• Title/Summary/Keyword: information warfare

Search Result 368, Processing Time 0.023 seconds

A Simulation Model for the Response of Information-Warfare based on Computer Forensics (정보전대응을 위한 컴퓨터 포렌식스 기반 모의실험1))

  • Choe, Yong-Rak;Ko, Byong-Su;Park, Meong-Chan
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.391-421
    • /
    • 2003
  • While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.

  • PDF

A Study on the Defense Information System Security Guideline for Network Centric Warfare (네트워크 중심전(NCW)하의 국방정보체계 제대별/기능별 정보보호지침 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information system security guidelines for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military officers establish information system security measures within their organization.

  • PDF

A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing (유비쿼터스 환경에서의 NCW 정보보호 대책)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.15-22
    • /
    • 2010
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information security guidelines for NCW, especially for ubiquitous network computing environment. For this purpose, this paper identified changes of battle aspect of tactical level and characteristics of information threats, and finally, the research suggested several information security guidelines for NCW. This paper is to intended to help military organization's planners determine practical and implemental plans in the near future.

A Study on the Information Security Plan for Network Centric Warfare : Development of Information Security Governance Assessment Index (네트워크 중심전(NCW)하의 정보보호체계 구축방안 연구 : 정보보호체계 평가지표 개발을 중심으로)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.83-91
    • /
    • 2007
  • Information security is a critical issue for network centric warfare(NCW). This paper provides a information security governance index for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military organization's planners determine the degree to which they have implemented an information systems governance framework at the strategic and tactical level within their organization.

  • PDF

A study on the estimation method for the bandwidth of the radar range tracker using the receiver parameters in electronic warfare (전자전에서 레이더 수집변수를 활용한 레이더 거리추적 대역폭 추정방법에 관한 연구)

  • Jo, Jeil;Kim, So-yeon;Lee, Jung-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.357-358
    • /
    • 2018
  • The track radar use the range track loop to track the target range. The bandwidth of the radar range tracker can be determined by tradeoff according to signal to noise ratio and the target range. On the other hand, electronic warfare is carried out to prevent the radar from tracking targets by electronic attack. The deception or noise jamming in electronic warfare can be performed to interfere with the range track loop of the radar. In order to efficiently perform electronic warfare, the bandwidth in radar tracking loop is estimated and can be used for electronic attack. To do this, we have studied the method of estimating the bandwidth of radar tracking loop using the variables that can be gathered in electronic warfare.

  • PDF

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

A Study on the Concept of the Cyber Warfare and the Plan of Reaction (사이버전의 개념과 대응방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.521-524
    • /
    • 2014
  • Because of the development of computers and networks, the use of the internet has been rapidly increased. The smart devices, such as smart phones and tablet PCs, have made an epoch-making changes, which have brought people's daily lives to the cyber world and life values have been improved. The cyber world not only just changed individual's lives, but also affected all areas and the world. The recent global trends reside mainly in protection of energy sources, and nation's dependency of the information system such as politic, economic and national security. Since major national infrastructure becomes a stragic attack target, the importance of cyber warfare has rised as an effective way to attact enermy. This article explores the concept of cyber warfare and national cyber capability, and then figure out the plan of reaction to minimize damages with best protection when cyber warfare occurs.

  • PDF

A Study on Applying Amphibious Warfare Using EINSTein Model Based on Complexity Theory (복잡계이론 기반하 EINSTein 모형을 이용한 상륙전 적용에 관한 연구)

  • Lee, Sang-Heon
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.2
    • /
    • pp.114-130
    • /
    • 2006
  • This paper deals with complexity theory to describe amphibious warfare situation using EINSTein (Enhanced ISAAC Neural Simulation Tool) simulation model. EINSTein model is an agent-based artificial "laboratory" for exploring self-organized emergent behavior in land combat. Many studies have shown that existing Lanchester equations used in most war simulation models does not describe changes of combat. Future warfare will be information warfare with various weapon system and complex combat units. We have compared and tested combat results with Lanchester models and EINSTein model. Furthermore, the EINSTein model has been applied and analyzed to amphibious warfare model such as amphibious assault and amphibious sudden attack. The results show that the EINSTein model has a possibility to apply and analyze amphibious warfare more properly than Lanchester models.

A System Design Method of Mine Warfare Using Information for SONAR and MDV (소나와 무인기뢰처리기 정보를 활용한 기뢰전 체계 설계 방안)

  • Kim, Jun-Young;Shin, Chang-Hong;Kim, Kyung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1243-1249
    • /
    • 2014
  • The naval mine is the explosives that are installed in the water in order to attack surface ships or submarines. So mine warfare is a very important component of naval operations. In this paper, first, understanding of the general concept about mine warfare. Second, introduce the mine hunting progress and mine sweeping progress. And then, suggest the system design method of mine counter measure warfare using several functions. The functions are mine area detection algorithm for side scan sonar image using Adaboost algorithm, and calculation to mine hunting progress rate and mine sweeping progress rate. And techniques that lead the mine disposal vehicle(MDV) to mine.

Conditions and Strategy for Applying the Mosaic Warfare Concept to the Korean Military Force -Focusing on AI Decision-Making Support System- (한국군에 모자이크전 개념 적용을 위한 조건과 전략 -AI 의사결정지원체계를 중심으로-)

  • Ji-Hye An;Byung-Ki Min;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.122-129
    • /
    • 2023
  • The paradigm of warfare is undergoing a revolutionary transformation due to the advancements in technology brought forth by the Fourth Industrial Revolution. Specifically, the U.S. military has introduced the concept of mosaic warfare as a means of military innovation, aiming to integrate diverse resources and capabilities, including various weapons, platforms, information systems, and artificial intelligence. This integration enhances the ability to conduct agile operations and respond effectively to dynamic situations. The incorporation of mosaic warfare could facilitate efficient and rapid command and control by integrating AI staff with human commanders. Ukrainian military operations have already employed mosaic warfare in response to Russian aggression. This paper focuses on the mosaic war fare concept, which is being proposed as a model for future warfare, and suggests the strategy for introducing the Korean mosaic warfare concept in light of the changing battlefield paradigm.