• Title/Summary/Keyword: Security threats

Search Result 1,482, Processing Time 0.028 seconds

The lesson From Korean War (한국전쟁의 교훈과 대비 -병력수(兵力數) 및 부대수(部隊數)를 중심으로-)

  • Yoon, Il-Young
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.49-168
    • /
    • 2010
  • Just before the Korean War, the total number of the North Korean troops was 198,380, while that of the ROK(Republic of Korea) army troops 105,752. That is, the total number of the ROK army troops at that time was 53.3% of the total number of the North Korean army. As of December 2008, the total number of the North Korean troops is estimated to be 1,190,000, while that of the ROK troops is 655,000, so the ROK army maintains 55.04% of the total number of the North Korean troops. If the ROK army continues to reduce its troops according to [Military Reform Plan 2020], the total number of its troops will be 517,000 m 2020. If North Korea maintains the current status(l,190,000 troops), the number of the ROK troops will be 43.4% of the North Korean army. In terms of units, just before the Korean War, the number of the ROK army divisions and regiments was 80% and 44.8% of North Korean army. As of December 2008, North Korea maintains 86 divisions and 69 regiments. Compared to the North Korean army, the ROK army maintains 46 Divisions (53.4% of North Korean army) and 15 regiments (21.3% of North Korean army). If the ROK army continue to reduce the military units according to [Military Reform Plan 2020], the number of ROK army divisions will be 28(13 Active Division, 4 Mobilization Divisions and 11 Local Reserve Divisions), while that of the North Korean army will be 86 in 2020. In that case, the number of divisions of the ROK army will be 32.5% of North Korean army. During the Korean war, North Korea suddenly invaded the Republic of Korea and occupied its capital 3 days after the war began. At that time, the ROK army maintained 80% of army divisions, compared to the North Korean army. The lesson to be learned from this is that, if the ROK army is forced to disperse its divisions because of the simultaneous invasion of North Korea and attack of guerrillas in home front areas, the Republic of Korea can be in a serious military danger, even though it maintains 80% of military divisions of North Korea. If the ROK army promotes the plans in [Military Reform Plan 2020], the number of military units of the ROK army will be 32.5% of that of the North Korean army. This ratio is 2.4 times lower than that of the time when the Korean war began, and in this case, 90% of total military power should be placed in the DMZ area. If 90% of military power is placed in the DMZ area, few troops will be left for the defense of home front. In addition, if the ROK army continues to reduce the troops, it can allow North Korea to have asymmetrical superiority in military force and it will eventually exert negative influence on the stability and peace of the Korean peninsular. On the other hand, it should be reminded that, during the Korean War, the Republic of Korea was attacked by North Korea, though it kept 53.3% of troops, compared to North Korea. It should also be reminded that, as of 2008, the ROK army is defending its territory with the troops 55.04% of North Korea. Moreover, the national defense is assisted by 25,120 troops of the US Forces in Korea. In case the total number of the ROK troops falls below 43.4% of the North Korean army, it may cause social unrest about the national security and may lead North Korea's misjudgement. Besides, according to Lanchester strategy, the party with weaker military power (60% compared to the party with stronger military power) has the 4.1% of winning possibility. Therefore, if we consider the fact that the total number of the ROK army troops is 55.04% of that of the North Korean army, the winning possibility of the ROK army is not higher than 4.1%. If the total number of ROK troops is reduced to 43.4% of that of North Korea, the winning possibility will be lower and the military operations will be in critically difficult situation. [Military Reform Plan 2020] rums at the reduction of troops and units of the ground forces under the policy of 'select few'. However, the problem is that the financial support to achieve this goal is not secured. Therefore, the promotion of [Military Reform Plan 2020] may cause the weakening of military defence power in 2020. Some advanced countries such as Japan, UK, Germany, and France have promoted the policy of 'select few'. However, what is to be noted is that the national security situation of those countries is much different from that of Korea. With the collapse of the Soviet Unions and European communist countries, the military threat of those European advanced countries has almost disappeared. In addition, the threats those advanced countries are facing are not wars in national level, but terrorism in international level. To cope with the threats like terrorism, large scaled army trops would not be necessary. So those advanced European countries can promote the policy of 'select few'. In line with this, those European countries put their focuses on the development of military sections that deal with non-military operations and protection from unspecified enemies. That is, those countries are promoting the policy of 'select few', because they found that the policy is suitable for their national security environment. Moreover, since they are pursuing common interest under the European Union(EU) and they can form an allied force under NATO, it is natural that they are pursing the 'select few' policy. At present, NATO maintains the larger number of troops(2,446,000) than Russia(l,027,000) to prepare for the potential threat of Russia. The situation of japan is also much different from that of Korea. As a country composed of islands, its prime military focus is put on the maritime defense. Accordingly, the development of ground force is given secondary focus. The japanese government promotes the policy to develop technology-concentrated small size navy and air-forces, instead of maintaining large-scaled ground force. In addition, because of the 'Peace Constitution' that was enacted just after the end of World War II, japan cannot maintain troops more than 240,000. With the limited number of troops (240,000), japan has no choice but to promote the policy of 'select few'. However, the situation of Korea is much different from the situations of those countries. The Republic of Korea is facing the threat of the North