• 제목/요약/키워드: Security Threats Factors

Search Result 109, Processing Time 0.026 seconds

Analysis of Threat Factors of the Chinese Maritime Militia and the Prospect of Maritime Disputes between Korea and China (중국 해상 민병대의 위협요인 분석 및 한·중 해양 분쟁 전망)

  • Park, Byeung chan
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.83-113
    • /
    • 2022
  • Although China's maritime militia has not been well known despite its long history, it is recently emerging as a serious threat to maritime security, causing neighboring countries' security concerns due to the growing number of maritime disputes with China. In this regard, it is now time to clearly define the true nature of the Chinese maritime militia. A close look at the organization and roles of the Chinese maritime militia reveals that it is an organization that is systematically managed and operated by the Chinese government and the People's Liberation Army of China. Its role is to serve the purpose of "contributing to the protection and expansion of China's marine interests." In addition, the threat factors of the Chinese maritime militia were analyzed by examining the cases of maritime disputes between the Chinese maritime militia and neighboring countries. First, the Chinese maritime militia has implemented the "Gray Zone Strategy." Second, it is a systematic organization supported by the Chinese government and the People's Liberation Army. Third, it is a maritime power that cannot be ignored as the world's largest militia organization. Fourth, it has a strategic flexibility that enables the execution of the dual mission of working for a living such as commercial fishing and serving in the maritime militia. The threats of the Chinese maritime militia are not limited to Southeast Asian countries located in the South China Sea. This is also the case in Korea as the country cannot avoid maritime disputes with China such as the Ieodo issue and the boundary delimitation of the West Sea. Accordingly, this study was focused on presenting a predictable scenario and countermeasures based on the analysis through a scenario technique with respect to the two cases that are most likely to occur in Korea-China relations. Finally, beyond identifying the nature of the Chinese maritime militia, this study takes a further step to share considerations as to how the organization may operate and develop in the future and how we can cope with its moves.

  • PDF

A Study on the Method for Judging the EMP Protection Plan and Required Level through Decision Making (의사결정론을 통한 EMP 방호대책 및 수준 판단방안 제시에 관한 연구)

  • Kim, Kuk-Joo;Park, Sang-Woo;Baek, Jang-Woon;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.2
    • /
    • pp.193-200
    • /
    • 2019
  • In the context of increasing threats of EMP by neighboring countries in the security situation on the Korean peninsula, EMP protection facilities are a very important means of ensuring military operational capability. These EMP protection facilities should be constructed by comprehensively judging various factors about operation units. However, Defense Military Facilities Criteria and National Technical Guideline for EMP protection require at least 80dB shielding effectiveness without considering other options. In this study, we use objective and statistical methods to refine the consideration of the required EMP protection level based on the opinions of the experts. To do this, the Delphi technique is used for this study, and the survey was conducted from 53 experts related to EMP protection standard in the military and civilian sectors. The first questionnaire investigated the appropriate level of EMP protection, and the second questionnaire analyzed the factors considered in establishing EMP protection level. As a result of the factor analysis on the opinions of the experts, it was concluded that the EMP protection requirement level should be determined by variables of METT + TC.

A Study on the Algorithms for One-way Transmission in IPv6 Environment (IPv6 환경에서의 일방향 통신 알고리즘에 대한 연구)

  • Koh, Keun Ho;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.63-69
    • /
    • 2017
  • In the early 1990s, IETF(Internet Engineering TaskForce) had started the discussion on new address protocol that can modify and supplement various drawbacks of existing IPv4 address protocol with the introduction of CIDR(Classless Inter-Domain Routing) which is a temporary solution for IPv4 address depletion, NAT, private IP address. While various standards related to new address protocol has been proposed, the SIPP(Simple Internet Protocol Plus) was adopted among them because it is regarded as the most promising solution. And this protocol has been developed into current IPv6. The new concepts are introduced with modifying a lot of deficiencies in the exisitng IPv4 such as real-time data processing, performance on QoS, security and the efficiency of routing. Since many security threats in IPv6 environment still exist, the necessity of stable data communication environment has been brought up continuously. This paper deveopled one-way communication algorithm in IPv6 based on the high possibility of protecting the system from uncertain and potential risk factors if the data is transmitted in one way. After the analysis of existing IPv6 and ICMPv6, this paper suggests one-way communication algorithm as a solution for existing IPv6 and ICMPv6 environment.

