• 제목/요약/키워드: Defense technology security

검색결과 357건 처리시간 0.028초

DACUM 기법을 이용한 방위산업체 정보통신보안실무자 직무분석 (Job Analysis for IT Security Workers in Defense Industry through DACUM Process)

  • 우광제;송해덕
    • 융합보안논문지
    • /
    • 제14권4호
    • /
    • pp.73-84
    • /
    • 2014
  • 지식 정보화 사회가 심화되면서 정보보호에 대한 중요성이 날로 높아지고 있다. 최근 들어 개인정보와 핵심 산업기술 유출 사고가 늘어나면서 모든 산업분야는 보안대책을 강구하는데 안간힘을 쓰고 있다. 특히 방위산업은 국가 안전보장에 필요한 국방력을 구축하는 분야이므로 일반 산업분야보다 더 높은 수준의 보안대책이 요구된다. 방위산업체는 방위산업보안업무훈령에 따라 업체별 규모와 여건에 맞게 보안조직을 편성하고 보안실무자를 임명 운영하고 있다. 정보 통신의 발달로 대부분의 핵심정보와 기술이 정보통신 시스템이나 저장매체에 기록 관리되고 있는 환경 속에서 정보통신보안실무자의 임무와 역할이 매우 중요하다. 그럼에도 방위산업체 정보통신보안실무자들의 직무에 대한 체계적인 분석과 그들의 전문성 향상을 위한 교육과정 개발이 부족한 실정이다. 이에 본 연구에서는 대표적인 직무분석 기법인 DACUM을 활용해서 정보통신보안실무자들의 책무와 과업을 도출하였고, 설문조사를 통해서 도출된 과업에 대한 타당도와 신뢰도를 검증하였다. 본 연구의 결과는 방위산업체 정보통신보안 업무의 발전에 기여하고 관련 규정의 개정 및 교육과정 개발을 위한 기초자료로 활용될 수 있을 것이다.

국방 CALS 통합 데이터 환경을 위한 내용 기반의 표준 데이터 검색 기술 개발 (The content based standard data search technology under CALS integrated data environment)

  • 정승욱;우훈식
    • 안보군사학연구
    • /
    • 통권2호
    • /
    • pp.261-283
    • /
    • 2004
  • To build up the military strength based on information oriented armed forces, the Korean ministry of national defense (MND) promotes the defense CALS (Continuous Acquisition and Life cycle Support) initiative for the reductions of acquisition times, improvements of system qualities, and reductions of costs. These defense CALS activities are the major component of the underlying mid and long term defense digitization program and the ultimate goal of program is to bring a quick victory by providing real-time battlefield intelligence and the economical operations of the military. The concept of defense CALS is to automate the acquisition and disposition of defense systems throughout their life cycle. For implementing defense CALS, the technology for exchange and sharing CALS standard data that is created once and used many times should be considered. In order to develop an efficient CALS information exchange and sharing system, it is required to integrate distributed and heterogeneous data sources and provide systematic search tools for those data. In this study, we developed a content based search engine technology which is essential for the construction of integrated data environments. The developed technology provides the environment of sharing the CALS standard data such as SGML(Standard Generalized Markup Language) and STEP(Standard for The Exchange of Product model data). Utilizing this technology, users can find and access distributed and heterogeneous data sources without knowing its actual location.

  • PDF

미군의 STE 사례 분석과 한국군 적용방안 연구 (A Study on the the U.S. military's STE case and Research on application methods to the South Korean military)

  • 이정섭;류연승;손창근
    • 한국국방기술학회 논문지
    • /
    • 제6권1호
    • /
    • pp.7-12
    • /
    • 2024
  • 2023년 3월 국방부는 국방혁신 4.0 기본계획에서 교육훈련간 전투원의 실전적 훈련을 위한 합성훈련환경(STE : Synthetic Training Environment)플랫폼을 강조하였다. 하지만 각 군별 상이한 시뮬레이터 및 지형정보체계 활용 등의 사항으로 풀어나갈 과제가 많다고 할 수 있다. 이에 따라 본 연구는 선진 합성훈련환경을 갖춘 미 육·공·해군 각각의 사례를 확인하며 한국군에 접목해볼 수 있는 사항을 도출하고 발전 방안을 제시한다.

