• Title/Summary/Keyword: 공격전략

Search Result 261, Processing Time 0.026 seconds

어떤 기업이 적대적M&A 대상인가?

  • Korea Venture Business Association
    • Venture DIGEST
    • /
    • s.117
    • /
    • pp.31-33
    • /
    • 2008
  • 2006년도 새해 벽두부터 신문과 TV 등 언론을 통해 뜻밖의 사건이 발생하였다. 공기업에서 민영화 된 KT&G를 공격한 칼 아이칸의 기사가 신문에 도배되면서 적대적 M&A라는 용어가 일반인에 게도 알려지게 되었으며, 대기업은 물론 중소, 벤처기업 등 많은 기업들도 이에 대한 방어전략에 부심하는 등 이 사건은 적대적 M&A에 대한 관심이 높아진 계기가 되었다. 그러나 우리는 이미 2003년과 2004년에 적대적 M&A가 발생하여 진행되는 과정을 경험한 바 있다. 소버린이 SK의 경영권 탈취를 위하여 약 15%에 이르도록 저가로 주식을 매집하여 최대주주가된 후에 집요하게 경영권 확보를 위하여 공격을 하였지만 국내 금융기관 및 소액주주가 SK의 백기사가 되어 줌으로써 경영권을 탈취하는 데 실패하였다. 하지만 소버린은 이 과정에서 막대한 주가차익을 챙기는 소득이 있었으며 모든 주식을 정리한 후에 철수를 하였다.

  • PDF

Sail Drone 선박 개발을 위한 무인 제어선박 기초 기술 연구

  • Man, Dong-U;Kim, Ji-Yeong;Kim, Jae-Gwan
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.11a
    • /
    • pp.108-110
    • /
    • 2018
  • 항공 드론의 비약적 발전에 비해 소형 선박을 이용한 Sail Drone의 기술 개발은 이제 막 초보적인 수준을 벗어나, 해양과학 조사에 이용되고 있는 추세이다. Sail Drone은 항공드론으로는 할 수 없는 해양의 조류, 해수 온도, 염분 농도 및 염분의 비중, 오염 해역의 측정과 어류의 분포 등 다양한 해양과학 자료의 조사뿐만 아니라, 선형 및 사용 용도를 변경하면 군사적으로도 적지의 관찰과 적 잠수함의 추적, 공격목표물에 대한 충돌 폭파, 아군의 미사일 등 전략무기의 공격 목표(Target) 등 다양한 방법으로 이용 할 수 있다. 추진동력을 얻기 위한 재생에너지 기술, 해양과학 Sensor의 설치 및 이용에 관한 기술, 획득한 정보의 전송 및 판독에 관한 기술, 무인 항행 조정 기술, GPS를 포함한 위치정보 이용 기술 등 복합적이고도 융합적인 기술이 요구되는 Sail Dronen 개발에 앞서 무인 제어선박을 연구하였다.

  • PDF

U.S Navy's Distributed Lethality Concept and Its Implications for East Asian Security (미 해군의 전력분산의 치명성이 동아시아 안보에 주는 함의)

