A Study on the Improvement for Military Cyber Protection Technology in the 4th Industrial Revolution

  • Published : 2017.09.30

Abstract

Keywords

References

  1. Ju, D., What should we do for 4th Industrial Revolution and National Cyber Security?, The 4th Industrial Revolution and the National Cyber Security Policy Forum, Presidential Commission on Broadcasting and Communications / National Cyber Security Association, S. Korea, Keynote presentation, 2017.
  2. Cho, S., The Study on Threats of Information Security and Their Solutions in the Fourth Industrial Revolution, Korean security science review, Vol.51, pp.11-35, 2017.
  3. Choi. I., Defense cyber protection development direction, Weekly defense review, KIDA, S. Korea, Vol.1659, pp.1-8, 2017.
  4. Han, C. and Kang, W., The Utilization of Big Data Technologies in the ROK Army, Journal of Business Administration Research, S. Korea, Vol.9, No.1, pp.5-24, 2016.
  5. Shin, S. and Kim, Y., A Study on the Cyber Cyber-Construction and Countermeasures by Introducing IoT, KINX2016257139, ROK. Joint Chiefs of Staff, S. Korea, pp.81-84, 2016.
  6. Ha, Y., Chung, Y., Lim, Y. and Yang, H., A Study on the Development of UAVs for the Public Switched Information System in Korea, KICS, S. Korea, Proceedings of the Summer Conference, 2009.
  7. Schneier, B., Secrets & Lies, John Wiley& Sons, 2000.
  8. Ross, R. S., Managing Information Security Risk: Organization, Mission, and Information System View, Special Publication (NIST SP), 800-39, Mar. 2011.
  9. Kidston, D., Li, L., Tang, H. and Mason, P., Mitigating Security Threats in Tactical Networks, Communications Research Centre (CRC), White Paper, 2010.
  10. Park, C., An, H., Kim, S. and Bae, J., Strategies to Improve the Management System of Weapon Systems Embedded SW and to Construct its Information Security System, Journal of Security Engineering, SERSC, S. Korea, Vol.12, No.4, pp.363-378, 2015.
  11. S. Korea's Defense Acquisition Program Administration, A Handbook on the Development and Management for Weapon Systems SW, 2013.
  12. Seo, S., Oh, W. and Kim, H., Research on cyber warfare manpower training strategy for securing Defense Information System using AHP analysis, Journal of Security Engineering, SERSC, S. Korea, Vol.12, No.2, pp.109-120, 2015. https://doi.org/10.14257/jse.2015.04.02
  13. Eom, J., The Improvement Plan of a Customized Cyber-Training Structure for enhancing the Capability of Cyber Security, Journal of Security Engineering, SERSC, S. Korea, Vol.12, No.6, pp.567-580, 2015. https://doi.org/10.14257/jse.2015.12.05
  14. Eom, J., Lee, W. and Park, K., A Construction Plan of Specialized Cyber Training Scheme for Enhancing the Capability of Military Cyber Warriors, Journal of Security Engineering, SERSC, S. Korea, Vol.13, No.2, pp.99-112, 2016. https://doi.org/10.14257/jse.2016.04.04
  15. Park, C., Kim, C., Kim, S., An, H. and Bae, J., Improvement of Personal Information Protection Level in the Military Using the Measurement of Disclosure Risk, Journal of Security Engineering, SERSC, S. Korea, Vol.12, No.6, pp.581-596, 2015. https://doi.org/10.14257/jse.2015.12.06
  16. Eurostat, Manual on Disclosure Control Methods, Luxembourg, Office for Official Publication of the European Communities, 1996.
  17. Techtarget Network, http://whatis.techtarget.com/definition/policy-based-management, 2011.
  18. Network Times, Whitelist Security, 153-162, 2010.
  19. Choi, J., Park, W. and Park, C., A Framework of Secure Access to iSCSI Network Storage based on TPM, KCC2009, Vol.36, No.1D, pp.5-9, 2009.