• Title/Summary/Keyword: 융합체계

Search Result 2,030, Processing Time 0.029 seconds

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

A Study on Service Classification System for Urban Intelligent Geospatial Information (지능형 도시공간정보 서비스 분류체계에 관한 연구)

  • Kim, Eun-Hyung
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2010.09a
    • /
    • pp.277-282
    • /
    • 2010
  • IT를 매개로 서로 다른 분야의 기술들이 상호 융합되어 새로운 서비스 또는 기술을 제공하는 유비쿼터스 패러다임은 도시에 대한 새로운 시각을 제공하고 있다. u-City는 첨단 정보통신 인프라와 유비쿼터스 정보서비스를 도시공간에 융합하여 도시생활의 편의 증대와 삶의 질 향상, 체계적 도시관리에 의한 안전보장과 시민복지 향상, 신산업 창출 등 도시의 제반기능을 혁신시킬 수 있는 차세대 정보화 도시를 의미한다. 성공적인 u-City 건설을 위해서 기존의 지자체GIS 개념을 확대한 지능형 도시공간정보의 개념이 필요하며, 지능형 도시공간정보를 효율적으로 제공하기 위한 서비스가 요구된다. 이러한 지능형 도시공간정보 서비스는 도시 전반의 영역에서 제시될 수 있으므로 다양한 서비스를 도출할 수 있다. 이에 본 연구에서는 지능형 도시공간정보의 개념을 살펴보고, 기존 u-City 관련 서비스 분류에 관한 선행 연구내용을 중심으로 지능형 도시공간정보 서비스 분류체계를 제시였다.

  • PDF

An exploratory study for designing research security framework (연구보안 관리체계 설계를 위한 탐색적 연구)

  • Na, Onechul;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.55-62
    • /
    • 2016
  • Recently, research outcome is frequently leaked in the process of progressing domestic R&D. Security system such as research security law and manual is implemented to prepare these leakage. However piecemeal solutions, simply technological measures, have a limit. Consequently, this study organizes a integrated research security framework by designing multidimensional security measures based on the R&D life cycle perspective. Concretely, this study constructs various control items predicated on law, moreover reviews the applicability of research security assessment items.

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.

A Study on Defense Information Security Management Structure for Digital Information Warfare (디지털 정보전에 대비한 국방정보보호업무 관리구조에 관한 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.57-63
    • /
    • 2008
  • The purpose of the research is to intended to help Korean military officers establish information system security structure. Information security is a critical issue for digital information warfare. Advanced countries such as U.S. and Japan have developed a new military security strategy for future information warfare. The readiness of Korean Army, however, is far behind those countries. This paper provides a systematic information security structure for Korean Army, which is a result of the research through a group decision making process.

  • PDF

A Study on the Inertial Navigation System Technology (관성항법장치 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.87-94
    • /
    • 2008
  • In this paper, a study on the inertial navigation system technology in guided weapon system development. Navigation devices are being used more commonly in places. Inertial navigation devices attached to them are used as weapons systems have a lot of interest in the development of devices for research and development accelerated. Therefore, this paper will encourage the development of weapon systems Inertial navigation device trends, features and configuration, type, techniques for research work.

  • PDF

A Study on Development of Multi-level Security Architecture(MLSA) (Multi-level 보안 아키텍처(MLSA) 구축 방안)

  • Choi, Kyong-Ho;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.107-114
    • /
    • 2007
  • We need development methodology of security architecture which offered various levels of security management in case of the organization required more than two security certifications. In this study, therefore, development methodology of Multi-level Security Architecture(MLSA) proposed. Specifically, we should consider factors of commonness and difference between information security management level evaluation of multiple security architecture. This kinds of endeavor can suggest the direction of the improvement of the evaluating security management and the dynamic plan for the security architecture, and it will make the continuous and systematic security management.

  • PDF

Document Schema for the CC-based evaluation of information technology security system (정보보호 시스템의 CC기반 평가를 위한 문서 스키마)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.45-52
    • /
    • 2012
  • CC does not Contain detailed instructions about evaluation document. So, we must develop document schema to make CC-based evaluation system. In this report, we developed document schema that can be used in CC-based evaluation system. We devloped document schema and DTD that applying Weakest precondition function, reduction rules about amount of document and dependancy analysis document from assurance class within CC. Approach of this study can be applied to develop document and DTD that can be used in evaluation system of software quality.

A Method for Deriving a Security Threat Response System in Smart Factory Area and Layer (스마트팩토리 영역 및 계층별 보안위협 대응체계 도출 기법)

  • In-Su Jung;Deuk-Hun Kim;Jin Kwak
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.187-189
    • /
    • 2023
  • IoT(Internet of Things), 빅데이터, AI(Artificial Intelligence), 클라우드와 같은 ICT(Information and Communications Technology) 기술이 발전함에 따라 ICT와 제조기술이 융합된 스마트팩토리가 발전하고 있다. 이는 2개의 영역과 5개의 계층으로 구성되어 기타 환경들과 상이한 구조를 가지고 있으며, 각 영역·계층별 발생 가능한 보안위협도 상이하다. 또한, 각 영역과 계층이 연결됨에 따라 발생 가능한 보안위협이 증가하고 있으며, 이에 대한 효율적인 대응을 위하여 스마트팩토리 영역·계층별 환경을 고려한 대응체계 마련이 필요한 실정이다. 따라서, 본 논문에서는 스마트팩토리 영역·계층별 발생 가능한 보안위협을 분석하고, 이에 대응하기 위한 대응체계 도출 기법을 제안한다.

The Ecological Variables Research on the Effect of Teacher's Happiness in Child Care Center (보육교사의 행복에 영향을 미치는 생태체계변인 연구)

  • Lee, Soon-Mi
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.423-430
    • /
    • 2017
  • The purpose of research is analyzing the ecological variables on the effect of child care teacher's happiness. The data was collected by the survey of the happiness factors and ecological variables of child care teachers. The results are listed below. First, of organismic variable, the age and the educational background of child care teacher showed discrimination one's happiness. Second, of micro system variable, the marital status is the only thing that affect the happiness. Third, of meso system variable, the teachers who are highly interact on each other such as, child to teacher and parents to teacher are much happier than others. Finally, of the outside system variable, the teachers who are working at the better working environment and good quality of duty are much happier than others.