Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.3.765

Research for Construction Cybersecurity Test and Evaluation of Weapon System  

Lee, Ji-seop (Center for Information Security Technologies(CIST), Korea University)
Cha, Sung-yong (Center for Information Security Technologies(CIST), Korea University)
Baek, Seung-soo (Center for Information Security Technologies(CIST), Korea University)
Kim, Seung-joo (Center for Information Security Technologies(CIST), Korea University)
Abstract
As the IT technology develops, the military information system develops to the current IT environment for efficient operation and rapid communication, and the threat of cyber attack against the advanced weapon system using network technology is increasing simultaneously. In order to prevent and mitigate these problems, the United States has applied the cybersecurity test evaluation system from the beginning to the beginning of weapon system development. However, in Korea, the evaluation process of cyber security test is weak, and there is concern about the damage due to cyber attack. In this paper, we analyze cybersecurity test evaluation status of U.S. and domestic weapon systems and propose a solution to the problem of cybersecurity test evaluation system.
Keywords
Cybersecurity; Test and Evaluation; Weapon Systems;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 "Cybersecurity Test and Evaluation Guidebook", Department of Defense, 2015
2 "National Defense Power Generation Business Instruction", Ordinance of the Ministry of National Defense No.2040, 2017
3 "National Defense Cyber Security Instruction", Presidential Decree No. 1862, 2015
4 Carl E. Landwehr, "History of US Government Investments in Cybersecurity Research", 2010 IEEE Symposium on Security and Privacy, 2010
5 "Cybersecurity Policy", National Security Presidential Directive-54 /Homeland Security Presidential Directive-23, January 2008
6 Wan Choung, "A Study on the Trend of Cyber-Security Legal Systems in Korean and the United States", Kyung hee Law Journal, pp.213-242, 2013
7 National Cyber Security Management Regulation", Presidential decree No.316, 2013
8 "Weapon system Test & Evaluation Practical Guidebook", Defense Acquisition Program Administration, 2013
9 "Guide for Conducting Risk Assessment", NIST SP 800-30 Rev.1, 2012
10 "Guide for Applying the Risk Management Framework to Federal Information Systems", NIST SP 800-37 Rev.1, 2010
11 "Information Assurance Certification Training", DoDI 8570.01, 2012
12 "Security & Privacy Controls for Federal Information Systems and Organizations", NIST SP 800-53 Rev.4, 2013
13 "Guide for Assessing the Security Controls in Federal Information Systems and Organizations", NIST SP 800-53A Rev.1, 2010
14 "Cybersecurity", DoDI 8500.01, 2014
15 "Managing Information Security Risk", NIST SP 800-39, 2011
16 Jungho Kang, Hoedong Kim, Sunsoo Kim, and Jincheol Yoo, "Cyber Warfare Countermeasures by Comparison of Cyber Warfare Strategy and Technology of North Korea and other Major Country", Journal of Security Engineering, Vol.13, No.4, pp.287-298, 2016   DOI
17 http://www.yonhapnews.co.kr/politics/2014/04/10/0505000000AKR20140410030651001.HTML?076fb838
18 https://news.sbs.co.kr/news/endPage.do?news_id=N1003456392
19 http://www.dt.co.kr/contents.html?article_no=2016120702109960813002
20 "Integrated Air, Space and Missile Defense in 2025 and Beyond", Space and Missile Defense symposium, 2015
21 Cybersecurity and the Risk Management Framework, Department of Defense, http://slideplayer.com/slide/4575411/
22 Congressional Research Service, Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process, May 23, 2014
23 "Operation of the Defense Acquisition System", DoDI 5000.02, 2013
24 "Risk Management Framework for DoD IT", DoDI 8510.01, 2014