• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.029 seconds

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

A Study of Today's Concept and Application of the Principle of the Provenance in Archives management (출처주의의 새로운 경향과 적용에 관한 연구)

  • Bang, Hyo-Soon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.2 no.2
    • /
    • pp.69-92
    • /
    • 2002
  • The objective of this study is to examine the re cent trend of the interpretation of the Principle of the Provenance in today s new environment of Archives Management and to identify the effective way of the application of the Principle of Provenance to Archives Management. Because of the continued change and the flexibility of the administrative organization and the development of information network, the traditional concept of the Principle of Provenance which put emphasis on a single creator and the physical entity of the archives has been gradually modified to a rather conceptual, abstract and realistic one. A method to apply the recent concept of the Principle of Provenance is to separate the descriptions of the record entity, the creators and the context and use the organic linkage of the separated description areas. Also we can control the provenance from the current stage or even from the pre-current stage by utilizing the classification scheme and the retention schedule. In case of the electronic records, we can manage the provenance and the context by using metadata inherent in the computerized information system. Above all it is critical that we need to structure and control the provenance by building the Korean rules for archival description corresponding to the international standards. And it is another an essential point that we have to develop a guideline for constructing the fond and maintaining its consistency.

The Issues of Digital Copying and Application of Fair Use in the Network Environment (네트워크 환경에서의 디지털복제와 공정사용 법리 적용의 문제점)

  • Hong Jae-Hyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.4
    • /
    • pp.139-164
    • /
    • 1997
  • The digital copying and digital transmission are rapidily Increasing with the innovation of information technology and the development of networking technology. But It Is Inevitable to limit copyright for the public benefit and cultural development In the digital environment in like manner with the analog environment. First, this study examinated the international trends and legulations relating to the copyright limitations In the U.S. and Japan for the fair use. Second, it dealed with the problems of the digital copying relating to the temporary storage In RAM and screen display that are recently becoming international issues. Third, it concretely explored and analyzed the problems according to the application of the fall use of the private copying, the library copying, and the copying for the purpose of school education in the network environment. In conclusion, to solve these problems that Is occurred from legulations In the analog environment Is needed the revision of the existing copyright law in Korea. Finally, this study suggested 'the copyright collecive management system' and 'the private copying levy system' as the systemic devices to control the digital private copying.

  • PDF

Research Technology Evolution of UAV(Unmanned Aerial Vehicle) and to Prospect Promising Technology (무인항공기 기술진화 탐색 및 유망기술 발굴 연구)

  • Joo, Seong-Hyeon
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.6
    • /
    • pp.80-89
    • /
    • 2019
  • Prospecting future social environmental changes and improvement research on future technologies is required for prospecting promising technology, as it would be useful for institution·company to set up technical planning. This study aims at providing a methodology for retaining international technology competitiveness, marketable industry, and sustainable promising technology in a field of new growth engine industry such as national unmanned aerial vehicle industry. We draw a result by analysing with tools such as KrKwic, Excel, NetMiner, presenting methods of a Social Network Analysis, sub-group analysis, and cognitive map analysis based on patent data in a field of unmanned aerial vehicle industry. Therefore, this study explored the technology evolution of UAV and to prospect promising technology. As a result, some future promising technologies are prospected as what worths concentrated investment, such as 'system integration tech', 'assessment/airworthiness certification tech', 'avionics', 'pilot control tech', 'identification of friend or foe', 'flight control tech', 'supportive equipment'.

Implementation of Multilateral Control System for Small UAV Control-Focused on Design (소형 무인기 통제를 위한 다자간 방식 관제시스템 구축방안-설계 중심으로)

  • Choi, Hyun-Taek;Kim, Seok-Kwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.6 no.4
    • /
    • pp.65-71
    • /
    • 2017
  • In this paper, we propose a design method for the construction of LTE-based small unmanned aerial vehicle control system to quickly and reliably collect multiple small unmanned aerial vehicle position information simultaneously flying all over the country. In particular, the main requirements are the network (N/W), hardware (H/ W), software(SW), Database(DB), development architecture, and business needs. To satisfy these requirements, N/W, H/W, SW, DB design, and architectural design plan were suggested regarding the design requirements of a small UAV system. To effectively control the small unmanned multi-party system in the system design, the architecture is divided into the front-end service area and the back-end service area according to the function and role of the unit system. In the front-end service area that grasps and controls the position and state of small unmanned aerial vehicles (UAVs), we have studied the design part that can be expanded to N through TCP/IP network by applying Client PC method.

A Study on the Factors Influencing Social Network Game(SNG) Addiction (소셜 네트워크 게임(Social Network Game) 중독에 영향을 미치는 요인에 관한 실증연구)

  • Yin, Jin Lian;Kim, Sanghyun;Kim, Geuna
    • International Commerce and Information Review
    • /
    • v.17 no.3
    • /
    • pp.29-57
    • /
    • 2015
  • The purpose of this study is to find the factors of Social Network Games of continuous game flow and addiction. This study analyzes the significant factors of the addiction of SNGs from three categories. It also seeks to find out what relation between continuous game flow and addiction in SNGs. The model consists of three categories (SNG characteristic, User characteristic, and Environmental characteristic). The research model was conducted through the structural equation modeling(SEM) approach, and tested using 374 questionnaires. The results indicated that SNG characteristic(accessibility, enjoyment, feedback), User characteristic(self-control), Environmental characteristic(social interaction, subjective norm) have a positive effect on continuous game flow. The findings also that continuous game flow plays a moderation role that affects addiction. Finally, we discussed the research results and offered relevant suggestions for schools, firms, and future studies

  • PDF

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.