• Title/Summary/Keyword: mutual security

Search Result 476, Processing Time 0.027 seconds

Russia's Eurasian strategy and Korea-Russia Cooperation - With reference to the economic cooperation of the inter-local governments - (러시아의 유라시아 전략과 한·러 협력 - 지방자치단체 간 경제협력을 중심으로 -)

  • Park, Sangnam
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.5-28
    • /
    • 2019
  • This study suggests that Korea - Russia economic cooperation, which has been sluggish in the meantime, should be revitalized as a small, medium sized business that can be practiced at the local level of both countries. Some large scales of national projects were difficult to realize due to some internal and external factors. Therefore, if Russia's Far East region of the complementary economic structure with the Korea's Gyeonggi Province of Korea could form the basis of cooperation by centering on SMEs, it further can be positive for promoting cooperation among South Korea, North Korea and Russia. The trilateral cooperation among two Koreas and Russia is necessary for the balance of political and economic powers in the East Asia. China's retaliation case regarding THAAD (Terminal High Altitude Area Defense) clearly showed that the greater the economic dependence on a particular country, the more threatening it could be. Therefore, it is important for the political and economic security to keep the balance by diversifying economic cooperation counterparts. As China's influence in the global economy grows, building value chains for mutual prosperity with various neighboring countries is gaining great importance. To this end, this paper examined Russia's Eurasian Strategy, New East Policy, and Far East Development Policy which were designed to seek the way to establish Russia's independent economic zone not absorbed by Europe and China.

  • PDF

Board Game Design for Disaster Safety Education for Elementary School Students Based on Learning Motivation Theory (학습동기이론 기반의 초등학생 재난안전 교육을 위한 보드게임 설계)

  • Kim Mira;Jung Hyungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.59-74
    • /
    • 2024
  • In order to improve safety consciousness due to the increase in disasters and safety accidents, safety education is necessary to prepare for disasters with interest in safety. This study is a board game design for disaster safety education for elementary school students based on Keller's learning motivation theory. By considering the school safety curriculum and the safety education contents of the School Safety Mutual Aid Association and the Ministry of Public Administration and Security, the content and goals of learning were derived and the order of learning was determined. When designing game content, the fun elements of the game were applied to Keller's learning motivation inducing factors such as attention concentration (A), relevance (R), confidence (C), satisfaction (S), and educational game design elements to induce the achievement of learning goals at the game planning stage. It is expected that the existing safety education focusing on lecture-style and audiovisual will be supplemented and used in the educational field.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

A Study on Factors Affecting Formation of Social Capital for Volunteer Fire Brigade (의용소방대의 사회적 자본 영향요인 분석)

  • Woo, Seong-Cheon;Chae, Jin;Go, Gi-Bong
    • Fire Science and Engineering
    • /
    • v.28 no.1
    • /
    • pp.64-70
    • /
    • 2014
  • A Volunteer Fire Brigade is a voluntary social services organization that performs various assistance works in fire fighting activities such as fire fighting and rescue of human lives on a part-time basis. Recently, it has also assumed an important role in the creation of security culture of local society. Besides, it provides diverse service activities related to security of local society. However, as this kind of volunteer fire brigade organization is not in a vigorous state, research for an improvement is being carried out in earnest. As part of a vitalization plan of the volunteer fire brigade, an attempt was made in this research to present an activation plan of the volunteer fire brigade through formation of social capital. Accordingly, efforts were made in this research to investigate and analyze an awareness of social capital among the volunteers and to present on this basis a plan for formation of social capital for the volunteer fire brigade of local society. As a result of the research, it turned out that social norm has the major effect on the formation of social capital for volunteer fire brigade. Therefore, it is our belief that an independent statute should be established to nurture and develop volunteer fire brigades. And when strong mutual trust among the volunteers are formed and efforts for devotion to local society are made on this basis, the security level of local society will be enhanced further.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Sohn, Hong;Jo, In-June;Ju, Young-Ki;Lee, Dal-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.357-364
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can peep through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working (:roup is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, 1 design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

Militarization of Space and Arms Control

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.443-469
    • /
    • 2018
  • In the sixty year since the first launch of Sputnik 1, it has become impossible to consider economic, political, or scientific human life in the communication field without reference to outer space. But, there is a growing groundswell of public opinion aimed at preventing arms race in space. Therefore it is necessary to establish some institution or mechanism such a code of conduct, international law. But every nation has a different posture on the grounds of national interest, or different levels of space development, the conditions required for the successful negotiation of a comprehensive treaty are not yet ripe. It is hoped that by beginning with soft measures (TCBM, Code of Conduct) for which it is easier to secure voluntary participation it may be possible to build up to a comprehensive treaty. The participation of the Space powers (US, Russia, China) in a dialogue of mutual exchange and shared information would contribute to international peace and give a long term benefit to humankind. It is also necessary to promote partnership through regional and bilateral cooperation. We should guide and shape opinion so that more nations ratify and sign existing international legal covenants in order to contribute to the efficency of Space law. International law needs to enforce PAROS and Space Security.

