• Title/Summary/Keyword: Security Strategy

Search Result 986, Processing Time 0.025 seconds

Chinese Naval Power Build-up and Measures for Regional Maritime Cooperation (중국의 해군력 발전과 지역 해양안보 협력 방안)

  • Park, Chang-Hee
    • Strategy21
    • /
    • s.40
    • /
    • pp.162-189
    • /
    • 2016
  • This research deals with the PLAN's capabilities and its implication for regional security, and suggests some measures for maritime security cooperation among regional states. China has began to focus its national strategy more on 'rising as a new maritime power' since the 18th Party Convention in November 2012. Chinese new strategy aims at building a strong navy, contributing economic prosperity and national security, and thus elevating its prestige in international society. Most of all, building a strong navy is the foremost task at this time, and that is why the PLAN has the priority for military modernization. Chinese new maritime strategy could cause naval arms race in East Asia and aggravate maritime territorial disputes among concerned parties. It is the time for regional states to discuss some measures to build confidence, such as arms control of naval weapons, establishment of multilateral maritime security mechanism, and foundation of regional security regime, thus enhancing regional maritime cooperation.

The Necessity and Development Direction of the ROK's Maritime Security Strategy White Paper (한국의 해양안보전략서의 필요성과 발전방향)

  • Kim, Kang-nyeong
    • Strategy21
    • /
    • s.45
    • /
    • pp.148-187
    • /
    • 2019
  • This paper is to analyse the necessity and development direction of the ROK's maritime security strategy white paper. To this end the paper is composed of 5 chapters titled introduction; the necessity of the ROK's maritime security strategy white paper; the ROK's actual situation in relation to maritime security strategy and cases of major advanced oceanic countries; the vision, goals, strategic tasks, and implementation system of the ROK's 'national maritime security strategy'; and conclusion. The achievement of the national marine strategic vision, such as the 'Ocean G5,' is of course possible when Korea can maintain and strengthen the maritime safety and maritime security of the people. The Sewol Ferry incident reminds us that we need a 'national maritime security strategy white paper' like the advanced marine countries. In order for the national maritime security strategy to be carried our efficiently, as in advanced oceanic countries, mere should be a dedicated department with sufficient authority and status to mobilize the cooperation of related organizations including naval-coastal cooperation. It would be good to set up a tentatively named Maritime Security Council, an organization of minister-level officials involved under the National Security Council, and an executive body composed of working-level officials from related ministries. In order to successfully carry out the national maritime security strategy for the maritime safety and maritime security of the people like the United States and the United Kingdom, we need to further strengthen our domestic cooperation and cooperation system, international cooperation, and maritime security. We have to promote the establishment and promotion of maritime security strategies by the Navy; strengthening the operational link between the Navy and the Coast Guard; strengthening the maritime surveillance capability at the national level, and promoting sharing with the private sector, etc.

Grand Strategy Framework for Information Systems Security in Organizations (조직 정보 시스템 보안을 위한 총괄 전략 프레임워크)

  • Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.7-21
    • /
    • 2009
  • Strategies have to be employed in information systems security in order to build and operate systems for information systems security in effective and structured manner. It is also essential for the entire organization to participate for successful implementation of the strategies and making them work. Current researches on information systems security strategy in organizations, however, have mainly been focused on deployment and operation of countermeasures based on strategic thinking and decision. In consequence, it is lack of research on overall frame for containing consideration factors required for moving and leading the whole enterprise for the holistic security purpose. Therefore, this paper proposes a framework for use in establishment of organization-wide information systems security strategies based on the concept of grand strategy from the traditional strategy research and on the four dimensional features of it.

  • PDF

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

Concept of Strategy in Organizational Information Security (조직 차원의 정보보안 전략의 개념)

  • Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.15-24
    • /
    • 2007
  • As the importance of information security increases, organizations are employing various security countermeasures into their information systems. However, they are not being adapted based on a strategic framework. Therefore this paper researches on the concept of the strategy in organizational information security. This paper studies literatures to find out how information security strategies have been discussed and what types of them have been proposed until now. This paper contributes to the formation of concept of strategy and classification of them by focusing on strategies themselves in organizational information security.

  • PDF

A Maritime Security Review of Russia's Annexation of Crimea (러시아의 크림반도 합병의 해양안보적 고찰)

  • Jung, Min-ki
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.57-81
    • /
    • 2023
  • This study aims to review Russia's annexation of Crimea from a maritime security perspective. Based on a comprehensive analysis of Russia's national security perception, this study analyzed Russia's maritime security strategy and the security importance of the Black Sea and the Sea of Azov, and reviewed the annexation of Crimea from a maritime security perspective. The main argument of this study is as follows. Russia's annexation of Crimea was necessary for the successful fulfillment of Russia's maritime security strategy in the Black and Azov Seas. Russia's annexation of Crimea guarantees the activities of the Black Sea Fleet militarily from a maritime security point of view, secures a passage to the Atlantic Ocean to counter NATO's expansion. From a economic security point of view, Russia's annexation of Crimea was based on the strategic considerations to secure influence within the Black Sea economic bloc which guarantees stable production and transportation of natural resources and shipping.

  • PDF

A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era (IoT시대의 기업 융합보안 전략에 대한 연구)

  • Noh, Jong-ho;Lee, Jong-hyeong;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

An Offensive Change of Japan's Defense Strategy and Strategic Implication to the South Korea Navy: Focusing on the Japan's Amphibious Rapid Deployment Brigade Creation (일본 방위전략의 공세적 변화가 한국 해군에 주는 전략적 함의 - 일본 '수륙기동단(水陸機動團)' 창설에 대한 분석을 중심으로 -)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.42
    • /
    • pp.83-113
    • /
    • 2017
  • After defeat in World War II, Japan's Peace Constitution committed the country to forego the acquisition of offensive military capabilities. However, in the midst of the post-cold war period, Japan began to change its security posture in line with the so-called 'normal state theory', which called for a more robust defense posture and expanded security activities. The second Abe administration promoted these security policies by issuing a National Security Strategy as well as a new National Defense Program Outline(NDPO) in 2013 and by establishing new security institutions such as the National Security Council. The Abe administration also adopted the new concept of a 'Unified Mobile Defense Force' in the 2013 which replaced the 'Dynamic Defense Force' as a new criteria for the Self-Defense Force's acquisition of military capabilities. In this new concept of military capabilities, the Ground Self-Defense Force is planning to replace existing divisions with mobile divisions and to form 'Amphibious Rapid Deployment Bridge' for the first time in 2018, which has long been taboo in Japan. Japan has experience a Marine Corps in the past. Likewise, an offensive changes in the military strategy can change the spectrum of strategy and 'Amphibious Rapid Deployment Bridge' plays a big role in this. Furthermore, Japan is increasing the Coast Guard's budget and capabilities in preparation for contingencies around the Senkaku islands (called the Diaoyu in Chinese). The South Korea navy should utilize Japan's changing security posture to deter immediate threat such as North Korea's military provocations and potential enemy threat such as China, Japan, Russia.

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

Analyses of requirements for Network Security Technology

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.64-67
    • /
    • 2007
  • IT industry strategy trend and home network security technology is presented. First, we consider the development strategy to improve next generation IT industry. Second, we have analyzed the technique for implementing home network. Last, we have analyzed the technique to security home network field.