• Title/Summary/Keyword: Military Security

Search Result 899, Processing Time 0.027 seconds

Measures for Training Military Information Security Professional Personnel for Cyber Security (사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안)

  • Lee, Kwang-ho;Kim, Heung-Taek
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.145-151
    • /
    • 2017
  • The Cyberspace of the Republic of Korea Army is continuously threatened by enemies. Means for responding to such cyber threats are ultimately Military information security professional personnel. Currently, however, there are only a handful of advanced information security professional persons in Republic of Korea Army, and a lack of systematic training is inadequate. Therefore, in this thesis, we surveyed the information security professional human resource policies of USA, UK, Israel, and Japan. In addition, the policy to train professional human resources specialized in defense cyber security, we proposed training of specialist talent of 4 steps and medium and long term plan, step-by-step training system sizing, introduction of certification system.

A Study on Management of the Secret Data in Defense Information System (Focusing on Defense Ammunition Information System) (국방정보체계의 비밀데이터 관리 방안 연구 (국방탄약정보체계를 중심으로))

  • Yeo, Seong-Cheol;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1285-1292
    • /
    • 2014
  • Ministry of National Defense made has set a standard regulations and detail to classify the revision of the military security and the plan to adjust or use those secrets. Moreover, the confidential management system with online secret process is operated by it. However, the study for management plan of stored secret data in these systems should be urgently required because the current regulation of military headquarter is different from present military situation so that it is not applicable up to now. This paper is focused on the Defense Ammunition Information Systems to find the proper way to deal with the secret data of the Defense Information Systems. The purpose is to describe the management plan for the secret data consistent with the current situation of the Military by study for the secret classification and case study. Therefore limitations are considered and solutions are finally suggested in this paper.

Distribution of clothing microclimate for making comfortable military uniform (쾌적한 군복 설계를 위한 의복기후 분포)

  • Kim, Yang-Won
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.231-247
    • /
    • 2003
  • To get the basic data for making comfortable military uniforms and to examine the distribution of clothing microclimate, seasonal fluctuations of skin temperature, subjective sensation, and clothing microclimate were measured from 10 males. The subject were questioned on thermal comfort in experiment. Clothing microclimate temperature at breast, skin temperature at four sites (breast, upper arm, thigh, leg), deep body temperature at eardrum( tympanic temperature), and subjective sensation were measured for an hour in the controlled climatic chamber. The subjects felt comfortable when skin temperature were recorded $34.43^{\circ}C$ at breast, $33.53^{\circ}C$ at upper arm, $32.9^{\circ}C$ at thigh, and 32.50 at leg. Then mean skin temperature was $33.55\pm$$0.63^{\circ}C$. Clothing microclimate temperature ranged from 31.2 to $33.8^{\circ}C$, and clothing microclimate humidity ranged from 49.80~52.41%. In the comparison of these results with the microclimate of military uniforms, it needs more insulation in clothing for military uniforms. It also says that military uniforms should be made of the textiles which can control humidity.

  • PDF

A Study on the Exterminating Violence in Military and Human Rights of Military officer (초급간부 인권과 군대 폭력 근절방안에 대한 연구)

  • Jung, Jae-Keak
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.99-106
    • /
    • 2016
  • Violent action is prohibited in military, and onus to maintain discipline is on commander. To complete this duty, junior leaders who work on the first line is on situation that their human rights are unprotected. And it is linked to military violence. To eradicate this kind of violence, reformation of military organizational culture which assure junior military leaders' human rights is needed.

