• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.024 seconds

A Study on Application of u-Learning System in Network Centric Warfare Environment (네트워크중심전 환경에서의 u-러닝 시스템 적용방안에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.43-49
    • /
    • 2010
  • With the development of information and communications technology(ICT), the concept of ubiquitous that we can communicate regardless of time and place appears. Due to the development of the technology delivering information, current society is called intellectualization society developed from informatization society. The intellectualization society is based on knowledge accumulated by processing information. The education methods are also developed into a concept of u-Learning applying the concept of ubiquitous from the concept of e-Learning using a computer. The military also points out education as a key policy. The aspect of war is changing to NCW(Network Centric Warfare) from platform centric warfare. Therefore, collecting and managing the war situations in real time is a key to controlling command. To this end, it needs to maximize individuals and groups' ability to cultivate the military with cutting-edge knowledge. Therefore, this study aims to look into methods to apply u-learning system in training and military actions according to changes in war environments and ICT.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application (소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2013
  • In 2010, the Ministry of National Defense decided to build a MegaCenter including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. The Cloud computing system environment should be designed applying cloud computing technology and policy for an efficient infrastructure that many IT resources are available in the data center as a concentrated form. That is, the system should be designed in such a way that clouding services will be efficiently provided to meet the needs of users and there will not be unnecessary waste of resources. However, in order to build an optimal system, it should be possible to predict the service performance and the resource availability at the initial phase of system design. In this paper, using the CloudAnalyst simulator to predict availability of the K-defence cloud computing system service, conducts cloud modeling and analysis of the 'Facebook', one of the most famous social network service applications with most users in the world. An Optimal K-Defense cloud computing design model is proposed through simulation results.

The Emergence of International Ocean Regime and the Change of Power Concept in International Society -The Case of United Nations Convention on the Law of the Sea- (국제사회 힘의 변화와 해양레짐 출현에 관한 소고 -유엔 해양법협약을 중심으로-)

  • Kang, Ryang;Park, Seong-Wook;Yang, Hee-Cheol
    • Ocean and Polar Research
    • /
    • v.28 no.3
    • /
    • pp.273-285
    • /
    • 2006
  • As the political arguments on international power concept has gradually been deepened, the role of international regimes, defined as principles, norms, rules, and decision-making procedures around which nation-actors' expectations converge in a given issue-area, has also been reinforced. There are many ways of understanding about international regimes. In terms of realistic theories, international regimes are one of methods of maintaining hegemonic power order of hegemonic nation and in terms of liberalistic theories, international regimes are understood as the products of mutual inter-dependence of nations in changing international society. As a matter of fact, if we take structural causes and regime consequences into severe consideration, we can find not a few characteristics of international regimes, such as security regime, world trade and fiance regime, ocean regime, environmental regime, human right regime, etc. This paper will examine the changing concept of power after World War II in three categories of hard power (military power), meta power (regime creating power), and soft power (advanced in cultural, diplomatical, and technological power). This paper will provide the evidence of why the changing power concepts will be strongly related with the emergence of international regimes. The UN convention on the law of the sea will chosen as a standard case of the ocean regime and it's regime structure and role will also be analysed in both realistic :md liberalistic theories. Futhermore, the nations' interests involved in the UN convention on the law of the sea will be analytically classified and finally a future prospectus of the UN convention on the law of the sea as an ocean regime will be tested.

Study on Development of Korean Unmanned Systems through Analysis of U.S. Unmanned Systems Policy (미국의 무인체계 정책 분석을 통한 한국의 무인체계 발전에 관한 연구)

  • Park, Dongseon;Oh, Kyungwon
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.3
    • /
    • pp.65-70
    • /
    • 2021
  • This study presents a method to efficiently advance the Republic of Korea's Unmanned Systems through the analysis of the development of the U.S. Unmanned System Policy. After the occurrence of the September 11 attacks, the U.S. developed Unmanned Systems as a part of RMA and became the leader in this area. The system went through numerous trials and errors during the development and acquisition. From these experiences, the U.S. had embodied Unmanned Systems acquisition methods by establishing Unmanned Systems Development Guidance and DoD Autonomy Community of Interest in 2012. In addition, as diverse unmanned programs started to proceed, it promoted Core Technology development sharing and simplification of functions of the Unmanned Systems to exclude budget-wasting elements such as duplication of programs. The Republic of Korea must politically build a collaborative system between industry/academia/research institute/military and apply evolutionary development strategies from the first step of the development of the Unmanned Systems the future Game Changer. In operations, concepts of the Manned/Unmanned Systems complex operation should be established and intelligent S/W, Open System, and Cyber Security technologies to materialize them developed.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

