• Title/Summary/Keyword: information warfare

Search Result 374, Processing Time 0.023 seconds

Aspects of Warfare in the Information Age - NCW Concerning (정보화 시대의 전쟁양상 - Network Centric Warfare(네트워크 중심 전쟁)을 중심으로)

  • Woo, Hee-Choul
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.45-50
    • /
    • 2016
  • This research suggests a method to contribute to the perfect execution of duty in prospective information warfare by inspecting network-based warfare, in which its basic concepts and efficient management plans are provided; it is especially important, due to growing focus on information warfare caused by sudden improvements on information technology which affects not only civil matters but international military affairs as well. For this purpose, this research scrutinizes on the chronological organization of warfare traits during the information age, and information-warfare execution, as well as its effects, thereby providing proper management plans for network-based warfare.

A Study on the Improvement of Capability Assessment and the Plan for Enhancing Cyber Warfare Capability of Korea (사이버전의 역량평가 개선과 역량 강화 방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1251-1258
    • /
    • 2015
  • Recently, as the development of cyber weapons, the threat of cyber warfare has been increasing. Nations, which experienced cyber warfare already, have been damaged not only in the cyber space as well as in real war field. Therefore, each nation is constantly making efforts to prepare for cyber warfare. First of all, to prepare for cyber warfare, each nation's capability of cyber warfare should be understood. A plan of reaction of cyber warfare should be searched by comparison and analysis of capability of cyber warfare. This paper compares and analyzes established methodology of capability assessment about cyber warfare, and this paper finds a better point to suggest the improvement of capability assessment about cyber warfare. This paper applies capability assessment of cyber warfare to nations, which can influence on Korea with improved capability assessment of cyber warfare. Comparing and analyzing the result of assessment, this paper deducts complementary point of Korean cyber warfare to suggest the plan to enhancing capability of cyber warfare.

North Korean Cyber Warfare Threat and South Korean Action (북한의 사이버전 위협분석과 대응방안 고찰)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • In this study, I analyzed the increased threat of cyber warfare and the threat of reality about what is happening around the currently. And to prepare for it, I proposed the fact how main developed countries deal with cyber warfare. Also, I presented North Korea's cyber warfare threat which is equipped with world's top 3 cyber warfare performance and the way how their strategy influence to South Korea's national security. Moreever, I studied the existing North Korea's cyber warfare threat and the way how, how South Korea deal with it and prepare to against expected threat of cyber warfare in future.

A Proposal of Combat Power Measurement Model of Army Warfare Information System Using Network Power based on Social Network Analysis (SNA 기반 네트워크 파워를 이용한 지상전장정보체계 전투력 효과측정 모델제안)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.36 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • It is important not only to introduce the C4I(Command and Control, Communication, Computer, Intelligence) system for realizing the NCW(Network Centric Warfare) but also to evaluate the synergistic effect by the C4I system. However, the study effort for evaluating the system's synergistic effect is insufficient compared with introducing the system. Therefore, in this paper, we proposed a model that measures the synergistic effect of combat power by the warfare information system. To measure the synergistic effect of warfare information system, the network power must be considered, so we also proposed a new methodology for measurement of network power based on SNA(Social Network Analysis), not Metcalfe's law. A model we proposed is a model that measures the raised combat power by the network effectiveness. The methodology and model we proposed in this paper will be used usefully to analyze the practical effect of constructing future warfare information system.

A Study on Alternatives of Cyber Psychological Warfare of Republic of Korea (효율적인 국방사이버심리전 수행방안)

  • Lee, Ki-Joong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.109-115
    • /
    • 2008
  • As a new facet of international security realm in 21C, Information Warfare(IW) has rised new way of warfare and demostrated its efficiency in battelfield. With the rapid development of information technology, indeed, it is difficult to estimate the future of IW. While there are a lot of discussion on the clear concep of IW, it is clear that IW has the factor of psychological warfare, so-called cyber psychological warfare. Considering the security environment of Republic of Korea(ROK), the cyber psychological warfare has the significant importance for national security. While it has to deal with the cyber psychological warfare of North Korea, it also try to cope with the various threaten of international conflicts to protect Korean people and national interest.

