• Title/Summary/Keyword: 융합체계

Search Result 2,030, Processing Time 0.029 seconds

A Study on the Information Security Plan for Network Centric Warfare : Development of Information Security Governance Assessment Index (네트워크 중심전(NCW)하의 정보보호체계 구축방안 연구 : 정보보호체계 평가지표 개발을 중심으로)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.83-91
    • /
    • 2007
  • Information security is a critical issue for network centric warfare(NCW). This paper provides a information security governance index for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military organization's planners determine the degree to which they have implemented an information systems governance framework at the strategic and tactical level within their organization.

  • PDF

A Study on Establishing EMP Protection Performance Standards and Improving Laws and Regulations for Military Facilities and Equipment (군사시설, 장비의 EMP 방호성능 기준 정립 및 법·제도 개선 방안연구)

  • Sangjun Park;Kukjoo Kim;Hoedong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.219-229
    • /
    • 2024
  • The application of 4th Industrial Revolution technologies in the defense sector is accelerating, leading to the rapid incorporation of information and communication technologies (ICT) into military systems. The biggest threat to these ICT-based military systems is an electromagnetic pulse (EMP) attack, which can result from nuclear explosions or EMP bombs. North Korea's ongoing nuclear advancements and EMP bomb capabilities pose a critical threat, necessitating South Korea's preparedness for such attacks to ensure the effective operation of its ICT-based military systems. Despite this urgency, the South Korean military currently lacks comprehensive standards for EMP protection, relying only on the design criteria for EMP protection facilities for buildings. This gap highlights the absence of sufficient legal and regulatory measures and the lack of focused research to develop EMP protection performance standards for safeguarding military systems. Therefore, this paper aims to analyze existing EMP protection performance standards and relevant laws and regulations. It proposes improvements and establishes necessary standards to enhance the EMP resilience of military facilities and equipment.

A study on the classification systems of domestic security fields (국내 보안 분야의 분류 체계에 관한 연구)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.81-88
    • /
    • 2015
  • Recently the Security fields is emerged as a important issue in the world, While a variety of techniques such as a Cloud Computing or a Internet Of Things appeared. In these circumstances, The domestic security fields are divided into the Information Security, the Physical Security and the Convergence Security. and among these security fields, Convergence security is attracted much attention from various industries. the classification systems of a new field Convergence Security has become a very important criteria such about the Statistics calculation, the Analysis of status industry sector and the Road maps. However, In the domestic, The related institutions classified each other differently the Convergence Security Classification. so it is urgently needed a domestic security fields systematic classification due to the problems such as lack of reliability of the accuracy, compatibility of a data. Therefore, this paper will be analyzed to the characteristics of the domestic security classification systems by the cases. and will be proposed the newly improved classification system, to be possible to addition or deletion of an classification entries, and to be easy expanded according to the new technology trends. this proposed to classification system is expected to be utilized as a basis for the construct of a domestic security classification system in a future.

A Study on Enhancing Cybersecurity of Weapon Systems for Life-Cycle (무기체계 수명주기 간 사이버보안 적용 개선방안)

  • Jung, Yong-Tae;Jung, Hyun-Sik;Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.67-75
    • /
    • 2019
  • Recently, the Ministry of National Defense has included embedded software for weapon systems as targets for the Defense cyber security. The Concept has been extended and evolved from the cyber security area that was previously limited to the information domain. The software is becoming increasingly important in weapon systems, and it is clear that they are subject to cyber threats. Therefore, We would like to suggest a improvement direction by diagnosing problems in terms of cyber security of the weapon systems for the life cycle. In order to improve cyber security of weapon systems, comprehensive policy including the weapon embedded software management should be established and the involved stakeholder should be participated in the activities.

Systematic Review of Upper Extremity Movement Assessment and Artificial Intelligence Convergence Research in Brain Injured Patients (뇌손상 환자의 상지 움직임 평가와 인공지능 융합연구에 관한 체계적 고찰)

  • Park, Sun Ha;Park, Hae Yean
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.109-118
    • /
    • 2022
  • The purpose of this study is to identify trends in the application of artificial intelligence by analyzing upper extremity movement assessment and artificial intelligence convergence research using a systematic literature review method. The research was conducted using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines. Among the 380 articles searched in three databases, 8 articles were finally selected according to the selection and exclusion criteria. For the evaluation of upper extremity movement, motion performance evaluation, FMA, and ARAT were used. For quantification, data were extracted using various tools, and upper extremity movement classification, recovery prognosis prediction, and evaluation tool score were predicted using artificial intelligence. This study is meaningful in that it systematically reviewed studies that objectively evaluated upper extremity movement using artificial intelligence and identified the direction in which artificial intelligence is being applied. Based on this, the introduction of artificial intelligence technology in the assessment of upper extremity movements is expected to help objectively identify the intervention effect and the patient's recovery.

