• 제목/요약/키워드: military power

검색결과 809건 처리시간 0.029초

북핵 위협 고도화에 효율적 대비를 위한 실증적 연구: 비군사 분야를 중심으로 (An Empirical Study for Efficient Preparation for Enhancing North Korean Nuclear Threat: Focusing on non-military field)

  • 김응수
    • 시큐리티연구
    • /
    • 제53호
    • /
    • pp.255-279
    • /
    • 2017
  • 북한 핵위협 고도화는 2017년 6차 핵실험에 이르기까지 악화일로로 치달아 국제사회의 제재에도 불구하고 실전 배치를 목전에 두고 있다. 그러나 한국 정부를 포함한 국제사회는 이에 대한 뚜렷한 해법과 대안을 제시하지 못하고 있어 북한의 핵 위협 고도화에 대한 대비책은 너무도 미비한 실태다. 본 연구는 북한은 어떤 경우에도 핵무기 개발을 포기하지 않을 것이라는 전제 하에 북한의 핵개발의 현주소와 위협 실태를 냉철하게 분석하여 취약점을 도출하여 이를 바탕으로 비군사적인 분야에서 무엇을 어떻게 대비하여 피해를 최소화 할 것인가에 대하여 논의하고자 한다. 연구결과로써 먼저 비상대비태세 유지를 위해서는 국민생활 안정 차원에서 전재민의 수용 대책을 강구하고, 방사능에 오염된 주민을 치료 조치 방안을 강구해야 한다. 다음으로 민방위태세 분야는 경보체제를 정비하고 민방위대원조직의 훈련을 핵 피폭시 체험식 훈련방법으로 발전시켜야 한다. 대피시설 구축의 의무화 하도록 법령을 정비해야 하며, 기 구축된 대피시설들의 보완해야 한다. 또한 기존의 민방위훈련과 핵공격 대비훈련을 통합해서 시행하는 방안을 발전시켜야 한다. 마지막으로 국민행동요령을 상황별로 제시하였으며 이를 숙달할 수 있도록 교육과 훈련이 필요하다. 이러한 사항들을 실행하기 위해서는 관련 법령 개정과 장 단기 계획을 수립하는 등 국가차원의 종합계획을 수립하여 우선순위를 설정하여 추진해야 한다.

  • PDF

시스템 ID를 이용한 USN의 보안 취약성 개선 (USN Security Enhancement Using System IDs)

  • 김현주;정종문
    • 대한전자공학회논문지TC
    • /
    • 제46권2호
    • /
    • pp.73-80
    • /
    • 2009
  • 군사용이나 환경 감시등의 영역에서 응용되고 있는 유비쿼터스 센서 네트워크(Ubiquitous Sensor Network)는 센서 정보의 도청이나, 비정상적 패킷의 유통, 메시지의 재사용 등 데이터의 위 변조와 같은 외부의 공격에 쉽게 노출되는 환경에서 동작하기 때문에, 보안은 필수적으로 갖추어져야 하는 중요한 기능이다. 저전력, 초소형, 저비용의 장점을 갖는 ZigBee는 유비쿼터스 센서 네트워크를 구현하는 최적의 기술로 주목받고 있다. 그러나 ZigBee 보안 시스템에는 심각한 문제점들을 가지고 있다. 본 논문에서는 USN의 대표적인 예로 ZigBee 보안 시스템이 가지고 있는 문제점들을 자세히 분석하고, 이를 해결하여 USN에 적합한 보안 프로토콜을 새롭게 제안하고 그 효율성을 비교 분석한다.