A Study on the Change of Security Level of Military Organizations Applying Grounded Theory (근거이론을 적용한 군 조직의 보안수준 변화요인 연구)

  • Park, Jae-Gon
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.283-303
    • /
    • 2017
  • This study which was started to identify the factors that change the security level of military organizations, analyzed the data collected from articles written by the active officers in the Defense Daily Journal hoping to improve the military security level by the qualitative research method called Grounded Theory, and establish causal relationship how organizational members respond to insider security threats. As a result of the analysis, the causal condition is 'the security threat of the insider', the contextual condition is 'the specificity of the military organization', the central phenomenon is 'the conflict of values as a soldier', the arbitrary condition is 'the security consciousness', Strategy is 'the responds to security threats', and the result was 'security level change'. The core categories can be presented as 'the degree of conflict of values on insider security threats' and two hypotheses have been derived. First, the members of the military organization strongly felt the conflict of values about security threat as the tendency to emphasize security was strong, and they helped to develop the security level of organization by responding strongly. Second, the stronger the tendency to focus on colleagues, respond weakly to security threats. And it undermines the security level of the organization. Finally, in order to improve the security level of the organization, it is necessary to establish a solid security consciousness and to make institutional development to support it.

  • PDF

Protection and Utilization of Military Remains during the Korean War - Focused on the Central Border of DMZ(Yeoncheon, Cheorwon, and Hwacheon-gun) - (한국 전쟁 군사유적의 보호 및 활용에 관한 연구 - 중부접경지역(연천군, 철원군, 화천군)을 중심으로 -)

  • Cho, Tae-Hwan;Kim, Tai-Young
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.20 no.3
    • /
    • pp.47-56
    • /
    • 2018
  • This study is to research the military remains of Korean War(1950~53) focused on Yeonchen, Cheorwon, and Hwacheon-gun in the central border of DMZ. The Yeoncheon-gun is installing 'Yeolsoe' and 'Taepung' observatory in the frontline battlefield adjacent to Southern Limit Line(SLL), and not only protects many military remains including war memorial and crematory facilities of UN troops, but also utilizes them as active educational places. The Cheorwon-gun is actively making known 'Baengmagoji memorial, 'Labor party office' and other buildings adjacent to 'Tourist security DMZ', but needs to set up many monuments around battlefields of 'Gimhwa' and 'Daeseongsan' adjacent to 'Eco-peace park DMZ'. With the battlefield of 'Paroho' as the center, which our troops made brilliant military gains during the war, the Hwacheon-gun protects and informs military remains such as '643 and 490 battlefields', 'Kkeomeok and Guman bridge'. Developing a network for military remains in connection with the annual local festivals, the experience tour and security will be available at these places.

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

An Offensive Change of Japan's Defense Strategy and Strategic Implication to the South Korea Navy: Focusing on the Japan's Amphibious Rapid Deployment Brigade Creation (일본 방위전략의 공세적 변화가 한국 해군에 주는 전략적 함의 - 일본 '수륙기동단(水陸機動團)' 창설에 대한 분석을 중심으로 -)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.42
    • /
    • pp.83-113
    • /
    • 2017
  • After defeat in World War II, Japan's Peace Constitution committed the country to forego the acquisition of offensive military capabilities. However, in the midst of the post-cold war period, Japan began to change its security posture in line with the so-called 'normal state theory', which called for a more robust defense posture and expanded security activities. The second Abe administration promoted these security policies by issuing a National Security Strategy as well as a new National Defense Program Outline(NDPO) in 2013 and by establishing new security institutions such as the National Security Council. The Abe administration also adopted the new concept of a 'Unified Mobile Defense Force' in the 2013 which replaced the 'Dynamic Defense Force' as a new criteria for the Self-Defense Force's acquisition of military capabilities. In this new concept of military capabilities, the Ground Self-Defense Force is planning to replace existing divisions with mobile divisions and to form 'Amphibious Rapid Deployment Bridge' for the first time in 2018, which has long been taboo in Japan. Japan has experience a Marine Corps in the past. Likewise, an offensive changes in the military strategy can change the spectrum of strategy and 'Amphibious Rapid Deployment Bridge' plays a big role in this. Furthermore, Japan is increasing the Coast Guard's budget and capabilities in preparation for contingencies around the Senkaku islands (called the Diaoyu in Chinese). The South Korea navy should utilize Japan's changing security posture to deter immediate threat such as North Korea's military provocations and potential enemy threat such as China, Japan, Russia.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.