RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        정보화 시대의 국가안보

        김기정(金基正),원영제(元永堤) 한국전략문제연구소 2001 전략연구 Vol.8 No.1

        The unprecedented advancement of the cutting-edged information technology bas made the game we play, the business we conduct and the politics we engage, faster and more complicated with stronger global linkage between events, which adds complexity and reduces predictability. Information revolution has generated fundamental changes in production, distribution, utilization and expansion of information itself. In this sense, information warfare has to be understood as something unprecedented since it would be highly colored by cyber terror on communication network, information hacking and cyber attacks on firewalls. The new paradigm of information warfare has challenged the traditional concept of national security and certainly required states to act upon this fast emergence of new trend. In this, information warfare is defined as the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries Information warfare is divided by MTR (Military Technical Revolution), RMA (Revolution in Military Affairs) and RSA (Revolution in Security Affairs) in terms of the level of information technology and characteristics. The MTR is simply, by applying information technology to the weapon systems, the development of new weapon system. Thus, the concept of military mission is not fundamentally different from the traditional one. However, the RMA is the realization by the military that information, and information technologies must be considered as a weapon in achieving national objectives via military activity. The RMA requires comprehensive linkage and connectivity of each weapon system that must be consist of on-line network to carry a military mission. The RMA is the highest level in the information warfare which generates the larges scale changes in the concept of military mission, doctrine and national security. There are 7 types of information warfare; Command and Control warfare, Intelligence-based warfare, electronic warfare, psychological warfare, hacker warfare, economic information warfare and cyber warfare. In information warfare, the offence target has varied from states to organizations and individual. The cost of carrying a military mission has become economic. Early warning and damage assessment has become virtually impossible due to the unprecedented increases in cyber-interactions. It has become difficult to manipulate information and the public opinion as access to information is open virtually to everyone. As the concept of war itself has expanded, any place that is accessible has become combat places due to the web of information networks. Gulf War was the first information warfare where the satellite surveillance system and precision-guided weapon were used to carry combat missions. At Yugoslavia, hacker warfare has emerged as a new warfare for the first time in the history of warfare. Under these circumstances of dramatic changes in the concept of warfare, major powers surrounding the Korean peninsula are in the process of constructing measures for information warfare. The United States are the leader in driving for the MTR and the RMA in order to countermeasure any cyber attacks on its information networks. In so doing, the US is developing not only the hardware and software of information warfare but also institutionalizing legal and institutional frameworks for the new century of information warfare. Chain has already constructed information networks that links major cities and military compounds in mainland, and is in the middle of creating anti-virus operation teams to effectively manage cyber terrors on its complicated information networks. Russia, having realized its increasing dependence on the imports of computer hardware as well as software, has decided to minimize the imports of strategic information hardware and software. Russia is trying to launch some sort of joint venture with foreign partners to increase its information warfare strength. Japan is also active in creating legal frameworks for cyber-terror and information security. Although North Korea is said to be backward in its computer hardware capacity, its software capacity is believed to be very competitive as it was proved in its autonomous launching of Taepodong Missile 1. Information revolution has inevitably become an undeniable mega trend in the world we live in. And it is accelerating fast, so fast that we must prepare for uncertainty and complexity. As opposed to the four major powers, Korea is at its start line for building up necessary measurements for information warfare. This must be done not only in technological areas but also in legal, institutional and political areas. Government must take initiatives to guide and lead cooperation among the private sectors, the academia and the technocrats. Information warfare brings important ramifications for national security in the era of information warfare, that is a new paradigm for war. Information warfare implies expansion of vulnerability that potential adversaries are able to cause critical damages. Therefore, we should be able to spot the venerable points of our adversaries and possess technological capacity to cause damages. In the ear of information warfare, actors in international politics may take asymmetric strategies in which each actor utilizes its information technology as a mean of either offense or defense. Lastly, information warfare has broadened the concept of national security so that its offense and defense lines has escalated to the cyber space. From the real space to the cyber space! this is what the concept of national security has become in the ear of information revolution. Therefore, securing national interest and citizenry safety has also expanded to the cyber space. Information warfare possess the two faced characteristics. It generates enormous opportunities for states to conduct efficient military operations and maintain national security. However at the same time, it proved exactly the same opportunities to potential adversaries so that our vulnerability increases concurrently. Thus the game that we will play has more of complexity and uncertainty. We may win but lose at the same time. Therefore our national security has entered into a new era that requires more of precise and prompt social linkage, governmental cooperation, pan-state network, effective military operation capacity and political leadership.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