• Title/Summary/Keyword: Security threat

Search Result 1,057, Processing Time 0.032 seconds

A study on overcoming the prospect of North Korea's fourth-generation war threats : Focusing on the Homeland Defense Reservists (북한의 제4세대전쟁 위협전망과 극복방안 연구: 향토예비군 운용 개선을 중심으로)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.3-13
    • /
    • 2016
  • We take it for granted that strong sides defeat weaker counterparts, while predicting the outcome of the battles. But in modern war, we can find plenty of evidence that weak sides won against the strong. This phenomenon can be understood logically by the fourth-generation war theory. the North Korean does not give up its unification strategy, which is unification by force, even though its inferior power. It is continuing various political, social and military levels of provocations toward both the international community and South Korea. Recently, North Korea did nuclear test, launched ICBM test, provoked the DMZ, and expecting to continue the provocations of the fourth-generation war level. We have to understand the nature of North Korea's fourth-generation war threats and provocations that it is focusing on. Based on this, have a new understanding of the value of the Homeland Defense Reservists as fundamental measures as the fourth-generation war threat and supplement related systems. We can firmly refuse the balance of power and power shift of the Korean Peninsula through improved Homeland Defense Reservists. As the expected North Korea's the fourth-generation war threats, our Homeland Defense Reservists is a firm will of conduct war, and political-social-economic-military means, it is possible to display as the best alternative.

A Study on the Measurement Method of Personal Information Protection Investment Performance (개인정보보호투자의 성과측정방안에 관한 연구)

  • Kim, Young-Il;Lee, Jae-Hoon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.99-106
    • /
    • 2013
  • Personal information protection has become one of the most impending business issues because leakage of personal information can cause tremendous financial losses and image degradation. Consequently, personal information protection initiatives have been recognized widely in business. To invigorate personal information protection investments, performance measurement method such as cost benefits analysis or qualitative analyses are needed, which have not been studied enough in the previous studies. This study proposes a performance measurement model which can include quantitative and qualitative analyses in the context of personal information protection investments. A comparative analysis has been performed on security investment and IT investment performance measurements, which leads to choose the WiBe method (developed by the German Interior Ministry), considering the privacy characteristics and the method's applicability. In particular, the quantitative effect measured how proactive threat assessment based on the way according to the nature of the businesses and organizations of privacy and possible investment decisions. This study proposes the 16 performance indicators, which turn out to be meaningful in terms of their materiality and feasibility by conducting focus group interviews of 25 experts on personal information protection.

Utilization plan of HUMINT in order to Overcome North Korea's WMD Treats: Focus on Modern Application 'use of spies' in the book of Art of War by Sun Tzu (북한의 WMD 위협 극복을 위한 인간정보 운용방안 : 손자병법 '용간편' 현대적 적용을 중심으로)

  • Lee, Jong Ho;Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.135-144
    • /
    • 2019
  • Recently, the Kim Jong Eun regime announced the completion of nuclear armed forces, and has been holding a summit meeting between the ROK and the US administration to promote the denuclearization of the Korean peninsula by the complete dismissal of the North Korean nuclear weapons toward the international community and the Republic of Korea. North Korea's Kim Jong Eun declares complete denuclearization, but in order to complete the real denuclearization of the Korean peninsula we seek, we need more practical preparation and preparation. In modern international society, the jungle law logic is applied precisely. A country that is not prepared cannot exist in history unless it believes only the good will of the other party and makes substantial preparations. Therefore, the top priority for us to prepare at this point is to obtain and manage complete information on the reality of North Korea's weapons of mass destruction. In particular, the weapons of mass destruction possessed by North Korea must be identified early on, and preparations for such weapons are essential, due to the seriousness of the damage. Therefore, this study complements the inherent limitations of modernized technology information in order to obtain accurate information on North Korea's threat of weapons of mass destruction, which is a serious issue directly linked to the survival of the Korean people and the state, And the operation plan was specified.

Malicious Traffic Classification Using Mitre ATT&CK and Machine Learning Based on UNSW-NB15 Dataset (마이터 어택과 머신러닝을 이용한 UNSW-NB15 데이터셋 기반 유해 트래픽 분류)

  • Yoon, Dong Hyun;Koo, Ja Hwan;Won, Dong Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.2
    • /
    • pp.99-110
    • /
    • 2023
  • This study proposed a classification of malicious network traffic using the cyber threat framework(Mitre ATT&CK) and machine learning to solve the real-time traffic detection problems faced by current security monitoring systems. We applied a network traffic dataset called UNSW-NB15 to the Mitre ATT&CK framework to transform the label and generate the final dataset through rare class processing. After learning several boosting-based ensemble models using the generated final dataset, we demonstrated how these ensemble models classify network traffic using various performance metrics. Based on the F-1 score, we showed that XGBoost with no rare class processing is the best in the multi-class traffic environment. We recognized that machine learning ensemble models through Mitre ATT&CK label conversion and oversampling processing have differences over existing studies, but have limitations due to (1) the inability to match perfectly when converting between existing datasets and Mitre ATT&CK labels and (2) the presence of excessive sparse classes. Nevertheless, Catboost with B-SMOTE achieved the classification accuracy of 0.9526, which is expected to be able to automatically detect normal/abnormal network traffic.