Design of Splunk Platform based Big Data Analysis System for Objectionable Information Detection (Splunk 플랫폼을 활용한 유해 정보 탐지를 위한 빅데이터 분석 시스템 설계)

  • Lee, Hyeop-Geon;Kim, Young-Woon;Kim, Ki-Young;Choi, Jong-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.76-81
    • /
    • 2018
  • The Internet of Things (IoT), which is emerging as a future economic growth engine, has been actively introduced in areas close to our daily lives. However, there are still IoT security threats that need to be resolved. In particular, with the spread of smart homes and smart cities, an explosive amount of closed-circuit televisions (CCTVs) have been installed. The Internet protocol (IP) information and even port numbers assigned to CCTVs are open to the public via search engines of web portals or on social media platforms, such as Facebook and Twitter; even with simple tools these pieces of information can be easily hacked. For this reason, a big-data analytics system is needed, capable of supporting quick responses against data, that can potentially contain risk factors to security or illegal websites that may cause social problems, by assisting in analyzing data collected by search engines and social media platforms, frequently utilized by Internet users, as well as data on illegal websites.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

A Study on the Major Country's Domestic Intelligence Operation and Architecture: Focusing on UK, USA, France and Korea (주요 국가의 국내정보 활동 및 조직체계 연구 : 영국·미국·프랑스·우리나라의 국내정보기구를 중심으로)

  • Moon, Kyeong-Hwan
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.153-183
    • /
    • 2014
  • Nowadays, proactive intelligence activities are required because of enhanced nation wide threats of terrorism and complexity of multidimensional factors of national security. South Korea not only need to draw up plans of information sharing among agencies for more effective national intelligence activities, but also have to evaluate the structure of Domestic Intelligence Agency and its right direction of activities. In this vein, this paper conducts comparative studies of structures and range of activities of intelligence Agencies by reviewing U.K, U.S.A, and France cases and suggests a potential model of 'domestic information specified agency' that we can adopt and methods to share information among agencies. The focus of this paper is on the reviewing of necessity of establishing new 'domestic information specified agency' which will mainly conduct anti-terrorism and counterintelligence activities, and its appropriate form. After reviewing the cases of U.K, U.S.A. and France, we conclude that overcoming the people's distrust about an invasion of freedom and rights caused by centralized and integrated independent intelligence agency is a prerequisite. Disputable issues of FBI, DHS, and South Korea's intelligence agency cases suggest that plans for restoring trust have to be considered if a new 'domestic information specified agency' is established in NIS. If it is established under government ministries such as MSPA focusing on implementing anti-terrorism and counterintelligence activities, organizations such as NCTC, NIC, that can carry out information sharing and cooperating with agencies concerned have to be established. Additionally, measures to solve structural problems caused by carrying out law enforcement functions by domestic information specified agency should be considered.

  • PDF

An Empirical Analysis of the Determinants of Defense Cost Sharing between Korea and the U.S. (한미 방위비 분담금 결정요인에 대한 실증분석)

