• Title/Summary/Keyword: 융합안보

Search Result 179, Processing Time 0.023 seconds

On the Study of National Security and Corresponding Strategies gainst Inside Enemies - A Case Study of German Unification Process - (국가안보와 내부의 적 대응방안 연구 -독일 통일과정 사례를 중심으로-)

  • Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.11-18
    • /
    • 2013
  • What is national security? National security is reduced for state national security. At present, national security threats can be divided into main enemies and potential ones and main enemies are separated inside and external ones. Arnold Toynbee said, "The destruction of the state is starting not from outside but from inside". This means we must be aware of inside enemies. How much do we know of the internal enemies who are trying to divide the people and overthrow the state? This paper focuses on corresponding strategies to depend our democratic state against inside enemies who penetrate all sectors of society and fabricate rumors, incite violence, and even try to overthrow our legitimate state with the base on the lessons of past West Germany case.

A Study on the Need of Unified Cyber Crisis Management System:Around Comparison about Policies and Systems of USA and Korea (통합적 사이버 위기관리 체계의 필요성에 관한 연구 : 미국과 한국의 제도 및 정책 비교를 중심으로)

  • Kim, Min-Sik;Park, Sang-Don;Kwon, Hun-Yeong;Kim, Il-Hwan;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.29-37
    • /
    • 2009
  • According to Homeland Security Act of 2002, DHS in USA is comprehensively responsible for execution of protection methods on the public and private sectors against cyber attack for USA cyber crisis management. There are different laws and organizations according to the sector that is the public, the private, CII(Critical Information Infrastructure, or Non-CII in Korea. In this paper, we show the unified cyber crisis management of USA makes korea realize the importance to integration and systematization for the national cyber crisis management system.

  • PDF

Measures for Training Military Information Security Professional Personnel for Cyber Security (사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안)

  • Lee, Kwang-ho;Kim, Heung-Taek
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.145-151
    • /
    • 2017
  • The Cyberspace of the Republic of Korea Army is continuously threatened by enemies. Means for responding to such cyber threats are ultimately Military information security professional personnel. Currently, however, there are only a handful of advanced information security professional persons in Republic of Korea Army, and a lack of systematic training is inadequate. Therefore, in this thesis, we surveyed the information security professional human resource policies of USA, UK, Israel, and Japan. In addition, the policy to train professional human resources specialized in defense cyber security, we proposed training of specialist talent of 4 steps and medium and long term plan, step-by-step training system sizing, introduction of certification system.

Advanced ICT abused by Terror in the 4th Industrial Revolution Era (제4차 산업혁명시대의 테러에 악용되는 첨단 정보통신기술)

  • Sim, Se-Hyeon;Eom, Jung-ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.1
    • /
    • pp.15-23
    • /
    • 2021
  • The 4th industrial revolution technology has brought many changes not only in human life but also in the industrial field. ICT such as 5G and artificial intelligence and convergence/complex systems such as drones and robots are convenient for humans, and automation of all processes in the industrial field. However, these advanced information and communication technologies also have adverse functions. As advanced ICT was incorporated into military and terrorist weapon systems, more powerful and highly destructive weapon systems began to be developed. In particular, by applying advanced ICT to the production and use of terrorist tools, the terrorist method became more sophisticated and caused more damage. In this paper, we derive advanced ICT that can be abused according to the terror patterns in the 4th industrial revolution era, and present a method that is applied from preparation to execution of terrorism. The abuse of advanced ICT makes terrorism more stealthy and subtle, and increases its destructive power.

An Architecture of One-Stop Monitor and Tracking System for Respond to Domestic 'Lone Wolf' Terrorism (국내 자생테러 대응을 위한 원-스톱 감시 및 추적 시스템 설계)

  • Eom, Jung-Ho;Sim, Se-Hyeon;Park, Kwang-Ki
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.89-96
    • /
    • 2021
  • In recent years, the fear of terrorism due to 'Lone Wolf' terrorism is spreading in the United States and Europe. The lone wolf terrorism, which carries out terrorism independently, without an organization behind it, threatens social security around the world. In Korea, those who have explosive national/social dissatisfaction due to damage caused by national policies, and delusional mental disorders can be classified as potential 'Lone Wolf' terrorists. In 'Lone Wolf' terrorism, unlike organized terrorism, it is difficult to identify signs of terrorism in advance, and it is not easy to identify terrorist tools and targets. Therefore, in order to minimize the damage caused by 'Lone Wolf' terrorism, it is necessary to architect an independent monitoring and tracking system for the police's quick response. In this paper, we propose to architect response system that can collect information from organizations that can identify the signs of potential 'Lone Wolf' terrorism, monitor the continuity of abnormal behavior, and determine the types of 'Lone Wolf' terrorism that can happen as continuous abnormal behaviors.