Understanding the Trilemma in Inter-Korea Economic Cooperation (남북한 경제협력의 불가능 삼각정리와 실천적 협력방안)

  • Han, Hongyul
    • Analyses & Alternatives
    • /
    • v.2 no.1
    • /
    • pp.5-29
    • /
    • 2018
  • Models of South-North Korean economic integration have the problem of circular reasoning. While many studies argue that South-North Korean economic integration would contribute to alleviate security risks in the Korean peninsular, they emphasize the success of any economic model of inter-Korean economic integration is subject to favorable geo-political and security environment. It is a failure in distinguishing between goals and constraints. After identifying three major goals of South-North Korean economic cooperation, this study shows the trilemma among the goals; they are 1) formation of a complete economic community, 2) maintaining independent sovereignty of the two Koreas, 3) promotion of mutual economic interests. The trilemma suggests that it is theoretically impossible to achieve the above three goals at the same time. Only two goals are achievable simultaneously. This study argues that the most practical option is to pursue the combination of goals 2) and 3) considering the complex political and security environment around the Korean peninsular. Recognizing that North Korea is the least developed country in the Northeast Asia region, South Korea's initiatives for inter-Korean economic cooperation should focus on assisting industrialization and integration of the North Korea economy into the Northeast Asian regional production sharing structure. In view of the 'flying geese model' of the sequential industrialization in the region, the least developed economic status of North Korea can partially be explained by its failure to participate in the production network in the region as well as lack of effective implementation of appropriate industrial policy. Therefore, promotion of industrialization of North Korea should be the immediate goal of economic cooperation between North and South Korea. It is an interesting fact that North Korea has rapidly expanded its apparel exports in recent years. It could mean that the North Korean economy is actively responding to the dynamics of international comparative advantage structure, although the production activities are limited to exports to China since the closure of the Gaesung Industrial Complex. The recent increase in apparel export is a starting point for incorporating the Easy Import Substitution fulfilling both domestic and neighboring regional demand of North Korea. It could help integrate North Korea's industry into the production network of Northeast Asia. An immediate policy implication is that the economic cooperation between the two Koreas should focus on facilitating this process and supporting North Korea's industrial policy through South Korea's contribution of capital, technology, and service intermediary inputs.

  • PDF

Eurasian Naval Power on Display: Sino-Russian Naval Exercises under Presidents Xi and Putin (유라시아 지역의 해군 전력 과시: 시진핑 주석과 푸틴 대통령 체제 하에 펼쳐지는 중러 해상합동훈련)

  • Richard Weitz
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.1-53
    • /
    • 2022
  • One manifestation of the contemporary era of renewed great power competition has been the deepening relationship between China and Russia. Their strengthening military ties, notwithstanding their lack of a formal defense alliance, have been especially striking. Since China and Russia deploy two of the world's most powerful navies, their growing maritime cooperation has been one of the most significant international security developments of recent years. The Sino-Russian naval exercises, involving varying platforms and locations, have built on years of high-level personnel exchanges, large Russian weapons sales to China, the Sino-Russia Treaty of Friendship, and other forms of cooperation. Though the joint Sino-Russian naval drills began soon after Beijing and Moscow ended their Cold War confrontation, these exercises have become much more important during the last decade, essentially becoming a core pillar of their expanding defense partnership. China and Russia now conduct more naval exercises in more places and with more types of weapons systems than ever before. In the future, Chinese and Russian maritime drills will likely encompass new locations, capabilities, and partners-including possibly the Arctic, hypersonic delivery systems, and novel African, Asian, and Middle East partners-as well as continue such recent innovations as conducting joint naval patrols and combined arms maritime drills. China and Russia pursue several objectives through their bilateral naval cooperation. The Treaty of Good-Neighborliness and Friendly Cooperation Between the People's Republic of China and the Russian Federation lacks a mutual defense clause, but does provide for consultations about common threats. The naval exercises, which rehearse non-traditional along with traditional missions (e.g., counter-piracy and humanitarian relief as well as with high-end warfighting), provide a means to enhance their response to such mutual challenges through coordinated military activities. Though the exercises may not realize substantial interoperability gains regarding combat capabilities, the drills do highlight to foreign audiences the Sino-Russian capacity to project coordinated naval power globally. This messaging is important given the reliance of China and Russia on the world's oceans for trade and the two countries' maritime territorial disputes with other countries. The exercises can also improve their national military capabilities as well as help them learn more about the tactics, techniques, and procedures of each other. The rising Chinese Navy especially benefits from working with the Russian armed forces, which have more experience conducting maritime missions, particularly in combat operations involving multiple combat arms, than the People's Liberation Army (PLA). On the negative side, these exercises, by enhancing their combat capabilities, may make Chinese and Russian policymakers more willing to employ military force or run escalatory risks in confrontations with other states. All these impacts are amplified in Northeast Asia, where the Chinese and Russian navies conduct most of their joint exercises. Northeast Asia has become an area of intensifying maritime confrontations involving China and Russia against the United States and Japan, with South Korea situated uneasily between them. The growing ties between the Chinese and Russian navies have complicated South Korean-U.S. military planning, diverted resources from concentrating against North Korea, and worsened the regional security environment. Naval planners in the United States, South Korea, and Japan will increasingly need to consider scenarios involving both the Chinese and Russian navies. For example, South Korean and U.S. policymakers need to prepare for situations in which coordinated Chinese and Russian military aggression overtaxes the Pentagon, obligating the South Korean Navy to rapidly backfill for any U.S.-allied security gaps that arise on the Korean Peninsula. Potentially reinforcing Chinese and Russian naval support to North Korea in a maritime confrontation with South Korea and its allies would present another serious challenge. Building on the commitment of Japan and South Korea to strengthen security ties, future exercises involving Japan, South Korea, and the United States should expand to consider these potential contingencies.

  • PDF

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.