• 제목/요약/키워드: Defense Technical Information

검색결과 92건 처리시간 0.032초

A Study on the Procedure of Technology Assessment Applicable to the Defense Industry Technology Decision (방위산업기술 판정을 위한 기술검토방안 연구)

  • Yang, Younggyu;Yang, Jeong-Eun;Yu, Na-yeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제21권11호
    • /
    • pp.357-363
    • /
    • 2020
  • With the emphasis on protecting Defense Industry Technology, the Defense Industry Technology Protection Act (DITPA) was enacted (in 2015) and implemented. According to article 7 of the DITPA, a target institution may apply to the Director of the Defense Acquisition Program Administration (DAPA) for a decision as to whether the technology it possesses belongs to the Defense Industry Technology. The Director of the DAPA shall make a decision through a technical review and notify the applicant in writing of the result. On the other hand, as detailed procedures and standards for the decision are not stipulated, the objectivity of the decision result may deteriorate, and it is necessary to prepare a procedure suitable for the characteristics of the decision. In this study, a technology assessment procedure that can be applied to the Defense Industry Technology Decision is proposed through domestic and international technology protection regulations and case analysis. The procedure consists of three-stage: fundamental review, technical attribute review, comprehensive review. As a result of this study, it is expected that the objectivity of a technology assessment for the Technology Industry Technology Decision will be secured, and the efficiency will be improved.

Embedded Software Development Process and Systematic Technical Information Management (내장형 소프트웨어 개발 프로세스와 기술자료 관리)

  • Jeong, Chang-Min;Hong, Jang-Eui;Pyun, Jae-Jeong
    • 한국IT서비스학회:학술대회논문집
    • /
    • 한국IT서비스학회 2002년도 추계학술대회
    • /
    • pp.478-484
    • /
    • 2002
  • 국방 무기체계의 신뢰성 있는 내장형 소프트웨어를 개발하고, 이의 수명을 증대하기 위해서는 소프트웨어 개발 과정에서 공학적인 개발 방법론의 적용과 체계적인 기술 관리가 필수적으로 요구된다. 본 논문에서는 국방 분야에서의 내장형 소프트웨어를 개발에 있어서 고려되어야 할 공학적 관리 요소들을 살펴보고, 적용한 개발 방법론과 개발 프로세스 및 기술자료 관리 방안을 소개한다. 복잡도, 규모, 도메인 특성에 따라 객체 지향 방법론을 적절하게 재구성하고, 이를 토대로 문서화를 통한 기술 관리 방안을 연구 적용하였다.

  • PDF

An Evaluation Model for Analyzing the Overlay Error of Computer-generated Holograms

  • Gan, Zihao;Peng, Xiaoqiang;Hong, Huajie
    • Current Optics and Photonics
    • /
    • 제4권4호
    • /
    • pp.277-285
    • /
    • 2020
  • Computer-generated holograms (CGH) are the core devices to solve the problem of freeform surface measurement. In view of the overlay error introduced in the manufacturing process of CGH, this paper proposes an evaluation model for analyzing the overlay error of CGH. The detection method of extracting CGH profile information by an ultra-depth of field micro-measurement system is presented. Furthermore, based on the detection method and technical scheme, the effect of overlay error on the wavefront accuracy of CGH can be evaluated.

Resaerch Trend and Cocentualization of Defense Industry Security From Convergence Security Perspective (융합보안 관점에서 방위산업보안 개념 정립과 연구동향 분석)

  • Woo, Kwang Jea
    • Convergence Security Journal
    • /
    • 제15권6_1호
    • /
    • pp.69-78
    • /
    • 2015
  • Methods that industrial spies use to smuggle core technology out are becoming more intelligent, technological, and complex, thus resulting in more serious damages. In particular, defense industries in which involve national core technology as well as institutions including labor force are industries that are in a greater need of the convergence security. Defense Industry develops, experiments, and produces defense security supplies for national security protection. Defense industry involves a number of security elements such as military secret, industrial secret, core technology labor force, defense industry supply, critical national facility, and information communication system. Defense industry security is a complex of military security and industrial security which is convergence security that integrates all security elements of defense industry. Therefore, defense industry security is a typical ideal model for convergence security. Research on defense industry security is relatively insufficient compared to research of security in other industrial fields. In order to prevent core technology of denfese industry from leaking and to protect technical professionals and institutions, research and action on defense industry security from convergence security perspective are therefore essential at this point of time.

