enemy's sustainability. All in all, thiss paper makes three proposals on how the ROK should respond. First, modern warfare as well as the emergent future warfare demonstrates that the center stage of battle is no longer the domestic territory, but rather further away into the sea and space. In this respect, the ROKN should take advantage of the distinct feature of battle space on the peninsula, which is surrounded by the seas, and obtain capabilities to intercept more than 50 percent of the enemy's ballistic missiles, including those of North Korea. In tandem with this capacity, employment of a large scale of UAV/F Carrier for Kill Chain operations should enhance effectiveness. This is because conditions are more favorable to defend from sea, on matters concerning accuracy rates against enemy targets, minimized threat of friendly damage, and cost effectiveness. Second, to maintain readiness for a North Korean crisis where timely deployment of US forces is not possible, the ROKN ought to obtain capabilities to hold the enemy attack at bay while deterring PRC naval intervention. It is also argued that ROKN should strengthen its power so as to protect national interests in the seas surrounding the peninsula without support from the USN, should ROK-PRC or ROK-Japan conflict arise concerning maritime jurisprudence. Third, the ROK should fortify infrastructures for independent construction of naval power and expand its R&D efforts, and for this purpose, the ROK should make the most of the advantages stemming from the ROK-U.S. alliance inducing active support from the United States. The rationale behind this argument is that while it is strategically effective to rely on alliance or jump on the bandwagon, the ultimate goal is always to acquire an independent response capability as much as possible.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

A Study on the Deployment of a Sea Based Sensor Platform for the Detection of a SLBM (잠수함 발사 탄도미사일 탐지를 위한 해상 센서플랫폼의 배치에 관한 연구)

  • Kim, Jiwon;Kwon, Yong Soo;Kim, Namgi;Kim, Dong Min;Park, Young Han
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.363-369
    • /
    • 2015
  • This paper describes deployment of a sea based sensor platform for the detection of a submarine launched ballistic missile (SLBM). Recently, North Korea successfully conducted the underwater launching test of the SLBM, which will seriously threaten the global security. To defend these threats successfully, a sensor platform of the ballistic missile defense (BMD) should be deployed in the area of high detection probability of the missile. The maximum detection range characteristics of the typical radar sensor system, however, depend on the radar cross section (RCS) and flight trajectories of the target. In this point of view, this work analyzed the flight trajectories based on the tactics and calculated the RCS of the SLBM. In addition, sea based sensor platform position is proposed from the analysis of the detection time.

A Study on China's Sea Gray Zone Strategy and Korean Navy's Countermeasures: Focusing on the response to the development of the maritime-based Three Wars (중국의 해양 회색지대 전략과 우리해군 대응책 연구: 해양 기반 삼전(三戰) 전개에 대한 대응을 중심으로)

  • Kim, Nam-su
    • Maritime Security
    • /
    • v.8 no.1
    • /
    • pp.1-39
    • /
    • 2024
  • This study started with the awareness that domestic studies on China's maritime gray zone strategy have been following the analysis results of previous studies, and that only principled positions and directions for countermeasures remain at the 'declarative and conceptual' level. In order to overcome the above problems, the author analyzed the maritime gray zone strategy being developed in the South China Sea, East China Sea, and the West Sea and Ieodo areas, recognizing that China is developing a maritime gray area strategy based on the 'three warfare' that constitutes its own strategic culture. As a result of the analysis, it is predicted that China's maritime gray zone strategy will be more aggressive in order to occupy the West Sea and Ieodo in the future. As a concept of our naval response strategy, The author proposed to 'neutralize' the development effect of 'three warfare', the basis of China's maritime gray zone strategy, to stop the gradual change in the phenomenon induced by China, and to continuously pursue 'return' to a maritime order based on norms and rules. In this study, a 'concrete and systemized' countermeasure to implement this was presented.

  • PDF

A Study on Community Counter-terrorism (지역사회 대테러활동에 관한 연구)

  • Jung, Woo-Il
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.187-205
    • /
    • 2009
  • In this study, Horgan(2005)'s argument highlights the centrality to any successful counter-terrorism strategy of understanding the social context in which terrorist ideologies take root. Counter-terrorism refers to the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt in response to terrorist threats and/or acts, both real and imputed. Pickering et al.(2008) historically explained four counter-terrorism strategies as traditional counter-terrorism model, community intelligence model, belonging model, social cohesion model. It is thus proposed that counter-terrorism strategies are based in established networks within the community and proactively seeks to continually renew these relationships between the community and police. This approach must embrace an explicit recognition of multiculturalism and its political imperative and drive in a policing organization explicitly committed to social cohesion and human rights in both discourse and practice. We, therefore, suggests community tree counter-terrorism approaches, or community intelligence model, belonging model and social cohesion model to apply to counter-terrorism agencies in Korea. These models are on the basis of Pickering et al.'s counter-terrorism models, which by using community policing to boot socially cohesion police are better able to position themselves as mediators to negotiate settlements between the competing demands of different social groups.

