• Title/Summary/Keyword: Supply Chain Security

Search Result 119, Processing Time 0.024 seconds

Secure Boot Security Requirements for Cryptographic Modules against Supply Chain Threats (공급망 위협에 대응하기 위한 암호모듈의 안전한 부팅 보안 요구사항 제안)

  • Jong Wook Park;Sanghan Lee;Bonseok Koo;Seon Yeob Baek;Sang Yun Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.989-1000
    • /
    • 2023
  • In order to respond to supply chain threats, active research and development efforts are underway for software tamper prevention technologies such as Secure Boot and management systems like Software Bill of Materials(SBOM). Particularly, the Trusted Computing Group (TCG) is introducing standards for Trusted Platform Module(TPM) to provide a secure and trustworthy computing boot environment. This paper emphasizes the need for introducing secure booting technology for cryptographic modules to ensure that they remain safe and provide reliable functionality even in the face of supply chain threats. Furthermore, it analyzes vulnerabilities in cryptographic modules verified by the ISO/IEC 19790 standard and proposes security requirements for secure booting of cryptographic modules to address these vulnerabilities.

A Proposed Model for Supply Chain using Blockchain Framework

  • Zenab AlSadeq;Haya Alubaidan;Alanoud Aldweesh;Atta-ur-Rahman ;Tahir Iqbal
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.91-98
    • /
    • 2023
  • The rapid increase in the use of new technology known as 'blockchain technologies' has addressed many challenges in different areas and provided benefits to users, in this paper we discuss the field of supply chains, improve confidence and transparency between participants and stakeholders significantly also in this paper we Compare between different blockchain frameworks focusing on most popular frameworks. Moreover, we proposed a model in the supply chain using a blockchain framework, the proposed supply chain model included many different resources that help to exchange information over the network. The proposed model also includes smart contracts that maintain all rules for transactions. using blockchain technology information such as transaction details, time and money are recorded and stored within the system from the beginning of the transaction entry.

Several Concepts of Industrial Innovation Policy and their Weights in Diverse Countries: Policy Implications for Korea (산업혁신정책의 주요 담론들과 그 정책목표의 국제 비교: 한국에의 시사점)

  • Keun Lee;Joonyup Kim
    • Journal of Technology Innovation
    • /
    • v.31 no.2
    • /
    • pp.1-27
    • /
    • 2023
  • This study first reviews the evolving literature on industrial innovation policy and thereby identifies three main goals of such policy. The first goal is traditional industrial policy aiming growth of existing and future industries, the second goal is sustainable development and quality of life, and third goal encompasses the issues related to supply chain and economic security. Then, the paper evaluates industrial innovation policy goals of the five economies (United States, China, Germany, Japan, and Taiwan) in terms of the relative weights given to each goal by each economy, and derives implications for Korea. The United States emphasizes economic security and supply chain stability amid its rivalry with China. In contrast, China focuses more on traditional industrial policies but has recently begun to consider supply chain and economic security. Germany and Japan tend to give similar weights to each of the three goals. Taiwan follows this trend with a new and additional emphasis on economic security given the rising threats from China. For Korea, economic security may not be the top priority, unlike the two super-powers. Instead, it seems more appropriate for Korea to follow Germany or Japan to prioritize supply chain stability and technology sovereignty, and, at the same time, fostering future growth industries must be still an important goal. Further, the concept of economic security for Korea should include promotion of defense industry and food security.

A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S. (미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

Anti-Counterfeiting Mechanism Based on RFID Tag Ownership Transfer Protocol (RFID 태그의 소유권 이전 프로토콜을 기반으로 한 위조 방지 메카니즘)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.6
    • /
    • pp.710-722
    • /
    • 2015
  • Counterfeit products have been a major concern in global market. With the emergence of RFID systems, to detect counterfeit products in supply chain is relatively easy. Many anti-counterfeiting techniques for products attached by RFID tag are proposed. Most of the previous anti-counterfeiting techniques are not considering the distribution of the counterfeit from a customer to a customer. Using the ownership transfer protocols we can prevent the counterfeit from being distributed on the supply chain as well as between the customers and the customers. The ownership transfer protocols must be modified for anti-counterfeiting because of the usage of the protocol. In this paper, we modify the ownership transfer protocol proposed by G. Kapoor and S. Piramuthu[1] to be able to detect the counterfeit and track and trace the products in the supply chain. Our proposed protocol consists of three phases: the products delivery phase, the products takeover phase, and the products sale phase. We show that our protocol is anti-counterfeiting as well as secure against the security attacks.