FunRank: Finding 1-Day Vulnerability with Call-Site and Data-Flow Analysis (FunRank: 함수 호출 관계 및 데이터 흐름 분석을 통한 공개된 취약점 식별)

  • Jaehyu Lee;Jihun Baek;Hyungon Moon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.305-318
    • /
    • 2023
  • The complexity of software products led many manufacturers to stitch open-source software for composing a product. Using open-source help reduce the development cost, but the difference in the different development life cycles makes it difficult to keep the product up-to-date. For this reason, even the patches for known vulnerabilities are not adopted quickly enough, leaving the entire product under threat. Existing studies propose to use binary differentiation techniques to determine if a product is left vulnerable against a particular vulnerability. Despite their effectiveness in finding real-world vulnerabilities, they often fail to locate the evidence of a vulnerability if it is a small function that usually is inlined at compile time. This work presents our tool FunRank which is designed to identify the short functions. Our experiments using synthesized and real-world software products show that FunRank can identify the short, inlined functions that suggest that the program is left vulnerable to a particular vulnerability.

The Construction Direction of the ROK NAVY for the Protection of Marine Sovereignty (국가의 해양주권 수호를 위한 한국해군의 전력건설 방향)

  • Shin, In-Kyun
    • Strategy21
    • /
    • s.30
    • /
    • pp.99-142
    • /
    • 2012
  • Withe increased North Korea's security threats, the South Korean navy has been faced with deteriorating security environment. While North Korea has increased asymmetric forces in the maritime and underwater with the development of nuclear weapons, and China and Japan have made a large investment in the buildup of naval forces, the power of the Pacific fleet of the US, a key ally is expected to be weakened. The biggest threat comes from China's intervention in case of full-scale war with North Korea, but low-density conflict issues are also serious problems. North Korea has violated the Armistice Agreement 2,660 times since the end of Korean War, among which the number of marine provocations reaches 1,430 times, and the tension over the NLL issue has been intensifying. With tension mounting between Korea and Japan over the Dokdo issue and conflict escalating with China over Ieo do Islet, the US Navy has confronted situation where it cannot fully concentrate on the security of the Korean peninsula, which leads to need for strengthening of South Korea's naval forces. Let's look at naval forces of neighboring countries. North Korea is threatening South Korean navy with its increased asymmetric forces, including submarines. China has achieved the remarkable development of naval forces since the promotion of 3-step plan to strengthen naval power from 1989, and it now retains highly modernized naval forces. Japan makes an investment in the construction of stat of the art warship every year. Since Japan's warship boasts of its advanced performance, Japan's Maritime Self Defense Force is evaluated the second most powerful behind the US Navy on the assumption that submarine power is not included in the naval forces. In this situation, naval power construction of South Korean navy should be done in phases, focusing on the followings; First, military strength to repel the energy warship quickly without any damage in case of battle with North Korea needs to be secured. Second, it is necessary to develop abilities to discourage the use of nuclear weapons of North Korea and attack its nuclear facilities in case of emergency. Third, construction of military power to suppress armed provocations from China and Japan is required. Based on the above naval power construction methods, the direction of power construction is suggested as follows. The sea fleet needs to build up its war potential to defeat the naval forces of North Korea quickly and participate in anti-submarine operations in response to North Korea's provocations. The task fleet should be composed of 3 task flotilla and retain the power to support the sea fleet and suppress the occurrence of maritime disputes with neighboring countries. In addition, it is necessary to expand submarine power, a high value power asset in preparation for establishment of submarine headquarters in 2015, develop anti-submarine helicopter and load SLAM-ER missile onto P-3C patrol aircraft. In case of maine corps, division class military force should be able to conduct landing operations. It takes more than 10 years to construct a new warship. Accordingly, it is necessary to establish plans for naval power construction carefully in consideration of reality and future. For the naval forces to safeguard maritime sovereignty and contribute to national security, the acquisition of a huge budget and buildup of military power is required. In this regard, enhancement of naval power can be achieved only through national, political and military understanding and agreement. It is necessary to let the nation know that modern naval forces with improved weapon system can serve as comprehensive armed forces to secure the command of the sea, perform defense of territory and territorial sky and attack the enemy's strategic facilities and budget inputted in the naval forces is the essential source for early end of the war and minimization of damage to the people. If the naval power construction is not realized, we can be faced with a national disgrace of usurpation of national sovereignty of 100 years ago. Accordingly, the strengthening of naval forces must be realized.

