• Title/Summary/Keyword: security strategy

Search Result 979, Processing Time 0.029 seconds

Developement Strategy for the National Research Network and Next Generation Network Security (국가연구망의 발전방향 및 차세대 국가연구망 보안)

  • Lee, Myoungsun;Cho, Buseung;Park, Hyoungwoo;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.3-11
    • /
    • 2016
  • With repid development of optical networking technology, Software-Defined Network (SDN) and Network Function Virtualization (NFV), high performance networking service, collaboration platform that enables collaborative research globally, drastically National Research Network (NRN) including Internet Service has changed. Therefore we compared and analyzed several world-class NRNs and took a view of future development strategy of the NRN. Also we suggest high speed security environment in super high bandwidth network with 40Gbps and 100Gbps optical transmission technology, network separation of NRN with Science DMZ to support high performance network transmission for science big data, building security environment for last-mile in campus network that supports programmability of IDS using BRO framework.

Analysis of the Reason for ROK's Foreign Strategy Adjustment: The growing threat from DPRK under the U.S.-China strategic competition and its profound influences on the security situation in Northeast Asia (韩国对外战略调整的原因分析-美中战略竞争下不断增加的北韩威胁对东北亚安全局势带来的深远影响)

  • Dongchan Kim;Jangwon Lee
    • Analyses & Alternatives
    • /
    • v.7 no.3
    • /
    • pp.115-144
    • /
    • 2023
  • Under the Trump administration, the U.S. has made clear that "China is America's strategic competitor, revisionist power and a major challenge to America's prosperity and security." The Biden administration has largely inherited this perception of China. China has also responded without backing down. Therefore, the U.S.-China strategic competition has become the most important background factor in the international system and has a great impact on the security situation in Northeast Asia. Nevertheless, if you look at the recent process of establishing trilateral security cooperation among ROK, the U.S. and Japan, we can find that ROK's foreign strategy adjustment has played a key role. This is because establishing trilateral security cooperation among ROK, the U.S. and Japan depends on improving ROK-Japan relations. And the Yoon Suk Yeol government is pushing for rapid improvement in ROK-Japan relations regardless of domestic political constraints. The trilateral summit at Camp David laid the groundwork for future cooperation among ROK, the U.S. and Japan in security and other broader areas. China is strongly dissatisfied with the formation of trilateral security cooperation among ROK, the U.S. and Japan. However, this paper argues that although ROK agrees to form trilateral security cooperation with the U.S. and Japan, ROK's strategic objectives are not exactly the same as those of the U.S. and Japan. For example, looking back at the development of the U.S.-Japan alliance after the end of the Cold War, both the U.S. and Japan share similar views and perceptions of China's rise. The real goal of the strengthening of the U.S.-Japan alliance in recent years is also how to cope with China's rise. On the other hand, ROK's previous administrations have been negative about trilateral security cooperation with the U.S. and Japan. This is because ROK's main strategic goal is to reduce or eliminate threats from DPRK rather than respond to China. Faced with increasing DPRK's provocations and threats, more than half of South Koreans are in favor of reinforcing trilateral security cooperation with the U.S. and Japan to contain or mitigate threats from DPRK. As a result, if North Korea's nuclear and missile threats to ROK continue, then ROK's foreign strategy is likely to be to strengthen trilateral security cooperation between the U.S. and Japan to ensure its own safety and survival. If China wants to reduce the strategic pressure from the trilateral security cooperation among ROK, the U.S. and Japan, the best way is to reduce DPRK's provocations and threats to ROK and play a more substantive role in getting DPRK to give up its nuclear program.

Analysis of the Chinese Navy's Offensive Strategy for the West Sea and the Development Direction of the Korean Navy's Response Strategy (중국해군의 공세적 서해(西海) 진출 전략 분석과 한국해군의 대응전략 발전방향)

