• Title/Summary/Keyword: Military Sector

Search Result 138, Processing Time 0.023 seconds

A study on security threats to drones using open source and military drone attack scenarios using telemetry hijacking (오픈소스 활용 드론에 대한 보안 위협과 Telemetry Hijacking을 이용한 군용 드론 공격 시나리오 연구)

  • Lee, Woojin;Seo, Kyungdeok;Chae, Byeongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.103-112
    • /
    • 2020
  • Recently, the interest in hobby/leisure drones is increasing in the private sector, and the military also uses drones in various countries such as North Korea, the United States, and Iran for military purposes such as reconnaissance and destruction. A variety of drone related research is underway, such as establishing and operating drone units within the Korean military. Inparticular, recently, as the size of drone flight control source code increases and the number of functions increases, drone developers are getting accustomed to using open sources and using them without checking for separate security vulnerabilities. However, since these open sources are actually accessible to attackers, they are inevitably exposed to various vulnerabilities. In this paper, we propose an attack scenario for military drones using open sources in connection with these vulnerabilities using Telemetry Hijacking techniques.

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.

Deployment Strategies of Cloud Computing System for Defense Infrastructure Enhanced with High Availability (고가용성 보장형 국방 클라우드 시스템 도입 전략)

  • Kang, Ki-Wan;Park, Jun-Gyu;Lee, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.7-15
    • /
    • 2019
  • Cloud computing markets are rapidly growing as cost savings and business innovation are being carried out through ICT worldwide. In line with this paradigm, the nation is striving to introduce cloud computing in various areas, including the public sector and defense sector, through various research. In the defense sector, DIDC was established in 2015 by integrating military, naval, air and military computing centers, and it provides cloud services in the form of IaaS to some systems in the center. In DIDC and various future cloud defense systems, It is an important issue to ensure availability in cloud defense systems in the defense sector because system failures such as network delays and system resource failures are directly linked to the results of battlefields. However, ensuring the highest levels of availability for all systems in the defense cloud can be inefficient, and the efficiency that can be gained from deploying a cloud system can be reduced. In this paper, we classify and define the level of availability of defense cloud systems step by step, and propose the strategy of introducing Erasure coding and failure acceptance systems, and disaster recovery system technology according to each level of availability acquisition.

A Case of Developing Performance Evaluation Model for Korean Defense Informatization (국방정보화 수준평가 모델 개발 사례)

  • Gyoo Gun Lim;Dae Chul Lee;Hyuk Jin Kwon;Sung Rim Cho
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.23-45
    • /
    • 2017
  • The ROK military is making a great effort and investment in establishing network-centric warfare, a future battlefield concept, as a major step in the establishment of a basic plan for military innovation. In the military organization level, an advanced process is introduced to shorten the command control time of the military and the business process is improved to shorten the decision time. In the information system dimension, an efficient resource management is achieved by establishing an automated command control system and a resource management information system by using the battle management information system. However, despite these efforts, we must evaluate the present level of informatization in an objective manner and assess the current progress toward the future goal of the military by using objective indicators. In promoting informatization, we must systematically identify the correct areas of improvement and identify policy directions to supplement in the future. Therefore, by analyzing preliminary research, workshops, and expert discussions on the major informatization level evaluation models at home and abroad, this study develops an evaluation model and several indicators that systematically reflect the characteristics of military organizations. The developed informatization level evaluation model is verified by conducting a feasibility test for the troops of the operation class or higher. We expect that this model will be able to objectively diagnose the level of informatization of the ROK military by putting budget and resources into the right place at the right time and to rapidly improve the vulnerability of the information sector.

The Analysis of Granger Causality between GDP and R&D Investments in Government, Private, Defense Sectors (국방 R&D 투자 및 정부, 민간 R&D 투자와 국민소득간의 상호 인과관계 분석)

  • Lee, Jin-Woo;Kwon, O-Sung
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.79-98
    • /
    • 2008
  • The purpose of this paper is to find the desirable R&D policies in defense area by analyzing causality between GDP and R&D investments in government, private, defense sectors. We have five variables which are composed of GDP, total R&D investment, R&D investments in government, private and defense sectors to figure out the causality between R&D investment in defense sector and other components. In the course of analysis on causality, we took the unit root test of variables to prevent spurious regression. Also we need to take cointegration test about non-stationary variables before the causality test. According to these test results, we took the causality test using ECM(Error Correction Model) for the models which have cointegrating relations. And we took ordinary Granger causality test for model which doesn't have a long-run stationary relationship. As a result of the causality test, it was shown that there exists the long-nu causality to GDP and R&D investments in government and private sectors from other variables. However, there doesn't exist the causality to defense R&D investment from other variables. We found that there doesn't exist the causality between R&D investments in defense and private sectors, and that they are independent.

