• Title/Summary/Keyword: Military security

Search Result 926, Processing Time 0.024 seconds

The Future War in the 21st Century and the Groundwork for the Korean Style Military Thought (21세기 미래전과 한국적 군사사상 형성의 조건)

  • Kim, Kwang-Soo
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.55-89
    • /
    • 2009
  • This article aims to critically review recent U. S. RMA-centered theories of warfare having prevailed after the 1991-92 Gulf War upon which the current ROKA military transformation project, the Vision 2020, largely based. In order to evaluate validity as a universal warfighing theory of NCW (Network Centric Warfare) and EBO (Effects-Based Operations), this article reviews the intrinsic strength and weakness of the theories as well as results of several recent wars that the U. S. Army conducted based on doctrines derived form such theories, In addition, this article examines the impact of certain military technology or weapon system in some well-known historical wars to draw lessons regarding the relationship between technology(weapon system) and military victory. Historical examples has shown that victories in war were not achieved by new technologies alone in most cases. Rather military victories tended to owe to combination of new technology, original doctrine and well conceived organization. Although the U. S. Armed Forces showed brilliant records of operational successes anchored on the system of PGMs and NCW concepts in Iraq (1991-92; 2003) and Afghanistan (2001-02), it must be pointed out that the operational successes did not bring about political ones in cases of Iraq and Afghanistan. It reminds us of perils of too technologically tilted approach to the conduct of war. In sum, one ought to recognize that superior technology nowadays became a necessary condition of success but is not yet a sufficient condition, the ROKA needs to be abreast with development trends of military technologies and related theoretical concepts, it need not too be in a hurry in adopting cutting edged war-making technologies at the expense of large amount of budget. The essay recommends for the ROKA several basic requirements for coping with conduct of future wars as well as establishing a 'Korean style military thought'; (1) Recognition of importance of technology in conduct of war; (2) Imposition of officer self-study hours in working days; (3) Establishing a lifestyle of military professionalism in the Korean officer corps; (4) Setting up small or large groups of think-tanks that are specialized in army doctrinal formulation.

  • PDF

A Study on the Improvement of the Military Studies Curriculum at the Civilian Universities (일반대학 군사학 교육과정 개선에 관한 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.121-131
    • /
    • 2013
  • It has been almost 10 years since the department of military studies was opened at the civilian universities. One of the important elements for the success of these new departments would be the curriculum. This paper tries to give an realistic answer to the question of curriculum. The factors influencing the design of curriculum of military studies are analyzed, such as the curricular of the military institutes that confer the B.S. in military studies, the domain of military studies and research areas, documentation classification of military studies and military engineering, scientific knowledge versus vocational capabilities in university education, relations between the B.S. courses and the master or doctorate courses, requirements asked by the Army, and moral education needed for the military officers. As a result of the analysis, the mandatory core courses should be total of 19, including 5 general courses and 14 major courses.

A Study on the Effect of Trust in the Army Perceived by University Students on Perception of National Security (대학생이 지각하는 군 신뢰가 안보의식에 미치는 영향에 관한 연구)

  • Chun, Kyung Kook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.13-25
    • /
    • 2020
  • The most important responsibility of a government is to protect citizen lives and its own territory from outside threats. Especially recent political changes surrounding the Korea Peninsula seriously threaten the korean national security. To copy the situation, perception of national security based on citizen's trust in the army is needed. Accordingly survey analysis on effect of trust in the army on perception of national security had been conducted on students of a university located in Ulsan. Result of the statistical analysis as follows. First, while social contribution and military abilities among trust in the army are highly evaluated, integrity and characteristics of organizational culture are low evaluated. Second, all the correlation coefficients among studying variables are significantly positive. But correlation coefficient between social contribution and perception of national security is relatively low. Third, integrity, characteristics, and military abilities has a significant and positive effect on perception of national security, but social contribution has no significant effect.

A study on security threats to drones using open source and military drone attack scenarios using telemetry hijacking (오픈소스 활용 드론에 대한 보안 위협과 Telemetry Hijacking을 이용한 군용 드론 공격 시나리오 연구)

  • Lee, Woojin;Seo, Kyungdeok;Chae, Byeongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.103-112
    • /
    • 2020
  • Recently, the interest in hobby/leisure drones is increasing in the private sector, and the military also uses drones in various countries such as North Korea, the United States, and Iran for military purposes such as reconnaissance and destruction. A variety of drone related research is underway, such as establishing and operating drone units within the Korean military. Inparticular, recently, as the size of drone flight control source code increases and the number of functions increases, drone developers are getting accustomed to using open sources and using them without checking for separate security vulnerabilities. However, since these open sources are actually accessible to attackers, they are inevitably exposed to various vulnerabilities. In this paper, we propose an attack scenario for military drones using open sources in connection with these vulnerabilities using Telemetry Hijacking techniques.