  • Kim, Nam-su
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.1-35
    • /
    • 2023
  • The purpose of this study is to present the direction of development of our navy's response strategy through analysis at the ends, ways, and means level of the Chinese navy's offensive strategy for the West Sea. As a result of the analysis, at the ends level, the Chinese Navy's offensive strategy for the West Sea strategy is being linked to a grand strategy to protect maritime rights and achieve maritime power between the U.S. and China competition, at the ways level, the Chinese Navy is expected to create a foundation for the international community to recognize the West Sea as China's inland sea through "routine entry" and "exercise authority", and in case of emergency, it will try to secure sea control in the West Sea in a short period of time by blocking Korea's maritime transportation route based on the overwhelming preemptive attack capability of aircraft carriers. At the means level, it is accelerating the construction of aircraft carrier warfare units and improving its ability to engage long-range missiles. As a direction of development of the Korean Navy's response strategy in response to this, first, Establishment and Development of National Maritime Security Strategy in conjunction with the Korean Indo-Pacific Strategy. Second, it proposes the development of the concept of effective security operations for the east sea area of the West Sea intermediate line, and third, the development of the concept of combat performance and capacity building to strengthen survival and lethality.

  • PDF

A Study on the Qualitative Improvement of Private Security Industrial (민간경호업의 질적 발전 방안에 관한 연구)

  • Song, Sang-Wook
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.113-127
    • /
    • 2006
  • The suggestions that follow are about the Qualitative Improvement of private security Industrial. First, in legal and institutional policy, new establishment by law for private security and more support from government is asked. Moreover, the restructuring or M&A between petty companies and the pricing for security service should be performed. Second, in the structural aspect of private security industry, the professional education center for private security guards should be established and the terms of payment and welfare should be improved to the level above standard. In addition, it should be achieved to change the public to have a new and correct understanding of private security and develope the specialized parts suited to the characteristic and ability of each companies. Third, the construction of operating system for private security service should be achieved; recruit system for competent security guards, marketing strategy and enforcement system, widely known confidence to client, normal training system for security guards and post management system for client. This is also to be suited to the characteristic of each companies.

  • PDF

A study on the Relationship between Organizational Member′s Information Security Mind and Organizational Information Security Level (조직구성원의 정보보안 의식과 조직의 정보보안 수준자의 관계 연구)

  • 정해철;김현수
    • The Journal of Information Technology and Database
    • /
    • v.7 no.2
    • /
    • pp.117-134
    • /
    • 2000
  • This study examines the relationship between the organizational member's information security mind and organizational information security level. The influential relationships among organizational members' information security mind are investigated, and the relationship between organization's information security level and information security mind has been analyzed. As a result, too manager's information security mind is shown to give the biggest influence to other group in the organization. A strong positive correlation exists between organizational member's information security mind and the level of organization's physical, technical, managerial information security. However, there is no significant difference in information security level by types of business. In the future, a more profound study on information security mind is necessary. And alternative methods of information security level estimation need to be studied.

  • PDF

The Consider of China's Great Strategy Change in the Present Age (현대 중국의 대전략 변화 고찰-신 중국 성립 이후 역대 영도자의 사상을 중심으로)

  • Choe, Gyeong-Sik
    • Journal of National Security and Military Science
    • /
    • s.3
    • /
    • pp.121-167
    • /
    • 2005
  • The great strategy of China has been changing depending on the time, change of surrounding environment and personality of leaders of the time. However, the process of the change was not the drastic change but has maintained the consistency through the course of modification and development. The great strategy of Mao Ze-dong was to have the objective in 'World Great Nation' with the facilitation of the 'Surpass Strategy' and 'Autonomy, Independence and Alliance strategy' to successfully build up the political great nation, but he entrapped China's politics and economy into the point of no return by excessive war preparation under 'The Principle of Inevitable World War', striving of rapid communism and other policies. The Deng Xiao-ping era also targeted for ‘World Great Nation’ but, unlike Mao Ze-dong, he had the foundation in the 'The Principle of Evitable World War' and undertook the ‘Peace and Development Strategy’ and ‘Peaceful Coexistence' to build up the advantageous surrounding environment for China to focus on the economic construction as the core of the nation by establishing ‘The Reform and Opening Strategy’ and 'Three-step Development Strategy‘ to have the successful soft landing of the Chinese economy with the astonishing economic development. The system of leader's group of China after Deng Xiao-ping succeeded the practical and realistic spirit of Deng Xia-ping, and based on the drastically grown economic strength, the great strategy of China is on the ‘The Great Reinvigoration of Chinese Nation’. This is one step further from the strategy of 'World Great Nation' of the past that it embraces all the minority races in China, Chinese economic sphere, foreign citizens of Chinese origin as well as Chinese residing abroad. China contemplates the time of making 'The Great Reinvigoration of Chinese Nation’ in 2050, 100 anniversary of the birth of new China.

