• Title/Summary/Keyword: Supply Chain Threat

Search Result 15, Processing Time 0.025 seconds

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.

A Study on the Citation of Defense Cyber Protection Partnership for Safe Supply Chain Management (안전한 공급망 관리를 위한 국방사이버보호 파트너십 인증 방안 연구)

  • Kim, Jong-hwa;Kim, Yongchul;Kim, Kyoung Min;Kang, Jeongheung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.101-107
    • /
    • 2019
  • Our military's cyberspace is under constant threat from the enemy. These cyber threats are targeted at the information service assets held by the military, and securing the security of the organization's information service assets is critical. However, since Information assets can not be 100% selt-sufficient in any organization as well as the military, acquisition of information assets by the supply chain is an inevitable. Therefor, after reviewing supply chain protection measures to secure the safety of the military supply chain, we proposed a method for securing supply chain companies through the citation of partnership based on the validated trust model.

Trends in Supply-Chain Security Technologies (공급망 보안기술 동향)

  • Kim, Daewon;Kang, Dongwook;Choi, Yongje;Lee, Sangsu;Choi, Byeongcheol
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.149-157
    • /
    • 2020
  • Security threats in supply-chains can be targeted at all the users who use products related to these supply-chains as well as at single equipment or individuals. This implies that these security threats can cause nationwide economic and social damages. In particular, it is true that hardware security threat analysis technology in supply-chains has significant technical barriers due to the lack of software knowledge as well as the need to study and understand undisclosed hardware designs. In this paper, we discuss the future direction of studies by introducing basic concepts and attack cases, along with domestic and foreign technology trends related to supply-chain security technology.

A Study on the Software Supply Chain Security Policy for the Strengthening of Cybersecurity: Based on SBOM Policy Cases (사이버안보 강화를 위한 소프트웨어 공급망 보안 정책 연구: SBOM 정책 추진 사례를 중심으로)

  • Son, Hyo-Hyun;Kim, Dong-Hee;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.9-20
    • /
    • 2022
  • Supply chain attacks target critical infrastructure, causing large amounts of damage and evolving into a threat to public safety and national security. Accordingly, when establishing cybersecurity strategies and policies, supply chain risk management is specified to enhance security, and the US Biden administration recently issued the Executive Order on Improving the Nation's Cybersecurity, SBOM was mentioned as part of the guidelines for strengthening software supply chain security. If the government mandates SBOM and uses it as a security verification tool for supply chains, it can be affected by the domestic procurement system in the future and can be referenced when establishing a security system for domestic supply chains according to the progress of policy implementation. Accordingly, in this paper, countries that are promoting the SBOM policy as a way to strengthen the security of the software supply chain were selected and analyzed with a focus on related cases. In addition, through comparison and analysis of foreign SBOM policy trends, methods for using domestic SBOM in terms of technology, policy, and law were considered. As the value of using SBOM as a supply chain integrity/transparency verification tool is expected in the future, it is necessary to continuously identify trends in the establishment of international standardization and policy development for SBOM and study the standard format.

Improvement of Logistics Service in Electronic Commerce (전자상거래에서의 물류서비스 개선방안)

  • Lee, Seung-Hui
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.05a
    • /
    • pp.525-544
    • /
    • 2004
  • The Purpose of this study is to examine logistics characteristics related to electronic commerce and to suggest improvement of logistics Service in electronic commerce. This paper concerns the logistics functions which are essential for completing a commerce process even under the EC environment and provides ways to improve the logistics performance. Electronic commerce have introduced two scenes; dramatic change of the existing distribution surroundings and noticeable achievement of the economic advance and social efficiency. But, in the same scene, electronic commerce can be a threat to business condition, especially logistics management. It suggests that for activation of EC it is necessary to strengthen the strategic alliances, introduce GPS and use the third party logistics positively to prepare for the settlements of traffic problems, support the introduction of integrated logistics service and logistics information system.