Analysis of Status of Radiation/Radioisotopes Utilization

  • Park, Chan Hee;Lee, Seung Hyun;Kim, Na Kyung;Kim, Kon Wuk
    • Journal of Radiation Protection and Research
    • /
    • v.42 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • Background: The use of radiation and radioisotopes in Korea has been increasing each year, and its impact on economy and industry is expected to be increasing progressively following the development of industrial technology and the expansion of their usage. To establish and supporting policies for industries using radiation and radioisotopes, it is necessary to check the status of related industries accurately, as well as to gather data required to establish plans for industrial development by studying both revenues and economic scale (contributing to revenue). Materials and Methods: To analyze the status of utilization, surveys were carried out on 6,621 organizations engaged in nuclear operations handling radiation and radioisotopes pursuant to the Nuclear Safety Act as of end 2014, on 33,471 medical institutions using radiation generators for medical and diagnostic purposes pursuant to the Medical Service Act, and on 2,218 organizations using radiation generators for animal diagnostics pursuant to the Veterinary License Act. Results and discussion: The overall status of the domestic radiation market including the number of user organizations, that of employees, and the size of distributions (imports, productions, and exports) with which the scale of domestic radiation market can be judged showed a growth trend compared to the previous year, though the number of employees for radiation operation in industrial sector, research sector, education sector, military sector, and power plants (nuclear power plants) and the size of imports was reduced somewhat. Conclusion: It is expected that data acquired through periodic surveys on the status of utilization would be utilized practically in establishing governmental policies related to the promotion of usage of radiation and radioisotopes, and also be utilized widely in cultivating and developing the industry efficiently to invigorate the related industries.

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

Study on Trends and Strategies for Defense Blockchain and ICT Technologies (국방 블록체인 기술 동향 및 국방 ICT 융합 전략 연구)

  • Lee, K.Hyu;Park, H.Sook
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.12-24
    • /
    • 2020
  • To keep pace with other powerful nations in this era of the era of digitalization and to emerge stronger in the world, the defense forces of South Korea aim to innovate and prepare themselves for digital battlefields of possible wars in the future. The resources in the defense sector, which is the core of defense intelligence, is based on an intelligent mission collaboration tactical network system via cyber, command, control, communication, and computer (C4), and military and non-human weapons. Defense intelligence depends on the degree of the convergence of advanced Information and communication technologies (ICTs). Considering this aspect of defense intelligence, We plan to determine the application status of defense blockchain technology and examine the feasibility of applying blockchain technology and the core of applied technology. Generally, a key feature of blockchain technology is its data integrity in untrusted environments. There are various types of core technologies for the blockchain depending on the target areas of application in the defense sector, and it is also essential to derive new application strategies for core technologies that are applied in combination with other ICT technologies. We plan to demonstrate new defense ICT converged technologies (DNAB2: Data, Network, AI, BigData, Blockchain) and DNAB2-As-Services in the defense strategy.

A study on the appropriateness of utilizing retired persons to military education and training sector (군사 교육훈련분야의 예비역 활용 적정성에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.27-34
    • /
    • 2014
  • This study is changing day by day in Korea, which reinforce the security environment and other advanced weapon systems and operate to secure it in excellent staff Reserves are being utilized in each group for the service pipe work required to determine the appropriateness of the Job Title, Retired military expertise and experience in utilizing the scarce human resources contribute to the improvement of the reinforcement of Power, Reserves required by each group's employment services and the need to normalize operations and annual operating plan objectives for determining the adequacy of the data to provide you with. In particular, the group has a direct impact on attack power can be trained to perform combat missions need to empower bag in bag research focuses on methods to improve and complement suggested.

A Methodology of Defense IT Convergence and Case Study (국방IT융합 추진방법론 및 사례 연구)

  • Sim, Seungbae;Jung, Hosang;Yoo, Cheonsoo;Jeong, Bongju
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.17-26
    • /
    • 2012
  • Information technology convergence has been recognized one of the key drivers in the industry perspective. Korea government established IT convergence policy in 2008 and has been implementing it to the core industry such as automotive, shipbuilding and defense industries. This research analyzes various IT convergence issues based on an operation of defense IT convergence center, one of the industry IT convergence centers. Defense IT convergence issues are as follows : the methods for introducing rapid changing IT to military area, rapid deployment procedures of verified commercial technologies and products, regulations for using of domestic software promotion and so on. We define the concept of defense IT convergence and propose the framework and processes for applying IT to our defense sector as one of industries. Also, we establish various business models in the military perspective using defense IT convergence framework. In this paper, we focus the development of defense IT convergence through the alignment of national IT convergence policy and propose various business models established through operating a defense IT convergence center.