Optimization of Agri-Food Supply Chain in a Sustainable Way Using Simulation Modeling

  • Vostriakova, Viktorija;Kononova, Oleksandra;Kravchenko, Sergey;Ruzhytskyi, Andriy;Sereda, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.245-256
    • /
    • 2021
  • Poor logistical infrastructure and agri-food supply chain management leads to significant food waste in logistic system. The concept of the sustainable value added agri-food chains requires defined approach to the analysis of the existing situation, possible improving strategies and also assessment of these changes impact on further development. The purpose of research is to provide scientific substantiation of theoretical and methodological principles and develop practical recommendations for the improvement of the agri-food logistics distribution system. A case study methodology is used in this article. The research framework is based on 4 steps: Value Stream Mapping (VSM), Gap and Process Analysis, Validation and Improvement Areas Definition and Imitation Modelling. This paper presents the appropriateness of LEAN logistics tools using, in particular, Value Stream Mapping (VSM) for minimizing logistic losses and Simulation Modeling of possible logistics distribution system improvement results. The algorithm of VSM analysis of the agri-food supply chain, which involves its optimization by implementing the principles of sustainable development at each stage, is proposed. The methodical approach to the analysis of possible ways for optimizing the operation of the logistics system of the agri-food distribution is developed. It involves the application of Value Stream Mapping, i.e. designing of stream maps of the creation of the added value in the agri-food supply chain for the current and future state based on the minimization of logistic losses. Simulation modeling of the investment project on time optimization in the agri-food supply chain and economic effect of proposed improvements in logistics product distribution system functioning at the level of the investigated agricultural enterprise has been determined. Improvement of logistics planning and coordination of operations in the supply chain and the innovative pre-cooling system proposed to be introduced have a 3-year payback period and almost 75-80% probability. Based on the conducted VSM analysis of losses in the agri-food supply chain, there have been determined the main points, where it is advisable to conduct optimization changes for the achievement of positive results and the significant economic effect from the proposed measures has been confirmed. In further studies, it is recommended to focus on identifying the synergistic effect of the agri-food supply chain optimization on the basis of sustainable development.

The Study of the electronic Access Service Model for Supply Chain (공급망을 위한 전자적 접근 서비스 모델 연구)

  • Ahn, Kyeongrim;Lee, Suyoun
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.95-100
    • /
    • 2014
  • The trend of business work that is related to supply chain changed into e-business using the electronic document However, the small and medium enterprise organizations still use huge volume of paper document, especially in private sector. Recently, the need for eco-friendly and low cost logistics becomes increasing. For this, it has expanded to exchange or to use e-document rather than the paper or manual processing in supply chain business. Therefore, this paper proposed the electronic access system for supply chain by business process modeling. If it is using the proposed system, it can be saving the exchanged or the scanned document to system, and user can utilize that document on just accessing system whenever they need the document. We believe it might reduce the burden of each organization because they don't need to save large volume data to their system or place. Furthermore, the benefits will effect across the national as well as global.

A Study on SCM Improvement Plan using the Internet of Things (사물인터넷을 활용한 SCM 고도화 방안에 대한 연구)

  • Kim, MinJune;KIM, YoungKil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.553-554
    • /
    • 2018
  • Supply Chain Management (SCM) is the overall process (component procurement, production planning, delivery, inventory control, etc.). It is the process from the supplier to the consumer until the raw material becomes the finished product. Basically, traditional supply chain management is primarily aimed at cost reduction and efficiency. However, considering only cost reduction and efficiency, it is not easy apply the center of 4th industry to Smart Factory. In this study, I propose a form of supply chain management network. It can be satisfy the security by using block chain and automatic control of each element by adding the internet of things.

  • PDF

Trend and Cause of Information Security Workforce's Job Turnover (정보보호인력 직무이동의 추이 및 요인)

  • Park, Sang-Woo;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.37-47
    • /
    • 2020
  • A significant proportion of information subjects experience information security breaches, and the number of reports and counseling cases of personal information infringements is increasing. Increased awareness of the importance of information security has raised interest in the personnel in charge of such tasks. However, hiring excellent new workers and preventing turnovers in information security remain unresolved. In this paper, by modeling the job career path of information security workforce as a Markov chain, we analyze the workforce turnover process and long-term turnover trends by information security jobs, and further analyze the number and duration of turnovers required to engage in specific jobs. The results of this study are expected to be a reference to balancing the supply and demand of information security workers for the government and to ensuring efficient management of the workforce for businesses.

Enhanced RFID Mutual Authentication Protocol on Efficient Supply Chain Management (효율적인 공급망 관리를 위한 강화된 RFID 상호 인증 프로토콜)

  • Jeon, Jun-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.691-698
    • /
    • 2009
  • Chen et al. proposed a RFID authentication protocol for anti-counterfeiting and privacy protection. A feasible security mechanism for anti-counterfeiting and privacy protection was proposed using XOR and random number shifting operations to enhance RFID tag's security providing a low cost. However, their authentication protocol has some drawbacks and security problems because they did not consider the surrounding environments. We conduct analysis on the protocol and identify problematic areas for improvement of the research. We also provide enhanced authentication and update scheme based on the comment for efficient supply chain management. The proposed protocol was analyzed and compared with typical XOR based RFID authentication protocols and it was confirmed that our protocol has high safety and low communication cost.

  • PDF