• Title/Summary/Keyword: information warfare

Search Result 368, Processing Time 0.021 seconds

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

A Proposal of New MOE to Assess the Combat Power Synergistic Effect of Warfare Information System (전장 정보체계의 전투력 상승효과 측정을 위한 새로운 MOE 제안)

  • Lee, Yong-Bok;Jung, Whan-Sik;Kim, Yong-Heup;Lee, Jae-Yeong
    • IE interfaces
    • /
    • v.22 no.3
    • /
    • pp.205-213
    • /
    • 2009
  • Warfare information system is a core factor of future combat operation under NCW(Network centric Warfare) environment. In this paper, we proposed a new MOE(Measure of Effectiveness) that can assess the combat power synergistic effect of warfare information system in the theater-level joint fire operation. This new MOE uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}(M{\upsilon}I)/T$). Four factors considered in combat power evaluation are network power(M), movement velocity(v), information superiority(I), command and control time(T). We applied this new MOE to the JFOS-K(Joint Fire Operating System-Korea) to assess its combat power effect and compared with other's effects obtained from different MOE.

Shift in Warfare Paradigm and Military Transformation (전쟁패러다임의 전환과 군사변혁)

  • Jeong, Chun-Il
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.381-418
    • /
    • 2006
  • In present, advanced countries in the world are seen concentring on Military Transformation to create new military capability as there is a shift in Warfare Paradigm. Rapid development of technology enables military system, operational concept and organization innovated. As a result, Revolution in Military Affairs(RMA) that dramatically increased warfighting capability is pursued. Especially, advanced information technology constructs system of systems with abilities of battle visualization, information sharing in battlefield, long-range strike capability that are interoperable and combined. Corresponding to this, engagement methods and organizations are being progressively developed. The purpose of this thesis is overview of newly developing Warfare Paradigm and analysis of tendency of Military Transformation that advanced countries are pursuing preparation to this. Above all, specific aspects and contents of the Warfare Paradigm which emerged by information age were summarized. Subsequently, Military Transformation which provides the basic concepts and principles to the advanced countries in the world for the creation of new military capability was discussed. In conclusion, the tendency of Military Transformation by U.S.A, Japan, China, and Russia surround the Korean peninsular as the major power in military was carefully observed.

  • PDF

A Study on Human Resource Management for Information Security in the Age of Information Warfare (사이버테러정보전 전문인력 양성 및 관리 방향에 대한 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.43-57
    • /
    • 2005
  • This paper is about a study on human resource management for information security in the age of information warfare. this study reviewed the current status of human security resource forces for information warfare and derived problems of current practices of various organizations. Based on the analysis of the current practices the author suggested several ideas for solving the problems various. The suggestions include 1) establishment of security manpower concept, 2) set-up of manpower requirement, ideas, 3) establishment of systematic educational system, 4) standardization, etc.

  • PDF

A Study on the Defense Cyber Warfare Exercise (국방사이버전 연습체계 개선 방안 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.43-53
    • /
    • 2009
  • In the information society, information security is a critical issue for defense cyber network system. This paper provides a result of a study on the defense cyber exercise system for cyber warfare. So far, defense cyber exercise system has been uneffective and is not systematic even if several exercises has been implemented. In order to overcome these problems, a systematic and integrated cyber exercise process is suggested. Under the suggested system, we expect that cyber exercise for cyber warfare will be implemented with more effective manner.

  • PDF

A Study on Efficient Friendly Forces Location Data Sharing on Battalion and Below

  • Kim, Hyung-Seok;Shin, Sang-Heon;Kim, Yong-Cheol;Lee, Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.95-101
    • /
    • 2018
  • In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a 'Network Centric Warfare' with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the basic elements in the 'Network Centric Warfare' is to share friendly forces location data. The bandwidth and transmission rates of radio used in battalion are low. Nevertheless, we should share our locations data almost in real time for effective fighting in a war situation. This paper describes the efficient method of friendly forces location data sharing based on low bandwidth radio. In particular, the concept of 'network-centered warfare' is reflected in the troop below the battalion to present an integrated and efficient way to shared location data of friendly forces.

An Attack Model Based on Software Cruise for Information Warfare (정보전을 위한 소프트웨어 순항 기반 공격 모델)

  • Ryu Ho-Yeon;Nam Young-Ho
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.49-60
    • /
    • 2004
  • Information Warfare(IW), a new aspect of war, is the field centralized the concern and research in the information security and national security, Both the defense and the offensive are important in the next generation IW, and so we need to do the various research to secure the network and system for gaining the superiority of IW. This paper proposes a model for IW based on software cruise to prepare the IW that is changing the offensive aspect. Software cruise is defined as a behavior of computer programs that travel toward specific destination from a source through the network. The proposed model have the cruise property and uses the cybermap to cruise toward the destination chosen in advance. Also, while self-movement, the model can function the predefined task.

  • PDF

A Study on the direction of implementing the Defence Logistics Supproting System for Network Centric Warfare (미래 네트워크중심전쟁에 부합하는 네트워크화 군수지원시스템 구축 방향)

  • Choi, S.Y.;Kang, S.J.;Park, K.W.
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.2
    • /
    • pp.165-187
    • /
    • 2006
  • The aim of this study is to suggest the direction of implementing the new defense logistics systems for the network centric warfare in the future. For this purpose, we reviewed SARL(Sense and Response Logistics) which receives great attention from the U.S. Department of Defence as the future logistic concept of network centric warfare, coupled with recent development in information technologies which give technical revolution in the future logistics information system. Also, we analyzed problems underlying logistics information system currently used in the Korean Armed Forces. Finally, we suggested the direction of implementing the new logistics information system for the network centric warfare, expecting to reduce total logistics cost, speed up logistics velocity, and enhance the efficiency of the combat support.

Implementation of OFP initialization function in IMDC for FA-50 aircraft

  • You, Eun-Kyung;Bae, Chan-Gyu;Kim, Hyeock-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.111-118
    • /
    • 2019
  • Recent trends in modern warfare are increasing in importance for air warfare, information warfare, and warfare. The technology of the weapon system software is rapidly developing, and the silent information war to hack it is still going on. Currently, the FA-50 aircraft has a function that can be initialized by a simple switch operation to protect the main military information in the event of an emergency. However, there are limitations in the existing Zeroize function, and this study was carried out to supplement this. First, we compare and analyze the memory structure of aircraft operating in our military, and examined the currently implemented Zeroize function. Second, we reviewed various methods to overcome the limitation of existing Zeroize function. Third, we implement the existing Zeroize function without additional manipulation. In this paper, we propose that the implementation of this feature will enable us to protect our military data more securely and suggest that we should continue to look for ways to enhance security for our technology in the future.