Korean Army that aims at keeping a large-scale military force. In addition, the countries surrounding Korea are also super powers containing strong military forces. Therefore, to cope with the actual threat of present and unspecified threat of future, the importance of maintaining a carefully calculated large-scale military force cannot be denied. Furthermore, when considering the fact that Korea is in a peninsular, the Republic of Korea must take it into consideration the tradition of continental countries' to maintain large-scale military powers. Since the Korean War, the ROK army has developed the technology-force combined military system, maintaining proper number of troops and units and pursuing 'select few' policy at the same time. This has been promoted with the consideration of military situation in the Koran peninsular and the cooperation of ROK-US combined forces. This kind of unique military system that cannot be found in other countries can be said to be an insightful one for the preparation for the actual threat of North Korea and the conflicts between continental countries and maritime countries. In addition, this kind of technology-force combined military system has enabled us to keep peace in Korea. Therefore, it would be desirable to maintain this technology-force combined military system until the reunification of the Korean peninsular. Furthermore, it is to be pointed out that blindly following the 'select few' policy of advanced countries is not a good option, because it is ignoring the military strategic situation of the Korean peninsular. If the Republic of Korea pursues the reduction of troops and units radically without consideration of the threat of North Korea and surrounding countries, it could be a significant strategic mistake. In addition, the ROK army should keep an eye on the fact the European advanced countries and Japan that are not facing direct military threats are spending more defense expenditures than Korea. If the ROK army reduces military power without proper alternatives, it would exert a negative effect on the stable economic development of Korea and peaceful reunification of the Korean peninsular. Therefore, the desirable option would be to focus on the development of quality of forces, maintaining proper size and number of troops and units under the technology-force combined military system. The tableau above shows that the advanced countries like the UK, Germany, Italy, and Austria spend more defense expenditure per person than the Republic of Korea, although they do not face actual military threats, and that they keep achieving better economic progress than the countries that spend less defense expenditure. Therefore, it would be necessary to adopt the merits of the defense systems of those advanced countries. As we have examined, it would be desirable to maintain the current size and number of troops and units, to promote 'select few' policy with increased defense expenditure, and to strengthen the technology-force combined military system. On the basis of firm national security, the Republic of Korea can develop efficient policies for reunification and prosperity, and jump into the status of advanced countries. Therefore, the plans to reduce troops and units in [Military Reform Plan 2020] should be reexamined. If it is difficult for the ROK army to maintain its size of 655,000 troops because of low birth rate, the plans to establish the prompt mobilization force or to adopt drafting system should be considered for the maintenance of proper number of troops and units. From now on, the Republic of Korean government should develop plans to keep peace as well as to prepare unexpected changes in the Korean peninsular. For the achievement of these missions, some options can be considered. The first one is to maintain the same size of military troops and units as North Korea. The second one is to maintain the same level of military power as North Korea in terms of military force index. The third one is to maintain the same level of military power as North Korea, with the combination of the prompt mobilization force and the troops in active service under the system of technology-force combined military system. At present, it would be not possible for the ROK army to maintain such a large-size military force as North Korea (1,190,000 troops and 86 units). So it would be rational to maintain almost the same level of military force as North Korea with the combination of the troops on the active list and the prompt mobilization forces. In other words, with the combination of the troops in active service (60%) and the prompt mobilization force (40%), the ROK army should develop the strategies to harmonize technology and forces. The Korean government should also be prepared for the strategic flexibility of USFK, the possibility of American policy change about the location of foreign army, radical unexpected changes in North Korea, the emergence of potential threat, surrounding countries' demand for Korean force for the maintenance of regional stability, and demand for international cooperation against terrorism. For this, it is necessary to develop new approaches toward the proper number and size of troops and units. For instance, to prepare for radical unexpected political or military changes in North Korea, the Republic of Korea should have plans to protect a large number of refugees, to control arms and people, to maintain social security, and to keep orders in North Korea. From the experiences of other countries, it is estimated that 115,000 to 230,000 troops, plus ten thousands of police are required to stabilize the North Korean society, in the case radical unexpected military or political change happens in North Korea. In addition, if the Republic of Korea should perform the release of hostages, control of mass destruction weapons, and suppress the internal wars in North Korea, it should send 460,000 troops to North Korea. Moreover, if the Republic of Korea wants to stop the attack of North Korea and flow of refugees in DMZ area, at least 600,000 troops would be required. In sum, even if the ROK army maintains 600,000 troops, it may need additional 460,000 troops to prepare for unexpected radical changes in North Korea. For this, it is necessary to establish the prompt mobilization force whose size and number are almost the same as the troops in active service. In case the ROK army keeps 650,000 troops, the proper number of the prompt mobilization force would be 460,000 to 500,000.

