• Title/Summary/Keyword: 방위산업보안

Search Result 45, Processing Time 0.021 seconds

Learning Model Development of utilizing a Tutor to study cyber-terrorism (사이버테러에 대비한 국가정보보안 현장 튜터를 활용한 교수-학습 모형 개발)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.49-57
    • /
    • 2015
  • Changes in the national intelligence security industry is becoming increasingly rapidly changing due to the development of the network and the use of the Internet. Information also can be called by critical information assets, as well as social infrastructure of the country's reality is that individuals at risk. These professionals make to prevent terrorists to destroy national defense system and network was absolutely necessary. But, Cyber Terror Response NCOs to be responsible for cyber terrorism requires a professional NCOs with advanced knowledge. National Competency Standards(NCS) using a national information security field tutors to conduct training courses teaching - learning model to develop and to apply.

디지털 혁명의 물결을 타는 전술 통신 체계(2)

  • Choe, In-Seok
    • Defense and Technology
    • /
    • no.6 s.292
    • /
    • pp.60-69
    • /
    • 2003
  • 진공관 기술을 이용한 크고 무거운 구형 아날로그 무전기로부터 오늘날의 작고 가벼운 소프트웨어 기반 디지털 무전기에 이르기까지 저니술 무전기는 많은 진화를 거듭하고 있다. 앞으로는 IT와 디지털 혁명으로 말미암아 상상도 못할 정도로 작고 가벼우면서도 조작과 운용 및 정비가 아주 쉽고 열악한 전투 환경에서도 다양한 기능을 발휘할 수 있는 성능이 아주 뛰어난 무전기가 출현될 것으로 예상된다. 이 글에서는 진공관 기술, 트랜지스터 및 직접 회로 등을 이용한 소자 기술의 발달에 따른 하드웨어상의 진화 과정을 살펴보고, 운용측면의 편의성, 보안성 및 성능의 향상을 위한 소프트웨어상의 신기술을 알아보며, 이와 같은 신기술이 적용된 여러가지 소프트웨어 기반 무전기와 차세대 종합 전술 통신 체계에 대하여 검토해 보고자 한다.

  • PDF

최신 방향탐지 장비의 발전추세(2)

  • Jeong, Sun-Ho
    • Defense and Technology
    • /
    • no.11 s.273
    • /
    • pp.48-57
    • /
    • 2001
  • ES기능의 하나인 방향탐지는 국가급 보안에 해당하는 분야로 일부 상용체제를 제외하고는 철저하게 독자적으로 개발되어야 한다. 그러나 국내개발 수준은 상당히 낙후되어 있으며 주요 핵심부품은 해외도입하고 있는 실정이다. 우리 나라도 더 이상의 직구매 방식을 지양하고, 국내 연구개발을 통해 독자적 전자전 장비 및 운용체제 갖추어 나가야 한다. 육군, 국과연, 학교 그리고 업체의 유기적인 참여와 협조만 이루어진다면 지금까지 국내에 축적된 기술력으로 충분히 개발할 수 있다고 판단된다.

  • PDF

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

A Study on the Changes of US Policy in International Defense Industry Cooperation and the Fure Korea-US Defense Industry Cooperation (미국의 국제 방산협력 정책 변화와 한미 방산협력 방안 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.35-44
    • /
    • 2014
  • It has been shown that the lack of sufficient defense industry cooperation between Korea and the US. The severe imbalance in defense trade between tow countries and Korea's weak defense industrial base has been a problem. This paper suggests the enhancement of defense industry cooperation with the US as a defense policy. The US policy has been changed to utilize the globalization of defense industries. The following cases were analyzed to show the policy change; The security of supply arrangement with 6 countries, the defense cooperation treaty with the United Kingdom and Australia. the defense Memorandum of Understanding with 23 countries, and the international cooperation with 8 countries for F-35 JSF program. Korea government needs to sign a defense MOU with U.S. and the defense industries are recommended to increase the opportunities of weapon system co-development and co-production. So that the Korea defense industry may improve competitiveness and to overcome the current weaknesses.