  • Moon, Changhwan
    • Strategy21
    • /
    • s.44
    • /
    • pp.79-102
    • /
    • 2018
  • 2015년 미 해군에서 발간한 미 수상함대전략(Surface Force Strategy)에 따르면, 미 해군은 반접근-지역거부(Anti-Acess and Anti-Denial, A2/AD) 전략에 대한 대응책으로 '분산된 치명성(Distributed Lethality, DL)'이라는 신 작전개념을 개발 중에 있다. 이 개념은 각 유닛(unit)의 공격력(offensive power)을 향상시키고 지리적으로 분산 시킴으로써(geographical dispersion) 생존성을 향상시키는데 목적을 두고 있다. 하지만 동맹국(한국/일본 등)이 '분산된 치명성(DL)' 개념에 기여할 수 있는 영역이 다양함에도 불구하고, 지금까지 미 해군 내에서는 동맹국과 어떻게 공조해야 할 것인가에 대한 논의가 부족한 것이 사실이다. 따라서, 미 해군은 향후 '분산된 치명성(DL)' 이라는 작전개념에 동맹국이 줄 수 있는 이점을 추가적으로 적용하는 '동맹국을 활용한 분산된 치명성(Distributed Lethality with Allies, DL+A)' 개념을 발전시켜야 할 것이다. '동맹국을 활용한 분산된 치명성(DL+A)' 개념이란 동맹국이 가지고 있는 전력, 시설, 플랫폼 등 가용자산을 최대한 활용하여 기존의 '분산된 치명성(DL)' 개념을 강화시키는 신 작전개념이다. 미 해군은 본 논문에서 제시하는 신 작전개념(DL+A)을 적용함으로써 다양한 영역(정찰, 군수, 지리적 요충지, 플랫폼)에서 동맹국으로부터 지원을 받을 수 있을 것이다. 또한, 동맹국은 미 해군의 신 작전개념을 적용함으로써 A2/AD 전략에 대비한 안보능력을 향상시킬 수 있을 것이다.

Analysis of the Causes of the Israel-Hamas War and Strategic Implications (이스라엘-하마스 전쟁원인 분석과 전략적 함의)

  • Il Soo Bae;Hee Tae Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.1-5
    • /
    • 2024
  • With the Russia-Ukraine war ongoing, the war broke out due to a surprise attack by Hamas on October 7, 2023. Israel and Hamas had a conflict with similar causes and aspects in 2021, which was immediately resolved with a peace agreement. It is no exaggeration to say that 'human history is the history of war.' War accounts for a significant portion of human history. According to Kenneth Waltz, the violent and selfish nature of humans, the nature of nations pursuing their own interests, and the international system act simultaneously as causes of war. The purpose of this study is to analyze the causes of the Israel-Hamas war using Kenneth Waltz's three image theories to derive implications and provide implications for Korea's military strategy.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Factors Associated with Drinking Experience, Smoking Experience, and Internet Addiction among Elementary School Students (초등학생의 음주 및 흡연 경험, 인터넷 중독 영향 요인)

  • Kim, Bongjeong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.6
    • /
    • pp.358-369
    • /
    • 2015
  • This study examined the status of and factors associated with drinking experience, smoking experience, and internet addiction among elementary school students. Cross-sectional data were collected by questionnaire from 1,061 children among the fifth and sixth grades in public elementary schools in Gyeonggi province. The prevalence of drinking and smoking experience, internet addiction of participants was 22.7%, 2.9%, and 4.2% respectively. Multiple logistic regressions showed that the likelihood of drinking and smoking experience, and internet addiction was commonly higher with those who was a male and had higher aggression level. The likelihood of drinking experience was lower with those who had higher family support, while was higher with those who had higher friend support. That of internet addiction was lower with having higher friend and teacher support. Prevention strategies to prevent drinking, smoking, and internet addiction among elementary school students should consider student's gender, control aggression, and enhance social support in family and school environments.

A Study on Cybersecurity Policy in the Context of International Security (국제협력을 통한 사이버안보 강화방안 연구)

  • Kim, So Jeong;Park, Sangdon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.51-59
    • /
    • 2013
  • Cyberspace, based on the dramatic development of information and communications technology, has brought enormous benefits to mankind. However, concerns over cyber terrorism and cyber attack are becoming serious. It is time to expand the global dialogue on international security issues in cyberspace. It is imperative to have a common understanding that cyberspace, the infrastructure for prosperity, should not be utilized as a space to create conflicts among states, and that all states agree to build confidence and peace in cyberspace. For this purpose, there are 3 tracks of international cooperations: 1)international cooperation such as UN and Conference on Cyberspace, 2)regional cooperations such as ARF and OSCE. 3)bilateral cooperations such US-Russia Cybersecurity Agreement, US-China presidential level dialogue. This paper will analyze the 1st track of international cooperations of UN and Conference on Cyberspace. With this, Korean government can prepare the forthcoming GGE activities and make our own strategy to deal with the global norms of good behaviour in cyberspace.