  • PDF

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

An Audit Model for Information Protection in Smartwork (스마트워크 기반의 정보보호 감리 모형)

  • Han, Ki-Joon;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.229-239
    • /
    • 2014
  • Smartwork technology, using teleworking, smartwork centers and mobile terminal, provides a flexible work environments without constraints of time and space. Smartwork system to increase the work efficiency has the information protection threats according to their convenience. Thus, in order to build smartwork, it is proper to provide information protection audit to help ensure the information protection. In this paper, we have proposed an infortaion protection audit model at the practical and technical level for building a smartwork environment. We were classified as a terminal, network and server area for information protection, and derived a professional information protection check items. Further, by establishing a smartwork information protection audit time to map ISMS control items, we have proposed an audit model so that it is possible to improve the security and efficiency. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check items correspond with the purpose of the smartwork information protection audit to auditors and IT specialists. As the result, this study was 97% satisfaction out of 13 check items.

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

Screening Rice Cultivars for Resistance to Bacterial Leaf Blight

  • Fred, Agaba Kayihura;Kiswara, Gilang;Yi, Gihwan;Kim, Kyung-Min
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.5
    • /
    • pp.938-945
    • /
    • 2016
  • Bacterial leaf blight (BLB) caused by Xanthomonas oryzae pv. oryzae (Xoo) is one of the most serious threats to rice production. In this study, screening of rice for resistance to BLB was carried out at two different times and locations; that is, in a greenhouse during winter and in an open field during summer. The pathogenicity of Xoo race K1 was tested on 32 Korean rice cultivars. Inoculation was conducted at the maximum tillering stage, and the lesion length was measured after 14 days of inoculation. Five cultivars, Hanareum, Namcheon, Samgdeok, Samgang, and Yangjo, were found to be resistant in both the greenhouse and open-field screenings. Expression of the plant defense-related genes JAmyb, OsNPR1, OsPR1a, OsWRKY45, and OsPR10b was observed in resistant and susceptible cultivars by qRT-PCR. Among the five genes tested, only OsPR10b showed coherent expression with the phenotypes. Screening of resistance to Xoo in rice was more accurate when conducted in open fields in the summer cultivation period than in greenhouses in winter. The expression of plant defense-related genes after bacterial inoculation could give another perspective in elucidating defense mechanisms by using both resistant and susceptible individuals.

Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls (시스템 호출 기반의 사운덱스 알고리즘을 이용한 신경망과 N-gram 기법에 대한 이상 탐지 성능 분석)

  • Park, Bong-Goo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.45-56
    • /
    • 2005
  • The weak foundation of the computing environment caused information leakage and hacking to be uncontrollable, Therefore, dynamic control of security threats and real-time reaction to identical or similar types of accidents after intrusion are considered to be important, h one of the solutions to solve the problem, studies on intrusion detection systems are actively being conducted. To improve the anomaly IDS using system calls, this study focuses on neural networks learning using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern, That Is, by changing variable length sequential system call data into a fixed iength behavior pattern using the soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm. The backpropagation neural networks technique is applied for anomaly detection of system calls using Sendmail Data of UNM to demonstrate its performance.

  • PDF

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF