• Title/Summary/Keyword: Defense Technology Security

Search Result 357, Processing Time 0.027 seconds

A Study on the Improvement Plan of Korea Defense Standardization (군수품 표준화 체계 발전방안 연구)

  • Ryu, Hyung-Gon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.459-468
    • /
    • 2015
  • Although defense standardization is recently becoming more and more active, there are still many obstacles to achieve attainments as planned. On the other hand, national standardization already has been applied as a mandatory rule in the overall industries and R&D programs and is well supported by systematic and specialized national basis. Furthermore, advanced countries, such as U.S.A., England and NATO, are considering defense standardization as a essential element to achieve low cost and highly efficient acquisition system and to enhance interoperability among the allied forces. This study aims to form public opinion in support of importance of defense standardization and to provide the vision and various implementation tasks for improving defense standardization outcome.

A Method of Defense and Security Threats in U-Healthcare Service (U-Healthcare서비스의 보안 위협과 대응 방법)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.4
    • /
    • pp.1-5
    • /
    • 2012
  • The fast-paced development in the field of U-Healthcare, which is available anytime and anywhere, is being underway in accordance with the development of IT technology. U-Healthcare technology has various security threats because it is based on network. The purpose of this paper is to examine the threats of DOS / DDOS attacks based on network attacks, and to propose the response technique that fit the situation of the U-Healthcare service by modifying the existing Detecting Early DOS / DDOS attacks through Packet Counting.

A Study on Improved Disaster Management System in Defense Field (우리나라 국방 재난관리 체계의 제도적 개선에 관한 연구)

  • Kim, Min Ho;Seo, Sang Won
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.3
    • /
    • pp.105-111
    • /
    • 2017
  • The number of natural disasters has risen dramatically such as earthquakes, typhoons and floods. However, the scope of disasters expand in today's society due to the rapidly changing environment. This study is to suggest improvements for disaster management system in defense field in order to reduce possible loss or damage from a huge disaster. Through two case studies from the United States and Japan, this research aims to support policy making of disaster management system in defense field.

MND-AF application study for anti-drone system (안티드론 시스템의 국방아키텍쳐 프레임워크 적용 연구)

  • Lee, Dong Joon;Kwon, Hyeong Ahn;Kim, Ji Tae;Jung, Gil Hyun;Yang, Sang Woon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.17 no.2
    • /
    • pp.23-36
    • /
    • 2021
  • Recently, the rapid development of drones is increasing as a variety of threats to important facilities of the country. In order to build an anti-drone system that responds to drones with high technical characteristics, standardization is required in terms of operation, system, and technology. By applying the defense architecture framework, it contributes to the establishment of the optimal system by proposing a standardization plan for the operational and system perspectives of the anti-drone system by creating outputs equivalent to the stage of prior research on weapons systems. It is a prerequisite for building a drone system the operational concept of the anti-drone system, the definition of the drone threat, the function of each component, the interface, the definition of data flow, the system performance and effect scale, etc. Management, security officers, and equipment manufacturers of important national and public facilities on site expect that it will be used as an objective standard at the government level for the component technology of the equipment to respond to the drone threat and the performance required in the environment.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

A study on Korea's defense export expansion strategy - Focusing on Korea-Poland Defense Export Case - (한국의 방산수출 확대 전략 연구 - 한·폴란드 방산수출 사례를 중심으로 -)

  • Geum-Ryul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.141-151
    • /
    • 2023
  • Since the end of the Cold War in the 1990s, European countries have cut defense costs and reduced armaments as an era of peace without large-scale wars continues, and as a result, the West's defense industry base has gradually weakened. On the other hand, South Korea, the world's only divided country, was able to achieve high growth in the defense industry as a result of continuous arms strengthening in the face of North Korea's nuclear and missile threats. With the rapid increase in demand for conventional weapons systems and changes in the structure of the global defense market due to the Russia-Ukraine war, Korea's weapons system drew great attention as a large-scale defense export contract with Poland was signed in 2022. In 2023, K-Defense ranked ninth in the world's arms exports and aims to become the world's fourth-largest defense exporter by 2027. Therefore, this study analyzed the case of Korea-Poland defense exports to derive problems, and presented development strategies related to export revitalization of K-Defense, a national strategic industry. In order for the defense industry to become Korea's next growth engine, it is necessary to establish a defense organization, prepare government-level measures to protect defense industry technology, and expand military and security cooperation with allies linked to defense exports.

