• Title/Summary/Keyword: 융합안보

Search Result 179, Processing Time 0.025 seconds

A Study on Measures for Strengthening Cybersecurity through Analysis of Cyberattack Response (사이버공격 대응 분석을 통한 사이버안보 강화 방안 연구)

  • Yoon, Oh Jun;Bae, Kwang Yong;Kim, Jae Hong;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.65-72
    • /
    • 2015
  • Recent cyberthreats are emerging as big issues that need to be addressed to both developed countries and South Korea. Our government has implemented and established comprehensive measures whenever major incidents were happened. It is still insufficient, even though the national and social level of cybersecurity are improved with continuous investments and efforts to strengthen the country than in the past. Comprehensive measures have been exposed to limit the effectiveness because they are focused on short-term measures. In this paper, we try to analyze the problems of incidents and assess the implementation process of establishing comprehensive measures in order to suggest ways ultimately to improve the country's overall level of cybersecurity.

The optimization of energy and food interdependencies in view of water security (물안보 관점에서의 에너지, 식량 연계 최적화 방안 접근)

  • Lee, Eul Rae;Park, Sang Young
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.461-461
    • /
    • 2018
  • 우리나라를 포함하여 전 세계적으로 기후변화로 기인하는 기상변동성 증가 등의 원인으로 물, 식량, 에너지의 시공간적 불균형이 발생할 것으로 전망되고 있다. 특히 미국 캘리포니아 2012-2015 대가뭄, 우리나라의 2013-2015 대가뭄 등 물부족의 위험 가능성이 증폭됨에 따라, 이와 관련된 에너지와 식량 등의 연계자원들도 기존의 방법과 같이 관리되고 활용하는 것에 한계점이 도달하고 있다. 기후변화와 같이 기상학적 스트레스 증가와 더불어, 국제적으로 인구증가 및 도시화가 확대될 것으로 전망되며, 한국, 미국, 중국, 인도 등에서 물안보에 대한 우려가 현실로 다가오고 있으며, 세계경제포럼(world economic forum)의 "전 지구적 위험도 인지 조사"에서도 물, 식량, 에너지 위기에 대한 심각성을 강조하고 있다. 물, 식량 그리고 에너지는 서로 밀접한 연관성을 가지고 있으며, 개별 분야에서의 문제는 그 자체의 위기로 그치지 않고 다른 타 분야의 위험도를 증폭시키는 원인으로 작용하게 된다. 과거와 다르게 교통, 물류 등의 발달로 물, 식량 및 에너지의 국가간 의존도가 더욱 증가하는 방향으로 전개되고 있으며, 세 가지 자원의 연계성 강화는 결국 상호위기를 선제적으로 대응할 수 있는 방법으로 전망된다. 따라서 물안보 및 물복지 실현을 위한 물과 에너지의 저비용, 고효율의 최적화 방안은 상당히 중요한 요인이 될 수 있다. 이를 위해 본 논문에서는 자원간 Trade-off, 평가 등 에너지소비를 줄이고 에너지 효율성을 증가하며 에너지 절약형 기술에 개발에 중점을 두는 방안을 찾아야 한다. 또한 원예시설 및 관개 기술의 개선에 따른 물과 에너지 소비량 비교 분석, 시설원예 산업의 에너지 생산성 및 절약형 기술 등 에너지-물-식량 분야의 상호연결을 정량화하고 최적화하는 방안들을 지속적으로 모색해야 할 필요가 있다.

