• Title/Summary/Keyword: 융합체계

Search Result 2,030, Processing Time 0.034 seconds

Research and Direction of Cyber Operation Education System for Fostering Common Situation Awareness about Cyber Operation -Focusing on non-Cyber Operations Unit Officer Education- (사이버작전에 대한 공통상황인식 함양을 위한 군(軍) 사이버작전 교육체계 연구 및 방향성 제안 -비(非)사이버작전부대 장교 교육을 중심으로-)

  • Lee, Sangwoon;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.13-22
    • /
    • 2019
  • The purpose of this study is to suggest the educational system and direction of cyber operations officers of non-cyber operations forces who do not specialize in cyber operations. In order to carry out cyber operations as a joint operation, non-Cyber Operations officers must also know about cyber operations, but there is no education system for them at present, Since there is almost no previous research on this, research in the relevant field is necessary. Therefore, the education system was developed based on the prior literature review, that is, the education system, that is, the necessity of education, the object of education, the goals and contents of the education, and the curriculum. In addition, the relevant experts confirmed the validity of each item with Delphi method, and as a result, some improvement was needed, but it was shown to be suitable as a whole. In addition, detailed educational program development can be developed based on this in the future.

Research of Improvement, and System of the Information Security Management Evaluation (보안관리수준 평가 체계에 대한 분석 및 개선안 연구)

  • Min, Byung-Gil;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.101-112
    • /
    • 2006
  • It will not be able to guarantee the secure operation for the information and communication systems with only technical security. So, ISMS(Information Security Management System) research and standardization are active going on. Korea published "The national cyber security management regulation" and "The national cyber security manual" in 2005. According to the regulation and manual, the government organ and public institution must accomplish the security management assessment to itself for systematic management of an information security. We studied related standards and security management systems of the Australia and the USA, and analyzed the security management evaluation system in "The national cyber security manual" in efficient security management focus. We presented the improvement direction of national security evaluation system through the research. We propose the additional control, selective control set and improvement of the evaluation process for efficient security management. Proposed system possible composition of suitable to each organ and flexible adaptation of rapidly changed information environment.

  • PDF

The Effects of Familiarity with Unmanned Technology on Expectation of Devel opment in Ground Forces through Structural Equation Model (구조방정식 모델을 활용한 무인화 기술 친숙성이 지상전력 발전 기대감에 미치는 영향)

  • Han, Seung Jo;Lee, Se Ho
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.91-98
    • /
    • 2019
  • The military is facing an era in which it must take advantage of technologies related with the 4th Industrial Revolution. The representative of the final application of the 4th Industrial Revolution technology is the unmanned system. Many unmanned systems have not yet been harnessed to the army, and it is assumed based on literature studies that improving familiarity with unmanned systems will have a positive effect on force strength in the future. To verify these assumptions, the structural equation model(SEM) was used for quantitative analysis. The results suggest that the increase in familiarity with unmanned systems induces the increase in availability of unmanned systems in each field, which eventually raises the expectation that overall ground force strength will increase. These results imply that the military should reinforce the curriculum that enhances the familiarity of the unmanned system in military education system.

Captive Flight Test POD System Design for Effective Development in Weapon System (무기체계의 효과적인 개발을 위한 항공탑재시험용 POD 시스템 설계)

  • Park, JungSoo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.25-31
    • /
    • 2018
  • Captive Flight Test (CFT) is one of the most important tests to acquire data when developing complex weapon systems. In this paper, we introduce the design and test result of our POD system for CFT. POD system uses POD set which consists of left and right POD. The exterior and mass properties of POD set are equal to those of fuel tank for aircraft so that we can omit Airworthiness Certification. Also, we adequately placed inner-equipments in order to acquire data including target image, navigation result and reference data to verify and analyse software algorithm. The POD system for CFT we developed is complex system as both mechanical and electronic factors are applied. As we repeatedly performed CFT, useful and various data for weapon development were acquired.

A Study of Practical Field Application Cryptographic Module through Evaluation Derived by Connection Indicators (품질 연계지표 평가방법을 사용한 암호화 모듈 실무현장 적용체계 연구)

  • Noh, SiChoon;Na, SangYeob
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.55-60
    • /
    • 2014
  • In this study, we propose a cryptographic module quality evaluation system referenced by ISO/IEC 9000 quality system with Quality, Quality Factor, Quality Subfactor, Metric. Practical application process encryption algorithm based on the encryption algorithm to encrypt the pros and cons valuation of diagnosis, point selection algorithm, analysis, and quality items(quality factor), eliciting constraints derived, such as the cryptographic module design quality evaluation system is set to step 5. The five steps are examples of field-based diagnostic tool for cryptographic operations, the most essential work to be done in order to derive one will work. 2-Factor encryption module for connection between indicator items(quality factor) to identify and ensure the quality of the item the constraints of the environment are two kinds of cryptographic operations. This study is an encryption module and a practical field application system, it presents the standardized model. We have to meet the rapid changes in information technology. The environment, development and the encryption algorithm applied to model a wide variety of on-site development encryption will be able to expect the efficiency.

The necessity of Smart Factory's Standards and Certification System Based on Grounded theory (근거이론에 의한 스마트공장 표준 및 인증제도 도입 필요성)

  • Shin, Jong-Chang;Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.203-208
    • /
    • 2018
  • This study is concerned with the introduction and operation of smart factories. In order to accomplish the purpose of research, we made a standard system of smart factory and investigated the recognition system. This study was conducted as a grounded theory methodology among qualitative research methodologies. The results of the study are the necessity of a tool to appropriately evaluate the new manufacturing process management system and related management activities to achieve the successful introduction of smart factories and the management performance of the organization. In order to successfully implement the Smart Factory Certification System, it is necessary to establish a certification organization system, enact relevant laws and amendments, operate government-led pilot projects, train professional workers, and establish incentive policies.

SOA-based Video Service Platform Model Design for Military e-Learning Service (군 원격교육체계를 위한 SOA기반 동영상서비스 플랫폼모델 설계)

  • Kim, Kyung-Rog;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.24-32
    • /
    • 2011
  • According to accelerate the convergence of defense and information technology, there is a need for innovative change in Military e-Learning service system. In other words, It has increased the need for system integration based on standards and interoperability to develop into a network-centric information and knowledge. In this study, It would like to introduce an integrated direction Military e-Learning service system on the SOA-based video content services in the operating system for the operating model. SOA is taking advantage in integration and expansion of the unit with a process. Using it, define of video services platform architecture and define of business model based on the Imprimatur model. Based on this, it define the role of actors for video content service in each step of the operating model, that is Production model, Brokerage model and consumption model. In the operating system, it define the functions and data to control and handle the needed functionality for video content services based on the operational model.

A Study on Tasks for the Legal Improvement for the Governance System in Cybersecurity (사이버안보 추진체계의 제도적 개선과제 연구)

  • Park, Sangdon;Kim, Injung
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.3-10
    • /
    • 2013
  • Cyber attacks are threats to national security. Today, cybersecurity threats have various types, the theft or spread of privacy and national secret, the realization of direct attacks to infrastructure and the hacktivism with political or social objectives. Furthermore, There are special situations in South Korea because of North Korea's threats. Thus, It is necessary to handle cybersecurity as a kind of national security problem. It is a time to identify problems of governance system in cybersecurity and to improve related Acts and subordinate statutes. There are several tasks for legal improvement for governance system in cybersecurity. They are improving legal bases for the roles of the relevant authorities in cybersecurity, consolidating national joint response to cyber accidents, establishing and vitalizing information sharing system, constructing foundation of cybersecurity through industry promotion and manpower development, and acquiring defensive tools by enhancement research an development. In order to address these challenges, it is necessary to pay much attention to enactment and to revision laws and to practice legislative procedure.

A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Case (사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -)

  • Kim, Dong Hee;Park, Sangdon;Kim, So Jeong;Yoon, Oh-Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.53-68
    • /
    • 2017
  • Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. Korea is sharing cyber threat information in public and private sectors mainly through the National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). In addition, Korean government is attempting to strengthen and make legal basis for unified cyber threat information sharing system through establishing policies. However, there are also concerns about issues such as leakage of sensitive information of companies or individuals including personal identifiable information that may produced during the cyber threat information sharing process, reliability and efficiency issues of the main agents who gather and manage information. In this paper, we try to derive improvement plans and implications by comparing and analyzing cyber threat information sharing status between U.S. and Korea.

An Industry-Service Classification Development of 5G-based Autonomous Vehicle Applications (5G 기반 자율주행차 활용 산업-서비스 분류체계 개발)

  • Kim, Dong Ha;Park, Seon Jeong;Leem, Choon Seong
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.91-112
    • /
    • 2019
  • In accordance with the advent of the 5th generation (5G) communication technology, we are having a change in various communication services which converge with high technologies related to the 4th Industrial Revolution. To utilize the upcoming 5G technology effectively and practically, we analyzed the technologies which have the most potential in convergence under the introduction of 5G technology and as a result, it is a autonomous vehicle that we'll discuss the core technologies of the 4th Industrial Revolution, which can lead to service activation by being combined with 5G technology. In addition, we developed an industry-service classification of 5G-based autonomous vehicle, we provided a basis for supporting a new business and its new business model converged with 5G communication technology. Furthermore, we will create a linkage matrix with the industry-service classification system of a new autonomous vehicles. This matrix will service as a guideline for industry-service development where autonomous vehicles can be utilized actively in the next generation.