• Title/Summary/Keyword: 첨단 보안

Search Result 147, Processing Time 0.019 seconds

Analysis of Information Distribution Capability of the Army TIGER Corps Multilayer Integrated Communication Network (Army TIGER 군단 다계층 통합 전술통신망의 정보유통량 분석)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.175-180
    • /
    • 2024
  • Future warfare is evolving with advanced science and technology, introducing a variety of unmanned and manned combat systems. These systems generate and exchange massive amounts of information, challenging current tactical communication systems as a foundation for future communication infrastructure. To analyze the information distribution capability of the Army TIGER corps, this paper examines four scenarios: standalone ground network operation, integrated network operation, load distribution, and error recovery. Utilizing M&S results, we highlight the potential of a multilayer integrated command and control network, incorporating ground, air, and space networks, to enhance the reliability and stability of the overall communication network.

A Study on the Promotion Method of Domestic Video Security Industry (국내 영상보안산업 활성화 방안 연구)

  • Yoo, Soonduck;Ryu, Daehyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.9-21
    • /
    • 2017
  • The purpose of this study is to identify the current situation and actual condition of the video security industry, The research method was based on interviews with twelve specialists, and examined the market trends, the problems of the video security industry, the improvement plan and the government promotion strategy. The problem with the domestic video security industry is that there are the decline in overseas exports and the slowdown in exports to China, insufficient measures to overcome certification barriers due to the strengthening of national certification system, domestic demand growth slowed, expansion of domestic market share of Chinese products, lack of high-tech development of domestic products, lack of expertise in technology development and operation and inadequate legislation for revitalizing the video security industry. The improvement plan is as follows. Need to implement export expansion support policy, need to build tailored response system for each country, need improvement of security related demand creation system, take measures such as domestic industrial protection policy, certification barriers and tariff barriers, induce future core technology to create high added value. The government also needs to actively support human resources development, and induce stabilization of relevant laws and institutions. This study will contribute to the development of related industries by suggesting the development direction of the video security industry.

Analyses of Impact on Business Performance of Information Security Companies: The Perspective of Mediating Effects of Organizational and Innovative Capabilities (정보보호 기업의 경영성과에 미치는 영향 분석: 조직 및 혁신 역량의 매개 효과의 관점에서)

  • Shin, HyunMin;Kim, Injai
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.157-172
    • /
    • 2021
  • Information security companies were established in earnest from the mid-late 1990s to early 2000s, far shorter than other national key industries. Nevertheless, the information security industry has made rapid progress. It is expected that the proportion of the information security industry will increase rapidly with the development of advanced technology along with the 4th industrial revolution. As COVID-19, which occurred at the end of 2019, spreads around the world in 2020, non-face-to-face services and digital transformation are accelerating, and cyber threats to users are also increasing. However, there are limitations in responding to new Cyber Security threats due to the shortage of information protection manpower, insufficient security capabilities of domestic companies, and the narrow domestic information protection market. This study examines the external environmental factors of information security companies such as government information protection system operation, government influence, government support, partnership between information security companies, and internal environmental factors such as top management support, financial status, human resources, organizational capability, This study was conducted using empirical data to analyze whether it affects innovation capability and whether organizational capability and innovation capability affect financial and non-financial performance. The results of this study can be used as basic data to suggest policies and implications for information security, and to strengthen the competitiveness of the information security industry.

A Study on Secure Node Memory Allocation in ROS Composition (ROS Composition에서의 안전한 노드 메모리 할당에 관한 연구)

  • Jiwon Seo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.12
    • /
    • pp.669-675
    • /
    • 2024
  • The Robot Operating System (ROS) has become a critical platform for developing advanced robotic systems across various fields, including smart homes, autonomous driving, and industrial automation. By modularizing complex robotic systems, ROS enables nodes to cooperate effectively while adopting a structure where each node operates as an independent process, ensuring fault isolation. However, the use of inter-process communication (IPC) introduces performance degradation and resource inefficiencies, particularly in scenarios involving frequent message exchanges or large-scale data processing. To address these challenges, ROS2 introduced the Composition feature, allowing multiple nodes to execute within a single process. While this approach improves communication efficiency by leveraging shared memory, it also raises potential security risks due to the shared address space. Specifically, loose memory access controls between nodes increase the likelihood of security vulnerabilities, which existing mechanisms such as Secure ROS (SROS) struggle to mitigate effectively. This paper proposes a novel method to enhance security and improve memory management in ROS Composition environments. By independently managing the memory segments of each node, the proposed mechanism prevents data interference and ensures secure memory access. Experimental results demonstrate that the method maintains stable performance with a low overhead of 3% to 10%, effectively enhancing the security of ROS Composition environments.

