• Title/Summary/Keyword: Defense technology security

Search Result 345, Processing Time 0.024 seconds

A Study on the Improvement Plan for Enhancing Utilization of Defense Critical Technologies (국방 핵심기술 활용성 증대를 위한 개선 방안 연구)

  • Cho, Il-Ryun;Kim, Chan-Soo;Noh, Sang-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.120-125
    • /
    • 2018
  • Various security threats, such as North Korea's nuclear tests and intercontinental ballistic missile developments, are becoming issues. Considering the current security situation in South Korea, proper selection of weapons and efficient defense acquisition systems are essential. In this paper, we conduct a survey and analysis of the defense core technology necessary for the development of weapons systems, and review whether current defense research and development is carried out efficiently. A theoretical study was conducted on ways to enhance the linkage between defense core technology and weapons systems development. As a result of the study, the necessity for development of weapons systems and the linking of defense core technology planning with the need for institutional improvement in enhanced utilization of defense core technology were derived. We propose a method for a long-term weapons systems concept plan that integrates defense core technology planning with forces planning and pre-project research programs to improve planning efficiency.

The study of the relationship of the defense industry-specific factors effect the innovation of manufacturing technology and the market share. (방위산업의 시장구조 결정요인이 기술혁신과 시장지배에 미치는 영향)

  • Chung, Young-Hyun
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.241-280
    • /
    • 2007
  • This study examines the relationship of the industry-specific factors that effect innovation of manufacturing technology and the market share within the defense industry. Since the establishment of the basic defense industry framework in 1973, there were numerous interactions of the industry-specific factors of the defense industry structure with the technological innovation and market organization of the defense industry. During last three decades, the domestic defense industry has achieved the considerable level but the framework of the basic system has not developed much in areas of the military science and the defense manufacturing technology. Industry-specific factors were formed in the process and appeared in a variety of behavioral characteristics as subsystems. Currently, there IS a growing trend where the management of defense industry is gradually deteriorating due to limitation of the domestic industry-specific factor (e.g. defense technologies, amount of demand, etc.). If there is a prominent imbalance of the industry-specific factors. it can trigger the potential problem of conflict, lack of cooperation and control, slowing the growth of the manufacturing technology thereby diminishing the market and deteriorating the defense supply/demand relationship. In a research conducted by Joe S. Bain, Bain analyzed the relationship of the traditional industrial organization where industry-specific factor(S) not only impacts the conductor(C). And, conductor(C) influences the shaping of the performance(P) of relationship of the traditional industrial organization. Consequently, the researcher has identified the demand monopoly, barriers to entry, and market competition with comparison of defense industry issues. These defense issues were three industry-specific factors identified, which are 1) The demand monopoly and The entry barriers to new market competition, 2) the industrial technical factor to a production technical competitiveness and a market sharing competitiveness, 3) the probability factor to revolution for military affairs(RMA) and a R&D production. According to baseline with these factors, the following research model is established from the special companies group(Group A), the systematization companies group(Group B), and the general companies group(Group 0. The hypothesis is that if there are more industry-specific factors, then there will be more relationships of defense industry relation statutes. This research is an empirical study on the relationship that the industry specific factors effects the innovation of manufacturing technology and the shaping of the market in the defense industry. Moreover, the existing models to evaluate the industry specific factors of the defense industry IS much to be desired with the controlled statistical analysis of the result. It is vital to study on current situation with suggesting alternative strategy to the efficient strategy. The descriptive analysis approach analysis is conducted with SPSSWIN to conduct reliability test, factor analysis, correlation analysis, cross-tabulation analysis, one-way ANOVA, and multiple regression analysis. However, there were some limitations of the survey such as the rigidity of concept about the technical factors and various market management factors. The wishes is that the decision-maker could be utilized these defence industrial factors to formulate efficient defence policy and strategy in the future.

  • PDF

A Study on an Audit Model for the Defense Information System security using BS7799 (BS7799(정보보안관리 표준)를 적용한 국방정보체계 보안감사모델에 관한 연구)

  • 최장욱;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.27 no.1
    • /
    • pp.89-100
    • /
    • 2001
  • Information technology has been made remarkable progress and most of computer systems are connected with internet over the world. We have not only advantages to access them easy, but also disadvantages to misuse information, abuse, crack, and damage privacy. We should have safeguards to preserve confidentiality, integrity and availability for our information system. Even tough the security is very important for the defense information system, we should not over limit users availability. BS7799, a British standard, is an evaluation criteria for information security management. In this paper we propose an audit model to manage and audit information security using control items of BS7799, which could be useful to mange the defence information system security. We standardize audit items, and classify them by levels, and degrees by using appropriate audit techniques / methods / processes.

  • PDF

On Enhanced e-Government Security - Network Forensics

  • Wei, Ren
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.173-184
    • /
    • 2004
  • E-Government security is crucial to the development of e-government. Due to the complexity and characteristics of e-government security, the viable current approaches for security focus on preventing the network intrusion or misusing in advanced and seldom concern of the forensics data attaining for the investigation after the network attack or fraud. We discuss the method for resolving the problem of the e-government security from the different side of view - network forensics approaches? from the thinking of the active protection or defense for the e-government security, which can also improve the ability of emergence response and incident investigation for e-government security.

