• Title/Summary/Keyword: Defense Technology Protection

Search Result 114, Processing Time 0.027 seconds

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

On Enhanced e-Government Security - Network Forensics

  • Wei, Ren
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.173-184
    • /
    • 2004
  • E-Government security is crucial to the development of e-government. Due to the complexity and characteristics of e-government security, the viable current approaches for security focus on preventing the network intrusion or misusing in advanced and seldom concern of the forensics data attaining for the investigation after the network attack or fraud. We discuss the method for resolving the problem of the e-government security from the different side of view - network forensics approaches? from the thinking of the active protection or defense for the e-government security, which can also improve the ability of emergence response and incident investigation for e-government security.

  • PDF

In-vitro Tests of Topical Skin Protectants using a Flow-Through Diffusion Cell System Containing Excised Hairless Mouse Skin (생체 피부조직을 이용한 피부보호제 in-vitro 시험평가)

  • Lee, Eun Young;Choi, Hoo Kyun;Kim, Sang Woong;Seo, Dong Sung;Joe, Hae Eun;Yu, Chi Ho;Kim, Chang Hwan;Cho, Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.434-442
    • /
    • 2022
  • Highly toxic chemical warfare agents(CWA) could be used in chemical warfare and terrorism. The protection of skin is crucial for civilians and soldiers, because the primary routes of exposure to CWA are inhalation and skin absorption. Thus, topical skin protectants(TSP) have been studied and developed in many countries to complement protective equipments. In this study, in-vitro test procedure was optimized and established using a flow-through diffusion cell system containing excised hairless mouse skin in an attempt to assess the effectiveness of various TSP formulations against nerve agent simulants. In addition, the test results on the formulations including the ingredients used in SERPACWA(Skin Exposure Reduction Paste Against Chemical Warfare Agent) and IB-1(TSP of Israel) were included, indicating that the formulations with perfluorinated compounds were more effective than the glycerin-based formulations.

Design and Fabrication of CLYC-Based Rotational Modulation Collimator (RMC) System for Gamma-Ray/Neutron Dual-Particle Imager

  • Kim, Hyun Suk;Lee, Jooyub;Choi, Sanghun;Bang, Young-bong;Ye, Sung-Joon;Kim, Geehyun
    • Journal of Radiation Protection and Research
    • /
    • v.46 no.3
    • /
    • pp.112-119
    • /
    • 2021
  • Background: This work aims to develop a new imaging system based on a pulse shape discrimination-capable Cs2LiYCl6:Ce (CLYC) scintillation detector combined with the rotational modulation collimator (RMC) technique for dual-particle imaging. Materials and Methods: In this study, a CLYC-based RMC system was designed based on Monte Carlo simulations, and a prototype was fabricated. Therein, a rotation control system was developed to rotate the RMC unit precisely, and a graphical user interface-based software was also developed to operate the data acquisition with RMC rotation. The RMC system was developed to allow combining various types of collimator masks and detectors interchangeably, making the imaging system more versatile for various applications and conditions. Results and Discussion: Operational performance of the fabricated system was studied by checking the accuracy and precision of the collimator rotation and obtaining modulation patterns from a gamma-ray source repeatedly. Conclusion: The prototype RMC system showed reliability in its mechanical properties and reproducibility in the acquisition of modulation patterns, and it will be further investigated for its dual-particle imaging capability with various complex radioactive source conditions.

Numerical Analysis on Penetration Reduction of a WHA Penetrator by an Impact of Linear Explosively Formed Penetrator(LEFP) (선형폭발성형탄(LEFP) 충격에 의한 WHA 관통자의 관통성능 감소에 관한 수치해석 연구)

  • Joo, Jaehyun;Choi, Joonhong;Koo, ManHoi;Kim, Dongkyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.384-392
    • /
    • 2017
  • A linear explosively formed penetrator(LEFP) is a modification of the explosively formed penetrator(EFP). An EFP is axisymmetric and has a dish-shaped liner while LEFP has a rectangular-shaped liner with curved cross section. Upon detonating LEFP forms laterally wide projectile like blade, leaving a long penetration hole on the target. On the other hand, a long-rod tungsten heavy alloy(WHA) penetrator is one of the major threats against most of the ground armored vehicles. In this paper, the feasibility of using an LEFP in protecting against a long-rod WHA penetrator by colliding LEFP into the threat was investigated through a set of numerical simulations. In this study, a scale-down WHA penetrator with length to diameter ratio(L/D) of 10.7 and 7.0 mm diameter was used to represent a long-rod WHA penetrator. LS-DYNA and Multi-Material ALE technique were employed for the simulation. For estimation of the protection effect by LEFP, residual penetration depths into RHA by the threat were compared according to various impact locations against the threat.

Design of Lightning Induced Transient Protection Circuit for Avionics Equipment Considering Parasitic Inductance (기생 인덕턴스를 고려한 항공기 탑재장비의 간접낙뢰 보호회로 설계)

  • Sim, Yong-gi;Cho, Seong-jin;Kim, Sung-hun;Park, Jun-hyun;Han, Jong-pyo
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.5
    • /
    • pp.459-465
    • /
    • 2017
  • In this paper, we introduce the design consideration of the lightning induced transient protection circuit for the indirect lightning strike on the avionics equipment. The lightning induced surge voltage, which is so-called as indirect effects of lightning, may cause a functional failure or physical damage to the electrical and electronic equipment of aircraft. In order to protect the electrical and electronic equipment of aircraft from the indirect effects of lightning, we should analyze the effect of lightning strike on aircraft and consider applying protection design for each avionics device. However, lightning induced transient protection circuits can have unintended consequences because parasitic inductance elements are exist in PCB and TVS diodes. In this paper, we introduce the design method of the protection circuit considering the parasitic inductance of the protection circuit. In addition, we show the result of verification test performed to validate the protection circuits for indirect effects of lightning.

Review of the Revised 2019 Trade Secret Protection Act and Industrial Technology Protection Act : Focusing on Civil and Criminal Remedies (2019년 개정 영업비밀보호법 및 산업기술보호법에 대한 검토: 민·형사적 구제를 중심으로)

  • