• Title/Summary/Keyword: Defense Technology Protection

Search Result 114, Processing Time 0.03 seconds

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

Development Direction of Maritime Manned-Unmanned Systems through Measurement of Combat Effectiveness against Major Threats on Sea Lines of Communication (해상교통로 상 주요 위협별 전투 효과 측정을 통한 해양 유·무인 복합체계 발전방향)

  • Yong-Hoon Kim;Yonghoon Ha
    • Journal of Industrial Convergence
    • /
    • v.21 no.11
    • /
    • pp.29-41
    • /
    • 2023
  • In this study, assuming that the maritime manned-unmanned systems, which will be used as the main force of the ROK Navy in the future, conducts its sea line of communication(SLOC) protection operations, the combat effectiveness against major threats was measured, and through this, the development direction of the manned-unmanned systems was suggested. Multi-criteria decision-making techniques such as Delphi and AHP were used to measure combat effectiveness, and the AHP survey was conducted on 40 naval officers, including 25 senior officers who are well-understood in the combat effectiveness of the weapons system and MUM-T. As an evaluation index for measuring combat effectiveness, the OODA loop was set as the main attribute, followed by Observe(0.358), Orient(0.315), Act(0.217), and Decide(0.110). The combat effectiveness of each major threat in SLOC, the lowest alternative, was measured to be 1.68 times higher than the response to maritime conflicts in neighboring countries and 3.61 times higher than the response to transnational threats. These results are expected to support rational decision-making in determining the level of technology required for acquisition of marine manned-unmanned systems and establishing operational plans for naval forces.

Molecular Cloning and Characterization of Sesquiterpene Cyclase cDNAs from Pepper Plant Infected with Phytophthora capsici

  • Kim, Jong-Bum;Lee, Sung-Gon;Ha, Sun-Hwa;Lee, Myung-Chul;Ye, Wan-Hye;Lee, Jang-Yong;Lee, Shin-Woo;Kim, Jung-Bong;Cho, Kang-Jin;Hwang, Young-Soo
    • Journal of Applied Biological Chemistry
    • /
    • v.44 no.2
    • /
    • pp.59-64
    • /
    • 2001
  • Pepper plants (Nogkwang, 60-day old) were inoculated with Phytophthora capsici to induce sesquiterpene cyclase associated with the biosynthesis of phytoalexin (capsidiol), a substance related to the defense against pathogens in plants. One day after inoculation, mRNA was isolated from the root, cDNA synthesized, and a library constructed in a ZAP express XR vector. The efficiency was $2{\times}10^6pfu/{\mu}g$. Sesquiterpene cyclase cDNA from Hyoscyamus muticus was labeled with $^{32}P$ and used as a probe for screening the cDNA library. After the third screening, 25 positive clones were selected. Through restrictive digestion and DNA gel-blot analysis, six different cyclase gene expressions were identified. PSC1B sequences of the six clones were determined, which were 1966 base pairs encoded 556 amino acids with an expected molecular weight of 63.8 kDa. Response against the pathogen was different between the resistant and susceptible peppers. After the infection of the pathogen, the expression of PSC genes continued in the resistant peppers while the plants were alive. The expression in the susceptible peppers lasted for only 4 days.

  • PDF

Application for Fire Protection Regulation based on Risk-Informed and Performance-Based Analysis (위험도 및 성능기반 분석방법에 의한 원전 화재방호규정 적용 방안)

  • Jee, Moon-Hak;Lee, Byung-Kon
    • Fire Science and Engineering
    • /
    • v.20 no.3 s.63
    • /
    • pp.65-70
    • /
    • 2006
  • From the beginning of the construction stage, the fire protection regulation for the nuclear power plants conforms to the design requirements for the acquisition of the license permit. This regulation is based on the plant status of the normal operation, but it is not enough to be used as an application standard for fire protection at the transient mode of the plant and the outage time for refueling as well as for the plant decommissioning. While the advanced fire protection requirement that has been developed in America recently suggests the performance-based requirement and management rule applicable to the overall life time of the plant, it simply represents the conceptual application. It means that it can not be treated as appropriate standards because it does not deal with the qualitative and quantitative approach in specific ways. By the way, with the use of the performance-based fire risk analysis, the dynamic behavior of the heat and smoke at the fire compartment of the nuclear power plants can be analyzed and the thermal effect to the safety-related equipment and cables can be evaluated as well. At this paper, it suggests the ways to change the applicable fire protection regulations and the required evaluation items for the fire risk resulted from the plant configuration change with an intent to introduce the state-of-the-art quantitative fire risk analysis technology at the domestic nuclear power plants.

Method for evaluating the safety performance and protection ability of the mobile steel protective wall during the high-explosive ammunition test (고폭탄 탄약시험 간 이동형 강재 방호벽의 안전성능 판단 및 유효 방호력 평가 방법)

  • Jeon, In-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.573-582
    • /
    • 2021
  • In this study, a series of processes for evaluating the effective protection against barriers that should be equipped in institutions that perform reliability tests on high-risk ammunition, such as high-explosive ammunition, were introduced. The impact that high-explosive bombs can have on personnel includes damage to the eardrum and lungs caused by explosion overpressure and penetrating wounds that can be received by fragments generated simultaneously with the explosion. Therefore, a high-explosive with COMP B explosives as its contents were set up, and an explosion protection theory investigation to calculate the degree of damage, numerical calculations and simulations were performed to verify the protection power. A numerical calculation revealed the maximum explosion overpressure on the protective wall when the high-explosive exploded and the penetration force of the fragment against a 50 mm-thick protective wall to be 77.74 kPa and 41.34 mm, respectively. In the simulation verification using AUTODYN, the maximum explosion overpressures affecting the firewall and personnel were 56.68 kPa and 18.175 kPa, respectively, and the penetration of fragments was 35.56 mm. This figure is lower than the human damage limit, and it was judged that the protective power of the barrier would be effective.

