Abstract
As IT advances, warfare undergoing a paradigm shifts. It is going from a type that is weapon-based—making heavy use of conventional weapons—to one that is network-based, a type of warfare called network-centric warfare (NCW). In NCW, sharing of information can be guaranteed using communication technologies of the network. As the members that take part in missions can exchange and collaborate with other, they can be completed more successfully and efficiently, increasing the military might. Amid advancements being made in IT, the Korea military is also doing research for conducting more effective warfare, which it aims to do by connecting each of the entities together and sharing battlefield resources. This paper examines threats to information security in NCW, as well as requirements for information security. Furthermore, a development direction for information security is proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bae, D.H., Cho, Y.G.: Operational attribute and principle of computer network operations (CNO). J. Nat. Def. Stud. 52(2), 39–70 (2009) (Research Institute for National Security Affairs of Korea National Defense University)
Ko, S.J.: Smallness unit a commander telecommunication system embodiment plan research, PaiChai University, Korea (2005)
Forouzan, B.A.: Cryptography and network security, McGraw-Hill, Seoul (2008)
Defense acquisition program administration, defense capacity improvement project management regulation (2006)
Ministry of National Defense: instruction on the management of defense information system interoperability and standardization, Korea (2003)
DoD: Department of Defense Directive 4630.5, interoperability and supportability of information technology and national security systems (2004)
DoD: DoD Instruction 4630.8, procedures for interoperability and supportability of information technology and national security systems (2004)
DoD: Chairman of the Joint Chiefs of Staff Instruction 6212.01.C, interoperability and supportability of information technology and national security systems (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Yang, HK., Kim, JM., Ryou, HB., Park, JH. (2012). Development Direction for Information Security in Network-Centric Warfare. In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 203. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5699-1_85
Download citation
DOI: https://doi.org/10.1007/978-94-007-5699-1_85
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5698-4
Online ISBN: 978-94-007-5699-1
eBook Packages: Computer ScienceComputer Science (R0)