• Title/Summary/Keyword: Security Cooperation

Search Result 883, Processing Time 0.023 seconds

A New National Security Strategy for South Korea: Exploring the Implementation of Positive Peace (한국의 새로운 국가 안보 전략: 적극적 평화 구축 방안 연구)

  • Choul-Hee Lee;Kyoung-Haing Lee;Sang Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.457-465
    • /
    • 2024
  • In the 21st century, the global security environment has undergone rapid changes, presenting South Korea with complex security dilemmas. This study aims to explore a new national security strategy for South Korea through the implementation of 'Positive Peace.' Based on Johan Galtung's concept of 'Positive Peace,' the study proposes a comprehensive approach to build sustainable peace by redesigning the peace process on the Korean Peninsula, establishing a multilateral security cooperation framework in Northeast Asia, expanding global peace contributions, promoting domestic social integration, and spreading a culture of peace. To realize these goals, the study discusses the need to redefine the role of the military, reallocate defense budgets, introduce the concept of a peace dividend, promote the peaceful use of science and technology, and legislate for the realization of the right to peace. The implementation of a 'Positive Peace' strategy aims to transform South Korea into a leading nation in peace, contributing to the peace and stability of the Korean Peninsula, Northeast Asia, and the global community.

Design of Messenger for Secure Communication between Users (사용자 사이의 안전한 통신을 위한 메신저 설계)

  • Yoon, Yoeung-Jun;Pyo, Kyoung-Hwan;Sin, Seung-Soo;Han, Kun-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.81-84
    • /
    • 2010
  • 기존의 메신저는 통신 내용 보안의 취약성으로 인해 서버관리자와 공격자로부터 사용자에게 피해를 주고 있다. 이러한 문제점을 보완하기 위해 현재 보편화된 메신저 프로그램인 네이트온 메신저의 채팅, 쪽지(메시지) 보내기의 패킷을 분석하고, 사용자의 채팅과 쪽지의 통신 내용을 보호하기 위해 보다 안전성이 높은 새로운 메신저 프로토콜 제안한다.

  • PDF

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Measures to Strengthen Korea-Japan Cyber Security Cooperation: Focusing on Joint Response to North Korean Cyber Threats (북한 사이버 위협에 대응하기 위한 한일사이버 안보협력 강화방안)

  • Tae Jin Chung
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.199-208
    • /
    • 2023
  • South Korea and Japanese governments have never responded cooperatively to North Korea cyber threats in the past 10 years or even before that. There are two reasons: First, The historical and political conflicts between the two countries were so deep that they did not discuss their mutual needs. Second, officially, Japan had not been subjected to a North Korean cyberattack until 2022 . In particular, the issues of comfort women and forced labor during World War II were holding back the reconciliation between the two countries. With the inauguration of the Yoon Seok-yeol administration, Korea-US relati ons improved dramatically. Tensions in Northeast Asia reached their peak due to the conflict between the US and China. It has become a situation where peace cannot be garaunteed without close cooperation between Korea and Japan led by the United States.

Security system in Central Asia: Significance for International Relations (중앙아시아 지역안보체제의 국제정치학적 의미)

  • Kim, Yong Hwan
    • Journal of International Area Studies (JIAS)
    • /
    • v.13 no.4
    • /
    • pp.129-154
    • /
    • 2010
  • In Post-soviet Space, particularly the Central Asian is a great turbulence region called the 'Eurasian Balkan', where diverse factors of conflict and dispute are existed. In Central Asia, a current regional security system is characterized by various multilateral cooperation relations among Central Asian nations and the world powers, such as NATO(PfP), OSCE, CIS, CSTO, CACO, SCO, CICA and so on. But nothing could obtain superiority as pan-regional security system. Unless internal problems and conflicts of the Central Asian nations be solved, security won't be assured in this region. Narrow-minded and blind realism will spread insecure region, make a lasting trouble spot in Eurasian continent. The purpose of this article is to explore significance for international relations of security system in the Central Asia. I examine general features of regional security environment formed after the Soviet Union's collapse, characteristics of multilateral cooperation related with Central Asian nations. Through consideration current situations I suggest prospects of security system in Central Asia.

