• Title/Summary/Keyword: Space Threat

Search Result 146, Processing Time 0.024 seconds

Cyber Threat under growth of Information Technology (정보기술 발전에 따른 사이버위협의 재조명)

  • 정관진
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.207-218
    • /
    • 2004
  • IT, the information technology's dramatic growth made entire society's system to rely on it, and took its place as one of the core keyword of 21st centurie's big variety. It is enlarging its role boundaries to most territories such as business or economy, and making another cyber space within cyber space. This report is going to review how we are defending ourselves from external threat within such dramatic flow of changes.

  • PDF

Development of an Autonomous Situational Awareness Software for Autonomous Unmanned Aerial Vehicles

  • Kim, Yun-Geun;Chang, Woohyuk;Kim, Kwangmin;Oh, Taegeun
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.2
    • /
    • pp.36-44
    • /
    • 2021
  • Unmanned aerial vehicles (UAVs) are increasingly needed as they can replace manned aircrafts in dangerous military missions. However, because of their low autonomy, current UAVs can execute missions only under continuous operator control. To overcome this limitation, higher autonomy levels of UAVs based on autonomous situational awareness is required. In this paper, we propose an autonomous situational awareness software consisting of situation awareness management, threat recognition, threat identification, and threat space analysis to detect dynamic situational change by external threats. We implemented the proposed software in real mission computer hardware and evaluated the performance of situational awareness toward dynamic radar threats in flight simulations.

Analysis and Aspects of Space Warfare in the Russia-Ukraine War (Russian Invasion of Ukraine) and Considerations for Space Technology Development (러시아-우크라이나 전쟁(러시아의 우크라이나 침공)의 우주전 분석 및 양상 그리고 우주기술 개발시 고려사항)

  • Choi, Seonghwan
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.169-186
    • /
    • 2022
  • In this article, Russia's space threat assessment and space warfare in the Russia-Ukraine war (Russian invasion of Ukraine) were analyzed and summarized. Considering the probability that commercial satellites will also be potential targets of space warfare, it is suggested that not only military satellites but also commercial satellites develop and apply space technology that can be applied equally to space threats when developing space technology. Necessary space technologies is listed.

Standardization Model and Implementation of Event Type in Real Time Cyber Threat (실시간 위협에서 Event 유형의 정형화 설계 및 구현)

  • Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.67-73
    • /
    • 2006
  • The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes the basis which constructs the effective cyber attack response system. Especially at the time of security accident occurrence, It overcomes the problem of existing security system through a definition of the event of security system and traffic volume and a concretize of database input method, and propose the standardization plan which is the cornerstone real time response and early warning system. a general standardization plan of this paper summarizes that put out of threat index, threat rating through adding this index and the package of early warning process, output a basis of cyber threat index calculation.

  • PDF

Electric Field Strength and Shielding Effectiveness Comparison According to the Size of Shielding Facility (방호 시설 크기에 따른 전계강도 및 차폐 효과 비교)

  • Kang, Ho-Jae;Huh, Chang-Su;Bang, Jeong-Ju;Choi, Jin-Su;Park, Woo-Chul
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.27 no.4
    • /
    • pp.221-225
    • /
    • 2014
  • In modern times, threat of high power electromagnetic wave is increasing. When the electrical grid and communication network are attacked by these high power electromagnetic wave, the whole infrastructure is paralyzed. To protect the infrastructure from these high power electromagnetic wave threat, the shielding facility that can block high power electromagnetic wave is constructed. Also shielding effectiveness evaluation about the constructed facility is important. But, because of space efficiency and saving of construction cost to construct the actual shielding facility, the shielding room wall is generally adjacent to exterior concrete structures. As space between shielding facility wall and concrete structures is very small, arranging the transmitting antenna exterior shielding facility is realistically difficult. Therefore, in this research, The shielding effectiveness measurement plan in the state of exterior narrow space of HEMP shielding facility is presented. And to apply this plan, The influence of shielding effectiveness according to the size of the shielding facility is analyzed.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