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

A study on Performance Evaluation for Network Architecture using Quantum Key Distribution Technology (양자암호기반의 통신망 구축 및 성능시험 검증연구)

  • Lee, Wonhyuk;Seok, Woojin;Park, Chanjin;Kwon, Woochang;Sohn, Ilkwon;Kim, Seunghae;Park, Byoungyoen
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.39-47
    • /
    • 2019
  • There are several big data-driven advanced research activities such as meteorological climate information, high energy physics, astronomy research, satellite information data, and genomic research data on KREONET. Since the performance degradation occurs in the environment with the existing network security equipment, methods for preventing the performance degradation on the high-performance research-only network and for high-speed research collaboration are being studied. In addition, the recent issue of quantum computers has been a threat to security using the existing encryption system. In this paper, we construct quantum cryptography-based communication network through environment construction and high-performance transmission test that build physical security through quantum cryptography-based communication network in end-to-end high-speed research network. The purpose of this study is to analyze the effect on network performance when performing physical encryption and to use it as basic data for constructing high-performance research collaboration network.

A Study on Establishing Scientific Guard Systems based on TVWS (TVWS 기반 과학화경계시스템 구축방안 연구)

  • Kyuyong Shin;Yuseok Kim;Seungwon Baik
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.81-92
    • /
    • 2023
  • In recent years, the ROK military is promoting Defense Innovation 4.0 with the goal of fostering strong military based on science and technology equipped with artificial intelligence(AI) to prepare for the upcoming population cliff. In particular, at the present time of increased threats of North Korea, the South Korean military is seeking to deal with a decrease in military service resources through the introduction of a Scientific Guard System using advanced technology. TICN which is a core basic communication system to ensure the integrated combat capability of the ROK military is, however, limited to use as a based network for the emerging Scientific Guard System due to the narrow transmission bandwidth with widely spread poor reception area. To deal with this problem, this paper proposes TVWS-based Scientific Guard Systems with TVWS-based wireless network construction technology that has been available for free in Korea since 2017. The TVWS-based Scientific Guard System proposed in this paper, when compared to the existing wired network-based Scientific Guard Systems, has various advantages in terms of minimizing operational gaps, reducing construction costs, and flexibility in installation and operation.

The Korean Military's Space Operations Strategy for Future Warfare (미래전을 대비한 한국군의 우주전 전략)

  • KWan-Soo Lim;Byung-Ki Min;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.195-202
    • /
    • 2024
  • Future warfare is expected to be multi-domain operations including space, based on the development of advanced information and communication technologies. Advanced space-faring countries such as the United States, Russia, China, and Japan are creating space forces based on advanced space technology to prepare for future space warfare and strengthening cooperation with private companies and other countries. The South Korean military is preparing for space warfare for each type of weapon, but it is still relatively weak in terms of integrated strategy and technology. As not only advanced space countries but also North Korea is increasing its investment in space militarisation, the ROK military needs to develop a comprehensive plan and establish a specialized organisation to prepare for future space warfare. Therefore, this paper examines the current status of the ROK military's space warfare preparedness and proposes space warfare strategies such as establishing a dedicated space warfare and space cybersecurity organization, strengthening domestic and international cooperation, research and development and training of specialized personnel, and reestablishing a training system.

Research on A Comprehensive Study on Building a Zero Knowledge Proof System Model (영지식 증명 시스템 구축 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.3 no.3
    • /
    • pp.8-13
    • /
    • 2024
  • Zero Knowledge Proof (ZKP) is an innovative decentralized technology designed to enhance the privacy and security of virtual currency transactions. By ensuring that only the necessary information is disclosed by the transaction provider, ZKP protects the confidentiality of all parties involved. This ensures that both the identity of the transacting parties and the transaction value remain confidential.ZKP not only provides a robust privacy function by concealing the identities and values involved in blockchain transactions but also facilitates the exchange of money between parties without the need to verify each other's identity. This anonymity feature is crucial in promoting trust and security in financial transactions, making ZKP a pivotal technology in the realm of virtual currencies. In the context of the Fourth Industrial Revolution, the application of ZKP contributes significantly to the comprehensive and stable development of financial services. It fosters a trustworthy user environment by ensuring that transaction privacy is maintained, thereby encouraging broader adoption of virtual currencies. By integrating ZKP, financial services can achieve a higher level of security and trust, essential for the continued growth and innovation within the sector.

Present Condition and View of Electronic Interlocking System for Signaling System Implementation on Train (신호설비구현을 위한 전자연동장치의 현황과 전망)

  • Lee, Jung-Geun;Lee, Hyang-Beom
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.361-365
    • /
    • 2007
  • 전자연동장치(Interlocking System)는 열차의 안전운행 확보와 함께 수송능력과 보호향상, 정확하고 신속한 운송과 더불어 이용률을 증대하는데 중요한 역할을 한다. 철도 신호보안 설비 중에서 그 핵심을 이루는 연동장치 설비에 첨단기술인 전자, 정보처리 및 정보전송기술을 철도 신호 시스템에 도입하여 신뢰성과 안정성이 확보된 신호설비를 구현하기 위해 최근에는 마이크로프로세서를 이용한 전자연동장치 기술이 개발되었다. 본 논문에서는 전자연동장치의 필요성 및 기존설비(기계 및 계전 연동장치)의 노후화에 따른 장애 및 호환성 결여 등의 문제점들을 해결하기 위하여 전자 연동장치와 기존 계전 연동장치의 차이점을 제시 및 문제 해결방안을 고찰하고, 전자연동장치 동향을 살펴보았다.

  • PDF