Measures to Enhance Emergency Management Capacity of Private Security Industry

  • Park, Dong-Kyun;Kim, Do-Kyuo
    • International Journal of Contents
    • /
    • v.5 no.1
    • /
    • pp.27-32
    • /
    • 2009
  • The private security will overcome the limit of public police system and implement a small and efficient government concept. Especially in recent years, this security system has naturally been expanded in its functions from crime prevention to prevention of disasters. To manage the emergency by the private security industry, the private security services to involve some peculiarity and specialty. The policy agenda of private security industry for crisis management are suggested. First of all, to provide quality services for emergency management, the guards from private organizations should receive professional education and training to secure the specialty. Second, we need to improve the quality of security instructors with intensive education system for them. Security instructors should be able to effectively handle lots of different matters in the fields of security, but examination of the current curriculum of education for security instructor indicates that there is not much chance of it. Third, must be natural in light that the private organizations have some limitations in their operational capabilities and scopes. Private security duties are well established in cooperation with related institutions such as the police. Lastly, development of high quality crisis management commodities in the private security becomes even more significant. The government should be determined to make an effort to grow the private industry and foster a political environment for the same purpose.

Military Security Policy Research Using Big Data and Text Mining (빅데이터와 텍스트마이닝 기법을 활용한 군사보안정책 탐구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.23-34
    • /
    • 2019
  • This study utilized big data, one of the new technologies of the Fourth Industrial Revolution as a policy direction study related to the military security of the Army. By utilizing Text mining and analyzing military security trends in domestic and foreign papers, it will be able to set policy directions and reduce trial and error. In this study, we found differences in domestic and international studies on military sucurity. At first, Domestic research has shown that in the course of the fourth industrial revolution, there is a strong interest in technological security, such as IT technology in security and cyber security in North Korea. On the other hand, Foreign research confirmed that policies are being studied in such a way that military sucurity is needed at the level of cooperation between countries and that it can contribute to world peace. Various academic policy studies have been underway in terms of determining world peace and security levels, not just security levels. It contrasted in our immediate confrontation with North Korea for decades but suggest complementary measures that cannot be overlooked from a grand perspective. Conclusionally, the direction of academic research in domestic and foreign should be done in macro perspective under national network cooperation, not just technology sucurity research, recognizing that military security is a policy product that should be studied in a security system between countries.

Conceptualization of Defense Industrial Security in Relation to National Security (국가 안보와 연계한 방위산업 보안 개념 정립)

  • Go, Hee-Jae;Lee, Yong-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.265-270
    • /
    • 2019
  • In order to protect the advancement of defense technology that has a tremendous e?ect on both the national security and the economy, the Republic of Korea established the Defense Technology Security Act in 2015. As the new enactment brought changes to the landscape of the defense industry and defense industrial security, a new examination of the concept of the defense industrial security has now become necessary. Even after taking into consideration the undisclosed nature of defense industrial security research, and the fact that only the limited number of firms participates in the subject matter, scientific studies related to the topic have not been active. However, with the new enactment of the Defense Technology Security Act, it is necessary to expand the scope of security and to redefine the concept of defense industrial security. In this paper, we analyzed the research works on related technology protection policies and our environment of the defense industry in order to conceptualize defense industrial security. The established concepts are expected to provide a systematic way to protect the confidential and defense technology.

A Participation Scheme of the Central Region Research Institute related to National Defense Information Security Industry (국방정보보호산업 관련 중부권 연구기관 활용방안)

  • Eom, Jung-Ho
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.191-206
    • /
    • 2011
  • This study is presented a scheme that information security research institutions located within the central area can be participated actively m national defense information security industry. The many of information security company are located in the central region(Daejeon) and there are many research institutes. However, the participation rate of the Defense Information Security Industry is not high compared to other provinces. Although a variety of reasons, there are no the Defense Privacy Office that could have a role in protocol and the information about the industry. In addition, the Department of Defense related to national defense information security industry have not information about research institutions in the central region and are not well to identify the characteristics of institutional technology and research. So in this paper we presented some of the alternatives. 1) Building Pool involved in information security research according to the characteristics of each agency 2) Constitute the research community between Research institutions and the company 3) Build the technology cooperation between research institutions and the defense research institutes 4) Utilization of industry/university/research institutes related to Information Security Industry 5) Make strategic alliances among research institutes based on technical expertise.

  • PDF

An Information Security Evaluation Indices for an enterprise organization (기업조직을 위한 정보보호 평가 척도)

  • Ko Il Seok;Ko Gwang Uk;Na Dae Kyung;Na Heui Seong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2005.05a
    • /
    • pp.108-110
    • /
    • 2005
  • Most of the evaluation systems have performed evaluation with an emphasis on information security products so far. However, evaluating information security level for an enterprise needs analysis of the whole enterprise organization, and a synthetic and systematic evaluation system based on it. This study has tried to grasp the information security level of the whole enterprise organization, and develop an evaluation system of information security level for suggesting a more developing direction of information security.

  • PDF