Case study of military education and training using AR (Augmented Reality)/VR (Virtual Reality) (AR(증강현실)/VR(가상현실) 활용한 군 교육훈련 사례 연구)

  • Seol, Hyeonju;Jeon, Kiseok
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.107-113
    • /
    • 2022
  • The AR/VR-based education and training system is expected to contribute greatly to accident prevention and budget reduction as well as practical training effects similar to the battlefield environment. Research to use AR/VR for learning is ongoing, and technology can be improved without experiencing failures that can occur in the real world. Major advanced countries in defense recognized the advantages of AR/VR technology early on, and developed and utilized systems using them in various fields, from mastery of individual weapon system operation to comprehensive combat training systems, war history education, and post-traumatic stress treatment. Therefore, the purpose of this study is to examine the cases of AR/VR application education and training in advanced defense countries and to draw implications for the South Korean military.

An Qualification Level Model for Efficient Management of Cyber Security Workforce (사이버보안 인력의 효율적 관리를 위한 자격등급 모델 설계)

  • Jung-Ho Eom;Hong-Jun Kim;Youn-Sung Choi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.61-69
    • /
    • 2022
  • When a large-scale cyber attack or terrorism occurs and the country suffers enormous damage or poses a fatal threat to security, social interest in nurturing cybersecurity workforce increases. In addition, the government often suggests policies and guideline to train cybersecurity workforce. However, the system that can systematically manage trained cyber workforce after they are employed in related organizations or companies is still weak. Software workforce has a standardized qualification level model, so appropriate jobs are set and managed for each level. Cyber workforce also need a specialized qualification level model that takes into account their career, academic background, and education&training performance. By assigning a qualification level, the duties that can be performed for each level should be set, and the position and duty of the department should also be assigned in consideration of the level. Therefore, in this paper, we propose a qualification level model for cyber security workforce.

Trend Analysis of Intelligent Cyber Attacks on Power Systems (전력시스템 대상 지능형 사이버공격 동향 분석)

  • Soon-Min Hong;Jung-ho Eom;Jae-Kyung Lee
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.21-28
    • /
    • 2023
  • The development of information and communication technology in the 21st century has increased operational efficiency by providing hyper-connectivity and hyper-intelligence in the control systems of major infrastructure, but is also increasing security vulnerabilities, exposing it to hacking threats. Among them, the electric power system that supplies electric power essential for daily life has become a major target of cyber-attacks as a national critical infrastructure system. Recently, in order to protect these power systems, various security systems have been developed and the stability of the power systems has been maintained through practical cyber battle training. However, as cyber-attacks are combined with advanced ICT technologies such as artificial intelligence and big data, it is not easy to defend cyber-attacks that are becoming more intelligent with existing security systems. In order to defend against such intelligent cyber-attacks, it is necessary to know the types and aspects of intelligent cyber-attacks in advance. In this study, we analyzed the evolution of cyber attacks combined with advanced ICT technology.

Conditions and Strategy for Applying the Mosaic Warfare Concept to the Korean Military Force -Focusing on AI Decision-Making Support System- (한국군에 모자이크전 개념 적용을 위한 조건과 전략 -AI 의사결정지원체계를 중심으로-)

  • Ji-Hye An;Byung-Ki Min;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.122-129
    • /
    • 2023
  • The paradigm of warfare is undergoing a revolutionary transformation due to the advancements in technology brought forth by the Fourth Industrial Revolution. Specifically, the U.S. military has introduced the concept of mosaic warfare as a means of military innovation, aiming to integrate diverse resources and capabilities, including various weapons, platforms, information systems, and artificial intelligence. This integration enhances the ability to conduct agile operations and respond effectively to dynamic situations. The incorporation of mosaic warfare could facilitate efficient and rapid command and control by integrating AI staff with human commanders. Ukrainian military operations have already employed mosaic warfare in response to Russian aggression. This paper focuses on the mosaic war fare concept, which is being proposed as a model for future warfare, and suggests the strategy for introducing the Korean mosaic warfare concept in light of the changing battlefield paradigm.

A Study on the Multi-sensor Data Fusion System for Ground Target Identification (지상표적식별을 위한 다중센서기반의 정보융합시스템에 관한 연구)

  • Gang, Seok-Hun
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.191-229
    • /
    • 2003
  • Multi-sensor data fusion techniques combine evidences from multiple sensors in order to get more accurate and efficient meaningful information through several process levels that may not be possible from a single sensor alone. One of the most important parts in the data fusion system is the identification fusion, and it can be categorized into physical models, parametric classification and cognitive-based models, and parametric classification technique is usually used in multi-sensor data fusion system by its characteristic. In this paper, we propose a novel heuristic identification fusion method in which we adopt desirable properties from not only parametric classification technique but also cognitive-based models in order to meet the realtime processing requirements.

  • PDF