• Title/Summary/Keyword: Space Threat

Search Result 146, Processing Time 0.025 seconds

A Study on the Improvement of Capability Assessment and the Plan for Enhancing Cyber Warfare Capability of Korea (사이버전의 역량평가 개선과 역량 강화 방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1251-1258
    • /
    • 2015
  • Recently, as the development of cyber weapons, the threat of cyber warfare has been increasing. Nations, which experienced cyber warfare already, have been damaged not only in the cyber space as well as in real war field. Therefore, each nation is constantly making efforts to prepare for cyber warfare. First of all, to prepare for cyber warfare, each nation's capability of cyber warfare should be understood. A plan of reaction of cyber warfare should be searched by comparison and analysis of capability of cyber warfare. This paper compares and analyzes established methodology of capability assessment about cyber warfare, and this paper finds a better point to suggest the improvement of capability assessment about cyber warfare. This paper applies capability assessment of cyber warfare to nations, which can influence on Korea with improved capability assessment of cyber warfare. Comparing and analyzing the result of assessment, this paper deducts complementary point of Korean cyber warfare to suggest the plan to enhancing capability of cyber warfare.

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

Strengthening Trend of Coast Guards in Northeast Asia (동북아 해양경찰 증강 동향)

  • Yoon, Sungsoon
    • Strategy21
    • /
    • s.43
    • /
    • pp.175-199
    • /
    • 2018
  • Recent marine territorial disputes in the East China Sea and the South China Sea have come to us as a great threat. China, which has recently established the China Coast Guard and has rapidly developed maritime security forces, is trying to overcome the various conflict countries with its power. Japan is also strengthening intensively its maritime security forces. Since Korea, China, and Japan are geographically neighboring and sharing maritime space in Northeast Asia, there is no conflict between maritime jurisdiction and territorial rights among the countries. The struggle for initiative in the ocean is fierce among the three coastal nations in Northeast Asia. therefore, Korea needs more thorough preparation and response to protect the marine sovereignty. As the superpowers of China and Japan are confronted and the United States is involved in the balance of power in strategic purposes, the East Asian sea area is a place where tension and conflict environment exist. China's illegal fishing boats are constantly invading our waters, and they even threaten the lives of our police officers. The issue of delimiting maritime boundaries between Korea and China has yet to be solved, and is underway in both countries, and there is a possibility that the exploration activities of the continental shelf resources may collide as the agreement on the continental shelf will expire between Korea and Japan. On the other hand, conflicts in the maritime jurisdictions of the three countries in Korea, China and Japan are leading to the enhancement of maritime security forces to secure deterrence rather than military confrontation. In the situation where the unresolved sovereignty and jurisdiction conflicts of Korea, China and Japan continue, and the competition for the strengthening of the maritime powers of China and Japan becomes fierce, there is a urgent need for stabilization and enhancement of the maritime forces in our country. It is necessary to establish a new long-term strategy for enhancing the maritime security force and to carry out it. It is expected that the Korean Coast Guard, which once said that it was a model for the establishment of China's Coast Guard as a powerful force for the enforcement of the maritime law, firmly establishes itself as a key force to protect our oceans with the Navy and keeps our maritime sovereignty firmly.

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

Current status and prospects for in-feed antibiotics in the different stages of pork production - A review

  • Li, Junyou
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.30 no.12
    • /
    • pp.1667-1673
    • /
    • 2017
  • Antibiotics have long been of great benefit for people, both in the medical treatment of human disease and in animal food where they improve the growth performance and feed utilization during animal production. Antibiotics as in-feed supplements affect all stages of pork production, including the gestation, nursing, growing, and finishing stages, although the effects show stage-dependent differences. However, the use of antibiotics in animal feed has become a worldwide concern. This review describes why sub-therapeutic levels of antibiotic additives in animal feed have become an integral part of animal feeding programs for more than 70 years, particularly in pork production. It also discusses the threat of the long-term use of sub-therapeutic levels of antibiotics in pork production. In recent years, the effectiveness of in-feed antibiotics has tended to decrease. This review analyzes this change from various perspectives. First, the equipment used at pig farms has improved dramatically and is more sanitary. Worldwide, more pig farms use pig farrowing crates, gestation crates, piglet nursery crates, flooring devices, piggery ventilation and cooler systems, automatic pig feeders, piggery heating equipment, and artificial insemination systems. In addition, scientists have replaced the use of antibiotics with organic acids, fermented mash, probiotics, prebiotics, minerals, oligosaccharides, enzymes, herbs/flavors, and protein/amino acids, and have improved management and husbandry techniques. In addition, animal welfare legislation has been aimed at improving the quality of the floors and living space, ensuring that animals have permanent access to fresh water, and setting a minimum weaning age. Finally, the prospects and the possibility of replacing antibiotics in pork production are described, in line with recent research results.