  • PDF

Implementation of VGPO/VGPI Velocity Deception Jamming Technique using Phase Sampled DRFM (위상 샘플방식 DRFM을 이용한 VGPO/VGPI 속도기만 재밍기법 구현)

  • Kim, Yo-Han;Moon, Byung-Jin;Hong, Sang-Guen;Sung, Ki-Min;Jeon, Young-Il;Na, In-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.955-961
    • /
    • 2021
  • In modern warfare, the importance of electronic warfare, which carries out a mission that using radio wave to find out enemy information or to protect ally information, has increased. Radar jamming technique is one of the most representative techniques of EA(Electronic Attack), it disturbs and deceives enemy radar system in order to secure ally location information. Velocity deception jamming technique, which is one of the radar jamming techniques, generally operate against pulse-doppler radar which use doppler effect in order to track target's velocity and location. Velocity Deception Jamming Technique can be implemented using DRFM(Digital Radio Frequency Memory) that performs Frequency Modulation. In this paper, I describe implementation method of VGPO/VGPI(Velocity Gate Pull-Off/Pull-In) velocity deception jamming technique using phase-sampled DRFM, and verify the operation of VGPO/VGPI velocity deception jamming technique with board test under signal injection condition.

A Study on Battle Damage Assessment of Electronic Warfare associated with Cyber Warfare (사이버전 연계 전자전 전투피해평가 지표 산출을 위한 연구)

  • Choi, Seungcheol;Cho, Joonhyung;Kwon, Oh-Jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.201-210
    • /
    • 2020
  • This paper proposes a framework for the battle damage assessment (BDA) of electronic warfare linked to cyber warfare. Thanks to the rapid development of information and communication technology, the importance of cyber warfare and electronic warfare in cyberspace is increasing. Therefore, the BDA for cyber warfare and its associated electronic warfare in cyberspace is an important factor that affects the success or failure of military operations. In this paper, we propose a method to calculate measure of performance and measure of effectiveness by classifying the electronic warfare system into large / medium / small classes according to the type of electronic warfare. By setting up a hypothetical scenario, we show the effectiveness of the proposed framework.

A Study on Defense Information Security Management Structure for Digital Information Warfare (디지털 정보전에 대비한 국방정보보호업무 관리구조에 관한 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.57-63
    • /
    • 2008
  • The purpose of the research is to intended to help Korean military officers establish information system security structure. Information security is a critical issue for digital information warfare. Advanced countries such as U.S. and Japan have developed a new military security strategy for future information warfare. The readiness of Korean Army, however, is far behind those countries. This paper provides a systematic information security structure for Korean Army, which is a result of the research through a group decision making process.

  • PDF

Conceptual Analysis of Cyber Electronic Warfare by OSI Reference Model (OSI 참조 모델에 의한 사이버전자전 개념 분석)

  • Lee, Minwoo;Lee, Jongkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.600-601
    • /
    • 2021
  • The cyberspace, which is the fifth battle field, should be utilized for multi-domain maneuvering between the cyberspace and the physical space using an electromagnetic spectrum. This becomes a major concept of cyber electronic warfare that combines the characteristics of cyber warfare and electronic warfare. In this study, the concept of cyber electronic warfare is analyzed by using the OSI reference model and examining the threats of the two-layer data link layer.

  • PDF

A Study on Applying EINSTein Model to guerrilla warfare (EINSTein모형의 비정규전 적용에 관한 연구)

  • 이기택;강성진
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.75-89
    • /
    • 2000
  • This paper deals with complex system theory to describe guerrilla warfare situation using EINSTein (Enhanced ISAAC Neural Simulation Tool) simulation model. EINSTein model is an agent-based artificial "laboratory" for exploring self-organized emergent behavior in land combat. Many studies have shown that existing Lanchester equations used in most guerrilla warfare models do not describe changes of combat units, real guerrilla warfare situation and qualitative factors in combat. Future warfare will be information warfare with various weapon system and complex combat units. We have compared and tested results with Lanchester models and EINSTein model. And the EINSTein model has been applied and analyzed to guerrilla warfare model (C4I facilities, coastal, urbanized terrain critical facilities defense). The results show that the EINSTein model has a possibility to apply and analyze guerrilla warfare more properly than Lanchester models.

  • PDF