• Title/Summary/Keyword: space threats

Search Result 116, Processing Time 0.025 seconds

Display System Design Based On The Abstraction Hierarchy

  • Sohn, Kwang-Young;Shin, Hyun-Kook
    • Nuclear Engineering and Technology
    • /
    • v.28 no.3
    • /
    • pp.339-348
    • /
    • 1996
  • Plant monitoring algorithm developments seem to be saturated which means that display system to show the results from the algorithm should be the well-defined and interactive tools for operator's diagnosing, controlling, restoring the abnormal plant situations. On the other hand, very little generalized display design concepts and evaluations are available. Events that are unfamiliar to operators and that has not been anticipated by designers may cause great threats to the nuclear power plant system safety operation. The abstraction hierarchy, considered most popular display design methodology but not generalized for nuclear power plant design space, has ken proposed as a representation frame work that can be adopted to design interfaces and supports operators in diagnosing overlooked events that should have been considered to operate plant safely. However most practical plant display systems do not fully stick to this design concept but partially rely on their philosophy from design experiences. Abstraction hierarchy display design concept will be do scribed and the trend of Advanced Control Room(ACR) CRT design will also be presented with the conventional display for the several type of plants. Consequently this complementary material should be of interest to designer and regulators concerned with nuclear power plant.

  • PDF

Conceptual Analysis of Cyber Electronic Warfare by OSI Reference Model (OSI 참조 모델에 의한 사이버전자전 개념 분석)

  • Lee, Minwoo;Lee, Jongkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.600-601
    • /
    • 2021
  • The cyberspace, which is the fifth battle field, should be utilized for multi-domain maneuvering between the cyberspace and the physical space using an electromagnetic spectrum. This becomes a major concept of cyber electronic warfare that combines the characteristics of cyber warfare and electronic warfare. In this study, the concept of cyber electronic warfare is analyzed by using the OSI reference model and examining the threats of the two-layer data link layer.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

The Future of Republic of Korea Navy : Toward a Korean Way of Naval Strategy (미래 대한민국 해군력 역할과 발전)

  • Choi, Joung-Hyun
    • Strategy21
    • /
    • s.37
    • /
    • pp.65-103
    • /
    • 2015
  • This study is an attempt to look into the future role of the ROKN and to provide a strategic way forward with a special focus on naval strategic concept and force planning. To accomplish this goal, this research takes four sequential steps for analysis: 1) assessing the role and utility of naval power of ROKN since its foundation back in 1945; 2) forecasting features of various maritime threats to influence the security of Korea in the future directly or indirectly; 3) identifying the roles to be undertaken by future ROKN; and 4) recommending Korean way of naval force planning and the operational concept of naval power. This study seeks to show that ROKN needs comprehensive role to better serve the nation with respect to national security, national prosperity and development, and future battle-space management. To safeguard the national security of Korea, it suggests three roles: 1) national guard for the peaceful unification; 2) protector of the maritime sovereignty; and 3) suppressor to maritime threats. Three more roles are highlighted for national prosperity: 1) escort of the national economy; 2) guardian for national maritime activities; and 3) contributor to the world peace. These roles need to be closely connected with the role for the battle-space management. This paper addresses the need for a dramatic shift of the central operational domain from land to maritime in the future. This will eventually offer future ROKN a leading role for developing strategic concept and force planning rather than merely a supporting one. This study finally suggests 'balanced' strategy both in concept development and force planning. A balanced force planning is a 'must' rather than an 'option' when considering a division of function between Task Fleets and Area Fleets, constructing cutting-edge conventional forces such as Aegis destroyer, CVs, or submarines, and the mix of high-profile platform and low-profile when composing future fleets. A 'balance' is also needed in operational concept. The fleet should be prepared to fulfill its missions based on two different types of force operation i.e., coercive or cooperative application of the utility of naval force. The findings and recommendations of the study are relevant today, and will be increasingly important in the future to achieve various political goals required by enhancing the utility of naval power.