  • PDF

Efficient Signature Schemes from R-LWE

  • Wang, Ting;Yu, Jianping;Zhang, Peng;Zhang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3911-3924
    • /
    • 2016
  • Compared to the classical cryptography, lattice-based cryptography is more secure, flexible and simple, and it is believed to be secure against quantum computers. In this paper, an efficient signature scheme is proposed from the ring learning with errors (R-LWE), which avoids sampling from discrete Gaussians and has the characteristics of the much simpler description etc. Then, the scheme is implemented in C/C++ and makes a comparison with the RSA signature scheme in detail. Additionally, a linearly homomorphic signature scheme without trapdoor is proposed from the R-LWE assumption. The security of the above two schemes are reducible to the worst-case hardness of shortest vectors on ideal lattices. The security analyses indicate the proposed schemes are unforgeable under chosen message attack model, and the efficiency analyses also show that the above schemes are much more efficient than other correlative signature schemes.

정형성 기반 국방 안전/보안필수 소프트웨어 개발 및 인증 기준 - 안전/보안필수 소프트웨어 인증 프로세스에 대한 정형기법 적용 방안 연구 - (Formalism-Based Defense Safety/Security-Critical Software Development & Certification Criteria - Application of Formal Methods to Safety/Security-Critical Software Certification Process Activities -)

  • 김창진;최진영
    • 한국군사과학기술학회지
    • /
    • 제10권1호
    • /
    • pp.55-69
    • /
    • 2007
  • The paper provides the approach to apply formal methods to the development and certification criteria of defense safety/security-critical software. RTCA/DO-178B is recognized as a do facto international standard for airworthiness certification but lack of concrete activities and vagueness of verification/certification criteria have been criticized. In the case of MoD Def Stan 00-55, the guidelines based on formal methods are concrete enough and structured for the defense safety-related software. Also Common Criteria Evaluation Assurance Level includes the strict requirements of formal methods for the certification of high-level security software. By analyzing the problems of DO-178B and comparing it with MoD Def Stan 00-55 and Common Criteria, we identity the important issues In safety and security space. And considering the identified issues, we carry out merging of DO-178B and CC EAL7 on the basis of formal methods. Also the actual case studies for formal methods applications are shown with respect to the verification and reuse of software components.

민군관계의 변화와 국방리더십의 발전방안에 관한 연구 (A Study on the Development of National Defense Leadership through the Change of Civil-Military Relationships)

  • 이창기
    • 안보군사학연구
    • /
    • 통권4호
    • /
    • pp.83-118
    • /
    • 2006
  • This study is to develop digital leadership in a field of national defense. Today, korean society is facing the crisis of national security. But national defense leadership is not show in the circumstance of national security crisis. As you know, national defense leadership is a process that make use of influence. Which means it converges people's interest and demands well and also show people the right vision of national defense and make them to comply the policy about national security. Because of the environmental change, our national defense leadership is having a new turning point. First, international order, which is under post-cold war, raises possibility of guarantee of peace and security in international society but also, cause the increase of multiple uncertainty and small size troubles in security circumstance. In addition, Korean society is rushing into democratization and localization period by success in peaceful change of political power went through about three times. The issue of political neutralization of military is stepping into settlement but still, negative inheritance of old military regime is worrying about it. In this situation, we can't expect rise in estimation about the importance of security and military's reason for being. So, military have to give their concern to not only internal maintenance of order and control and growth of soldiers but also developing external leadership to strength influence to society and military's the reason for being. So for these alternative I'm suggesting a digital leadership of national defense which fits digital era. This digital leadership is the leadership which can accept and understand digital technology and lead the digital organization. To construct digital national defense we need a practical leadership. The leadership has to be digital leadership with digital competence that can direct vision of digital national defense and carry out the policy. A leader who ha s digital leadership can lead the digital society. The ultimate key to construct digital government, digital corporate and digital citizen depends on digital leader with digital mind. To be more specific, digital leadership has network leadership, next generation leadership, knowledge driven management leadership, innovation oriented leadership. A leader with this kind of leadership is the real person with digital leadership. From now on, to rise this, we have to build up human resource development strategy and develop educational training program.

  • PDF

A Model of Artificial Intelligence in Cyber Security of SCADA to Enhance Public Safety in UAE

  • Omar Abdulrahmanal Alattas Alhashmi;Mohd Faizal Abdullah;Raihana Syahirah Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.173-182
    • /
    • 2023
  • The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries.

국방핵심기술 연구개발과제의 선정평가 개선 연구 (The Improvement on Proposal Evaluation System of National Defense Core Technology R&D Projects)

  • 김찬수;조규갑
    • 기술혁신연구
    • /
    • 제15권2호
    • /
    • pp.123-152
    • /
    • 2007
  • The striking characteristic of the contemporary global security environment is that the nature of threats has become diverse and complex. For example, transnational and non-military threats including terrorism and proliferation of weapon of mass destruction has increased. In this security environment, Advanced countries funnel their investments for defense budgets into the assurance of key force capability and R&D of cutting-edge core technologies, in consideration of future battlefield environments so as to get an edge on not only defense science and technology but also intelligence capabilities. As shown by past practices of the korea's defense acquisition, the ministry of national defense has tried to enhance its force capabilities in the short-term by purchasing foreign weapon systems rather than by investing in domestic R&D. Accordingly, the technological gaps between the korea and advanced countries were widened due to both insufficient investment in development of domestic technologies and avoidance of technological transfer by advanced countries. Thus, for the effective execution of the R&D budget and the successful performance of the projects, the importance of selection, management and evaluation of the R&D projects is emphasized. So, The objective of this study is that the analysis of the proposal-selection evaluation system for the realization of the successful defense core technology R&D projects. This study focused on the improvement of the proposal-selection evaluation model which can be applicable to the national defense core R&D projects. Using the improved proposal-selection evaluation system, we propose a model to enhance the reliability of the national defense core technology R&D project evaluation system.

  • PDF

국방연구개발 투자우선순위 도출 프레임워크 - TRA 방법론에 기반한 DEA 중심으로 - (A Framework for Deriving Investment Priority in National Defense R&D - Using DEA based on TRA -)

  • 유동현;임동일;설현주
    • 한국군사과학기술학회지
    • /
    • 제21권2호
    • /
    • pp.217-224
    • /
    • 2018
  • The purpose of this study is to evaluate the future potential value of CTE(Critical Technology Element)s that are evaluated to be low in TRA(Technology Readiness Assesment) and to present investment prioritization technologies in defense R&D(Research and Development) based on them. To do this, we used the DEA(Data Envelopment Analysis) method, which is useful in evaluating the efficiency of the organization. Specifically, we suggest a systematic framework to evaluate the future value of CTEs by setting the CTEs derived from the TRA process to DMU(Decision Making Unit)s, the cost and time required to develop each CTE as the input factor of the DEA and the effects of the development of each CTE as the output factor of the DEA respectively. We also conducted an illustrative case study on radar technologies to demonstrate the usefulness of the proposed approach.

사회연결망분석 개념을 적용한 국방정보체계 취약점 분석·평가 모형 연구 (A Study on the Vulnerability Assessment Model for National Defense Intelligence System Using SNA)

  • 장영천;강경란;최봉완
    • 한국군사과학기술학회지
    • /
    • 제20권3호
    • /
    • pp.421-430
    • /
    • 2017
  • In this research, we propose a methodology for assessing security vulnerability of the national defense intelligence system, considering not only target elements but also the interconnection relationship of the whole system. Existing approaches decide the security vulnerability of the whole system by assessing only target elements. However, those approaches have an issue with potentially showing the same outcome for the systems that have identical target elements but the different types of interconnection relationships. We propose a more practical assessment method which takes the interconnection relationship of a whole system into consideration based on the concept of SNA(Social Network Analysis).