수송기관용 오일의 화재위험성에 관한 연구 (A Study on the Fire Hazard of Transportation Oil)

  • 박영주;황미정;이해평;이승철;이창현
    • 한국안전학회지
    • /
    • 제29권3호
    • /
    • pp.114-120
    • /
    • 2014
  • The purpose of this study is to conduct the study of the combustion and thermal characteristics through transportation oil for the analysis of fire hazard. Transportation oil breaks down into fuels such as diesel for civilian demands, gasoline, DF1(diesel for military), high sulfur diesel(for marine), kerosene and JP1(for aviation), and lubricants like brake fluid, power steering oil, engine oil, and automatic and manual transmission oil. The experiments of flash point, ignition point, flame duration time, heat release rate were carried out using TAG closed cup flash point tester(AFP761), Cleveland open cup auto flash point analyzer(AFP762), KRS-RG-9000 and Dual cone calorimeter. As a result, the fuel's ignition points were lower than lubricants, especially that of gasoline was not conducted as it has below zero one. Gasoline has the highest ignition point of about $600^{\circ}C$, while the other fuels showed $400{\sim}465^{\circ}C$. For flame duration time, lubricants had over 300 seconds, but fuels had less than 300 seconds except high sulfur diesel(350 seconds). Total heat release rate ranged $287{\sim}462kW/m^2$ for lubricants and gasoline showed the highest total heat release rate, $652kW/m^2$.

Pub/Sub-based Sensor virtualization framework for Cloud environment

  • Ullah, Mohammad Hasmat;Park, Sung-Soon;Nob, Jaechun;Kim, Gyeong Hun
    • International journal of advanced smart convergence
    • /
    • 제4권2호
    • /
    • pp.109-119
    • /
    • 2015
  • The interaction between wireless sensors such as Internet of Things (IoT) and Cloud is a new paradigm of communication virtualization to overcome resource and efficiency restriction. Cloud computing provides unlimited platform, resources, services and also covers almost every area of computing. On the other hand, Wireless Sensor Networks (WSN) has gained attention for their potential supports and attractive solutions such as IoT, environment monitoring, healthcare, military, critical infrastructure monitoring, home and industrial automation, transportation, business, etc. Besides, our virtual groups and social networks are in main role of information sharing. However, this sensor network lacks resource, storage capacity and computational power along with extensibility, fault-tolerance, reliability and openness. These data are not available to community groups or cloud environment for general purpose research or utilization yet. If we reduce the gap between real and virtual world by adding this WSN driven data to cloud environment and virtual communities, then it can gain a remarkable attention from all over, along with giving us the benefit in various sectors. We have proposed a Pub/Sub-based sensor virtualization framework Cloud environment. This integration provides resource, service, and storage with sensor driven data to the community. We have virtualized physical sensors as virtual sensors on cloud computing, while this middleware and virtual sensors are provisioned automatically to end users whenever they required. Our architecture provides service to end users without being concerned about its implementation details. Furthermore, we have proposed an efficient content-based event matching algorithm to analyze subscriptions and to publish proper contents in a cost-effective manner. We have evaluated our algorithm which shows better performance while comparing to that of previously proposed algorithms.

인도-태평양(FOIP) 전략과 전력분산의 치명성에 관한 연구 (A Study on US Free and Open Indo-Pacific Strategy and Distributed Lethality)

  • 김태성
    • Strategy21
    • /
    • 통권44호
    • /
    • pp.28-53
    • /
    • 2018
  • The U.S. has recently developed Free and Open Indo-Pacific strategy and Distributed Lethality strategy based on a common perception that they are responding to China's threats. In the future, it is anticipated the following. Strengthen cooperation of the U.S.-India-Vietnam navy, Maximizing the combined combat power between the U.S. and regional navies, Improving its ability to restore damage control, Economic cooperation between the Pacific and Indian countries. The meanings given to the Korean navy are as follows. First, South Korea should pursue cooperation with the Indian Navy, which will grow into a regional balance on China's growth. The growth of the Indian navy is expected to increase cooperation with other Pacific countries. The government should seek ways to promote cooperation with india navy in various fields. Secondly, it is a joint drill between the U.S. Navy and the Korean Navy. Recently, the Korea-U.S. joint drill has not been conducted and many changes are expected to be made regarding the implementation of the joint drill in the future. Therefore, it is necessary to respond to possible changes in the naval relationship between Korea navy and the U.S. navy Also, due to distributed lethality strategy, preparations for operations and training with U.S.navy will be necessary. Lastly, it should contribute to cooperation among regional countries in preparation for maritime territorial disputes. The growth of the Chinese navy and the territorial disputes in the East and South China sea has raised the possibility of accidental military clashes at sea. Therefore, the government should make efforts to create multilateral security cooperation systems that can continue to promote the prevention of armed conflict.