Investigation of Technical Requirements for a Protective Shield with Lunar Regolith for Human Habitat (월면토를 이용한 달 유인 우주기지 보호층의 기술적 요구조건에 관한 연구)

  • Lee, Jangguen ;Gong, Zheng;Jin, Hyunwoo ;Ryu, Byung Hyun;Kim, Young-Jae
    • Journal of the Korean Geotechnical Society
    • /
    • v.39 no.10
    • /
    • pp.49-55
    • /
    • 2023
  • The discovery of lunar ice in the lunar polar region has fueled international interest in in situ resource utilization (ISRU) and the construction of lunar habitats. Unlike Earth's atmosphere, the Moon presents unique challenges, including frequent meteoroid impacts, direct exposure to space radiation, and extreme temperature variations. To safeguard lunar habitats from these threats, the construction of a protective shield is essential. Lunar regolith, as a construction material, offers distinct advantages, reducing transportation costs and ensuring a sustainable supply of raw materials. Moreover, it streamlines manufacturing, integration schedules, and enables easy repairs and modifications without Earth resupply. Adjusting the shield's thickness within the habitat's structural limits remains feasible as lunar conditions evolve. Although extensive research on protective shields using lunar regolith has been conducted, unresolved conflicts persist regarding shield requirements. This study conducts a comprehensive analysis of the primary lunar threats and suggests a minimum shield thickness of 2 m using lunar regolith. Furthermore, it outlines the necessary technology for the rapid construction of such protective shields.

Biometric User Authentication Method of Mobile Application in Trustable Space (신뢰할 수 있는 공간에서 생체인식기반의 모바일 애플리케이션 사용자인증 기법)

  • Lee, Tae Kyong;Kim, Yong Hyuk;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.201-212
    • /
    • 2017
  • As services using mobile devices increase, exposure of personal information, and secure threats increase. In this paper, we propose a location-based user authentication system used in mobile device for tightening security. Our authentication system is performed to authenticate two steps. The first authentication is location authentication to ensure that the user accesses an application in trustable space. This authentication method uses an Access Point's information. The second authentication is trustable space authentication to confirm the normal user. This method is carried out the authentication by using biometric information from the user.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

International Legal Regulation for Environmental Contamination on Outer Space Activities (우주에서의 환경오염 방지를 위한 국제법적 규제)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.153-194
    • /
    • 2009
  • The resources of outer space are for the common exploitation of mankind, and it is a common responsibility of mankind to protect the outer space environment. With the rapid development of space science and technology, and especially with the busy space activities of some major space powers, environmental contamination or space debris is steadily increasing in quantity and has brought grave potential threats and actual damage to the outer space environment and human activities in space. Especially We must mitigate and seek out a solution to remove space debris which poses a threat directly to man's exploitation and use of outer space activities in the Low Earth Orbit (LEO) and in the Geostationary Orbit (GEO), through international cooperation and agreement in the fields of space science, economics, politics and law, in order to safeguard the life and property of mankind and protect the earth's environment. While the issue of space debris has been the subject of scientific study and discussion for some time now, it has yet to be fully addressed within the context of an international legal framework. During the earlier stages of the space age, which began in the late 1950s, the focus of international lawmakers and diplomats was the establishment of basic rules which sought to define the legal nature of outer space and set out the parameters for space activities and the nature and scope of activities carried out in outer space were quite limited. Consequently, environmental issues and the risks that might arise from the generation of space debris did not receive priority attention within the context of the development international space law. In recent years, however, the world has seen dramatic advances in technology and increases in the type and number of space-related activities which are being carried out. In addition, the number of actors in this field has exploded from two highly developed States to a vast array of different States, intergovernmental and nongovernmental organizations, including private industry. Therefore, the number of artificial objects in the near-Earth space is continually increasing. As has been previously mentioned, COPUOS was the entity that created the existing five treaties, and five sets of legal Principles, which form the core of space law, and COPUOS is clearly the most appropriate entity to oversee the creation of this regulatory body for the outer space environmental problem. This idea has been proposed by various States and also at the ILA Conference in Buenos Aires. The ILA Conference in Buenos Aires produced an extensive proposal for such a regulatory regime, dealing with space debris issues in legal terms This article seeks to discuss the status of international law as it relates to outer space environmental problem and space debris and indicate a course of action which might be taken by the international community to develop a legal framework which can adequately cope with the complexity of issues that have recently been recognized. In Section Ⅱ,Ⅲ and IV of this article discuss the current status of international space law, and the extent to which some of the issues raised by earth and space environment are accounted for within the existing United Nations multilateral treaties. Section V and VI discuss the scope and nature of space debris issues as they emerged from the recent multi-year study carried out by the ILA, Scientific and Technical Subcommittee, Legal Subcommittee of the United Nations Committee on the Peaceful Uses of Outer Space ("COPUOS") as a prelude to the matters that will require the attention of international lawmakers in the future. Finally, analyzes the difficulties inherent in the future regulation and control of space debris and the activities to protect the earth's environment. and indicates a possible course of action which could well provide, at the least, a partial solution to this complex challenge.