A study on the Educational Support Status of the Retired Military Personnel (제대군인의 전직지원교육 실태에 관한 연구)

  • Koo, Young Hui;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.37-43
    • /
    • 2013
  • Retired Military Personnel do not cause an increase in the employment rate of the overall society in the aftermath of the global economic crisis contributed to instability of employment was for many years the future employment of Retired will have an impact on the environment. Over the last 20 years working to improve Retired Military Personnel employment despite these results, it appears a former education support and related support policies deemed necessary and complementary Thus, the former domestic and foreign support education and development direction of the realities in the present investigation.

A Study on the Serious Game for the Military Training (군사훈련용 기능성 게임에 관한 연구)

  • Ha, Soo-Cheol
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.233-270
    • /
    • 2009
  • Serious game played with a computer in accordance with specific rules, that uses entertainment to further government or corporate training, education, health, public policy, and strategic communication objectives. The main goal of a serious game is usually to train or educate users while giving them an enjoyable experience. Serous games are video games with serious purposes such as teaching or training and whose principal aim is education. The major characteristics of serious games involve pedagogy which are all of the activities that educate, train, or instruct the player. Other characteristics of serious games are that they use entertainment principles, creativity and technology to build games that carry out serious purposes. This study is to introduce a serious game for the military training and to describe the elements of game design for developing it.

  • PDF

Influence of Negative Factors of War: Economic, Legal, Regional and Environmental Aspects

  • Kopytko, Marta;Grabar, Nataliia;Storozhuk, Oksana;Borutska, Yuliia;Doroshenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.13-18
    • /
    • 2022
  • Mankind has been living in the third millennium of a new era for 15 years. Today he realized that he was on a tiny planet with not much space. The 20th century laid bare its global consequences in all its horror.. According to the Stockholm International Peace Research Institute, more than 30 armed conflicts are recorded on the planet every year, leading to the death of more than 1,000 people during the year. Over the past 15 years, the total number of deaths as a result of military actions in such conflicts has also increased: more than 17 thousand people - in 2002 to more than 22.5 thousand - in 2011. 2022, in turn, became the beginning of a new round of military history, bringing changes in the social, environmental, agro-industrial, economic and other spheres not only in Ukraine, but also in all countries of the civilized world. As a result of the study, the most significant impact of the negative factors of the war, namely the economic, legal, regional and environmental aspects, was identified and analyzed.

A Study on the the U.S. military's STE case and Research on application methods to the South Korean military (미군의 STE 사례 분석과 한국군 적용방안 연구)

  • Jungsub Lee;Yeonseung Ryu;Changgeun Son
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.6 no.1
    • /
    • pp.7-12
    • /
    • 2024
  • In March 2023, the Ministry of National Defense highlighted the Synthetic Training Environment (STE) platform for practical training of combatants between training exercises in its Defense Innovation 4.0 Basic Plan. However, there are many issues to be resolved, such as the use of different simulators and terrain information systems for each military. Therefore, this study examined the cases of the U.S. Army, Air Force, and Navy, each of which has an advanced synthetic training environment, to derive suggestions for the ROK military.

  • PDF

A Study On Enterprise Password Management Recommendations (대규모 조직에서의 패스워드 관리에 관한 권고 고찰)

  • Park, Jin-Sub
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.421-465
    • /
    • 2010
  • Passwords are used in many ways to protect data, systems, and networks. Passwords are also used to protect files and other stored information. In addition, passwords are often used in less visible ways for authentication. In this article, We provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems. Organizations need to protect the confidentiality, integrity, and availability of passwords so that all authorized users - and no unauthorized users - can use passwords successfully as needed. Integrity and availability should be ensured by typical data security controls, such as using access control lists to prevent attackers from overwriting passwords and having secured backups of password files. Ensuring the confidentiality of passwords is considerably more challenging and involves a number of security controls along with decisions involving the characteristics of the passwords themselves.

  • PDF

A Study on an Audit Model for the Defense Information System security using BS7799 (BS7799(정보보안관리 표준)를 적용한 국방정보체계 보안감사모델에 관한 연구)

  • 최장욱;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.27 no.1
    • /
    • pp.89-100
    • /
    • 2001
  • Information technology has been made remarkable progress and most of computer systems are connected with internet over the world. We have not only advantages to access them easy, but also disadvantages to misuse information, abuse, crack, and damage privacy. We should have safeguards to preserve confidentiality, integrity and availability for our information system. Even tough the security is very important for the defense information system, we should not over limit users availability. BS7799, a British standard, is an evaluation criteria for information security management. In this paper we propose an audit model to manage and audit information security using control items of BS7799, which could be useful to mange the defence information system security. We standardize audit items, and classify them by levels, and degrees by using appropriate audit techniques / methods / processes.

  • PDF