• Title/Summary/Keyword: Defense Strategy

Search Result 408, Processing Time 0.028 seconds

Following the Cold War, both the United States' military operational concept and the Republic of Korea Army's developmental study (탈냉전기 미국의 군사작전 개념과 한국군 발전방향 연구-합동작전을 중심으로)

  • Lee, Se-Han
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.121-163
    • /
    • 2004
  • Science technique development expanded into, not only land, sea, and air operations but also those of airspace, and cyber battle spaces. It is generally accepted at this time that space centric operations currently cannot be effectively divided from air operations. However, science and technology advancements make it possible to integrate Army, Navy, Airforce, and Marine forces into effective operations as never before. The Republic of Korea Armed Forces needs to establish a more effective joint concept. The US military, considered by many experts as the most effective in the world, understands the necessity of joint operations and accordingly has highly developed its own concept of joint operations. The US joint operational concepts demonstrated their effectiveness during the Iraqi War by dominating the battlefield through effective use of all combat and non-combat power. Following the US Iraqi War experience, the US Department of Defense continued to enhance Joint Capability through the acceleration of US Military Transformation involving all components. The future national security of the Republic of Korea, faced with the peculiarity of communist threat in the form of North Korea, and the conflicting interest of four strong powers; the United States, China, Japan, and Russia, depends on small but strong armed forces employing all available combat power through effective National and Military Strategy, and considering domestic and international constraints. In order to succeed in future wars, military operations following joint operational concepts must effectively employ all available combat power in a timely manner. The Republic of Korea Armed Forces must establish a joint forces concept in order to integrate all available combat power during employment. Therefore we must establish military operations that develop the military structure and organization, doctrine, weapon systems, training and education of our armed forces based on the key concept of joint operations.

  • PDF

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

Service model strategy for the Promoting of game industry (게임 산업 육성을 위한 서비스모델 전략)

  • Kwon, Hyeog-In;Park, Jeoung-Eun;Joo, Hi-Yeob;Choi, Yong-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1589-1596
    • /
    • 2011
  • Through the convergence of the games industry value creation is possible regions. It typically appears as a Serious Game. Education, medical, defense such as industry and convergence are creating greater added value. The government also identified the importance of the games industry, and the budget set, game development, support business, human resources development policy, along with business and industry to industry to solve the social problems of regulatory policy and operations are being announced. However, by accessing it from a different perspective on the continued growth of the industry's problems is thought to act as. Thus, policymakers in government positions and in fact industry to conduct business in the private sector to reflect both the position of the design of a new development approach is needed. In this study examines the current game industry development policies, as well as activities at corporate level and industry level, the activities of national at the same time that the service should consider using a model with an integrated perspective of the games industry development policy is proposed.

The Life History and Morphological Changes of Daphnia (D. pulex and D. galeata) Induced by the Larval Damselfly (Cercion sp.) and Fish (Micropterus salmoides) Kairomones (실잠자리 유충과 어류에서 분비된 카이로몬에 의한 물벼룩류의 생활사와 형태변화)

  • La, Geung-Hwan;Jo, Hyo-Nyeo;Choe, Hyeon-Ju;Kim, Hyun-Woo
    • Korean Journal of Ecology and Environment
    • /
    • v.42 no.1
    • /
    • pp.107-114
    • /
    • 2009
  • We investigated the predation behavior of larval damselfly on Daphnia pulex and D. galeata, and compared the life history and morphological defenses in two Daphnia species against larval damselfly and fish kairomones. Larval damselflies showed size-dependent predation behavior and preyed upon smaller daphnids easily regardless light condition. Overall, small D. galeata juveniles were more vulnerable than D. pulex to the larval damselfly predation. D. pulex displayed life history and morphological changes as the anti-predator defenses against larval damselfly as well as large mouth bass, while D. galeata showed the anti-predator defenses to the large mouth bass. Thus, our results revealed that two Daphnia species exhibits different anti-predator defense strategy to increase survivorship.