  • PDF

A Comparative Study between Space Law and the Law of the Sea (우주법과 해양법의 비교 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.2
    • /
    • pp.187-210
    • /
    • 2009
  • Space law(or outer space law) and the law of the sea are branches of international law dealing with activities in geographical ares which do not or do only in part come under national sovereignty. Legal rules pertaining to the outer space and sea began to develop once activities emerged in those areas: amongst others, activities dealing with transportation, research, exploration, defense and exploitation. Naturally the law of the sea developed first, followed, early in the twentieth century, by air law, and later in the century by space law. Obviously the law of the sea, of the air and of outer space influence each other. Ideas have been borrowed from one field and applied to another. This article examines some analogies and differences between the outer space law and the law of the sea, especially from the perspective of the legal status, the exploration and exploitation of the natural resources and environment. As far as the comparisons of the legal status between the outer space and high seas are concerned the two areas are res extra commercium. The latter is res extra commercium based on both the customary international law and treaty, however, the former is different respectively according to the customary law and treaty. Under international customary law, whilst outer space constitutes res extra commercium, celestial bodies are res nullius. However as among contracting States of the 1967 Outer Space Treaty, both outer space and celestial bodies are declared res extra commercium. As for the comparisons of the exploration and exploitation of natural resources between the Moon including other celestial bodies in 1979 Moon Agreement and the deep sea bed in the 1982 United Nations Convention on the Law of the Sea, the both areas are the common heritage of mankind. The latter gives us very systematic models such as International Sea-bed Authority, however, the international regime for the former will be established as the exploitation of the natural resources of the celestial bodies other than the Earth is about to become feasible. Thus Moon Agreement could not impose a moratorium, but would merely permit orderly attempts to establish that such exploitation was in fact feasible and practicable, by allowing experimental beginnings and thereafter pilot operations. As Professor Carl Christol said until the parties of the Moon Agreement were able to put into operation the legal regime for the equitable sharing of benefits, they would remain free to disregard the Common Heritage of Mankind principle. Parties to one or both of the agreements would retain jurisdiction over national space activities. In so far as the comparisons of the protection of the environment between the outer space and sea is concerned the legal instruments for the latter are more systematically developed than the former. In the case of the former there are growing tendencies of concerning the environmental threats arising from space activities these days. There is no separate legal instrument to deal with those problems.

  • PDF

A Study on IoT Security Technology using LoRa (LoRa 기반 IoT 보안대책에 대한 연구)

  • Chung, Youngseek;Cha, Jaesang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.4
    • /
    • pp.185-189
    • /
    • 2017
  • According to the rapid growth of Internet of Things (IoT) technology, we are able to connect between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. These days, Low Power Wide Area (LPWA) technologies becomes popular more and more, to implement IoT infrastructure effectively. In this paper, this study aims to analyze LoRa, one of LPWA technologies, and suggest IoT security technology using LoRa to minimize threats to security.