• 제목/요약/키워드: defense configuration management system

검색결과 18건 처리시간 0.03초

양산성 확보를 위한 체계공학 기반의 개발단계 품질보증 방법에 관한 연구 (A Study on the Development Stage Quality Assurance Solution based on System Engineering for Securing Producibility)

  • 김승우;진희철
    • 품질경영학회지
    • /
    • 제45권2호
    • /
    • pp.175-189
    • /
    • 2017
  • Purpose: This study aims to built the manual for quality assurance at development stages based on the system engineering to prevent the lack of mass product capability in advance. Methods: This study have proposed quality baseline and review guidelines of outputs in system development stages for R&D quality assurance of Domestic weapons systems Results: We apply the this method to 21 projects of military area in 2016, and we present 1,291 supplementary requirements such as adding the missing test items. Conclusion: This method contribute to minimize the gap between the quality of development and production and reduce the configuration management effort during the initial production.

영상정보처리기기(CCTV)의 포괄적 보안관리를 위한 암호·인증·보호·체계(CCPS) 모델 제안 (Proposed CCPS model for comprehensive security management of CCTV)

  • 송원석;조준하;강성문;이민우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 춘계학술대회
    • /
    • pp.657-660
    • /
    • 2021
  • 영상정보처리기기(CCTV)는 민감 정보를 수집, 전송, 저장하는 데 있어서 관리적, 물리적, 기술적 측면에서 포괄적으로 보안관리가 이뤄져야 한다. 이를 위해 영상정보처리에 관련된 암호기술, 기술인증, 보호기술, 보안장비에 대한 적용 기준이 필요하다. 본 논문에서는 영상정보처리기기에 관련된 다양한 보안기술, 인증제도를 분석하여 영상정보처리기기의 구축 및 운영에 적용하여 포괄적 보안관리를 위한 암호·인증·보호·체계(CCPS; Cryptography·Certification·Protection·System) 모델을 제안한다.

  • PDF

국방품질경영시스템 요구사항에 대한 중요도-난이도 분석 (Importance-Difficulty Analysis for DQMS Requirements)

  • 김윤희;박종훈;이상천
    • 산업경영시스템학회지
    • /
    • 제40권3호
    • /
    • pp.49-58
    • /
    • 2017
  • The DQMS (Defence Quality Management System) is a certification system that manages participating companies to improve the quality of munitions. Since Korean Defense Specification (KDS) for DQMS certification that was established by adding military requirements based on the ISO quality standard, many companies complain that they should pay too much effort into the preparation process. However, it is hard to find helpful information on the preparation process because we have been only interested in the effect of DQMS acquisition. The purpose of this paper is to provide helpful information to companies preparing for DQMS certification. We surveyed the degree of difficulty and importance of the DQMS requirements from the companies with certification experience, and performed IDA (Importance-Difficulty analysis) by dividing the companies into the main contractor and the subcontractor. The result of IDA shows that there is a different recognition to the DQMS certification between main-contracting and sub-contracting companies. Subcontractor has more difficulties than main contractor in preparing the DQMS certification. In addition, we are able to identify the difficult and important requirements in the preparation process to the DQMS certification. Both main contractor and subcontractor have difficulty to the requirements related to configuration or validation such as 'customer controls configuration', 'configuration review shall be implemented' and 'design and development validation documentation.' The requirements related to customers are important to main contractor but the subcontractor regards difficult requirements as important ones. The result of this paper would be helpful to both the company preparing for DQMS and the munitions quality assurance agency.

WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구 (A Study on the Security System of the Web Based Defense Information Service Network)

  • 신유찬;남길현
    • 한국국방경영분석학회지
    • /
    • 제28권1호
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

무기체계 소프트웨어 규격화 누락여부 검증 방안 - 펌웨어 중심으로 (The Verification Method for Missing Software Standardization in Weapon System - Focused on Firmware)

  • 송치훈
    • 한국산학기술학회논문지
    • /
    • 제22권3호
    • /
    • pp.310-315
    • /
    • 2021
  • 군에서 사용하는 무기체계의 경우 경제적이고 효율적인 조달·관리 및 유지를 위하여 국방규격을 제정하여 관리한다. 국방규격은 제품 및 용역에 대한 기술적인 요구사항과 요구필요조건의 일치성 여부를 판단하기 위한 절차와 방법을 서술한 문서로, 작성된 국방규격은 무기체계의 생산, 품질보증, 형상관리 등에 활용된다. 소프트웨어도 국방규격의 하나로 다른 국방규격(국방규격서, 품질보증요구서, 도면, 부품/BOM 목록)과 같이 작성되고 관리되나, 소프트웨어의 일부(또는 전부)를 포함하지 않고 규격화를 수행하는 경우가 있다. 이 경우 개발업체를 제외하고는 다른 업체들은 제품을 생산할 수 없어 경쟁계약이 제약될 뿐만 아니라, 승인 없이 업체가 임의로 소프트웨어를 변경할 수 있어 무기체계의 품질에도 큰 영향을 미친다. 따라서 소프트웨어의 규격화 누락 여부의 검증은 반드시 필요하나, 하드웨어 내부에 탑재되는 펌웨어의 경우 개발업체 외에는 규격화 누락 여부의 확인이 매우 어렵다. 본 연구에서는 실제 품질보증 업무 수행 시에 활용할 수 있는 소프트웨어 규격화 누락 여부의 검증 방안을 제시하였으며, 이를 통해 무기체계의 효율적인 생산, 품질보증에 기여할 것이다.

이기종 분산 환경에서 동적 재구성이 가능한 통합 관리 및 모니터링 시스템 (Dynamic Reconfigurable Integrated Management and Monitoring System for Heterogeneous Distributed Environments)

  • 민법기;서용진;김현수;국승학;정용환;김점수
    • 인터넷정보학회논문지
    • /
    • 제13권6호
    • /
    • pp.63-74
    • /
    • 2012
  • 본 논문에서는 이기종 분산 컴퓨팅 환경에서의 관리 대상이 되는 시스템이나 애플리케이션들의 정보 모델을 동적으로 재구성하는 통합 관리/모니터링 시스템을 개발한다. 다양한 플랫폼 위에서 동작하는 하위 시스템들이 추가, 제거, 수정되는 상황에서 분산시스템을 효과적으로 관리하기 위해서는 분산 시스템의 형상과 통합 관리/모니터링 시스템의 정보가 일치해야 한다. 이에 시스템의 형상이 변화되었을 때, 시스템의 변경된 형상과 통합 관리/모니터링 시스템의 정보가 동기화되어야 하며, 동기화가 수행되는 동안 시스템은 정지 없이 모니터링 정보를 사용자에게 제공할 수 있는 가용성이 보장되어야 한다. 본 논문에서는 관리 대상인 하위 시스템에서 하드웨어나 소프트웨어의 형상의 변경이 있을 때 변경 내용을 통합 관리/모니터링 시스템에 통보하고, 통보된 정보를 바탕으로 관리 대상인 하드웨어 및 소프트웨어의 정보들을 동적으로 재구성 하는 방법을 제안한다. 이를 통해 어떤 이기종 분산 시스템도 통합 관리/모니터링 시스템에 반영하여 신뢰성 있는 통합 관리를 수행할 수 있을 것으로 기대된다.

현대 무기체계 소프트웨어 개발 사례 분석을 통한 품질개선 방안에 대한 연구 (An Investigation into Improving the Quality of Modern Weapon System Software Products: a Case Study)

  • 최태윤;이효진
    • 시스템엔지니어링학술지
    • /
    • 제8권2호
    • /
    • pp.19-25
    • /
    • 2012
  • As modern weapon systems have evolved into embedded software systems, the capability to develop, install, and maintain high-quality software products is becoming increasingly valuable in today's competitive aerospace and defense industry. It is desirable, especially for government-contracted projects whose end-users are military personnel, that specific types of software quality elements are assured early during product development; namely, functionality and usability. Motivated by this need to approach improving software quality from a user's perspective, this paper presents a case study that analyzes system-level software integration testing results for a weapon system indigenously developed in the Republic of Korea. Quantitative data, such as software defect ratios and configuration change rates, are computed to observe meaningful trends with respect to functionality - represented by tests designed to verify the system's electrical signal interfaces - and usability, which is evaluated in terms of how often the initial human-computer interface had to be re-designed. Insights gained from these exercises are subsequently presented as a set of "lessons learned" to take into account when developing new software items for complex weapon systems.

