• Title/Summary/Keyword: 위협요소

Search Result 746, Processing Time 0.023 seconds

Study on the Removal of the Cable Braid Inside the Missile (유도탄 탄내케이블 브레이드 제거에 따른 고찰)

  • Eun, Hee-hyun;Kim, Ji-min;Lee, Min-hyoung;Jung, Jae-won
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.105-110
    • /
    • 2018
  • The North Korea nuclear issue is now posing a serious security threat to the Korea and Northeast Asia. Accordingly, the South Korean military is pushing for the introduction of long-range air-to-surface flights and the development of domestic nuclear facilities that can precisely hit North Korea headquarters building and nuclear facility even hundreds of kilometers above the border. In this paper, we removed the cable braid for securing the weight of the missile among several design elements for long-range air-to-surface missile development and estimated and analyzed the resulting performance. The possibility of braid removal was analyzed in terms of crosstalk inside the cable and CS114, RE101 of MIL-STD-461F.

A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office (스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할)

  • Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.109-127
    • /
    • 2011
  • Mobile Office is a new type of working method in the workplace that can be used at any time or anywhere by connecting to the network with mobile devices. This allows people to do their jobs without their physical presence in their offices to use computers. The elements in mobile office environment are advancing. They include the widespread distribution of the smart phones, the network enhancing strategy in a ubiquitous environment and expansion of the wireless internet; however, there are not enough security guidelines or policies against these threats on the new environment, the mobile office, although there is the revitalization policy of smart work supported by the government. CERT and ISAC, the known security system as of now, could be used for the secure mobile office, In this paper, suggestions are to be provided for strengthening the security of smart mobile office by analysing the functions of CERT and ISAC.

The Development of Thermal Model for Safety Analysis on Electronics in High-Speed Vehicle (고속 비행체 전자 장비의 안전성 예측을 위한 열해석 모델 구축)

  • Lee, Jin Gwan;Lee, Min Jung;Hwang, Su Kweon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.5
    • /
    • pp.437-446
    • /
    • 2021
  • As flying vehicle's speed is getting faster, the magnitude of aerodynamic heating is getting bigger. High-speed vehicle's exterior skin is heated to hundreds of degrees, and electrical equipments inside the vehicle are heated, simultaneously. Since allowable temperature of electrical equipments is low, they are vulnerable to effect of aerodynamic heating. These days, lots of techniques are applied to estimate temperature of electrical equipments in flight condition, and to make them thermally safe from heating during flight. In this paper, new model building technique for thermal safety analysis is introduced. To understand internal thermal transient characteristic of electrical equipment, simple heating experiment was held. From the result of experiment, we used our new building technique to build thermal analysis model which reflects thermal transient characteristic of original equipment. This model can provide internal temperature differences of electrical equipment and temperature change of specific unit which is thermally most vulnerable part in the equipment. So, engineers are provided much more detailed thermal analysis data for thermal safety of electrical equipment through this technique.

Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model (DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석)

  • Sun, Jong-wook;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.853-862
    • /
    • 2021
  • Today, disturbance and paralysis of information and communication infrastructure by electronic infringement of national infrastructure is emerging as a threat. Accordingly, the government regularly implements the vulnerability analysis and evaluation system of major information and communication infrastructure to protect the information system and control system of major infrastructure, and invests increased human and material resources every year to efficiently operate it. However, despite the government's efforts, as infringement accidents and attempts targeting national infrastructure continue to occur, the government's resource input to prepare the information protection foundation has little effect on the information protection activity result calculation, making the evaluation system not efficient. The question arises that it is not. Therefore, in this study, we use the DEA model to review the efficient operation of the vulnerability analysis and evaluation system for major information and communications infrastructure, and suggest improvement measures to enhance the level of information protection based on the analyzed results.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

Development of a Calculation Model for an Optimal Safe Distance between Ship Routes and Offshore Wind Sites (선박 통항로와 해상풍력단지 간 최적의 이격거리 산정 모델 개발)

  • Ohn, Sung-Wook;Namgung, Ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.6
    • /
    • pp.973-991
    • /
    • 2022
  • Globally, several countries with sea are using eco-friendly energy resources through offshore wind power development by overcoming the weak point of the existing power generation method. The sea has the advantage of being able to develop large scale wind farms in wide waters, but the installation of marine structures threatens the safe operation of vessels. Accordingly, a standard guideline for safe navigation by analyzing the mutual effects between ship routes and offshore wind site was presented by the PIANC. Nonetheless, the standard guideline calculated the same safe distance in all situations. Therefore, this study developed a calculation model for an optimal safe distance between ship routes and offshore wind sites by reflecting the ship's maneuvering, encounter situations, environmental force, traffic density, offshore wind power generators, and channel types. As a result of the validation simulation, the developed model showed that the optimal safe distance was secured.

Research on depression and emergency detection model using smartphone sensors (스마트폰 센서를 통한 우울증 탐지 및 위급상황 탐지 모델 연구)

  • Mingeun Son;Gangpyo Lee;Jae Yong Park;Min Choi
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.9-18
    • /
    • 2023
  • Due to the deepening of COVID-19, high-intensity social distancing has been prolonged and many social problems have been cured. In particular, physical and psychological isolation occurred due to the non-face-to-face system and a lot of damage occurred. The various social problems caused by Corona acted as severe stress for all those affected by Corona 19, and eventually acted as a factor threatening mental health such as depression. While the number of people suffering from mental illness is increasing, the actual use of mental health services is low. Therefore, it is necessary to establish a system for people suffering from mental health problems. Therefore, in this study, depression detection and emergency detection models were constructed based on sensor information using smartphones from depressed subjects and general subjects. For the detection of depression and emergencies, VAE, DAGMM, ECOD, COPOD, and LGBM algorithms were used. As a result of the study, the depression detection model had an F1 score of 0.93 and the emergency situation detection model had an F1 score of 0.99. direction.

Resupply Behavior Modeling in Small-unit Combat Simulation using Decision Trees (소부대 전투 모의를 위한 의사결정트리 기반 재보급 행위 모델링)

  • Seil An;Sang Woo Han
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.9-21
    • /
    • 2023
  • The recent conflict between Russia and Ukraine underscores the significant of military logistics support in modern warfare. Military logistics support is intricate and specialized, and traditionally centered on the mission-level operational analysis and functional models. Nevertheless, there is currently increasing demand for military logistics support even at the engagement level, especially for resupply using unmanned transport assets. In response to the demand, this study proposes a task model of the military logistics support for engagement-level analysis that relies on the logic of ammunition resupply below the battalion level. The model employs a decisions tree to establish the priority of resupply based on variables such as the enemy's level of threat and the remaining ammunition of the supported unit. The model's feasibility is demonstrated through a combat simulation using OneSAF.

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.