  • PDF

A Reanalysis and Evaluation of the Chuncheon District Battle In the Early Part of the Korean War (6·25전쟁 초기 춘천지구 전투의 재분석과 평가)

  • LEE, SUNG CHOON
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.127-139
    • /
    • 2015
  • The purpose of this research is to reevaluate the success factors and significance of the battle through the analysis of the only successful Chuncheon district battle during the defense combat in the early part of the Korean War on June 25, 1950. The research results are the matters that are analyzed from the viewpoint of the armed forces of the Republic of Korea, focusing intensively on the successful aspect of the early defense combat against North Korean army's surprise invasion of the South and on the battle that thwarted the North Korean army's intensive surprise attack intention. This research attempts to reanalyze the Chuncheon District Battle in connection with the Kim Il-sung's strategic course of action in consideration of the operation plan of North Korean invasion of the South. In other words, it is to reanalyze the enemy tactics in connection with North Korean army's plan of invasion of the South. The fact that the 6th Division of the armed forces of the Republic of Korea destroyed the North Korean army's operations plans that were in accordance with Kim Il-sung's strategic plans has more significance than a simple tactical success. The Chuncheon District Battle should be reevaluated as the "decisive battle" which went beyond a successful early defense combat in a Chuncheon region, and which fundamentally defeated North Korean army's war plan itself by thwarting the Kim Il-sung's strategic plan.

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

Efficacy of UN's Sanctions on North Korea's Nuclear and North Korea's Regime Survival Strategy (유엔의 북핵 대북제재조치의 실효성과 북한의 체제생존전략)

  • KIM, JOO-SAM
    • Korea and Global Affairs
    • /
    • v.2 no.1
    • /
    • pp.69-92
    • /
    • 2018
  • North Korea conducted a total of six nuclear tests from the 1st test of 2006 to September, 2017. North Korea developed an armed forces security strategy at the level of regime protection and defense to respond to U.S. hostile policy. However, it is certain that strategic goals of North Korea's nuclear test were to overcome a crisis in North Korea's regime through US-North Korea negotiation and complete nuclear armed forces for socialist unification on the Korean Peninsula. North Korea's continuous nuclear test is a direct factor in threatening peace on the Korean Peninsula and an indirect factor in security dynamics of Northeast Asia. The U.N. Security Council has enforced sanctions against North Korea through six resolutions against North Korea's reckless nuclear test for the past 10 years. However, Kim Jong-Un's regime is in a position to stick to simultaneous pursuit of nuclear and economic development in spite of anti-North sanction of international society including U.N. and U.S.A. It is understood that North Korea was stimulated to conduct intense nuclear test as U.N. and U.S.A's anti-North sanction was not effective on North Korea. Full-scale and local wars are expected as military options, one of anti-North sanctions of the Trump administration. The Trump administration has attempted diplomatic pressure strategy as a secondary boycott unlike previous administrations. Nevertheless, North Korea has stood against U.N. and U.S.A's anti-North sanction with brinkmanship tactics, announcing full-scale military confrontation against U.S. It is judged that North Korea will pursue simultaneous nuclear weapons and economic development in terms of regime survival. North Korea will have less strategic choices in that its regime may collapse because of realistic national strategy between U.S.A. and China.

A Study on the Fire Prevention Activities and Suppression Measures of Utility-Pipe Conduit (지하공동구 화재예방활동 및 진압대책에 관한 연구)

  • Lee, Jung-Il
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.63-68
    • /
    • 2010
  • Utility-Pipe Conduit is, Housing and city effectively accommodate what they absolutely need power, communications, gas, pipeline, water supply, drainage, energy facilities etc, according to expansion of urban infrastructure are derived, several ways to solve problems in, collection facilities in place are maintained and managed facility. If Utility-Pipe Conduit is damaged, as well as national security, because their impact on society as a whole, by introducing large vulnerability in the fire prevention activities and suppression measures and disaster for our situation by introducing measures, comprehensive analysis of the fire risk, it shall establish fire prevention activities and suppression through analysis of Utility-Pipe Conduit design, institutional issues, the problem of fire protection facilities, fire spread phenomenon etc. Because of Utility-Pipe Conduit is an enclosed place, so incomplete combustion due to lack of oxygen supply that there are problem such dark smoke, carbon monoxide etc, toxic combustion products and heat generation and visual impairment is an issue difficult to enter. As well as fire prevention activities, the fire In light of the particularity of the under ground than above ground fire, so this phenomenon is weak fire fighting that fire to become effective fire fighting tactics, basically it is necessary difficulty softening, non-burn softening and prevent combustion expansion of the cable is installed on the Utility-Pipe Conduit, having to considering the specificity of the response command system and relevant organizations to establish an on-site, Structural identification and other information gathering required to record of Response agencies, keep air conditioning system 24 hours and strengthening Virtual Total Training of Response agen