• 제목/요약/키워드: Military security

검색결과 926건 처리시간 0.026초

적시적정공급을 위한 물자확보수준결정에 관한 연구 (A Study on the Determination of Material Security Level for Just in Time Supply)

  • 최정상
    • 산업경영시스템학회지
    • /
    • 제16권27호
    • /
    • pp.35-42
    • /
    • 1993
  • Just in time backup of the essential materials at industry and military is very important. Especially in case of military essential materials at wartime is so important as it controls victory and/or defeat. This paper presents the new approach for just in time suppling the essential materials at the beginning wartime - security step of materials, reservation priority and quantity requirement degree. In order to build the new approach, we introduced the concepts of cost and effect analysis for each essential item. First of all, the developed model will be useful to maximize combat sustaning power under constraint of budget.

  • PDF

생물무기에 의한 테러와 대응책 (Terrorism using biological weapons and Countermeasures)

  • 조성호
    • 시큐리티연구
    • /
    • 제7호
    • /
    • pp.287-307
    • /
    • 2004
  • Mass killing and injuring by purpose, the countries that is hurrying countermeasure preparation of investigators who enforce that necessity to compare to intimidation of doing creature weapon is common concerns of the several countries including advanced nation such as the United States of America. Development and use of biological weapon have increased too recently to private citizens unlike development of military purpose in country dimension. The latest WHO is preparing proposal of standard stroke model who each department solidifies preparedness for chemical biological and electronic weapon revising report about biological weapon. But in case of korea, confrontation plan that bamboo broom about possibility of attack to the common people and attack comparing actual state in case of attained nothing but is readying remedy about biological warfare partially in military dimension was not readied. The purpose of this article is a study on threat of bio-weapons and the countermeasure.

  • PDF

전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법 (An Efficient Key Management Scheme in Tactical Ad-Hoc Network)

  • 김은호;이수진
    • 한국군사과학기술학회지
    • /
    • 제12권3호
    • /
    • pp.317-324
    • /
    • 2009
  • Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.

컬러 영상의 RGB 화소 최대차분 기반 보간법을 이용한 정보은닉 기법 (Information Hiding Method based on Interpolation using Max Difference of RGB Pixel for Color Images)

  • 이준호;김평한;정기현;유기영
    • 한국멀티미디어학회논문지
    • /
    • 제20권4호
    • /
    • pp.629-639
    • /
    • 2017
  • Interpolation based information hiding methods are widely used to get information security. Conventional interpolation methods use the neighboring pixel value and simple calculation like average to embed secret bit stream into the image. But these information hiding methods are not appropriate to color images like military images because the characteristics of military images are not considered and these methods are restricted in grayscale images. In this paper, the new information hiding method based on interpolation using RGB pixel values of color image is proposed and the effectiveness is analyzed through experiments.

사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구 (A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA)

  • 장영천;강경란;최봉완
    • 한국군사과학기술학회지
    • /
    • 제20권3호
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).

다양한 리더십 이론에 대한 고찰 (The overview of various leadership theories)

  • 이재창
    • 안보군사학연구
    • /
    • 통권3호
    • /
    • pp.265-288
    • /
    • 2005
  • The study of leadership has been an important and central part of various organizations. The purpose of this study is to provide an overview of the literature on organizational leadership, with an emphasis on recent trends and developments likely to dominate the field through the turn of the century. Leadership has been studied in different ways, depending on the researcher's conception of leadership and methodological preferences. Most of the studies divide naturally into distinct lines of research and can be classified according to whether the primacy focus is on leader traits, behavior, influence, or situational factors. Charismatic and transformational, and self leadership, a subject that became popular in recent years, can be viewed as a hybrid approach that involves elements from each of the other approaches. Finally, it discussed implication of the present study and the research required in the future.

  • PDF

클라우제비츠의 전쟁이론과 평화이론 (Clausewitz’s theory of war and peace)

  • 김만수
    • 안보군사학연구
    • /
    • 통권2호
    • /
    • pp.1-21
    • /
    • 2004
  • Clausewitz’s theory of war can be divided between the theory of conduct of war and the theory of preparations for war, and the theory of war that Clausewitz means, is the theory of conduct of war. But before Clausewitz, men regarded a theory of preparations for war as the theory of war. The theory of preparations for war concerns generally about the material side of war, but not its spiritual aspect. The activity of war is basically a human spiritual and psychological action. And because the war is dangerous, the anxiety occurs and diverse human feelings, for example courage, have been required. Also the informations in war is normally very uncertain, so an insight of the commander is in war very needed. The Theory of war has to consider this spiritual aspect. To end the war and to acquire the peace, an excellent talent of commander is necessary. And it is a genius. Men who are difficult to move but have strong feelings, these are the men who are best able to be a genius.

  • PDF

테러와 테러정책에 대한 미시경제학적 분석 (A Microeconomic Analysis on Terrorism and Anti-terror Policies)

  • 최효철
    • 안보군사학연구
    • /
    • 통권2호
    • /
    • pp.201-235
    • /
    • 2004
  • This paper provides a simple microeconomic model of terrorist attcks and anti-terrorism policies. The terrorists can be characterised as rational actors, choosing between legal activities and terrorist activities to promote their political goals. Since their resources are limited, one can think of anti-terrorist policies by examining how such policies affect the objectives and constraints of terrorists. Deterrence policy seeks to reduce terrorist attacks by raising the cost of undertaking terrorist acts. Proactive policy aims at preventing attacks by destroying terrorists' resources (fund, personnel, leadership). This paper suggests another type of anti-terrorist policy which is to reduce the benefits of (or in other words, raising the opportunity costs of) terrorist acts. Such a policy is based on decentralisation in political decision-making and economic power.

  • PDF

저격전의 역사와 미래전망 (The History of Sniping Combat Scenes and Future Prospects)

  • 양대규
    • 안보군사학연구
    • /
    • 통권5호
    • /
    • pp.281-350
    • /
    • 2007
  • The purpose of this study is to survey the circumstances of sniping warfare and to prove the importance of usage of snipers. The research method was referred to the history of foreign warfares and autobiographies, articles, and testimonies of snipers. Also, various news reports were also studied to collect information. The content of this study investigates the circumstances of sniping combat scenes from its first appearance in the world's major warfares to contemporary ones. Also, the research contains the history of weapons, ammunition, rifles, and the principle of rifle shooting including ballistics. We hope this study provides ROK Army and government agencies the foundation of sniping and thereby improving the effectiveness of correspondence to international conflicts and terrorism.

  • PDF

사이버 방호기능 분석을 통한 지휘통제에 관한 연구 (A Study on Command and Control Through Cyber Protection Function Analysis)

  • 최세호;오행록;윤주범
    • 한국군사과학기술학회지
    • /
    • 제24권5호
    • /
    • pp.537-544
    • /
    • 2021
  • Cyber threats can bypass existing cyber-protection systems and are rapidly developing by exploiting new technologies such as artificial intelligence. In order to respond to such cyber threats, it is important to improve the ability to detect unknown cyber threats by correlating heterogeneous cyber protection systems. In this paper, to enhance cyber-attack response capabilities, we proposed command and control that enables rapid decision-making and response before the attack objectives are achieved, using Lockheed Martin's cyber kill chain and MITRE ATT&CK to analyze the purpose and intention of the attacker.