  • PDF

An Analysis on the Conditions for Successful Economic Sanctions on North Korea : Focusing on the Maritime Aspects of Economic Sanctions (대북경제제재의 효과성과 미래 발전 방향에 대한 고찰: 해상대북제재를 중심으로)

  • Kim, Sang-Hoon
    • Strategy21
    • /
    • s.46
    • /
    • pp.239-276
    • /
    • 2020
  • The failure of early economic sanctions aimed at hurting the overall economies of targeted states called for a more sophisticated design of economic sanctions. This paved way for the advent of 'smart sanctions,' which target the supporters of the regime instead of the public mass. Despite controversies over the effectiveness of economic sanctions as a coercive tool to change the behavior of a targeted state, the transformation from 'comprehensive sanctions' to 'smart sanctions' is gaining the status of a legitimate method to impose punishment on states that do not conform to international norms, the nonproliferation of weapons of mass destruction in this particular context of the paper. The five permanent members of the United Nations Security Council proved that it can come to an accord on imposing economic sanctions over adopting resolutions on waging military war with targeted states. The North Korean nuclear issue has been the biggest security threat to countries in the region, even for China out of fear that further developments of nuclear weapons in North Korea might lead to a 'domino-effect,' leading to nuclear proliferation in the Northeast Asia region. Economic sanctions had been adopted by the UNSC as early as 2006 after the first North Korean nuclear test and has continually strengthened sanctions measures at each stage of North Korean weapons development. While dubious of the effectiveness of early sanctions on North Korea, recent sanctions that limit North Korea's exports of coal and imports of oil seem to have an impact on the regime, inducing Kim Jong-un to commit to peaceful talks since 2018. The purpose of this paper is to add a variable to the factors determining the success of economic sanctions on North Korea: preventing North Korea's evasion efforts by conducting illegal transshipments at sea. I first analyze the cause of recent success in the economic sanctions that led Kim Jong-un to engage in talks and add the maritime element to the argument. There are three conditions for the success of the sanctions regime, and they are: (1) smart sanctions, targeting commodities and support groups (elites) vital to regime survival., (2) China's faithful participation in the sanctions regime, and finally, (3) preventing North Korea's maritime evasion efforts.

The Mutual Assistance System and Cooperation between South Korea, the U.S. and China for the North Korean Nuclear Issue and Unification of the Korean Peninsula (북핵과 한반도 통일에 대한 한·미·중 3국 공조체제와 협력)

  • Kim, Joo-Sam
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.71-96
    • /
    • 2017
  • This study speculates on responses to the nuclear threats of North Korea and mutual assistance and cooperation between South Korea, the U.S. and China for the unification of the Korean Peninsula. As for the North Koreas nuclear issue and unification of the Korean Peninsula, South Korea is the subject of national division, the U.S. is a responsible country in international issues and does not have diplomatic ties with North Korea. China is a traditional socialist nation and a supporter of North Korea. As North Korea's strategic weapons including nuclear weapons and ballistic missiles are international issues, to defend against Kim Jung-Eun's unexpected acts, the three countries should actively cooperate with each other and develop countermeasures. However, with respect to the road map of the North Koreas issue, there are subtle differences between the U.S. and China in recognition of and sanctions against North Korea as a resolution of the U..N. Security Council. The U.S. has continued a deterrence policy and sanctions against North Korea based on joint threats between South Korea and the U.S. while China has showed a negative position in the process of solving the North Korean nuclear issue because of the unstable security derived from the U.S. 's intervention in the Korean peninsula. North Korea should change its diplomatic policy in a more concrete way towards world peace although it has continued trade of strategic weapons with Middle Eastern countries to maintain its political system. For example, to restart the summit talks and open multilateral security channels. Although the issue of unification of the Korean peninsula should be resolved by South and North Korea themselves, it is strange that South and North Korea depend on the logic of powerful countries for the resolution of a national problem. As for North Koreas nuclear and the Unification issues, peaceful solutions presented by South Korea seem more persuasive than the solution presented by North Korea which did not secure any international support. However, South Korea, the U.S. and China need to develop uni-directional two-tract strategies for sanctions against North Korea and talks with North Korea for peace on the Korean peninsula, and should continue to support the economic independence of North Korea.