  • PDF

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.2
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.

Internal and External Characteristics of Information Security Officers Affecting Organization's Information Security Performance (조직 정보보호성과에 영향을 미치는 정보보호담당임원의 내·외적 특성)

  • Oh, Ha-Kyeong;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.4
    • /
    • pp.1-19
    • /
    • 2020
  • Infringement of information security has caused the corporate image to be damaged and share price to fall, and it is emerging as an organizational risk. The value of information assets in enterprises has led to a higher level of security than in the past. As a result, companies are aware of the need for officers to protect information and to oversee a security management system. However, despite the growing importance of information security officers, there is a lack of research on their roles and characteristics. This study validates the relationship between determinants that affect the performance of information security. And a structural equation model was presented and empirically analyzed to see the impact of the internal and external characteristics of the staff in charge of information security on the organization's information security performance.

"Peaceful Uses" of Outer Space and Japan' s Space Policy

  • Takai, Susumu
    • The Korean Journal of Air & Space Law and Policy
    • /
    • no.spc
    • /
    • pp.247-270
    • /
    • 2007
  • Space development and utilization must be conducted within a framework of "peaceful uses" principle under Space Treaty. Japan ratified the treaty in 1967, and interpreted "peaceful uses" as "non-military uses" then. A ghost of "peaceful uses" principle has been hung over Japan up to the moment. Japan's space development and utilization has been conducted with genuine academic interest, and therefore Japan did not introduce space infrastructures to national security policy and did not facilitate growth of space industry. When the Cold War ended, Northeast Asian security environment makes Japan difficult to maintain an interpretation as "non-military uses". Besides the change of external security environment, the domestic industry situation and a series of rocket launching failure needed reexamination of Japan's space policy. Japan is gradually changing its space policy, and introducing space infrastructure in a national security policy under a "generalization" theory that gave a broad interpretation of "peaceful uses" principle. Council for Science and Technology Policy (CSTP) adopted a basic strategy of Japan's space policy in 2004. Since then, a long-term report of Japan Aerospace Exploration Agency (JAXA), an investigation report of Society of Japanese Aerospace Companies (SJAC) and a proposal of Japan Business Federation (JSF) were followed. Japan will promote space development and utilization in national security policy with a "strictly defensive defense" strategy and "non-aggressive uses"principle for protection of life and property of Japanese people and stabilization of East Asian countries.

  • PDF

Cyber attack taxonomy for digital environment in nuclear power plants

  • Kim, Seungmin;Heo, Gyunyoung;Zio, Enrico;Shin, Jinsoo;Song, Jae-gu
    • Nuclear Engineering and Technology
    • /
    • v.52 no.5
    • /
    • pp.995-1001
    • /
    • 2020
  • With the development of digital instrumentation and control (I&C) devices, cyber security at nuclear power plants (NPPs) has become a hot issue. The Stuxnet, which destroyed Iran's uranium enrichment facility in 2010, suggests that NPPs could even lead to an accident involving the release of radioactive materials cyber-attacks. However, cyber security research on industrial control systems (ICSs) and supervisory control and data acquisition (SCADA) systems is relatively inadequate compared to information technology (IT) and further it is difficult to study cyber-attack taxonomy for NPPs considering the characteristics of ICSs. The advanced research of cyber-attack taxonomy does not reflect the architectural and inherent characteristics of NPPs and lacks a systematic countermeasure strategy. Therefore, it is necessary to more systematically check the consistency of operators and regulators related to cyber security, as in regulatory guide 5.71 (RG.5.71) and regulatory standard 015 (RS.015). For this reason, this paper attempts to suggest a template for cyber-attack taxonomy based on the characteristics of NPPs and exemplifies a specific cyber-attack case in the template. In addition, this paper proposes a systematic countermeasure strategy by matching the countermeasure with critical digital assets (CDAs). The cyber-attack cases investigated using the proposed cyber-attack taxonomy can be used as data for evaluation and validation of cyber security conformance for digital devices to be applied, and as effective prevention and mitigation for cyber-attacks of NPPs.