해양공간 인식과 확장의 관점에서 본 한국 해양전략의 발전 방향 (Future Direction of ROK Navy's Maritime Strategy based on the Recognition and Expansion of Maritime Sphere)

  • 정광호
    • Strategy21
    • /
    • 통권44호
    • /
    • pp.142-176
    • /
    • 2018
  • So far, the main threat to South Korea was North Korea. That is why South Korea established a strategy based on the threat of North Korea and most of the budget on defense was used to deter North Korea. Even though the neighboring countries(China, Japan, and Russia) are growing as a real threat with abilities and intentions based on their powerful naval forces, South Korea has not yet been able to establish a strategy that regards neighboring countries as a threat. But the decades-old structural mechanism of the Korean security environment is undergoing a radical change on April 27, 2018, through the South-North summit and the Panmunjom Declaration. Under the changing security environment, South Korea was placed in a complicated dilemma that had to deal with threats of two axes(China), three axes(China, Japan), and four axes(Japan, Russia). If the one axis threat(North Korea) is dominated by land threats, the second, third and fourth axis threats are threats from the sea. This paper analyzed the maritime strategy of Korea within the framework of maritime-geopolitics, in other words recognition and expansion of the sphere of maritime. I have designed that the maritime defense space that we can deny from threats is divided into three lines of defense: 1 line (radius 3,000km), 2 lines (2,000km), and 3 lines (1,000km). The three defense zones of the three lines were defined as an active defense(1 line), defensive offense(2 line), active offense(3 line). The three defense zones of the three lines were defined as the sphere of core maritime, As a power to deny the sphere of core maritime, it was analyzed as a maneuvering unit, a nuclear-powered submarine, the establishment of missile strategy, and the fortification of islands station. The marine strategy of South Korea with these concepts and means was defined as 'Offensive Maritime Denial Strategy'.

테러대비를 위한 CBRNE교육 선진사례 분석에 관한 연구 (Contrast Analysis for CBRN attacks on educational research and best practices)

  • 김태환;박대우;홍은선
    • 한국재난정보학회 논문집
    • /
    • 제5권1호
    • /
    • pp.78-100
    • /
    • 2009
  • This study is to protect peoples' life, minimize the property damage by coping with threats quickly and take more preventive measures in advance against nuclear bomb, CBR, and potential explosive. For this, CBRNE(Chemical, Biological, Radiological, Nuclear, Explosive) program research was used. Thanks to advance in technology, terrorist groups and even individuals make or keep nuclear and CBR weapons. And also it's likely that disaster and threats from a toxic gas, acute pathogens, accidents in the nuclear power plants and a high explosive could be happened a lot. Recently more organized terrorist groups maintain random attacks for unspecified individuals and also it's highly likely that a large-scale terrorist attack by WMD and CBRNEwill be done. To take strict measures against CBRNE attacks by terrorists is on the rise as an urgent national task. Moreover biological weapons are relatively easy and inexpensive to obtain or produce and cause mass casualties with a small amount. For this reason, more than 25 countries have already possessed them. In the 21 st century, the international safety environment marks the age of complicated threats : transnational threats such as comprehensive security and terror, organized crime, drug smuggling, illegal trade of weapons of mass destruction, and environmental disruption along with traditional security threats. These cause military threats, terror threats, and CBRNE threats in our daily life to grow. Therefore it needs to come up with measures in such areas as research development, policy, training program. Major industrial nations on CBRNE like USA, Canada, Switzerland, and Israel have implemented various educational programs. These researches could be utilized as basic materials for drawing up plans for civil defense, emergency services and worldwide countermeasures against CBRNE.