South Korea's Defense Industry Development Strategy - Focusing on Technology Protection Policy - (한국의 방위산업 발전전략 연구 - 기술보호정책을 중심으로 -)

  • Geum-Ryul Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.83-93
    • /
    • 2024
  • As the paradigm of the global defense industry changes due to the Russia-Ukraine war, Korea's cutting-edge conventional weapons systems are attracting attention from around the world. In 2023, Korea ranked 9th in world arms exports, and is pursuing innovation in the defense industry with the goal of becoming the world's 4th largest defense exporter by 2027. The defense industry is a national strategic industry that requires a long period of time and a large budget, and defense technology is a core technology that has a great impact on the advancement of defense and the national economy. Over the past five years, Korea has suffered economic losses worth approximately 25 trillion won due to the outflow of cutting-edge technology overseas, and there is an urgent need for institutional improvement to prevent the outflow of defense technology. Therefore, this study presented Korea's defense industry development strategy by examining the laws and systems that the three key players in the Indo-Pacific region, the United States, China, and Japan, are promoting to protect defense industry technology. To foster the defense industry as a promising future industry in Korea, it is necessary to respond to the fast-evolving pace of development of advanced science and technology in connection with securing technological sovereignty and protect defense technology, which is a key technology of the country, by improving related laws and systems.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

The Influence of Factors on the Level of Digitalization of World Economies

  • Pyroh, Olha;Kalachenkova, Kateryna;Kuybida, Vasyl;Chmil, Hanna;Kiptenko, Viktoriia;Razumova, Oleksandra
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.183-191
    • /
    • 2021
  • The advanced development of the world's economies requires a detailed study of the impact of factors on the level of digitalization, to ensure economic growth and promote the use of information and communication technologies in the digital economy. Digitalization of the world's economies is ensured through the implementation of relevant regulations and policy decisions to implement public policy and strategy of the digital economy. The purpose of the study is to establish the pattern of the impact of factors on the level of digitalization of world economies by conducting a regression analysis to reflect the dependence of the impact of factors on the level of digitalization in 25 economies (by IMD digital competitiveness), to check the level of digitalization of the world's economies. It is necessary to analyze the ranking of countries in the world according to the DiGiX Index, IMD, and DESI Digital Competitiveness Rating. Research methods: information synthesis method; regression analysis; systematization, and generalization. Results. It was found that because of regression analysis, the value of the coefficient of determination indicates that the regression model by 78% explains the relationship between future readiness of countries to implement digital technologies and information and communication technologies, but there are still a small number of other factors not included in the regression model. It is determined that the greatest progress among EU member states for the period 2015-2020 according to the DESI index belongs to Ireland, the Netherlands, Malta, and Spain. It is established that Estonia, Spain, and Denmark are in the lead in the DESI rating, in terms of e-government implementation. The study found that the impact of factors on the level of digitalization of world economies contributes to solving current economic problems through further implementation of information and communication technologies and improving legislation in the digital economy, which will ensure the implementation of effective digital policy. It is established that ensuring the appropriate level of digitalization of the world's economies should solve the problems in the digital economy sector faced by governments and businesses, which requires the implementation of measures to regulate and ensure the continued operation of the digital economy.

A Systematic Literature Review on Smart Factory Research: Identifying Research Trends in Korean Academia (스마트공장에 관한 체계적 문헌 분석: 국내 학술 경향 연구)

  • Kim, Gibum;Lee, Jungwoo
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.59-71
    • /
    • 2020
  • The paper reports on a systematic literature review results concerning the smart factory research in Korea. 144 papers were identified from the articles published in Korean journals listed in the Korean citation index by keyword search related to smart factory. Bibliometric analyses were conducted by way of co-occurrence and network analysis using the VOSViewer. Automation, intelligence, and bigdata were identifed as three critical clusters of research while, operating systems, international policy and cases, concept analysis as other three clusters of research. Internet of Things turned out to be a key technology of smart factory linking all of these areas. Servitization studies were small in numbers but seemed to have a lot of potential. Security researches seemed to be lacking connections with other areas of studies. Results of this study can be used as a milestone for identifying future research issues in smart factories.