  • PDF

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

A Study on the Logistics Strategy of our International Courier Service Companies against Development of Electronic Commerce (국내택배운송업계의 전자상거래 물류전략)

  • Kwon, O
    • The Journal of Information Technology
    • /
    • v.4 no.2
    • /
    • pp.83-102
    • /
    • 2001
  • International Courier Service can be used for on campus pick-up and delivery of small items on a pre-arranged basis or on call. Same day service is available for important items at a minimal fee. As e-commerce develops, effective procurement and delivery become even more critical success factors, offering great opportunities to the transportation and logistics Industry in an e-Commerce World. Much of the logistics industry has developed, or is developing systems to operate in the new e-market to capture new electronic tailer clients and enhance relationships with current customers. Supply chain solutions based on EC links will eventually become standard, leaving some companies behind. fresh opportunities and reduced entry barriers to new competitors via e-commerce pose a major threat to the present logistics industry. supply chain systems developers and industry consultants that subcontract physical transport of goods to contractors may encroach on traditional logistics industry business. In this paper I tried to explain various aspects of the physical distribution service through international courier service in an e-commerce world and survey the logistics strategy of international courier service companies against development of electronic commerce based on our companies, logistics strategy.

  • PDF

Analysis of Japan's CPTPP Trade Effect Using Gravity Model (중력모형을 이용한 일본의 CPTPP 교역 효과 분석)

  • Jongin Kim;Seong-Hyuk Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.5
    • /
    • pp.43-50
    • /
    • 2023
  • The South Korean government announced its plan to pursue membership in the CPTPP in 2022, aiming to establish a stable supply chain within the Asia-Pacific region. The CPTPP, led by Japan, was ratified in 2018 by 11 countries with the goal of eliminating tariffs and establishing new trade rules. According to our analysis, since the implementation of the CPTPP, there has been a trade promotion effect among Japan and member countries, with greater effects observed in countries with higher GDP per capita and closer geographical distance. As long as tariff elimination and reduction proceed as planned, the trade promotion effects are expected to expand gradually. However, the expansion of trade between Japan and CPTPP member countries may also indicate a relative contraction in trade with non-member countries, potentially posing a threat to the stable supply chain in the Korean industry within the Asia-Pacific region. As Japan is Korea's fourth-largest trading partner, it is necessary to carefully consider the impact of CPTPP on Japan's future trade with member countries and engage in discussions regarding Korea's participation and negotiation content based on a thorough examination of the matter.

Trend of standardization in the field of Industrial Security through ISO/TC 292 (ISO/TC 292에 의한 산업보안 분야 국제표준화의 동향)

  • Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.79-111
    • /
    • 2016
  • This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.

  • PDF

A study on the application and counter measures of IC tag in international marine container transport (국제해상컨테이너운송에서 보안강화를 위한 전자태그(IC tag)의 적용과 대응방안)

  • Han, Sang-Hyun;Choi, Jun-Ho
    • International Commerce and Information Review
    • /
    • v.12 no.2
    • /
    • pp.133-158
    • /
    • 2010
  • Since 11 September 2001, the awareness of terrorists' actions has clearly risen. The potential threat of terrorists using containers poses a large risk to our economies and to our societies. In order to protect cargo from damage and terrorist threats, business and government turn to RFID and IC tags, and tradition container is replaced by IC smart container. In this study, presented application of IC tag and future tasks to Container transport by sea in viewpoint of security strengthening. First, realization and international SCM realization structural order that cover container supply chain whole of international standardization and association between industry are certainly needed. Second, it may have to try in technical development for IC tag Ratio that can read elevation moment develop suitable IC tag or reader in International Standard. Third, Need to establish concrete use policy as soon as possible in national dimension at the same time effort for international standard normalization of frequency. Finally, it shows to uses jointly with electron sealing and must solve problem about usable plan and information leak.

  • PDF