The Plan for Promotion of Civil and Military S&T Cooperation and Activation of Dual Use Technology Program (민군기술협력 촉진과 민군겸용기술사업 활성화 방안)

  • Lee, Chun-Geun;Song, Wi-Jin
    • Journal of Technology Innovation
    • /
    • 제14권3호
    • /
    • pp.209-235
    • /
    • 2006
  • Since the end of the cold war, technical tie-up between private corporations and an army in developed countries has increased a lot, and the trend is spreading through developing countries rapidly. To cope with the circumstance actively, the dual use technology program for both private corporations and an army was begun in Korea in 1998. With the program, overlapping investment was resolved and technology transfer was stimulated. And the standardization and information exchange saved considerable national budget and made possible economic profit. Yet, the combination project of 4 ministries and offices showed problems such as loose cooperation and, low industralization record. However, developed countries are out of the mere stage of dual technology development and turn into broad technical tie-up including future prediction, national competitiveness improvement, and the private company's leading participation and they are systemizing them very fast. Korea also set up the national defense reform plan with the blueprint of future military force improvement, budget increase for national defense research, and increased participation of private corporations, and created Defense Acquisition program Administration to support them. The innovation of national defense system brings forward the need to link the private and military innovation. Korea has pursued the fast growth through assimilation, absorption, and improvement of foreign technology. But now, Korea has to focus on self innovation, original technology, parts and material. As this applies to private companies and military equally, it is important to concentrate limited resources for the effective technology cooperation. Considering this, the strategies to activate the dual use technology are program concept and range extension, task-deduction way improvement and future-oriented common task deduction, and promotion system improvement.

  • PDF

Research of a Development Plan on the Integrated Weapon System Database based on Integrated Operation and Management System for the Aircraft Development Management (항공기 체계운영관리시스템 기반의 통합무기체계데이터베이스 발전 방안 연구)

  • Chung, Joon-Young;Kim, Cheon-Youn;Kim, Jong-Jin;Lee, Sang-Bum
    • Journal of the Korea Society of Computer and Information
    • /
    • 제12권1호
    • /
    • pp.269-276
    • /
    • 2007
  • National defense research and development is trying to develop the weapon system to satisfy users' requirements at minimum cost, high quality and the shortest period. Under integrated database computer environments, development processes and tools have been developed to implement system engineering and concurrent engineering systematically. In the aerospace defense weapon system, the fixed wing development department has developed and operated the integrated operation and management information system based on web technology to manage efficiently the technical information generated by the R&D process. When this system was applied to the existing R&D project for the aircraft weapon system, it proved and verified its efficiency. In this paper, we describe the future development plan of an integrated R&D framework and an integrated weapon system database based on the integrated operation and management information system which are able to centrol the technical information of KF-X, UAV(Unmanned Aerial Vehicles) and UCAV(Unmanned Combat Aerial Vehicles) programs. We also describe an interoperability and integration plan with WISEMAN which will be operated soon in our research Institute.

  • PDF

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • 제23권11호
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