Historical Review on the Security Service for the Royal Household in the "Goryeo" Era (고려시대 왕실호위제도의 사적 고찰)

  • Lee, Sung-Jin;Kim, Eui-Young;Lee, Jong-Hwan
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.413-429
    • /
    • 2007
  • The Guard over the royal household in the "Goryeo" era was the same as if was over the President or Ruler of a nation today. In those days, a king represented a nation and any threat to the safety of a king could bring the destruction of a nation and the dispersion of the people. by reviewing the change of the 2-Gun 6-Wi system of the era, it can be, summed up as follow, Ther will be suggestions. The Guard might focus on a king's personal safety in the wake of the system of the Silla and Taebong dynasties until the establishment of the Goryeo Dynasty's unique political system. "Goryeo" rebuilt the royal palace in Gyeonyeong-gun to take the shape of unified country after its accomplishment of unification of the late three countries, Then it was afraid of the rebellion and uprising of local powerful clans, The country put them under control and organized the local army with them in the era of Kings, Seongjong, through the kings, Seongjong and Gwangjong. The army system of "Goryeo" consisted of 2-Gun and 6-Wi, and 2-Gun placed above the 6-Wi played the role of the Royal guards, and among the organizations a certain army under the specific name of "Gyeonyong-gun" guarded the kings in the nearest position. An aristocratic culture enjoyed its golden age in the period of stability of the aristocracy of "Goryeo", but afterward in the confusion of the aristocratic disruption and incompatible confrontation the country lost its control, and faced military rebellions by treating civil officials well and ill-treating military officials The safety of kings become unstable with the grasping political power by the military officials, and "Dobang" was established in the era of Choi's family to grasp political power. In the era of Choi Woo, he gathered his men and organized his familys army with them and managed the personnel administration with the civil officials of "Jeongbang and Seobang under his command. Such a fact shows the similarity to today's task of guarding. Considering the facts that "Sambyeolcho, the military ground of the military-men-rule, was at the center of the struggling against Mongolia and that even after the fall of the military regime, they rebelled and fought against Mongolia to the end, we came to know that the nationalism in the era of the military era was great. In the transition of external situations from "Myeong" to "Won"(Chinese dynasties), the conflict between the old "Won"-friendly power and the new "Myeong"-friendly power caused the weakness of the power to guard the royal household, and "Goryeo" at last gave way to the newly rising "Joseon" led by Lee, Seong Gye who won the people's confidence.

  • PDF

EU's Space Code of Conduct: Right Step Forward (EU의 우주행동강령의 의미와 평가)

  • Park, Won-Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.211-241
    • /
    • 2012
  • The Draft International Code of Conduct for Outer Space Activities officially proposed by the European Union on the occasion of the 55th Session of the United Nations Peaceful Uses of the Outer Space last June 2012 in Vienna, Austria is to fill the lacunae of the relevant norms to be applied to the human activities in the outer space and thus has the merit our attention. The missing elements of the norms span from the prohibition of an arms race, safety and security of the space objects including the measures to reduce the space debris to the exchange of information of space activities among space-faring nations. The EU's initiatives, when implemented, cover or will eventually prepare for the forum to deal with such issues of interests of the international community. The EU's initiatives begun at the end of 2008 included the unofficial contacts with major space powers including in particular the USA of which position is believed to have been reflected in the Draft with the aim to have it adopted in 2013. Although the Code is made up of soft law rather than hard law for the subscribing countries, the USA seems to be afraid of the eventuality whereby its strategic advantages in the outer space will be affected by the prohibiting norms, possibly to be pursued by the Code from its current non-binding character, of placing weapons in the outer space. It is with this trepidation that the USA has been opposing to the adoption of the United Nations Assembly Resolutions on the prevention of an arms race in the outer space (PAROS) and in the same context to the setting-up of a working group on the arms race in the outer space in the frame of the Conference on Disarmament. China and Russia who together put forward a draft Treaty on Prevention of the Placement of Weapons in Outer Space and of the Threat or Use of Force against Outer Space Objects (PPWT) in 2008 would not feel comfortable either because the EU initiatives will steal the lime light. Consequently their reactions are understandably passive towards the Draft Code while the reaction of the USA to the PPWT was a clear cut "No". With the above background, the future of the EU Code is uncertain. Nevertheless, the purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security, all to maximize the principle of the peaceful use and exploration of the outer space is the laudable efforts on the part of EU. When the detailed negotiations will be held, some problems including the cost to be incurred by setting up an office for the clerical works could be discussed for both efficient and economic mechanism. For example, the new clerical works envisaged in the Draft Code could be discharged by the current UN OOSA (Office for Outer Space Affairs) with minimal additional resources. The EU's initiatives are another meaningful contribution following one due to it in adopting the Kyoto Protocol of 1997 to the UNFCCC (UN Framework Convention on the Climate Change) and deserve the praise from the thoughtful international community.

  • PDF