  • PDF

Study on Developmental Strategy of National Defense & IT Convergence (국방IT융합기술의 발전전략에 관한 연구)

  • Koo, Han Lim;Kim, Seong Min;Rhee, Woo Seop
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.99-112
    • /
    • 2014
  • National Defense & IT Convergence is ensuring actual force integration by developing new IT Convergence Technology for the purpose of realizing the concept of Network Centric Warfare. The Ministry of Defense has appointed National Defense & IT Convergence Center of Defense Agency for Technology and Quality as a specialized agency for the National Defense & IT Convergence development, a mission in the creative economy era and has been active in military demand inquiry and prior technology plan with the industrial-academic research institute for discovery of National Defense IT Convergence projects based on the Convergence Center. Further, it is promoting focused on the timely introduction of private IT new technology by operating the project planning team comprised of defense domain specialists and by applying the advanced planning method etc. Accordingly, for the development of National Defense & IT convergence, developmental strategy is urgently required to be utilized effectively after considering theoretically on the national IT Convergence policy enforcement and phenomenon of National Defense & IT Convergence technology and analyzing them comprehensively. This thesis promotes in phases the IT Convergence projects which are identified for the development, improves the efficiency of newly created National Defense & IT Convergence center and suggests training program of IT Convergence personnel related to the defense reforms. With such, it will achieve smart defense in advance and will also contribute largely for the realization of the immediate paradigm shift and of the creative economy.

A Study on the Investment Efficiency of Defense Science and Technology R&D (국방과학기술 연구개발 투자 효율화 방안 연구)

  • Gam, Hyemi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.164-169
    • /
    • 2019
  • Defense R&D investment is expanding. This shows that major countries are preparing for future warfare by securing high-tech technologies and developing new concept weapons systems. In particular, it is expected to accelerate the development of the technology of the 4th Industrial Revolution in the future, and Korea needs its own ability to develop advanced weapons and medium- and long-term investment strategies to prepare for future warfare. The defense science and technology strategy will be established every five years. The strategy-dependent R&D drive has limitations in replacing the rapidly changing security environment and changes in science and technology. This study proposes an investment efficiency process to proactive incorporate information into R&D strategies with a focus on implementing policies and changing security threats, while maintaining continuity in which strategic and focused areas are linked to core technology development. The process can quickly reflect the needs of technological change, the security environment and defense policy. The process can be used to efficiently allocate defense R&D budgets and establish strategic investment directions.

Analysis of Domestic Security Solution Market Trend using Big Data (빅데이터를 활용한 국내 보안솔루션 시장 동향 분석)

  • Park, Sangcheon;Park, Dongsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.492-501
    • /
    • 2019
  • To use the system safely in cyberspace, you need to use a security solution that is appropriate for your situation. In order to strengthen cyber security, it is necessary to accurately understand the flow of security from past to present and to prepare for various future threats. In this study, information security words of security/hacking news of Naver News which is reliable by using text mining were collected and analyzed. First, we checked the number of security news articles for the past seven years and analyzed the trends. Second, after confirming the security/hacking word rankings, we identified major concerns each year. Third, we analyzed the word of each security solution to see which security group is interested. Fourth, after separating the title and the body of the security news, security related words were extracted and analyzed. The fifth confirms trends and trends by detailed security solutions. Lastly, annual revenue and security word frequencies were analyzed. Through this big data news analysis, we will conduct an overall awareness survey on security solutions and analyze many unstructured data to analyze current market trends and provide information that can predict the future.

A research on cyber kill chain and TTP by APT attack case study (APT 공격 사례 분석을 통한 사이버 킬체인과 TTP에 대한 연구)

  • Yoon, Youngin;Kim, Jonghwa;Lee, Jaeyeon;Yu, Sukdea;Lee, Sangjin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.91-101
    • /
    • 2020
  • We analyzed APT attack cases that occurred overseas in the past using a cyber kill chain model and a TTP model. As a result of the analysis, we found that the cyber kill chain model is effective in figuring out the overall outline, but is not suitable for establishing a specific defense strategy, however, TTP model is suitable to have a practical defense system. Based on these analysis results, it is suggested that defense technology development which is based on TTP model to build defense-in-depth system for preparing cyber attacks.

A Study on the Improvement Plan of Korea Defense Standardization (군수품 표준화 체계 발전방안 연구)

  • Ryu, Hyung-Gon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.459-468
    • /
    • 2015
  • Although defense standardization is recently becoming more and more active, there are still many obstacles to achieve attainments as planned. On the other hand, national standardization already has been applied as a mandatory rule in the overall industries and R&D programs and is well supported by systematic and specialized national basis. Furthermore, advanced countries, such as U.S.A., England and NATO, are considering defense standardization as a essential element to achieve low cost and highly efficient acquisition system and to enhance interoperability among the allied forces. This study aims to form public opinion in support of importance of defense standardization and to provide the vision and various implementation tasks for improving defense standardization outcome.

A Method of Defense and Security Threats in U-Healthcare Service (U-Healthcare서비스의 보안 위협과 대응 방법)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.4
    • /
    • pp.1-5
    • /
    • 2012
  • The fast-paced development in the field of U-Healthcare, which is available anytime and anywhere, is being underway in accordance with the development of IT technology. U-Healthcare technology has various security threats because it is based on network. The purpose of this paper is to examine the threats of DOS / DDOS attacks based on network attacks, and to propose the response technique that fit the situation of the U-Healthcare service by modifying the existing Detecting Early DOS / DDOS attacks through Packet Counting.