Modeling & Simulation Framework for the Efficient Development of a Rescue Robot (효율적인 구조로봇 개발을 위한 통합 M&S 프레임워크)

  • Park, Gyuhyun
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.149-158
    • /
    • 2019
  • This paper introduces an integrated Modeling & Simulation framework for the efficient development of the rescue robot which rescues a wounded patients or soldiers and disposes a dangerous objects or explosive materials in the battlefields and disastrous environments. An integrated M&S(Modeling & Simulation) framework would have enabled us to perform the dynamic simulation program GAZEBO based Software-in-the-Loop Simulation(SILS) which is to replacing the robot platform hardware with a simulation software. An integrated M&S framework would help us to perform designing robot and performance validation of robot control results more efficiently. Furthermore, Tele-operation performance in the unstructured environments could be improved. We review a case study of applying an integrated M&S framework tool in validating performance of mobility stabilization control, one of the most important control strategy in the rescue robot.

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

A Study for Integrating ICS Security Logs with Centralized SIEM (Security Information and Event Management) using OPC Protocol (OPC 프로토콜을 활용한 제어시스템 보안로그 전송방법 고찰 및 통합 로그서버 구축방안)

  • Kim, Jaehong;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1205-1212
    • /
    • 2022
  • Cyber threat targeting ICS (Industrial Control System) has indicated drastic increases over the past decade and Cyber Incident in Critical Infrastructure such as Energy, Gas Terminal and Petrochemical industries can lead to disaster-level accidents including casualties and large-scale fires. In order to effectively respond to cyber attacks targeting ICS, a multi-layered defense-in-depth strategy considering Control System Architecture is necessary. In particular, the centralized security log system integrating OT (Operational Technology) and IT (Information Technology) plays an important role in the ICS incident response plan. The paper suggests the way of implementing centralized security log system that collects security events and logs using OPC Protocol from Level 0 to Level 5 based on IEC62443 Purdue Model to integrate ICS security logs with SIEM (Security Information Event Management) operated in IT environment.

Energy Performance and Cost Assessment for Implementing GroundSource Heat Pump System in Military Building (군사시설 내 지열 히트펌프 시스템 적용에 따른 에너지 성능과 비용 절감 효과 평가)

  • Byonghu Sohn;Kyung Joo Cho;Dong Woo Cho
    • Journal of the Korean Society for Geothermal and Hydrothermal Energy
    • /
    • v.18 no.4
    • /
    • pp.45-57
    • /
    • 2022
  • The Ministry of National Defense of the Republic of Korea is showing a lot of interest in net zero-energy buildings (NZEBs) to reduce energy consumption of military facilities and to promote green growth policy in military sector. The application of building passive technologies and renewable energies is essential to achieving NZEBs. This paper analyzed energy performance and energy cost on the conventional heating and cooling system (baseline scenario) and three different alternative scenarios (ALT 1, ALT 2 and ALT 3) applied in a hypothetical military building. A building modeling and simulation software (DesignBuilder V6.1) with EnergyPlus calculation engine was used to calculate the energy consumption for each scenario. Overall, when the GSHPs are applied to both space airconditioning and domestic hot water (DHW) production, Alt-2 and Alt-3, the amount of energy consumption for target building can be greatly reduced. In addition, when the building envelope performance is increased like Alt-3, the energy consumption can be further reduced. The annual energy cost analysis showed that the baseline was approximately 161 million KRW, while Alt-3 was approximately 33 million KRW. Therefore, it was analyzed that the initial construction cost increase could be recovered within about 6.7 years for ALT 3. The results of this study can help decision-makers to determine the optimal strategy for implementing GSHP systems in military buildings through energy performance and initial construction cost assessment.

The Effect of Alliance on Maritime Territorial Disputes: A Case of the Aegean Sea Dispute Between Greece and Türkiye (해양영토분쟁에서 동맹의 영향: 그리스와 튀르키예 에게해 분쟁 사례)

  • Hwang, Won-June
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.137-161
    • /
    • 2023
  • This paper explores the limited role of alliances in preventing maritime territorial disputes among member states, using the ongoing conflict between Greece and Türkiye, two NATO allies, as a case study. Drawing on Institutionalist theory, we seek to explain the mechanisms that have contributed to the failure of the alliance to prevent this dispute, despite constant cooperation and transparency. Unlike land disputes, maritime territorial disputes are complex and multi-layered, with fluid boundaries that can change with climate or natural resource availability. Moreover, the lack of constant surveillance creates ambiguity about territorial encroachment thresholds. These factors have exacerbated the dispute between Greece and Türkiye, drawing other NATO members into the conflict and undermining the strength of the alliance. This paper concludes by providing policy implications for the Republic of Korea in its own potential maritime disputes, and contributes to the broader literature on the role of alliances in preventing territorial disputes.

  • PDF