• Title/Summary/Keyword: Tactics

Search Result 377, Processing Time 0.027 seconds

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training (사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

A Study on Optimal Operation against Anti-Air Missiles with Consideration of Anti-Surface Missile Kill Probability (대함유도탄 요격 확률을 고려한 함정 대공방어유도탄의 최적 운용 연구)

  • Park, Hyeonwoo;Lee, Hanmin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.815-823
    • /
    • 2019
  • A naval surface-to-air missile is an effective countermeasure against increasing threats of anti-ship missiles. Optimal operation is imperative for high survivability due to limited defense resources of a warship. This paper addresses a problem of optimal engagement to maximize the overall probability of intercept under Shoot-Look-Shoot tactics. The problem is formulated and analyzed with consideration of a realistic single-shoot probability model. The analysis shows that a global solution is achieved for some engagement scenarios. A numerical algorithm to optimize the overall probability of intercept is suggested. An illustrative example is provided to verify our results.

A Case Study of Quality Improvement for Tactics Simulation based on ISO/IEC 9126 (ISO/IEC 9126 기반의 전술 시뮬레이션 소프트웨어 테스트 사례 연구)

  • Kim, Kidu;Kim, R.YoungChul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1054-1056
    • /
    • 2015
  • 소프트웨어 테스트를 수행하는 조직에서 근무한 경험으로는 일반적으로 소프트웨어 개발 조직에서 수행하는 테스트는 소스코드의 오류를 찾는 수준이었다. 짧은 개발 기간 내에 기능이 수행되는 제품을 개발해야하기 때문에 기능이 수행되기만 하는 제품을 개발할 뿐이었다. 테스트가 올바르게 수행되지 않은 제품은 무수히 많은 잠재적 결함을 갖게 된다. 본 논문에서는 개발 완료된 전술 시뮬레이션 소프트웨어를 대상으로 ISO/IEC 9126 기반의 소프트웨어 테스트를 통해 잠재적 결함을 확인하고, 품질 향상을 위한 반복적인 회귀 테스트를 통해 품질 향상을 이룬 사례를 기술한다.

A Study on the Management Strategies of EUC for Business Innovation (기업혁신을 위한 EUC의 관리전략)

  • 오화중;김동균
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.15 no.25
    • /
    • pp.115-124
    • /
    • 1992
  • The need for organization to formulate an appropriate strategies and tactics for the management of EUC has been repeatedly emphasized in the MIS literature. Yet to date an absence of explicite EUC strategies seems to be the overwhelming norm. The purpose of this paper, under the assumption that EUC is an organization innovation, is to contribute what EUC management is most effective for a given organization at a particular point in time. 1. How to effectively implement a particular EUC strategy\ulcorner 2. When to adopt a particular strategy\ulcorner After this paper reviewed these issues, it would present strategies that the business can accomplish innovation through EUC activity.

  • PDF

A Study on Airworthiness Certification Standards for Military Small Rotary-Wing Unmanned Aerial Vehicles (군용 소형 회전익무인기 감항인증기준에 대한 연구)

  • Yang, Junmo;Lee, Sangchul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.78-83
    • /
    • 2021
  • In modern society, the use of small rotary-wing unmanned aerial vehicles such as drones is increasing. As the military considers tactics using drones, demand for drones is increasing. However, there is still no airworthiness certification standard for drones for safety. In this paper, we proposed airworthiness certification standards for small rotorcraft unmanned aerial vehicles based on CS-LURS in Europe and STANG-4703, 4738 (draft) of the North Atlantic Treaty Organization. In addition, airworthiness certification standards have been strengthened through the case of unmanned aerial vehicle accidents in operation by the Korean military. The airworthiness certification standards for small rotary-wing unmanned aerial vehicles will be supplemented through a demonstration project.

Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions

  • Lee, Daewon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.717-723
    • /
    • 2019
  • Smart systems and services aim to facilitate growing urban populations and their prospects of virtual-real social behaviors, gig economies, factory automation, knowledge-based workforce, integrated societies, modern living, among many more. To satisfy these objectives, smart systems and services must comprises of a complex set of features such as security, ease of use and user friendliness, manageability, scalability, adaptivity, intelligent behavior, and personalization. Recently, artificial intelligence (AI) is realized as a data-driven technology to provide an efficient knowledge representation, semantic modeling, and can support a cognitive behavior aspect of the system. In this paper, an integration of AI with the smart systems and services is presented to mitigate the existing challenges. Several novel researches work in terms of frameworks, architectures, paradigms, and algorithms are discussed to provide possible solutions against the existing challenges in the AI-based smart systems and services. Such novel research works involve efficient shape image retrieval, speech signal processing, dynamic thermal rating, advanced persistent threat tactics, user authentication, and so on.

An Elementary Teacher's Journey Through Action Research for Improving Student Responses

  • Noh, Jihwa
    • East Asian mathematical journal
    • /
    • v.37 no.2
    • /
    • pp.245-262
    • /
    • 2021
  • This study describes a sixth-grade teacher's professional development journey through action research for improving students' responses in a mathematics class. In the action research, the influence a teacher's questioning tactics would have on students' ability to determine answer reasonability to mathematics problems was investigated. Drawing on qualitative analysis of the teacher's lessons, reflection journal and interviews as well as the classroom students' questionnaires and interviews, this study examines how action research can affect the teacher and the classroom students. The results suggest the popularization of action research among teachers by teacher training and development programs showing the positive changes in the teacher's performance leading to improved student responses.

Information Intervention: A Taxonomy & Typology for Government Communication

  • Arceneaux, Phillip
    • Journal of Public Diplomacy
    • /
    • v.1 no.1
    • /
    • pp.5-35
    • /
    • 2021
  • Where government communication in the early 20th century fell under the umbrella term, "propaganda," the post-WWII era saw a paradigm fracture into public affairs for domestic audiences, public diplomacy for foreign audiences, and psychological operations for hostile audiences. The continued diffusion of the Internet, however, has blurred such distinctions, mending this fractured paradigm. Based on in-depth interviews, this study typologizes government communication to contextualize how various tactics functions within the 21st century digital media ecology, through an "Information Intervention" taxonomy. In an age where state-sponsored disinformation and computational propaganda are tantamount threats, this paper elucidates the field's fundamental concepts by articulating who communicates with what audience, in what manner, with what intent, and with what desired outcomes.

How the United States Marched the Semiconductor Industry into Its Trade War with China

  • Bown, Chad P.
    • East Asian Economic Review
    • /
    • v.24 no.4
    • /
    • pp.349-388
    • /
    • 2020
  • The US-China trade war forced a reluctant semiconductor industry into someone else's fight, a very different position from its leading role in the 1980s trade conflict with Japan. This paper describes how the political economy of the global semiconductor industry has evolved since the 1980s. That includes both a shift in the business model behind how semiconductors go from conception to a finished product as well as the geographic reorientation toward Asia of demand and manufactured supply. It uses that lens to explain how, during the modern conflict with China, US policymakers turned to a legally complex set of export restrictions targeting the semiconductor supply chain in the attempt to safeguard critical infrastructure in the telecommunications sector. The potentially far-reaching tactics included weaponization of exports by relatively small but highly specialized American software service and equipment providers in order to constrain Huawei, a Fortune Global 500 company. It describes potential costs of such policies, some of their unintended consequences, and whether policymakers might push them further in the attempt to constrain other Chinese firms.

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • Gee-hee Yun;Kyoung-jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.