• Title/Summary/Keyword: Defense IT Policy

Search Result 270, Processing Time 0.051 seconds

Improving the Security Policy Based on Data Value for Defense Innovation with Science and Technology (과학기술 중심 국방혁신을 위한 데이터 가치 기반 보안정책 발전 방향)

  • Heungsoon Park
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.109-115
    • /
    • 2023
  • The future outlook for defense faces various and challenging environments such as the acceleration of uncertainty in the global security landscape and limitations in domestic social and economic conditions. In response, the Ministry of National Defense seeks to address the problems and threats through defense innovation based on scientific and technological advancements such as artificial intelligence, drones, and robots. To introduce advanced AI-based technology, it is essential to integrate and utilize data on IT environments such as cloud and 5G. However, existing traditional security policies face difficulties in data sharing and utilization due to mainly system-oriented security policies and uniform security measures. This study proposes a paradigm shift to a data value-based security policy based on theoretical background on data valuation and life-cycle management. Through this, it is expected to facilitate the implementation of scientific and technological innovations for national defense based on data-based task activation and new technology introduction.

Case Study and Performance Analysis of IT Convergence Business Models for Defense Sector (국방 IT융합 비즈니스 모델 사례와 성과 분석)

  • Sim, Seungbae;Yoo, Cheonsoo;Hong, Sumin
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.275-287
    • /
    • 2015
  • Information technology (IT) convergence have been recognized one of the key drivers in the industry perspective. Especially, IT convergence have been one of the most important innovative way for defense sector. Korea government established IT convergence policy in 2008 and have been applying it to the core industry such as automotive, shipbuilding and defense industries. Recently, the creative vitamin project has been launched. Vitamin 'D' means the way to create the value of defense industry. This research analyzes and evaluates various IT convergence business models based on an operation of defense IT convergence center from 2011 to 2014, which is the industry IT convergence centers. Defense IT convergence business models can be classified into four types of mission area as follows : weapon acquisition and management, military intelligence, military power construction, and resources management. We define the concept of defense IT convergence and describe the framework and processes for applying IT to the defense sector. We analyzes and evaluates various business models designed through defense IT convergence framework and processes.

Suggestions for IT Convergence on Defense in the IT Firm's Perspective (IT기업 관점에서의 국방IT융합 추진방향)

  • Lee, Dong Hoon;Lee, Sangho
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.57-69
    • /
    • 2014
  • IT convergence technology can boost the advancement of weapon systems and efficient operation for the military reformation in Korea. This study investigated IT firms' concern about the defense acquisition process for IT-convergent systems and the role of IT firms in the process with Focus Group Interview and in-depth interview on executives of IT firms, and classified the concern to three major issues. They are the clarification of IT firms' role in the defense IT-convergent efforts, the establishment of the control tower for defense IT convergence, and reasonable estimation of software development cost in the defense acquisition process.

A Study on Informatization Performance Management: A Case of Defense Informatization Policy Evaluation (정보화 성과관리방안 연구: 국방정보화 정책평가 사례를 중심으로)

  • Lee, Hanjun;Kim, Sungtae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.29-48
    • /
    • 2020
  • For the visualization of outcome is relatively limited in informatization filed especially, systematic and quantifiable performance management of IT projects and policies is needed. Thus, the government developed its informatization evaluation system and has reinforced it. And Ministry of National Defense (MND) continues to strive for the settlement of the informatization performance evaluation system as well. According to Defense Informatization Law which was legislated in 2011, informatization policies should be assessed annually through informatization policy evaluation system in terms of their enforcement and outcome. However, informatization policy evaluation has not carried out since its pilot enforcement just after the legislation of the law. Hence, we conducted informatization policy evaluation aimed at performance investigation of 31 policies in '14~'18 Defense Informatization Master Plan. We sophisticated the current informatization policy system and we provide guidelines and tools to support the development of performance goal and indicators for each of the policies. Then, the policies were assessed by the evaluation committee we organized for our study, and we analyzed the problems we tackled in the whole process of evaluation and provided proposals for effectiveness enhancement of defense informatization evaluation system. The proposals will be meaningful for performance management in defense informatization sector and in public informatization sector as well.

A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm (통합 보안정책 알고리즘 적용에 따른 최적화 방어 시스템 구축에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.39-46
    • /
    • 2011
  • This study is conducted to examine the optimal integrated security policy based on network in case of attacks by implementing unique security policies of various network security equipments as an algorithm within one system. To this end, the policies conduct the experiment to implement the optimal security system through the process of mutually integrating the unique defense policy of Firewall, VPN(Virtual Private Network), IDS(Intrusion Detection System), and IPS(Intrusion Prevention System). In addition, this study is meaningful in that it designs integrated mechanism for rapid detection of system load caused by establishment of the security policy and rapid and efficient defense and secures basic network infrastructure implementation.