  • PDF

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

A study on comparison and decomposition of organic matter in Nakdong river basin (낙동강 수계 유기물 비교 및 분해에 관한 연구)

  • Han, Gyuseong;Lee, Jaesoon;Kwon, Bomin;Choi, Kwangsoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.487-487
    • /
    • 2018
  • 본 연구에서는 2017년 5월부터 12월까지 주단위로 낙동강 수계 5개 보 구간(칠곡보~창녕함안보)에서 본류와 유입지천의 유기물(BOD, $COD_{Mn}$, TOC) 분석 및 상관관계 조사하였으며, 강정고령보~창녕함안보의 대표지점에 대해서는 용존유기물(DOC)의 분해특성을 조사하였다. 본류의 유기물 농도는 BOD $2.7mgO_2/L$($2.3{\sim}3.1mgO_2/L$), $COD_{Mn}$ $5.6mgO_2/L$($5.0{\sim}6.2mgO_2/L$), TOC 4.7 mgC/L($4.2{\sim}5.2mgO_2/L$), 유입지천은 BOD $3.4mgO_2/L$($1.1{\sim}5.6mgO_2/L$), $COD_{Mn}$ $7.1mgO_2/L$($2.5{\sim}10.9mgO_2/L$), TOC $5.7mgO_2/L$(2.3~8.7 mgC/L)로 각각 나타났다. 유기물간 상관성 분석결과 본류의 BOD와 COD, TOC 상관계수(r)은 각각 0.97, 0.98, COD와 TOC는 0.91, 유입지천의 BOD와 COD, TOC는 각각 0.81, 076, COD와 TOC는 0.99로 나타났다. 본류 구간에서 탄소로 환산된 BOD-C/TOC 산화율은 21.5%(20.4~22.5%), COD-C/TOC 45.7%(44.3~48.0%), 유입지천의 BOD-C/TOC 산화율은 23.6%(13.1~31.0%), COD-C/TOC 48.0%(41.3~53.3%)로 각각 나타났다. 강정고령보~창녕함안보 대표지점의 DOC 분해특성은 DOC 중 R-DOC가 86.9%(74.5~94.3%), L-DOC 13.0%(5.7~25.5%)로 나타났다. L-DOC의 분해속도(k)는 0.21 /day(0.11~0.38 /day)로 계산되었으며, 보별 평균 분해속도는 합천창녕보(0.25 /day) > 강정고령보(0.22 /day) > 창녕함안보(0.21 /day) > 달성보(0.18 /day)순으로 나타났다. 유기물 농도는 본류에서는 하류로 갈수록 증가하는 경향을 보였으며, 유입지천은 지점별로 다양하게 나타났다. 유기물간 상관성은 유입지천보다 본류구간이 상관계수가 높게 나타났다. TOC에 대한 BOD와 $COD_{Mn}$산화율은 본류구간 보다 유입지천에서 큰 변동을 보였으며, 실제 유기물 총량 대비 BOD와 $COD_{Mn}$은 각각 77.0%, 52.7% 낮게 나타났다. DOC 중 난분해성 유기물이 대부분을 차지하였으며, 타 보 대비 달성보 내에 난분해성 유기물이 높은 것으로 나타났다.

  • PDF

Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases (미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로)

  • Kayeon Lee
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.89-108
    • /
    • 2023
  • Science, technology and innovation (STI) has expanded the activity of actors from the traditional physical territory to the cyberspace. Data-driven platform services and markets advance new discussions on cross-border cooperation and cyber security, as well as discourse on sovereignty in cyberspace. These changes are also affecting the hegemony competition between the US and China. In particular, competition for aid to developing countries that are located along major resource transportation routes, such as natural gas and deep sea resources, is fierce. ASEAN is not only a geopolitical military and security point where the US and China powers collide, but its population of 600 million has great potential for the development of the digital economy due to its data resources. In this regard, this article aims to connect the discourse of liberalism and authoritarianism with data regulation and cybersecurity in international development cooperation, and derive implications for ASEAN integration through this. This study has significance as a convergence study that links international political issues related to big data in terms of global governance.

