• Title/Summary/Keyword: Defense Project Management

Search Result 124, Processing Time 0.022 seconds

Estimation of low impact development duration of estuaries at urban area (도시 유역에 위치한 하구를 구성하는 하천의 저영향 개발 기간 산정)

  • Jeong, Anchul;Lim, Jeongcheol;Kim, Songhyun;Baek, Chungyeol
    • Journal of Wetlands Research
    • /
    • v.21 no.4
    • /
    • pp.290-297
    • /
    • 2019
  • The estuary is a transition zone where fresh water and salt water meet because the stream is connected to the open sea area. So estuaries have very high biodiversity and form a unique ecosystem. However, before the recognition of the ecological value of the estuaries, various damage and disturbances have been occurred so countermeasures are needed. The river master plan is acting as a disturbance factor. However, the river master plan has the public object such as water disaster defense, river function improvement, and national water resources management. Therefore, it is necessary to study the ways in which the opposite relationship of development and ecosystem protection coexist. In this study, the concept of environmental windows were used to estimate the low impact development duration. We expected that proposed method for low impact development duration estimation can be used as a basis and basic data to protected the ecosystem from development project and disturbance in the future.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

A Study on the Necessity of Verification about depot level maintenance plan through the Weapons System cases analysis (무기체계 사례 분석을 통한 창정비개발계획안 검증 필요성 연구)

  • Ahn, Jung-Jun;Kim, Su-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.76-82
    • /
    • 2019
  • This study has done to search for a solution to remove risk limitedly caused by separating weapon system acquisition from operation and maintenance at the view point of Logistic Commander who's responsible for stable operation and maintenance after acquiring weapon system. At the System development stage, unverified overhaul development plan may cause additional manpower and costs after the development, and furthermore it is likely to have risk to lower reliability of the military. Thus, research and development agency should write overhaul development plan at the System development stage, and it should be verified through evaluation and verification test. Secondly, during research and development, institutional supplementation is needed to calculate human and material resources writing overhaul development plan. Thirdly, it should be able to analyze proper operation & maintenance plan and cost for overhaul plan at the pre-investigation stage. Fourthly, the base which can develop overhaul concept and overhaul factors should be included in the need and need determination document. Lastly, for the weapon system which has small amount of high power figure, project management should be performed to be able to specify at the each acquisition level of weapon system to realize Article 28, clause 3 and 4 of Defense business law.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.