“…The process of transmitting tactical data to another element and receiving tactical data from another element [2,51] 등 전투체계/무기체계와 연관된 요소를 분석한 연 구뿐만 아니라 [3][4][5][6][7][8]23,50] 함정 항해•운용을 위한 장비(GPS, AIS 등)가 전투체계와 직접 연동됨에 따라 발생할 수 있는 위협 [52][53][54] , 전투체계 전반 COTS(Commercial Of The Shelf) 구성품 사용에 따른 공급망 공격 가능성 [55][56][57][58][59][60] , 전투체계가 함정 전투를 위해 각종 시스템을 제 어하는 체계라는 관점에서 ICS 측면의 특성 [61,62] [16] . T31, T34, T38, T42, T44, T46, T48, T50, T52, T54, T57, T61, T64, T67, T70, T72, T73, T74, T76, T79, T84, T90, T95, T107, T113, T116, T120, T125, T128, T132, T147, T180, T181 OR 1.1.1.2 Flooding T31, T34, T38, T42, T44, T46, T48, T50, T52, T54, T57, T61, T64, T67, T70, T72, T73, T74, T76, T79, T84, T90, T95, T107, T113, T116, T120, T125, T128, T132, T147, T179, T180, T181, T184, T186, T192 OR 1.1.1.3 Land attack T31, T34, T38, T42, T44, T46, T48, T50, T52, T54, T57, T61, T64, T67, T70, T72, T73, T74, T76, T79, T84, T90, T95, T107, T113, T116, T120, T125, T128, T132, T147, T180, T181, T192 OR 1.1.1.4 Teardrop T31, T34, T38, T42, T44, T46, T48, T50, T52, T54, T57, T76, T79, T84, T90, T95, T107, T113, T116, T120, T125, T128, T132, T147, T180, T181, T192 Installing Spy Chips T5, T15, T21, T27, T56, T83, T89, T94, T106, T112, T131, T196, T197 OR 3.1.1.2 ARP Spoofing T1, T4, T10, T12, T14, T18, T20, T56, T81, T86, T91, T97, T103, T109, T117, T122, T129, T106, T112, T131, T194, T195, T196, T197 OR 3.1.1.3 ICMP Redirect T1, T4, T5, T12, T15, T18, T21, T27, T56, T81, T86, T91, T97, T83, T89, T94, T103, T109, T117, T122, T129, T106, T112, T131, T194, T195, T196, T197 OR 3.1.1.4 Switch jamming attack T5, T15, T21, T27, T81, T86, T91, T97, T103, T109, T117, T122, T129, T106, T112, T131, T194, T195, T196, T197 Omit 를 정의하고 있다 [67] .…”