Vehicle Ramming Terror Attacks and Physical Barriers as a Counterterrorism Policy (차량돌진테러와 물리적 방어물에 관한 연구)

  • Yun, Minwoo;Kim, Eunyoung
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.9-29
    • /
    • 2018
  • Recently, it has been frequently reported there were rapid increase of vehicle ramming attacks in the Western countries, such as Europe, United States of America, Australia, and Canada. Vehicle ramming attacks happened in Western countries specifically targeted civilians and maliciously intented to attack as many victims as possible. and resulted in significant number of casualties and wounds. Experts in terrorism analyze the increase of terrors using vehicle is largely due to the change of terror strategy of Islamic extremest groups like ISIS which encouraging would-be terrorist to use vehicles as an effective killing weapons. Accordingly, The most of countries experienced vehicle terrorist attacks began to build physical barriers including ballards, fences, and obstacles on the main shopping streets, transportation facilities, and famous crowded places and buildings in order to prevent mass killing by terrorists' vehicle ramming attack. Contrary to such swift respond to be prepared attacks using vehicle as a weapon Western countries, there are still lack of interests in preparing this type of terrorist attacks among domestic policy makers and scholars. To fulfill the research gap, this study aimed to investigate important issues regarding physical barriers in South Korea. The contributions, implications of this study and suggestions for policy implications of this study findings were discussed in results and discuss.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

North Korea's Nuclear Strategy: Its Type Characteristics and Prospects (북한 핵전략의 유형적 특징과 전망)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.2
    • /
    • pp.171-208
    • /
    • 2017
  • This paper is to analyze the type characteristics and prospects of the North Korean nuclear strategy. To this end, the paper is composed of 5 chapters titled introduction; the concept and type of nuclear strategy; the nuclear capabilities of North Korea and the declarative nuclear strategy; the operational characteristics and prospects of the North Korean nuclear strategy; and conclusion. Recently, the deployment of nuclear weapons and the enhancement of nuclear capabilities in North Korea have raised serious problems in our security and military preparedness. Nuclear strategy means military strategy related to the organization, deployment and operation of nuclear weapons. The study of North Korea's nuclear strategy begins with a very realistic assumption that the nuclear arsenal of North Korea has been substantiated. It is a measure based on North Korea's nuclear arsenal that our defense authorities present the concepts of preemptive attack, missile defense, and mass retaliation as countermeasures against the North Korean nuclear issue and are in the process of introducing and deploying them. The declared nuclear declaration strategy of the DPRK is summarized as: (1)Nuclear deterrence and retaliation strategy under the (North Korea's) Nuclear Weapons Act, (2)Nuclear preemptive aggression, (3)The principle of 'no first use' of nuclear weapons in the 7th Congress. And the intentions and operational characteristics of the North Korean nuclear strategy are as follows: (1)Avoiding blame through imitation of existing nuclear state practices, (2)Favoring of nuclear strategy through declarative nuclear strategy, (3)Non-settlement of nuclear strategy due to gap between nuclear capability and nuclear posture. North Korea has declared itself a nuclear-weapon state through the revised Constitution(2012.7), the Line of 'Construction of the Nuclear Armed Forces and the Economy'(2013.3), and the Nuclear Weapons Act(2013.4). However, the status of "nuclear nations" can only be granted by the NPT, which is already a closed system. Realistically, a robust ROK-US alliance and close US-ROK cooperation are crucial to curbing and overcoming the North Korean nuclear threat we face. On this basis, it is essential not only to deter North Korea's nuclear attacks, but also to establish and implement our own short-term, middle-term and long-term political and military countermeasures for North Korea's denuclearization and disarmament.