• Title/Summary/Keyword: cyber forces

Search Result 25, Processing Time 0.024 seconds

A Study on the Direction of Cyber Forces Development in the Korean military through Changes in Germany's Cyber Warfare Response Policy (독일의 사이버전 대응 정책변화를 통해 본 한국군 사이버전력 발전 방안에 관한 연구)

  • Sangjun Park;Taesan Kim;Jee-won Kim;Chan-gi Jung
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.59-68
    • /
    • 2021
  • The Future Battlefield includes the main areas of modern warfare, including the ground, sea, and air, as well as cyberspace and space. Cyberspace consists of computers, wired and wireless networks, and spans the ground, sea, air, and space domains. Cyber warfare takes place in cyberspace, so it is not easy for people without expertise in cyber to recognize the cyber situation. Therefore, training personnel with professional knowledge and skills in cyber is paramount in preparation for cyber warfare. In particular, the results of cyber warfare will vary greatly depending on the ability of cyber combatants to carry it out, the performance of cyber systems, and the proficiency of cyber warfare procedures. The South Korean military has power to respond to cyber warfare at various levels, centering on the Cyber Operations Command, but there is a limit to defending all the rapidly expanding cyberspace. In this paper, to overcome these limitations, we looked at the changes in Germany's cyber warfare response policy. Based on them, the organization structure, weapon system, and education and training system of future Korean military cyber forces are presented separately.

The Application of Porter's Five Forces Model on the Electronic Components Industry in the United States and the Strategy of the Korean Company (미국 내 전자부품산업의 5 Forces Model과 한국기업전략)

  • Kang, Boksun;Lee, Minjung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.179-180
    • /
    • 2022
  • 미상무성이 2021년에 발표한 미국의 전체 무역량 중 한국의 비중은 3.4%로 미국의 수입국중 7위를 기록하고 있다. 그중 전자부품이 차지하는 비율은 26.7%로 미국 내에서도 주요 수입품목으로 분류된다. KOTRA는 미국의 디지털화에 따른 5G, 6G, 클라우드 컴퓨팅, 인공지능(AI) 등의 산업 시장 확대와 더불어 소재부품의 수요도 증가할 것으로 전망하고 있다[1]. 한국의 부품산업이 미국 시장에 보다 효과적으로 진출하기 위한 전략 수립을 위해 마이클 포터의 5 Forces Model을 미국의 산업 환경에 적용하였다. 한국의 부품기업들이 미국시장진출을위해서는 국가 내부적으로는 원천 기술력을 최대한 확보하고, 원자재 공급망을 안정화시켜 외부의 위협을 견제함과 동시에, 미국 시장에서는 한국 전자부품의 차별성을 인증받아 소비재 개발의 초기단계에 파트너사로 진입 산업 내 경쟁우위를 선점하는 것이 중요하다.

  • PDF

Active and Context-Resilient Cyber Defense Operation applying the Concept of Performing Mosaic Warfare (모자이크전 수행 개념을 적용한 능동형 상황 탄력적 사이버 방어작전)

  • Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.41-48
    • /
    • 2021
  • Recently, the aspect of war is evolving due to the 4th industrial revolution technology. Among them, AI technology is changing the way of war as it is applied to advanced weapon systems and decision-making systems. Mosaic Warfare, presented by the U.S. DARPA, is shifting military warfare from attrition-centric warfare to decision-centric warfare by combining Internet of Things, cloud computing, big data, mobile, and artificial intelligence technologies. In addition, it is a method to perform operations quickly so that the most offensive effect can be achieved by appropriately combining the distributed and deployed forces according to the battlefield context. In other words, military operations are not carried out through a uniform combat process, but various forces are operated through a distributed system depending on the battlefield context. In cyber warfare, as artificial intelligence is applied to cyber attack technology, there is a limit to responding with the same procedural response method as the existing cyber kill chain. Therefore, in this paper, the execution method of mosaic warfare is applied to perform context-resilient cyber operations that can operate a response system according to the attack and cyberspace context.

A Study on the Closing Force according to the Opening Angle of the Door in the Smoke Control System (제연구역 출입문 개방 각도에 따른 폐쇄력에 관한 연구)

  • Oh, Won-Sin;Joung, Suck-Hwan
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.4
    • /
    • pp.43-48
    • /
    • 2021
  • In this study, the experiment was conducted on a fire door(W × H = 0.98 m × 2.19 m) installed on the vestibule. The effective leakage area for each opening angles and closing forces derived from the impulse-momentum equation was compared and analyzed with the experimental results. As a result of the experiment, the major factors affecting the door closing forces were the pressure difference and the area of the door. The difference of door closing forces between measured and calculated values by the impulse-momentum equation showed a deviation of less than ±15% at the opening angles of 5°to 10°. At the door opening angle of 2.5°, the dynamic pressure was much higher than the measured static pressure, and this pressure difference is estimated to be air resistance acting to prevent the door from being completely closed.

