• Title/Summary/Keyword: 보안 협상

Search Result 54, Processing Time 0.022 seconds

Constructivist Implications of the 9.19 Military Implementation Agreement (9.19 군사합의서의 구성주의적 함의 고찰)

  • Lee, Kang Kyong;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.101-110
    • /
    • 2020
  • Since the third inter-Korean summit, the inter-Korean summit in Pyongyang and the U.S.-North Korea summit in Singapore and Hanoi, denuclearization negotiations are under way that will determine the fate of the Korean Peninsula. However, the negotiations are stalled and some skepticism is expected due to the conflicting U.S.-North Korea stance over the terms of denuclearization. The reason why it is difficult to realize the complete denuclearization of North Korea is that there are a variety of variables such as the traditional security dilemma in Northeast Asia, the hegemonic competition between the U.S. and China, and the formation of a new cold-war system. At a turning point when three inter-Korean summits and three U.S.-North Korea summits were held in the wake of the 2018 PyeongChang Winter Olympics, North Korea's complete denuclearization has become a must-do historical task for Northeast Asia and world peace beyond the Korean Peninsula. In this sense, the inter-Korean summit in Pyongyang is seen as a historic occasion for presenting a new milestone for the denuclearization of North Korea and the development of inter-Korean relations through the 9.19 Pyongyang Joint Declaration and the Military Agreement. Meanwhile, Constructivism, which has become the main paradigm of international political theory, presents the view that ideological variables such as ideology, history and culture define material factors, identity and interests of state actors, and that the structure of international relations can be changed through interaction. In this study, the historical meaning of the 9.19 Pyongyang Declaration, which is now past its first anniversary, was considered from a constructivist perspective. To this end, the development process of constructivism theory and analysis model and the development process of inter-Korean relations were briefly reviewed, and the military implications of the 9.19 Military Agreement were presented.

A Study on the Korean National Police's Protesting Policing Policy through the Analysis of Negotiated Management Model (협의관리모델 분석을 통한 한국 경찰의 집회시위 관리정책 연구)

  • Hwang, Kyu-Jin;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.65-77
    • /
    • 2011
  • In Western Europo and the US, there has been a general trend over 30 years of reducing the amount of force by the police, through a paradigm shift from 'Escalated Force Model' towards 'Negotiated Management Model'. In tune with this trend, for example, the Swedish Police have implemented the uniformed 'Dialogue Police' system, in order to establish communication contact with demonstrators, before, during, and after their events, The Negotiated Management Model involves a greater respect for the rights of protesters, a more tolerant approach to community, and improved intelligence, communication, and flexibility, in order to facilitate lawful protests and to reduce the possibility of an escalation of major public disorder. The Korean National Police (KNP) appears to be operated within this negotiated management framework, since in preparation for the G20 Seoul Summit, they have also emphasized good communication between the police and protest groups, by newly creating the concept of 'Protest Policing Through Facilitation of Lawful Protests'. In this context, this study first attempts to analyze not only the negotiated management model, but also the Swedish dialogue police. Secondly, the study conducts a comparative study between the KNP's Protest Policing Through Facilitation of Lawful Protest and the Swedish dialogue police system, particularly, in conjunction with the negotiated management. Although Korean and western police have different system and history, protest policing model is now approaching with each other through a link between conflict resolution techniques, such as dialogue, negotiation, mediation and facilitation. Finally, the study is to prove if the KNP's protest policing model corresponds with the negotiated management model, and further to suggest new 'Facilitation of Conflict Resolution Model' as a desirable future of the KNP's protest policing.

An Implementation and Evaluation of Improved Anti-DoS IKE Protocol Engine for Interaction with IPsec System (IPsec과 연동되는 개선된 Anti-DoS IKE 프로토콜 엔진의 구현 및 평가)

  • Kim, Sung-Chan;Choun, Jun-Ho;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.1005-1016
    • /
    • 2006
  • As the increment usage of Internet, the security systems's importance is emphasized. The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system, was pointed out a problem of efficiency and stability. In this research, we try to resolve those problems, and evaluate the newly designed Key Exchange protocol in the IPsec interaction test bed system environment. In this research we implemented the new Key Exchange Protocol as a recommendation of RFC proposal, so as to resolve the problem which was pointed out the key exchange complexity and the speed of authentication process. We also designed the defense mechanism against the Denial of Service attack. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency as a result of reuse the preexistence state value when it's renegotiated.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

A Comparative Study on the Arms Control Approach Method toward North Korea in between the Past and the Moon Government (과거와 현 문재인 정부의 대북 군비통제 접근방법 비교 연구)

  • Lee, Pyo-Kyu
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.147-156
    • /
    • 2019
  • The purpose of this study is provide appropriate arms control measures between South and North Koreas by comparing and analyzing the former proposals and agreements in the past and the current Moon Government's approach representing the 9.19 military agreement. For this, I established the most appropriate framework for analysis through comparing and analyzing the arms control theories. The policies of the past governments and of the current Moon Jae-in government are analyzed. The most highlighted characteristic was that the arms control policies were projected by not from the military confidence, but political confidence building measures or both concurrently. In conclusion, I suggested the strategies of projecting confidence building measures and arms control or disarmament in the process of projecting the peace settlement. Nonetheless, the most important point is that the policies of arms control and unification should be pushed ahead complementally.

A Study on Liberalization of Cross-Border Data Transfer in Digital Trade Agreements (디지털 무역협정의 국경 간 데이터 이전 자유화 연구)

  • Chung, Jason
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.627-628
    • /
    • 2022
  • There is no internationally accepted codified definition of digital trade because of the wide variety and scope of related industries and transactions(product + service + data) in general. Recently, innovative changes are taking place in digital trade due to the development of technologies such as IT due to the 4th industrial revolution, and advanced countries such as the US, EU, and Japan are including digital trade issues such as data movement liberalization in the negotiation agenda of the digital trade agreement. The issue with the liberalization of cross-border data movement is that freedom of data movement is necessary to vitalize digital trade, but it also increases the risk of information security and privacy violations. Looking at the directions of advanced countries, the US favors minimization of regulations, Europe favors regional single marketization, but passively opens up to the outside world, and China promotes independent markets through regulations. Therefore, measures to strengthen restrictions on cross-border data movement are an issue that has recently been implemented by each country or an international aggrement is scheduled to be reached soon, and Korea also needs a close response.

  • PDF

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.

A study on the key management protocols for the Internet (인터넷 키 관리 프로토콜에 관한 연구)

  • Lee, Kye-Sang
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.133-140
    • /
    • 2003
  • IKE, which is the standard key management protocol for IPSEC, is said to have several known problems. To resolve the problems of the IKE, two protocol proposals are being discussed in the IETF. the IKE version 2 and Just Fast Keying protocols. They should satisfy several protocol design requirements such as the protocol simplicity, the endurability against DOS attacks, the degree of the PFS, the identity protection, the cryptographic negotiation, and the authentication methods. In this paper, we summarize the characteristics of these two protocols and try to analyze their implications according to the protocol design requirements.