9 research outputs found

    Security Issues in the International Society and Cyber Space

    No full text
    ์ด ๋…ผ๋ฌธ์€ ์ œ1์ €์ž์˜ ๋ฐ•์‚ฌํ•™์œ„ ๋…ผ๋ฌธ์ธ ๋ถํ•œ์˜ ์‚ฌ์ด๋ฒ„ ์œ„ํ˜‘๊ณผ ๋Œ€์‘์ „๋žต์— ๊ด€ํ•œ ์—ฐ๊ตฌ์˜ ์ผ๋ถ€๋ถ„์„ ์ˆ˜์ •, ๋ฐœ์ „์‹œ์ผœ ์ž‘์„ฑ๋œ ์—ฐ๊ตฌ์ž„์„ ๋ฐํž™๋‹ˆ๋‹ค. ๋˜ํ•œ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์˜ ๋“ฑ์žฅ์œผ๋กœ ๊ธฐ์ˆ ์  ๋ฒˆ์˜๊ณผ ์•ˆ๋…•์„ ์ถ”๊ตฌํ•˜๋˜ ๊ตญ์ œ์‚ฌํšŒ๋Š” ์ด์ œ ๋ถˆ๊ฐ€ํ”ผํ•œ ์—ญ์„ค์— ์ง๋ฉดํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋ฅธ๋ฐ” ์ดˆ์—ฐ๊ฒฐ์„ฑ โ€ค ์ดˆ์ง€๋Šฅ์„ฑ ์‚ฌํšŒ๋กœ ์ง„์ž…ํ•œ ๊ตญ์ œ์‚ฌํšŒ๋Š” ์ด๋ฏธ ์•…์„ฑ์ฝ”๋“œ๋กœ ๋ฌด์žฅํ•œ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์— ์ง์ ‘์ ์œผ๋กœ ๋…ธ์ถœ๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋Š” ์ด์ „์—๋Š” ๊ฒฝํ—˜ํ•˜์ง€ ๋ชปํ•œ ์ƒˆ๋กœ์šด ํ˜•ํƒœ์˜ ์•ˆ๋ณด๋ฌธ์ œ๋กœ๋ถ€ํ„ฐ ๊ตญ์ œ์‚ฌํšŒ๊ฐ€ ์œ„ํ˜‘๋ฐ›๊ณ  ์žˆ๋‹ค๋Š” ๊ฒƒ์„ ์˜๋ฏธํ•œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฌํ•œ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์˜ ์•ˆ๋ณด๋ฌธ์ œ์— ๋Œ€ํ•ด ๊ตญ์ œ์‚ฌํšŒ๋Š” ์—ฌ์ „ํžˆ ์ง์ ‘์ ์ธ ๋Œ€์‘๋ฐฉ์•ˆ์„ ์ œ์‹œํ•˜์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋‹ค. ๋ฌผ๋ก  ์‚ฌ์ด๋ฒ„ ์„ธ๊ณ„์˜ ์œ„ํ˜‘ํ–‰์œ„๊ฐ€ ๊ฐœ๋ณ„๊ตญ๊ฐ€์˜ ์•ˆ๋ณด๋ฅผ ์œ„ํ˜‘ํ•˜๊ณ  ์žˆ๋‹ค๋Š” ์‚ฌ์‹ค๊ณผ ์ด๋Ÿฌํ•œ ์œ„ํ˜‘์ด ๊ตญ์ œ์‚ฌํšŒ์˜ ์ง‘๋‹จ์•ˆ๋ณด์˜ ์˜์—ญ์—๊นŒ์ง€ ์˜ํ–ฅ์„ ๋ฏธ์น  ์ˆ˜ ์žˆ๋‹ค๋Š” ์ ์—์„œ๋Š” ์ธ์‹์„ ํ•˜๊ณ  ์žˆ๋Š” ๊ฒƒ์œผ๋กœ ๋ณด์ด๋‚˜ ์•„์ง๊นŒ์ง€ ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด์— ๋Œ€ํ•œ ๊ตญ์ œ๊ทœ๋ฒ”์„ ๋น„๋กฏํ•œ ์ „๋žต ๋ฐ ์ง€์นจ ๋“ฑ์— ์žˆ์–ด์„œ๋Š” ์ผ์น˜๋œ ํ•ฉ์˜์ ์„ ์ฐพ์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์— ์ ์šฉ๋˜๋Š” ๊ทœ๋ฒ”์„ ๊ตฌ์ถ•ํ•˜๊ณ ์ž ํ•˜๋Š” ๋ฏธ๊ตญ ์ค‘์‹ฌ์˜ ์„œ๋ฐฉ์ง„์˜๊ณผ ์ค‘๊ตญ โ€ค ๋Ÿฌ์‹œ์•„ ์ค‘์‹ฌ์˜ ์ง„์˜์˜ ์ด๋ถ„๋ฒ•์  ์‚ฌ๊ณ ์˜ ์ฐจ์ด๋กœ ์ธํ•ด ์—ฌ์ „ํžˆ ์ •์น˜์ ใ†์™ธ๊ต์ ์œผ๋กœ ๊ณต๊ฐ๋Œ€๋ฅผ ํ˜•์„ฑํ•˜์ง€๋Š” ๋ชปํ•˜๊ณ  ์žˆ๊ณ , ์–‘ ์ง„์˜์˜ ๋…ผ์Ÿ ๊ณต๋ฐฉ์ด์‚ฌ์ด๋ฒ„ ๊ณต๊ฐ„์— ๋Œ€ํ•œ ์•ˆ๋ณด๋ฌธ์ œ ํ•ด๊ฒฐ์— ์žˆ์–ด ๊ธฐ์กด ๊ตญ์ œ๋ฒ• ์ฒด์ œ์˜ ์ ์šฉ๋ฌธ์ œ์™€ ๊ฐœ๋ณ„๊ตญ๊ฐ€์˜ ์ฃผ๊ถŒ์  ๊ฐœ๋…์˜ ์ธ์ •์— ์žˆ๋Š” ๋งŒํผ, ๋Œ€ํ‘œ์ฃผ์ž์ธ ๋ฏธ๊ตญ๊ณผ ์ค‘๊ตญ โ€ค ๋Ÿฌ์‹œ์•„์™€์˜ ์ƒํ˜ธ๊ฐ„ ์—ฐ๊ฒฐ๋ฐ€๋„์˜ ํฌ์„์ด ์ด๋ฃจ์–ด์ง€์ง€ ์•Š๊ณ ์„œ๋Š” ๊ตฌ์กฐ์  ์–‘๋ถ„ํ™” ๊ณผ์ •์€ ๋”์šฑ ๊ฐ€์—ด๋  ๊ฒƒ์ด๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์ด๋Ÿฌํ•œ ๋ถ„์ ˆ์„ฑ์€ ์ ์  ๋” ๋‹ค์ธต์ ์ด๊ณ  ๋ณ€ํ™”๋ฌด์Œํ•˜๊ฒŒ ์ง„ํ™”ํ•˜๊ณ  ์žˆ๋Š” ์‚ฌ์ด๋ฒ„ ์œ„ํ˜‘์— ์ง๋ฉดํ•œ ์šฐ๋ฆฌ์˜ ์ž…์žฅ์—์„œ๋„ ์ƒ๋‹นํžˆ ๋ถˆ๋ฆฌํ•œ ๋ฐฉํ–ฅ์œผ๋กœ ์ž‘์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด์— ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์‚ฌ์ด๋ฒ„ ์•ˆ๋ณด์— ๋Œ€ํ•œ ๊ตญ์ œ์‚ฌํšŒ์˜ ๋ถ„์ ˆ๋œ ์‹œ๊ฐ์„ ์ดํ•ดํ•˜๊ณ , ์šฐ๋ฆฌ์—๊ฒŒ ํ•„์š”ํ•œ ๋…์ž์ ์ด๊ณ  ์‹ค์šฉ์ ์ธ ๋Œ€์‘๋ฐฉ์•ˆ์„ ๋ชจ์ƒ‰ํ•˜๊ณ ์ž ์‚ฌ์ด๋ฒ„ ํ˜‘๋ ฅ์ฒด๊ณ„์˜ ํ™•์žฅ, ๊ทธ๋ฆฌ๊ณ  ์ ๊ทน์  ์‚ฌ์ด๋ฒ„ ๋ฐฉ์–ด์ฒด๊ณ„์˜ ํ™•๋ฆฝ์„ ์ œ์‹œํ•˜๊ณ ์ž ํ•œ๋‹ค.The international community, which pursued technological prosperity and well-being with the advent of cyberspace, is now facing inevitable irony. The international community, which has entered the so-called Superconnectivityโ€ค Superintelligence, is directly exposed to cyber attacks armed with malicious code, which poses new threats to the international community. However, the international community has yet to come up with a direct response to this problem. Of course, are they still aware of the fact that cyber world threat actions are threatening the security of individual countries, and that such threats may not have an impact on the global communitys areas of collective security. In particular, the differences between the two countries bilateral opinions on the issue of cyber security and those of the U.S. and Russia who want to establish the rules applied to cyberspace have not led to a political and diplomatic consensus. Without dilution of the interconnection density of, the process of structural separation will heat up further. And this fragmentation may pose a significant disadvantage for us in the face of increasingly multilayered and ever-changing cyber threats. Therefore, In this study, we want to demonstrate the expansion of the cyber cooperation system and the establishment of an active cyber defense system in order to understand the fragmented view of cyber security by the international community and to explore the unique and practical responses we need
    corecore