테러리즘의 대응관리체제에 관한 고찰 - "9. 11 테러"를 중심으로 - (A Study Consequence Management System of the Terrorism)

  • 김이수;안병수;한남수
    • 시큐리티연구
    • /
    • 제7호
    • /
    • pp.95-124
    • /
    • 2004
  • It can be said that 'the September 11th Terrorist Attacks' in 2001 were not only the indiscriminate attacks on innocent people but also the whole - political, economical and military - attacks on human life. Also, 'the September 11th Terrorist Attacks' can be regarded as the significant events in the history of world, which were on the peak of the super-terrorism or new-terrorism that had emerged from the 1980s. However, if one would have analysed the developments of terrorism from the 1970s, they could have been foreknown without difficulty. The finding from this study can be summarized as the followings, First, in spite that the USA responsive system against terrorism had been assessed as perfect before 'the September 11th Terrorist Attacks', the fragilities were found in the aspects of the response on the new-terrorism or super-terrorism. The previous responsive system before 'the September 11th Terrorist Attacks' had the following defects as the followings: (1) it was impossible to establish the integrated strategy, because the organizations related to the response against terrorism had not integrated; (2) there were some weakness to collect and diffuse the informations related to terrorism; (3) the security system for the domestic airline service in USA and the responsive system of air defense against terrors on aircraft were very fragile. For these reasons, USA government established the 'Department of Homeland Security' of which the President is the head so that the many organizations related to terrorism were integrated into a single management system. And, it legislated a new act to protect security from terrors, which legalized of the wiretapping in spite of the risk of encroachment upon personal rights, increased the jail terms upon terrorists, froze the bank related to terrorist organization, and could censor e-mails. Second, it seem that Korean responsive system against terrors more fragile than that of USA. One of the reasons is that people have some perception that Korea is a safe zone from terrors, because there were little attacks from international terrorists in Korea. This can be found from the fact that the legal arrangement against terrorism is only the President's instruction No. 47. Under this responsive system against terrorism dependent on only the President's instruction, it is expected that there would be a poor response against terrors due to the lack of unified and integrated responsive agency as like the case of USA before 'the September 11th Terrorist Attacks'. And, where there is no legal countermeasure, it is impossible to expect the binding force on the outside of administrative agencies and the performances to prevent and hinder the terrorist actions can not but be limited. That is to say, the current responsive system can not counteract effectively against the new-terrorism and super-terrorism. Third, although there were some changes in Korean government's policies against terrorism. there still are problems. One of the most important problems is that the new responsive system against terrorism in Korea, different from that of USA, is not a permanent agency but a meeting body that is organized by a commission. This commission is controled by the Prime Minister and the substantial tasks are under the National Intelligence Service. Under this configuration, there can be the lack of strong leadership and control. Additionally, because there is no statute to response against terrorism, it is impossible to prevent and counteract effectively against terrorism. The above summarized suggests that, because the contemporary super-terrorism or new-terrorism makes numerous casualties of unspecified persons and enormous nationwide damages, the thorough prevention against terrorism is the most important challenge, and that the full range of legal and institutional arrangements for the ex post counteraction should be established. In order to do so, it is necessary for the government to make legal and institutional arrangements such as the permanent agency for protection from terrorism in which the related departments cooperates with together and the development of efficient anti-terror programs, and to show its willingness and ability that it can counteract upon any type of domestic and foreign terrorism so that obtain the active supports and confidence from citizens.

  • PDF