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

Stress Resistance of Zacco koreanus due to Exposure of Cement Powder (시멘트 분말 노출에 따른 참갈겨니의 스트레스 저항성)

  • Shin, Myung Ja;Lee, Jong Eun;Seo, Eul Won
    • Journal of Life Science
    • /
    • v.25 no.6
    • /
    • pp.615-623
    • /
    • 2015
  • This study investigated the effects of dissolved cement powder on Zacco koreanus by analyzing morphophysiological changes. The gills exposed to dissolved cement powder developed abnormal shapes in their secondary lamellae and increased numbers of mucous cells after long-term exposure. Additionally, clubbing, edema, and exfoliation of the epithelial cells were observed in the secondary lamellae. In the kidney tissue, the space in Bowman’s capsule was widened, and in the integument tissue the arrangement of the dermis was irregular due to the thinned epidermis. These results suggest that long-term exposure to cement powder can significantly affect morphological change, resulting death. The activities of antioxidant enzymes and LDH tended to increase commensurately with the duration of cement exposure. It was concluded that up-regulated proteins were the stress proteins involved in myofibrillar-protein production and down-regulated proteins were involved in glycolysis and energy metabolism after the integument’s exposure to cement. According to these results dissolved cement powder is a serious threat to the survival of fish because it causes morphological changes and weakens physiological activity in Z. koreanus tissues.

Analysis of the Operation of China Air Defense Identification Zone (CADIZ) corresponding to the PRC's maritime strategy and the ROK's response measures (중국의 해양전략과 연계한 중국방공식별구역(CADIZ) 운영 분석과 우리의 대응방안)

  • Kim, Dongsoo;Chong, Mangseok;Hong, Sungpyo
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.2
    • /
    • pp.35-42
    • /
    • 2017
  • This paper analyzes the intention of the PRC (People's Republic of China) to establish and operate CADIZ to implement the government's maritime policy and strategy and to project its air power in preparation for maritime provocation and contingency, especially over the area where East Asia countries have claimed to have maritime jurisdiction over one another. This paper is also intended to guide the Republic of Korea's response measures for coping with the maritime intention and threat of China by such measures as reinforcing military power, constructing the strategic air base in Jeju, and expanding the present KADIZ.

Following the Cold War, both the United States' military operational concept and the Republic of Korea Army's developmental study (탈냉전기 미국의 군사작전 개념과 한국군 발전방향 연구-합동작전을 중심으로)

  • Lee, Se-Han
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.121-163
    • /
    • 2004
  • Science technique development expanded into, not only land, sea, and air operations but also those of airspace, and cyber battle spaces. It is generally accepted at this time that space centric operations currently cannot be effectively divided from air operations. However, science and technology advancements make it possible to integrate Army, Navy, Airforce, and Marine forces into effective operations as never before. The Republic of Korea Armed Forces needs to establish a more effective joint concept. The US military, considered by many experts as the most effective in the world, understands the necessity of joint operations and accordingly has highly developed its own concept of joint operations. The US joint operational concepts demonstrated their effectiveness during the Iraqi War by dominating the battlefield through effective use of all combat and non-combat power. Following the US Iraqi War experience, the US Department of Defense continued to enhance Joint Capability through the acceleration of US Military Transformation involving all components. The future national security of the Republic of Korea, faced with the peculiarity of communist threat in the form of North Korea, and the conflicting interest of four strong powers; the United States, China, Japan, and Russia, depends on small but strong armed forces employing all available combat power through effective National and Military Strategy, and considering domestic and international constraints. In order to succeed in future wars, military operations following joint operational concepts must effectively employ all available combat power in a timely manner. The Republic of Korea Armed Forces must establish a joint forces concept in order to integrate all available combat power during employment. Therefore we must establish military operations that develop the military structure and organization, doctrine, weapon systems, training and education of our armed forces based on the key concept of joint operations.

  • PDF

A Study about Early Detection Techniques of Cyber Threats Based Honey-Net (허니넷 기반의 사이버위협 조기탐지기법 연구)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.67-72
    • /
    • 2005
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modern information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. In order to solve a same problem, this paper researched early detection techniques for only early warning of cyber threats with separate way the detection due to and existing security equipment from the large network. It researched the cyber example alert system which applies the module of based honeynet from the actual large network and this technique against the malignant traffic how many probably it will be able to dispose effectively from large network.

  • PDF