Future Direction of ROK Navy's Maritime Strategy based on the Recognition and Expansion of Maritime Sphere (해양공간 인식과 확장의 관점에서 본 한국 해양전략의 발전 방향)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.44
    • /
    • pp.142-176
    • /
    • 2018
  • So far, the main threat to South Korea was North Korea. That is why South Korea established a strategy based on the threat of North Korea and most of the budget on defense was used to deter North Korea. Even though the neighboring countries(China, Japan, and Russia) are growing as a real threat with abilities and intentions based on their powerful naval forces, South Korea has not yet been able to establish a strategy that regards neighboring countries as a threat. But the decades-old structural mechanism of the Korean security environment is undergoing a radical change on April 27, 2018, through the South-North summit and the Panmunjom Declaration. Under the changing security environment, South Korea was placed in a complicated dilemma that had to deal with threats of two axes(China), three axes(China, Japan), and four axes(Japan, Russia). If the one axis threat(North Korea) is dominated by land threats, the second, third and fourth axis threats are threats from the sea. This paper analyzed the maritime strategy of Korea within the framework of maritime-geopolitics, in other words recognition and expansion of the sphere of maritime. I have designed that the maritime defense space that we can deny from threats is divided into three lines of defense: 1 line (radius 3,000km), 2 lines (2,000km), and 3 lines (1,000km). The three defense zones of the three lines were defined as an active defense(1 line), defensive offense(2 line), active offense(3 line). The three defense zones of the three lines were defined as the sphere of core maritime, As a power to deny the sphere of core maritime, it was analyzed as a maneuvering unit, a nuclear-powered submarine, the establishment of missile strategy, and the fortification of islands station. The marine strategy of South Korea with these concepts and means was defined as 'Offensive Maritime Denial Strategy'.

Public's Recognition of the Space Object's Re-entry Situations and the National Space Disaster Management Policy (우리나라 국민의 우주위험인식 수준과 국가 재난정책)

  • Kim, Syeun;Cho, Sungki;Hong, Jeongyoo
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.6
    • /
    • pp.84-92
    • /
    • 2016
  • Since the mankind started its space mission, the number of artificial space objects has been increasing exponentially. It contains not just the space machines which are in use but the machines which are out of order. Meantime, those dead machines are being a serious danger, a real threat to human's lives and property because of it could re-enter into the earth's atmosphere and fall to the ground causing mega-disaster. As the number of space activities gets growing so far, the re-entry of the space objects will be a lot more happened in the future. Therefore, not just natural space object like asteroids but the artificial space object like artificial satellite and space station can cause the disaster by falling to the ground. To protect our nation and our property, the government has set up the space disaster management center in Korea astronomy and Space science Institute. In this study, we surveyed public's recognition of the space object's re-entry situation and analyzed it to contribute building national space disaster management policy.

A Study on Efficient Encryption for Message Communication between Devices (기기 간 메시지 부분 암호화 연구)

  • Lee, Yang-Ho;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.19-26
    • /
    • 2014
  • The advent of smart phones brought adverse effect between devices recently. For example, adverse effects of info-communication with advent of computer. Also, hacking threat aiming cyber space that is getting more advanced is spreading in terms of range and danger, so that it reaches the level that the nation has to concern. In this circumstance, crimes involving info-technology is now problem in society. As internet technology advances, it enlarges the range of hacker's threat to not only smart phones, but ships, aircrafts, buildings, and cars. It could be seen as social threat of between human and human, between machine and machine, and between human and machine. This study discuss these problems.

Videogames in Cybersecurity: Philosophical and Psychological Review of Possible Impact

  • Bogdan, Levyk;Maletska, Mariia;Khrypko, Svitlana;Leonid, Kryvyzyuk;Olga, Dobrodum;Pasko, Katerina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.249-256
    • /
    • 2021
  • An issue of security and threat is urgent as well as it concerns everyone: a person, community, state, etc. Today, the question of cybersecurity has become especially relevant due to general digitalization and the spread of the cyberculture. In terms of it, the growing popularity of videogames can be observed. Their impact on society differs significantly, therefore, it needs thorough consideration. The purpose of the article is to disclose the role of videogames in cybersecurity. To achieve the stated purpose, such methods as analysis, synthesis, systematization and practical involvement of videogames have been used. As a result, three levels of possible threat of videogames has been distinguished: videogames as a possibly dangerous software, as a tool of propaganda and spread of stereotypes, as a space for the creation of virtual communities. In conclusion, it is stated that videogames can be not only a threat, but also a tool for strengthening the cybersecurity.