A Study on Designing of Information Integration Framework and Architecture with Enhanced Security Focused on defense field (보안성을 강화한 정보연계 프레임워크 및 아키텍처 설계에 관한 연구 - 국방 분야를 중심으로)

  • Kang, Min-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.248-255
    • /
    • 2016
  • The amount and diversity of information is increasing, as is the information integration connecting data among the related institutions. In the defense field, DTAQ, which is in charge of the quality of military supplies, is attempting to collect and analyze the information which is related with it. In addition, the object of information integration is to expand civil data as well as defense data. There are many ways to integrate data in various environments. In the defense field, which needs enhanced security, it is necessary to establish and apply the information integration methods which are enhanced with more security. In this study, the framework and architecture of information integration was designed by considering task requirements and security conditions. As a result of example application of this framework for information systems to the selected 4 institutions, it was confirmed that the task can be performed through data connections. From the study result, integration architecture which can be applied securely in defense field was suggested. The data accumulated by using this framework with strengthened security are expected to be utilized for the quality improvement of military supplies.

Unauthorized Software Blocking Techniques in Software Defined Network (SDN) Environments (Software Defined Network(SDN) 환경에서 비인가 소프트웨어 차단 기법)

  • Kang, Nam-Gil;Kwon, TaeWook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.393-399
    • /
    • 2019
  • In a situation where an unauthorized SW brought into the organization without being authorized is emerging as a threat to the network security, the security of the network based on the SDN(Software-Defined Network) can be strengthened through the development of the security application considering the organization's characteristics. Security technology of existing SDN environment has been studied to protect internal network from external networks such as firewalls and Intrusion Detection Systems, but the research for resolving insider threat was insufficient. Therefore, We propose a system that protects the internal network from unauthorized SW, which is one of the insider threats in the SDN environment.

A Study on the Direction of the Formulation of "Safe Country" Laws and Regulations due to the Development of Information Technology (정보사회에 있어서 '안전국가' 법규의 정립방향에 관한 소고)

  • Kim, Hyun-Kyung
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.151-163
    • /
    • 2013
  • It is no doubt that information technology is the key factor of national safety. Information technology is positively useful for national security such as crime prevention and detection, criminal investigation, disaster management, and national defense. However, it might be a threat to the security as we saw in the examples such as '3.4 DDoS attacks' and 'Nong-hyup Computer Network Failure.' Although the effect that information technology makes upon the national security is immense, the current legal system does not reflect these changes well. National security should be kept during 'prevention-response-recovery' process regardless it is in the online on offline. In addition, public administration for national security should be based on laws. However, the current legal system is lack of legislative basis on cyber and physical disaster, and the laws on the response to disaster might cause confusing. Therefore, this study examines the limitation of the current legal system on national security, and suggests directions for the development of the system based on the new establishment of the legal concept for 'national security'.

Defense Trade Security Initiative (미국의 새로운 무기수출통제정책 소개)

  • Lee, Dong-Ha
    • Defense and Technology
    • /
    • no.9 s.259
    • /
    • pp.18-25
    • /
    • 2000
  • 상당 부분의 방위 교역을 미국에 의지하고 있는 우리로서는 Extension of ITAR Exemption to Qualified Countries에 특별한 관심을 가져야 할 것으로 판단된다. 이러한 ITAR면제 대상국이 되기 위해서는 수출통제, 산업보안, 정보체계, 사법체계 및 상호호혜적인 방산시장접근 허용 등 선진국가와 같은 수준의 정책방향 및 제도를 요구하고 있는 바, 모든 것이 개방되고 있는 추세에 맞추어 우리의 방산능력을 전문화하여 특정 분야에서의 경쟁력을 갖추고 당당히 선진국가와 상호 교류 할 수 있는 제도를 구축하여야 될 것이다.

  • PDF