Application of Analytic Hierarchy Process of Defense Innovation 2020 Advanced Topics in Plan Step of Defense Planning Management Afftair (국방기획 관리업무의 기획단계에서 국방개혁 2020 추진과제들에 대한 계층분석적 의사결정 적용)

  • Choi, Myoung-Seo;Lee, Hong-Chul;Cheon, Hyeon-Jae
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.2
    • /
    • pp.212-222
    • /
    • 2006
  • The defense innovation 2020 advanced topics which have to establish robust milatary are based on archiving defense innovation by selecting twenty-one main topics and eighties' sub-topics whose topics focus on defense innovation and defense circumstance in 2020. Although defense innovation 2020 which is to be advanced with defense basic policy need to decision making, it is specified in programming step by merging budget with plan. If the Defense Ministry archives decision making from initial plan step, although it archives group decision making in programming step at present, it will archive efficient affair. This study archives a group decision making of defense innovation 2020 advanced topics which were published in the Defense Ministry by applying Analytic Hierarchy Process in plan step. In addition, if the weights of the main topics are equal, the sub topics analyze how to be changed throughout sensitivity analysis and suggest the topics' priority rank throughout group decision making.

Development of Evaluation System for Defense Informatization Level

  • Sim, Seungbae;Lee, Sangho
    • Journal of Multimedia Information System
    • /
    • v.6 no.4
    • /
    • pp.271-282
    • /
    • 2019
  • There is a description that you cannot manage what you do not measure. The Korea Ministry of National Defense (MND) is conducting evaluations in various fields to obtain meaningful effects from IT investments, and views that the evaluation of the defense informatization sector is divided into defense informatization policy evaluation and defense informatization project evaluation. The defense informatization level evaluation can measure the informatization level of MND and the armed forces or organizations. Since the evaluation system being studied to measure the level of defense informatization is composed mainly of qualitative metrics, it is necessary to reconstruct it based on quantitative metrics that can guarantee objectivity. In addition, for managing the level of change by evaluation objects, the evaluation system should be designed with a focus on homeostasis of metrics so that it can be measured periodically. Moreover, metrics need to be promoted in terms of performance against targets. To this end, this study proposes to measure the level of defense informatization by dividing it into defense information network, computer systems, interoperability and standardization, information security, information environment, and information system use, and suggests their metrics.

Analysis on the Policy Network in the Defense Industry Exportation Support Policy: Focusing on the Success of the T-50 Exportation to Indonesia (방산수출 지원정책에 관한 정책네트워크 연구: T-50 인도네시아 수출 성공사례를 중심으로)

  • Jun, Jongho
    • Journal of Technology Innovation
    • /
    • v.24 no.1
    • /
    • pp.113-142
    • /
    • 2016
  • T-50 exportation to Indonesia embodied an objective of governmental policy and became a catalyst accelerating the exportation of domestic defense industries. Defense industry exportation is recognized as a new growth engine creating economic interests and it became an important policy of the government. This study will suggest an effective direction for the support policy of the defense industry exportation through analysis on factors behind the success of the T-50 exportation to indonesia in the view of policy network. Policy network theory has its efficacy and workability in analyzing what kind of results are yielded from each policy actor's attributes and their interaction during the execution and establishment of the support policy for the defense exportation. The type of policy network of the T-50 exportation to Indonesia was a policy community. Many governmental ministries, defense industry which is the group of interest, and experts from the research institutes have established the Korea Defense Trade Support Center(KODITS) for accomplishing common policy goal with mutually shared sentiment, and sought for a strategy for the success of the defense industry exportation having official and unofficial meeting centering around the KODITS. Although there were oppositions and conflicts among major actors, though forming a cooperative relationship among majority of the actors, policy-wise decision making for the exportation of the T-50 to Indonesia was efficiently carried out. The cooperative relationship was the key in the success of the T-50 exportation. Considering that the policy community from cooperative mutual interaction is efficient in reaching the goal of the defense industry exportation support policy, this study suggests operating government-wise temporary Task Force(TF) to succeed in big exportation projects such as the T-X exportation to the U.S. In addition, institutional and procedural supplementation such as regular meetings among the head of related governmental ministries and etc. are required in order to enhance the mutually cooperative relationship withing the TF.

A Study on Building an Integration Security System Applying Virtual Clustering (Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.101-110
    • /
    • 2011
  • Recently, an attack to an application incapacitates the intrusion detection rule, the defense policy for a network and database and induces intrusion incidents. Thus, it is necessary to study integration security to ensure the security of an internal network and database from that attack. This article is about building an integration security system to prevent an attack to an application set with intrusion detection rules. It responds to network-based attack through detection, disperses attack with the internal integration security system through virtual clustering and load balancing, and sets up defense policy for attacking destination packets, analyzes and records attack packets, and updates rules through monitoring and analysis. Moreover, this study establishes defense policy according to attacking types to settle access traffic through virtual machine partition policy and suggests an integration security system applied to prevent attack and tests its defense. The result of this study is expected to provide practical data for integration security defense for hacking attack from outside.

Shelf-Life Time Based Cache Replacement Policy Suitable for Web Environment (웹 환경에 적합한 보관수명 기반 캐시 교체정책)

  • Han, Sungmin;Park, Heungsoon;Kwon, Taewook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1091-1101
    • /
    • 2015
  • Cache mechanism, which has been a research subject for a significant period of time in computer science, has become realized in the form of web caching in network practice. Web caching has various advantages, such as saving of network resources and response time reduction, depends its performance on cache replacement policy, therefore, analysis and consideration of the environment in which a web cache operates is essential for designing better replacement policies. Thus, in the current web environment where is rapidly changing relative to the past, a new cache replacement policy is necessary to reflect those changes. In this paper we stipulate some characteristics of the web at present, propose a new cache replacement policy, and evaluate it.