OBSERVABILITY-IN-DEPTH: AN ESSENTIAL COMPLEMENT TO THE DEFENSE-IN-DEPTH SAFETY STRATEGY IN THE NUCLEAR INDUSTRY

  • Favaro, Francesca M.;Saleh, Joseph H.
    • Nuclear Engineering and Technology
    • /
    • 제46권6호
    • /
    • pp.803-816
    • /
    • 2014
  • Defense-in-depth is a fundamental safety principle for the design and operation of nuclear power plants. Despite its general appeal, defense-in-depth is not without its drawbacks, which include its potential for concealing the occurrence of hazardous states in a system, and more generally rendering the latter more opaque for its operators and managers, thus resulting in safety blind spots. This in turn translates into a shrinking of the time window available for operators to identify an unfolding hazardous condition or situation and intervene to abate it. To prevent this drawback from materializing, we propose in this work a novel safety principle termed "observability-in-depth". We characterize it as the set of provisions technical, operational, and organizational designed to enable the monitoring and identification of emerging hazardous conditions and accident pathogens in real-time and over different time-scales. Observability-in-depth also requires the monitoring of conditions of all safety barriers that implement defense-in-depth; and in so doing it supports sensemaking of identified hazardous conditions, and the understanding of potential accident sequences that might follow (how they can propagate). Observability-in-depth is thus an information-centric principle, and its importance in accident prevention is in the value of the information it provides and actions or safety interventions it spurs. We examine several "event reports" from the U.S. Nuclear Regulatory Commission database, which illustrate specific instances of violation of the observability-in-depth safety principle and the consequences that followed (e.g., unmonitored releases and loss of containments). We also revisit the Three Mile Island accident in light of the proposed principle, and identify causes and consequences of the lack of observability-in-depth related to this accident sequence. We illustrate both the benefits of adopting the observability-in-depth safety principle and the adverse consequences when this principle is violated or not implemented. This work constitutes a first step in the development of the observability-in-depth safety principle, and we hope this effort invites other researchers and safety professionals to further explore and develop this principle and its implementation.

A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP (AHP를 이용한 국방정보기술표준 선정 평가 모델 개발에 관한 연구)

  • Kim, Ja-Hee;Kim, Woo-Je;Cho, Hyun-Ki;Lee, Eun-Young;Seo, Min-Woo
    • IE interfaces
    • /
    • 제25권1호
    • /
    • pp.96-105
    • /
    • 2012
  • Recently, the interoperability has become more important to enhance the net-centric capabilities of the warfighter. DITA (Defense Information Technical stAndard) is the set of IT standards for improving interoperability, scalability, effectiveness, and efficiency. In this paper, we analyzed the standardizing process to derive the selection criteria and structurized the derived selection criteria using the KJ (Kawakita Jiro) method. Finally, we developed an evaluation model for selecting a standard for DITA using AHP (Analytic Hierarchy Process). As a result, we present eight selection criteria (maintainability, trend, stability, portability, effect of other standard, constraint of the network, and applicability to the systems). We also applied some examples that several IT standards to our selection model for validating the model. We expect our model to help to decide objectively whether the new standard can be listed in DITA.

A Building Scheme on LAMIS for ROK Army (한국군 종합군수지원 관리정보체계 (LAMIS) 구축방안)

  • Hong Jang-Ui;Yun Hyeon-Cheol;Byeon Jae-Jeong
    • Journal of the military operations research society of Korea
    • /
    • 제18권2호
    • /
    • pp.1-22
    • /
    • 1992
  • Computer-aided logistics support system is recognized an essential system to reduce supply and maintenance cost, and to improve readiness of weapon system or operationable composite machines. According to these trends, this paper focuses on the design scheme and the computerization strategy of information management system for Integrated Logistics Support (ILS) work. Suggested system. LAMIS(Logistics support Analysis Management Information System) is a total system that composed of Logistics Support Analysis Management information system (LSAM), Configuration Management Information System (CMIS), Maintenance Management Information System (MMIS), Project Management System (PMS) and Information Retrival System(IRS) etc. Also, LAMIS is a computerized tool that improves current supply and maintenance support program, that attempts to reliable requirment analysis of logistics support elements, and that supports to use the existing technical specification of similar one when weapon system acquisition project is started newly. When LAMIS implication is completed, it can be applied to logistics support of defense or commercial site. Straightway, LAMIS will be enhanced with computer - aided design system, engineering drawing system, interactive electronic technical manual system, electronic data interchange system, and three dimensional simulation system to weapon system configuration. When that is done, LAMIS is CALS system.

  • PDF