미래 지식정보사회의 정보보호 전략 프레임워크

  • Hwang, Jung-Yeon
    • Information and Communications Magazine
    • /
    • v.26 no.1
    • /
    • pp.31-37
    • /
    • 2009
  • 우리나라는 세계 최고 수준의 IT 인프라를 기반으로 네트워크 및 서비스 융합, RFID 등 u-IT 서비스 확산 등을 통해 유비쿼터스 사회로 빠르게 진입하고 있다. 향후 디지털 융합이 가속화됨에 따라 시간과 공간의 제약 없이 원하는 정보의 획득 활용이 증가하고, u-Health, u-learning 등 IT가 타산업과 융합되면서 높은 부가가치를 창출할 것으로 전망 된다. 그러나 정보화의 급속한 진전에 따른 사회 전반의 편의성과 효율성이 향상하였으나, 해킹 바이러스, 개인정보 유출사고, 스팸 등 역기능으로 인한 피해도 확산되고 있다. 최근에는 네트워크 방어체계를 무력화시키는 지능화된 해킹, 대량의 고객정보 유출, 사회공학 기법을 활용한 피싱 등 이용자의 자산과 프라이버시를 침해하는 사이버범죄 증가 등으로 이용자자산과 권리 보호관점에서의 정보보호의 중요성이 부각되고 있다. 향후 시간과 장소에 상관없이 지식정보를 활용하여 편리하고 쾌적한 생활을 누리게 하는 지식정보사회는 예측 불가능한 위험이 곳곳에 산재한 정보위험사회로의 진입을 의미 할 수도 있다. 그러므로 미래사회에서 예상되는 위협을 예측하여 효과적으로 사전에 예방할 수 있는 체계를 마련하는 것은 안전하고 신뢰할 수 있는 지식정보사회를 향유하기 위한 전제조건으로 작용한다. 이에 본고에서는 미래 지식정보사회에 대비한 정보보호 전략으로 안전한 u-사회 청사진 설계 및 환경조성 선도와 국제화, 사이버위협 예방 및 대응체계의 입체적 조화와 융합, 정보보호 기술 제품 산업간 선순환 촉진과 성장 등 3대 전략을 설정하고 실행방안을 제시한다.

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service (융합형 u-헬스케어 서비스에서 헬스 정보 교환을 위한 키 트리 기반 관리 체계 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.81-86
    • /
    • 2015
  • The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.

정보 융합체계 현황 분석(3)

  • Jo, Dong-Rae;Choe, Jeung-Won;Ju, Jae-U
    • Defense and Technology
    • /
    • no.2 s.276
    • /
    • pp.50-57
    • /
    • 2002
  • 정보 융합은 특정한 기술이 아니라 일반적인 개념이다. 즉 특정한 사건에 대해 다양한 경로와 수단으로 획득한 다수의 불완전한 데이터들을 적절히 처리하여 사용자가 필요로 하는 보다 완전한 데이터를 만드는 과정이라고 할 수 있다. 정보융합에 대한 연구는 80년대 초반에 시작되었지만, 80년대 중반에 정보융합에 대한 모델이 정립되면서 미국과 유럽의 국방과 관련된 기관을 중심으로 정보융합 프로젝트에 참여하며너 비로소 본격적인 연구가 시작되었다.

  • PDF

The Technical Trend and Prospect of Platform Integration for Smart Grid System (스마트 그리드 환경의 통합 플랫폼 구현을 위한 기술현황 및 전망)

  • Choi, Seung-Hwan;Oh, Do-Eun;Kim, Young-Il;Kim, Young-Jun;Kang, Shin-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1977-1978
    • /
    • 2011
  • 스마트그리드는 기존의 전력망에 정보통신 기술을 융합하여 공급자와 소비자가 양방향으로 실시간 전력 정보를 교환함으로써 에너지 효율을 최적화 하고자 하는 차세대 전력망이다. 기존의 공급자 중심의 일방향성, 폐쇄성, 획일적인 전력망에서 수요자 중심의 양방향성, 개방성을 특징으로 하며 다양한 서비스를 제공하게 된다. 스마트그리드의 운영환경에서의 비즈니스 모델에 따라 기존 서비스 플랫폼과 신규 서비스 플랫폼을 융합할 수 있는 정보통합 체계가 구축되어야 한다. 또한 이종 플랫폼을 융합할 수 있는 적응 모듈이 체계적으로 설계되어야 하며, 이종 체계간 상호운용성 확보는 필수사항이다. 한편 우리나라는 기후변화 등 범 세계적인 이슈에 대응하기 위하여 저탄소 녹색성장, 에너지 효율향상 및 신성장 동력 창출을 위하여 국가 전략 로드맵을 수립하고 국가 단위의 실증사업을 통한 선제적 대응에 총력을 다하고 있다. 실제로 국가 로드맵과 실증사업은 지능형 전력망, 지능형 소비자, 지능형 운송, 지능형 신재생, 지능형 전력서비스의 5개 분야의 응용서비스 영역 기반으로 나누어져 각각의 서비스 플랫폼 구조를 가지고 있으며, 이에 대한 스마트그리드 플랫폼 통합 체계 기술은 스마트그리드의 핵심 기술이다.

  • PDF

A Study on Evaluation System based on Characteristics of BcN (BcN 특성 관점의 평가체계 개발에 관한 연구)

  • Na, Yun-Ji;Ko, Il-Seok;Cho, Young-Suk
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.49-58
    • /
    • 2006
  • Currently there are many standards of network management. They are : SNMP (Simple Network Management Protocol-for Internet management), CMIP (Common Management Information Protocol-standardized by ITU-T and ISO), RMON (Remote network MONitoring-for distributed management of the LAN segment), and so on. Especially RMON has created the many concerns in order to manage subnetworks of a large network, but it has negative aspects. For instance, routers or hubs with RMON capability are expensive to a network manager because of adding heavy management cost. Moreover it imposes a heavier burden on network manager, because it must use a network management tool which will be additionally needed with RMON device. This paper proposes a model of PC based RMON Agent system. The RMON Agent system monitors the traffic on LAN segment through the use of a Virtual Device Driver (VxD), based on PC. In term of cost this model will replace the expensive RMON device, and eventually enable a network manager to manage LAN segment more efficiently, due to reduced cost.

  • PDF