Examination of NATO's Strategic Changes After the Russia-Ukraine War and Korea's Security Strategic Implications (러-우 전쟁 이후 NATO의 전략 변화와 한국의 안보전략적 함의 고찰)

  • Kim Hyun Jin;Bae Il Soo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.25-29
    • /
    • 2024
  • After the Russia-Ukraine War, NATO broke away from the peacekeeping strategy that it had maintained and declared that it would strengthen the multilateral security consultative body, pursue strategic stability, expand armaments, cooperate security, and strengthen dialogue and cooperation in the Indo-Pacific region. Changes in NATO's strategy directly and indirectly affect Korea's security environment. Only by clearly analyzing this and establishing policies and strategies to respond to it can the threat be suppressed and national interests protected. NATO designates China and Russia as threats. By using cooperation and solidarity with NATO as an opportunity, we will be able to strengthen security cooperation and alliances, develop and expand the defense industry market, and expand opportunities to participate in the Ukraine reconstruction project.

Increasing Transnational Threats and Terrorism and Establishment of Integrated Border Security Systems: Focused on U.S., Canada and Australia (초국가적 위협 및 테러리즘 증가와 통합국경안보체계 구축: 미국, 캐나다, 호주를 중심으로)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • Since the September 11, 2001, transnational crimes and terrorism have increased, the importance of border security has been emphasized and integrated CIQ capability has been required. The U.S., Canada, and Australia are consolidating CIQ to strengthen border security, focusing on strengthening travelers and goods immigration control and airports, ports and land border security. In 2003, the U.S. established the Customs and Border Protection(CBP) under the Department of Homeland Security. Canada also established the Canada Border Services Agency(CBSA) under the Public Safety Canada in 2003. The Australian Customs and Border Protection Service was integrated with the Department of Immigration and Border Protection(DIBP) and the Australian Border Force was established in 2015. However, Korea operates a distributed border management system for each CIQ task which is unable to respond to complex border threats such as illegal immigration, entry of terrorists, smuggling of drugs, and gun trade in the airports, ports and land borders. In order to solve this problem, it is possible to consider integrating sequentially the customs and quarantine services which have high similarities, and to integrate the entire CIQ tasks with the Korea Customs Service delegated to the immigration control duties in the mid to long term. There is also a plan to benchmark the CIQ single accountability agencies in the U.S., Canada, and Australia in accordance with the Korean situation and to establish a new integrated border security organization.

Industrial Security Crime's Realities and Counter-Measure (산업보안범죄의 실태 및 대응방안)

  • Seo, Bong Sung;Lim, You Seok
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.141-149
    • /
    • 2015
  • Modern society is to have an significant impact on the competitiveness of the country in which the economic value is very high occupancy and ensure a state-of-the-art science and technology. The country's core technology or industry security crimes going seized state-of-the-art technology firms can threat of damage to the country's economic security. In particular, the defense industry serious crime that is directly related to national security. The company's core technology and trade secrets leaked once the industrial countries must prevent security breaches and offenses of strict punishment measures because it is impossible to recover. Also, some advanced countries directly has been operating industrial security crime for the country's economy and national security. In recent years, Nation core technology infringement cases are rapidly increasing in the country. In addition, industrial security crime threat to national security. Therefore, the industry security crimes damage to the national security that infringe on the business secrets of core technologies and businesses. It is necessary to identify that industry security crime associated with the visibility of the broad scope of intellectual property protection.

A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'- (포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 -)

  • Kim Tai Jin
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.115-126
    • /
    • 2022
  • This study studied the working relationship between national crisis management and national defense elements from a comprehensive security perspective. The elements of national defense are presented in the Integrated Defense Act. Therefore, by presenting the principles, problems, and alternatives of integrated defense, the study was conducted with the aim of protecting the lives and property of the people in the event of a national crisis and strengthen national security. As a theoretical background, an analysis frame was envisioned based on the four stages of crisis management in the 'Comprehensive Crisis Management Model' and the 'Basic Guidelines for National Crisis Management'. Through this, four domestic and foreign case studies were conducted. As a result of the study, it can be confirmed that related laws, organizations, and public awareness must be provided in order for the national defense elements at each stage of national crisis management to work well. For the completeness of national crisis management, it was suggested that the enactment of the Framework Act on National Crisis Management, the establishment of an integrated defense plan, linked training, C4I for communication, strengthening the capabilities of local government heads, and national defense elements of firefighters.

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.