North Korea's cyber attack threat analysis research (Based on the type of attack technology) (북한의 사이버 공격 위협 분석 연구 (공격 기술의 유형 중심으로))

  • Kim, Jin Gwang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.107-110
    • /
    • 2020
  • 북한의 사이버 공격은 매년 증가하고 있으며 공격 수행인력 또한 6,800여 명으로 지속 늘어나고 있어 우리에게 큰 위협이 되고 있다. 그럼에도 불구하고 현재까지 북한의 사이버 공격사례 분석은 각각의 사건에 대한 개별 현황분석밖에 되지 않아 큰 시각에서의 공격 기술 유형이 어떻게 변화하였는지와 관련된 연구가 필요하다. 이에 따라 본 논문에서는 우선 사이버전의 일반사항 및 공격 기술을 확인하고 최근 3년간 발생한 북한의 사이버 공격사례를 조사하여 세부적으로 사용된 주요 공격 기술의 유형을 확인하고자 한다.

  • PDF

North Korea's cyber organization-related information research (Based on organization status and major attack cases) (북한의 사이버조직 관련 정보 연구 (조직 현황 및 주요 공격사례 중심으로))

  • Kim, Jin Gwang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.111-114
    • /
    • 2020
  • 우리나라에 대한 사이버 공격의 배후로 추정되는 북한의 사이버조직에 우리는 얼마나 알고 있을까? 사이버 공간의 특성상 공격 흔적이 남지 않기에 언론사들은 북한의 사이버조직과 관련하여 일관된 정보를 거의 제공하지 못하고 있다. 따라서 갈수록 진화하는 북한의 사이버 공격에 효과적으로 대비하기 위해 본 논문에서는 비록 인터넷에 공개된 자료(논문, 기사 등)라 할지라도 이를 통해서 북한 사이버조직 현황 및 주요 공격사례를 중심으로 관련 정보를 살펴보고자 한다.

  • PDF

Research and Direction of Cyber Operation Education System for Fostering Common Situation Awareness about Cyber Operation -Focusing on non-Cyber Operations Unit Officer Education- (사이버작전에 대한 공통상황인식 함양을 위한 군(軍) 사이버작전 교육체계 연구 및 방향성 제안 -비(非)사이버작전부대 장교 교육을 중심으로-)

  • Lee, Sangwoon;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.13-22
    • /
    • 2019
  • The purpose of this study is to suggest the educational system and direction of cyber operations officers of non-cyber operations forces who do not specialize in cyber operations. In order to carry out cyber operations as a joint operation, non-Cyber Operations officers must also know about cyber operations, but there is no education system for them at present, Since there is almost no previous research on this, research in the relevant field is necessary. Therefore, the education system was developed based on the prior literature review, that is, the education system, that is, the necessity of education, the object of education, the goals and contents of the education, and the curriculum. In addition, the relevant experts confirmed the validity of each item with Delphi method, and as a result, some improvement was needed, but it was shown to be suitable as a whole. In addition, detailed educational program development can be developed based on this in the future.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

This paper asks whether the Republic of Korea (ROK) Navy should Study on ROK Navy's Strategy Planning - Concerning to JOAC, ASB Concept of US Armed Forces - (한국 해군의 전략 수립 방향 연구 - 미군의 JOAC, ASB 개념 분석과 한국 해군에의 함의-)

  • Na, Sung-Min
    • Strategy21
    • /
    • s.32
    • /
    • pp.5-35
    • /
    • 2013
  • The purpose of this thesis is to suggest how to plan ROK(Republic of Korea) Navy's strategy concerning to JOAC(Joint Operation Access Concept) and ASB(Air-Sea Battle) concept of US(United States) armed forces. Since 2006, US armed forces has been developing CONOPS(Concepts of Operations), JOAC & ASB. These concepts will not only affect security environment for Korea Peninsula and West Pacific Area, but also will be affected to ROK Navy's Strategy. Therefore, Korea Navy has to consider and review those concepts and should discuss the way to secure peace of Korea Peninsula. JOAC & ASB have been developed for securing operational access ability of US armed forces against enemy forces. A2/AD(Anti-Access, Area-Denial) is the strategy of possible enemy forces against US forces' approaching into the operation area and impede operations within area. US forces had to overcome enemy's A2/AD strategy in coming century to protect national interest and sustain global leadership. The main concept of JOAC & ASB is "Cross-domain Synergy", which means 'to eliminate duplicate and improve joint operability containing space and cyber operation area.' Korea Navy's acceptance of JOAC & ASB without any revising is not a rational choice. Without the amendment some problems can be occurred by the Korea navy's acceptance for the original version of JOAC & ASB. Those are "Missing differences of operation environment between Korea and US", "Impediment from neighbor nations, especially PRC (People's Republic of China)", and "Impediment inside from Korea armed forces". Therefore, Korea Navy has to evaluate and find out the way to solve for JOAC & ASB to apply for their strategy and minimise those possible problems above. This thesis is expected to be the solution.

  • PDF