  • PDF

특정직 여성인력의 직무수행능력 향상 방안에 관한 실증 분석 - 여군·여경 설문조사를 중심으로 - (A Study on Empirical Analysis Improvement in Special job of Womanpower performing ablity - Focusing on the woman soldier·police woman survey -)

  • 최미애;이상열
    • 시큐리티연구
    • /
    • 제43호
    • /
    • pp.147-175
    • /
    • 2015
  • 앞으로 여성공무원 수 증가와 함께 여성공무원의 파워가 더욱 거세질 것으로 보인다. 이러한 시대적 변화에 발맞추기 위해 최근 여군, 여경의 선발이 증가하고 있으며 군 경찰 내부조직에서도 여성인력을 효율적으로 운영하려는 움직임이 증가하고 있다. 본 연구는 특정직 여성인력 중에서도 대표적인 여군과 여경을 면밀하게 분석하여 보다나은 직무수행능력을 향상시키는 방향을 제시하고자 하는데 목적이 있다. 여군과 여경은 남성이 대다수인 조직 내에서 소수인원으로 많은 어려움을 겪고 있으며 근무하고 있다. 우수한 여성인력의 활발한 사회진출을 위한 변화의 흐름에 발맞추어 군대와 경찰도 적극 노력해야 할 것이다. 더구나 일반직 여성인력과는 다르게 여군과 여경은 특수한 성향을 띠고 있는 조직 내에서 업무를 수행하고 있는 만큼 정책적인 지원과 관심이 필요하다.

  • PDF

입지 환경 인자를 이용한 DMZ 남측 철책선 주변 훼손지 유형화 (Classification of the Damaged Areas in the DMZ (Demilitarized zone) by Location Environments)

  • 박기쁨;김상준;이아영;김동학;유승봉
    • 한국환경복원기술학회지
    • /
    • 제24권2호
    • /
    • pp.71-84
    • /
    • 2021
  • Restoration of DMZ has come up with the discussion on the peaceful use of the DMZ and the conservation plan of the army. In this study, we aim to identify soil characteristics of 108 sites to figure out environmental conditions around the iron fence of DMZ where vegetation has been removed repeatedly. Based on the soil characteristics and climate variables, hierarchy clustering was performed to categorize sites. As a result, we categorized 108 sites into 4 types: middle elevation region, lowland, East coast lowland, other areas. Group of 'other area' is only high in nutrient and clay proportion. Others are in igneous rock and metamorphic rocks with a high proportion of sand and lower nutrients than the optimum range of growth in Korean forest soil. The middle elevation region has a high altitude, low temperature. The east coast lowland has a high temperature in January and low precipitation. The lowland has a low altitude and high temperature. This category provides the environmental condition around the DMZ fence and can be used to select plants for restoration. The restoration project around the DMZ iron fence should satisfy the security of military plans, which means that functional restoration is prior to ecological restoration such as vegetation management under a power line. Additionally, improvement of soil quality and surface stability through restoration projects is required to enhance the resilience of the ecosystem in DMZ.

봉쇄와 보안장비 수준 기반 정보보호 위험관리 수준 측정 연구 (A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis)

  • 한충희;한창희
    • 정보보호학회논문지
    • /
    • 제31권6호
    • /
    • pp.1261-1266
    • /
    • 2021
  • 기존의 정보보호 위험평가 방법은 정보자산의 취약성을 평가하는데 중점을 둔다. 그러나 정보자산의 형태가 바뀌고 새로운 유형의 정보자산이 나오면 그에 대한 평가기준도 추가하거나 삭제하는 등의 보완을 거쳐야 하는 한계가 있다. 기존 방법들은 사이버 위협이 유입되는 경로에 연구가 미흡하다. 특히, 공인 IP를 가지고 있는 웹기반 정보시스템을 대상으로 유입되는 유입경로의 봉쇄를 위한 연구가 매우 부족한 상황이다. 이에 본 논문에서는 BDLA (Blockade and Defense Level Analysis) 기반 정보보호 위험평가 모델의 주요 연구내용을 소개 한다. 또한, BDLA기반 정보보호 위험평가 모델을 적용하여 17개 공공기관의 봉쇄수준과 보안장비 수준 측정을 통하여 정보보호 위험 수준을 연구하였다.