최근의 한국기계공업의 실태

  • 정선모
    • Journal of the KSME
    • /
    • v.16 no.2
    • /
    • pp.15-25
    • /
    • 1976
  • 제3차 경제개발 5개년 계획이 제4차 연도인 1975년의 우리나라 기계공업은 국제경기의 불투명 속에서도 시설의 확충과 혀내화를 적극 추진하여 양산 체제를 확립하였으며 국제경쟁력을 강화 하여 기계공업의 수출산업화의 전환점을 마련하고 기계공업의 자립도를 증대시켜서 우리나라 기계공업의 여명기를 마지한 해라고 평가된다. 특히 자동차공업은 조립생산체에서 제조생산체 제로 탈바꿈 하므로서 명실공히 세계에서 16번째로 자동차제조국으로 인정 받게 된 것은 우리 나라 기계공업계에 밝은 전망을 던져준 것으로 특기할만한 성과라 볼 수 있다. 그리고 우리나라 기계공업이 단기일에 가속도로 생장한 것은 방위산업의 견지에서 총력보안의 차원에서 기계공 업을 혁명적으로 모든 지원을 집중하여 육성하였기 때문이라고 풀이된다. 그러나 우리나라 기 계공업의 역사가 짧고 내적 외적인 취약점의 악순환이 아직도 되풀이 되고 저변구조가 좁고 약 하기 때문에 해결되지 않으면 안될 난문제가 산적하고 있다. 여기에서 다시한번 75년도 우리나라 기계공업의 발자취를 뒤돌아 보면서 문제점을 찾아내고 그 대책을 모색해 보기로 한다.

  • PDF

Analysis of Operational Efficiency of Military Department of University Using Data Envelopment Analysis Method (자료포락분석법을 활용한 일반대학 군사학과의 운영 효율성 분석)

  • Young-Min Bae;Sweng-Kyu Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.95-102
    • /
    • 2023
  • The purpose of this paper was to confirm the operational level of the military department of universities, which plays a key role in the officer training process, through empirical research and confirm meaningful results for improvement. There are 11 university military departments operated through the Army, agreements, and semi-agreement, and the Data Envelopment Analysis (DEA) was applied from the perspective of resource input and performance for each university's military department operation to analyze relative efficiency and confirm specific directions for improvement. As a result of operational efficiency analysis, 6 DMUs (Decsision Making Unit) were found to be efficient in the BCC model out of 11 DMUs, and the evaluation results could be confirmed through classification of efficient and inefficient groups through data capture analysis. This paper may be of practical value in that it checks the efficiency of the comparative university military departments and confirms specific information for development through the DEA-Additive model that reflects several evaluation factors at once. Through this, the operators of each university's military department are admitted.

The Effect of Reward and Security Awareness on User Intention of Knowledge Portal Service for ROK Army (보상과 보안의식이 육군지식포탈 사용자 의도에 미치는 영향)

  • Lee, Jong-Gill;Ku, Xyle
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.2
    • /
    • pp.36-48
    • /
    • 2019
  • As the importance of Knowledge Management System (KMS) in the military increases, Republic of Korea Army (ROK Army) developed Army Knowledge Portal. Although the members in the military are encouraged to use the portal, few members currently use it. This study was conducted to find variables to predict the user's intention to use the portal, which contributes to activating the use of Army Knowledge Portal in the army. On the basis of Technology Acceptance Model (TAM), ten variables such as perceived ease of use, general information security awareness, information security awareness, expectation for external rewards, expectation for relationships, sense of self-worth, attitude toward compliance with security policy, attitude toward knowledge sharing, intention of non-combat knowledge sharing, and intention of combat knowledge sharing were considered as independent variables. 105 participants on active duty who currently use or have experience to use the portal participated in this study. The results indicated that general information security awareness and information security awareness increases compliance with the information security policy. In addition, the attitude toward knowledge sharing is enhanced by expectations for relationship and sense of self-worth. Based on the results, the authors propose the need for policy alternatives to reinforce the reward system and security policy, which activates the use of Knowledge Portal Service for ROK Army.

An Efficient Method of Test Environment Setup for Weapon System Software Reliability Test (무기체계 소프트웨어 신뢰성 시험을 위한 효율적 시험 환경 구축 방안)

  • Choi, Minkwan;Bak, Daun;Kook, Seunghak
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.7-12
    • /
    • 2019
  • Recently, as the weight of software in the weapon system increases, the quality of the software becomes a very important factor. In order to improve the quality of the weapon system software, DAPA(Defense Acquisition Program Administration) has institutionalized software reliability in Weapon System Software Development and Management Manual. The manual presents specific methods and procedures to improve the weapon system software quality. In order to meet the required reliability test standards specified in the manual, it is necessary to continuously detect and correct defects throughout the entire development period. However, it is difficult to build proper reliability test environment due to the cost of software reliability tools, setting up secured and separated network environment, and etc. Therefore, in this study, we propose an efficient environment construction method for software reliability test of defense industry field in restricted development environment and limited resources.