A Method and Application of Vulnerability Analysis for Combat Systems Considering Threats and Defense Ability : Focused on PKM Model (위협의 특성과 장갑의 방호 성능을 고려한 전투 시스템의 취약성 분석 방법 및 활용 : 고속정 모델을 대상으로)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1623-1631
    • /
    • 2016
  • There are many researches which analyze vulnerability for combat systems, have been progressing, and apply the analyzed result to reflect on design phase. Recently, there have been requirements for integrating the previous module based researches which conducted independently. In this paper, we propose an integrated vulnerability analysis method for the combat system considering characteristics of threats and protection performance of armors through an analysis of the advanced research. In addition, by applying the proposed method improves the existing hit probability analysis program and we are verified based on scenarios for improving survivability of PKM (Petrol Killer Medium) for vulnerability analysis confirmed the results. The proposed method improves reliability of vulnerability analysis by considering threats and defense ability. Also it able to satisfied with the integration requirements. Furthermore, we became buildup for the development of applied system and the method and integrated vulnerability analysis method for combat systems.

Computational Simulation of Lightning Strike on Aircraft and Design of Lightning Protection System (항공기 낙뢰 전산 시뮬레이션 및 보호시스템 설계)

  • Kim, Jong-Jun;Baek, Sang-Tae;Song, Dong-Geon;Myong, Rho-Shin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.12
    • /
    • pp.1071-1086
    • /
    • 2016
  • The safety of aircraft can be threatened by environmental factors, such as icing, turbulence, and lightning strike. Due to its adverse effects on aircraft structure and electronic components of aircraft, lightning strike is one of the biggest hazards on aircraft safety. Lightning strike can inject high voltage electric current to the aircraft, which may generate strong magnetic field and extreme hot spots, leading to severe damage of structure or other equipment in aircraft. In this work, mechanism of lightning strike and associated direct and indirect effects of lightning on aircraft were studied. First, on the basis of aircraft lightning regulations provided by Aerospace Recommended Practice (ARP), we considered different lightning waveform and zones of an aircraft. A coupled thermal-electrical computational model of ABAQUS was then used for simulating flow of heat and electric current caused by a lightning strike. A study on fuel tank, with and without lightning protection system, was also conducted using the computational model. Finally, electric current flow on two full scale airframes was analyzed using the EMA3D code.

Industrial Security Crime's Realities and Counter-Measure (산업보안범죄의 실태 및 대응방안)

  • Seo, Bong Sung;Lim, You Seok
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.141-149
    • /
    • 2015
  • Modern society is to have an significant impact on the competitiveness of the country in which the economic value is very high occupancy and ensure a state-of-the-art science and technology. The country's core technology or industry security crimes going seized state-of-the-art technology firms can threat of damage to the country's economic security. In particular, the defense industry serious crime that is directly related to national security. The company's core technology and trade secrets leaked once the industrial countries must prevent security breaches and offenses of strict punishment measures because it is impossible to recover. Also, some advanced countries directly has been operating industrial security crime for the country's economy and national security. In recent years, Nation core technology infringement cases are rapidly increasing in the country. In addition, industrial security crime threat to national security. Therefore, the industry security crimes damage to the national security that infringe on the business secrets of core technologies and businesses. It is necessary to identify that industry security crime associated with the visibility of the broad scope of intellectual property protection.

Protective Effect of Enerbalance on Cadmium-induced Testicular Damages in Mice (카드뮴에 의해 유도된 마우스의 고환 독성 모델에서 에너발란스의 보호 효과)

  • Park, Kwang-Hyun;Mok, Ji-Ye;Kim, Sung-Zoo;Kang, Hyung-Sub;Shim, Jae-Suk;Jang, Seon-Il
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.25 no.3
    • /
    • pp.482-488
    • /
    • 2011
  • Cadmium (Cd) is well known as a spermatotoxic and gonadotoxic heavy metal ion. This study was performed to assess the possible protective effect of Enerbalance on Cd-induced spermiotoxicity and testicular damage. The control group received isotonic saline; Cd group received Cd (2 mg/kg BW per day) orally; extract-treated groups were orally administrated with Enerbalance (50 mg and 100 mg/kg BW per day) and Cd for 10 days. Morphological changes of testicular tissue, sperm characteristics, oxidative/antioxidative parameters from testis, and serum sexual hormone level were determined. Enerbalance was significantely increased sperm amount in cauda epididymis without changes of ratio of epididymis/body weight and testis/body weight. Cd caused a marked decrease in epididymal sperm concentration and chemotactic sperm motility, testicular superoxide dismutase (SOD), catalase (CAT), Enerbalance was significantly ameliorated loss of epididymal sperm concentration, sperm chemotactic motility, antioxidative parameters, and male hormone whereas decreased abnormal architecture by testis damage. Enerbalance was successfully attenuated these adverse effects of Cd and offers a dose-dependent protection. Our study demonstrated that Enerbalance could proffer a measure of protection against Cd-induced testicular damage and spermiotoxicity by possibly reducing oxidative stress and increasing the antioxidant defense mechanism in mice.