  • Yonggi Min;Sunggyun Shin;Yongjoon Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.183-192
    • /
    • 2024
  • The purpose of this study is to empirically analyze the determining factors (economy, security, domestic politics, administration, and international politics) that affect the ROK-US defense cost sharing decision. Through this, we will gain a deeper understanding of the defense cost sharing decision process and improve the efficiency of defense cost sharing calculation and execution. The scope of the study is ROK-US defense cost sharing from 1991 to 2021. The data used in the empirical analysis were various secondary data such as Ministry of National Defense, government statistical data, SIPRI, and media reports. As an empirical analysis method, multiple regression analysis using time series was used and the data was analyzed using an autoregressive model. As a result of empirical research through multiple regression analysis, we derived the following results. It was analyzed that the size of Korea's economy, that is, GDP, the previous year's defense cost share, and the number of U.S. troops stationed in Korea had a positive influence on the decision on defense cost sharing. This indicates that Korea's economic growth is a major factor influencing the increase in defense cost sharing, and that the gradual increase in the budget and the negotiation method of the Special Agreement (SMA) for cost sharing of stationing US troops in Korea play an important role. On the other hand, the political tendencies of the ruling party, North Korea's military threats, and China's defense budget were found to have no statistically significant influence on the decision to share defense costs.

Discussion on the Strategic Priorities and Navy's Coping in the Interwar Period Britain, 1919?1939 (「전간기 영국의 전략 우선순위 논의와 영국해군의 대응, 1919-1939」)

  • Jeon, Yoon-Jae
    • Strategy21
    • /
    • s.32
    • /
    • pp.123-159
    • /
    • 2013
  • The purpose of this research paper is to re-valuate the factors that affected the Royal Navy's rearmament and preparation for war by conducting analysis on the discussion held in the Britain on the strategic priorities and Navy's coping measures adopted during the interwar period. After the end of the WWI, each of the military arms of the Britain faced significant difficulty in securing budget and increasing their military power all throughout the interwar period, and the Navy was not an exception. The WWII that got started on September 1939 was the turning point in which this difficulty led to full-fledged crisis. Immensely many criticisms followed after the war and problems were identified when it comes to the Royal Navy's performance during the war. This type of effort to identify problem led to the attempt to analyze whether Royal Navy's preparation for war and rearmament policy during interwar period were adequate, and to identify the root causes of failure. Existing studies sought to find the root cause of failed rearmament from external factors such as the deterioration of the Britain itself or pressure from the Treasury Department to cut the budget for national defense, or sought to detect problems from the development of wrong strategies by the Navy. However, Royal Navy's failed preparation for the war during interwar period is not the result of one or two separate factors. Instead, it resulted due to the diverse factors and situations that the Britain was facing at the time, and due to intricate and complex interaction of these factors. Meanwhile, this research paper focused on the context characterized by 'strategic selection and setting up of priorities' among the various factors to conduct analysis on the Navy's rearmament by linking it with the discussion held at the time on setting up strategic priorities, and sought to demonstrate that the Navy Department's inadequate counter-measures developed during this process waned Royal Navy's position. After the end of WWI, each of the military arms continued to compete for the limited resources and budget all throughout the interwar period, and this type of competition amidst the situation in which the economic situation of Britain was still unstable, made prioritization when it comes to the allocation of resources and setting up of the priorities when it comes to the military power build-up, inevitable. Amidst this situation, the RAF was able to secure resources first and foremost, encouraged by the conviction of some politicians who were affected by the 'theory of aerial threat' and who believed that curtailing potential attack with the Air Force would be means to secure national security at comparatively lower cost. In response, Navy successfully defended the need for the existence of Navy despite the advancement of the aerial power, by emphasizing that the Britain's livelihood depends on trade and on the maintenance of maritime traffic. Despite this counter-measuring logic, however, Navy's role was still limited to the defense of overseas territory and to the fleet run-off instead of sea traffic route production when it comes to the specific power build-up plan, and did not understand the situation in which financial and economic factors gained greater importance when it comes to the setting up of strategic priorities. As a result, Navy's plan to build its powers was met with continual resistance of the Treasury Department, and lost the opportunity to re-gain the status of 'senior service' that it had enjoyed in the past during the competition for strategic prioritization. Given that the strategic and economic situation that Korea faces today is not very different from that of the Britain during the interwar period, our Navy too should leverage the lessons learned from the Royal Navy to make the effort to secure viable position when it comes to the setting of priorities in case of national defense strategy by presenting the basis on why maritime coping should be prioritized among the numerous other threats, and by developing the measures for securing the powers needed effectively amidst the limited resources.

  • PDF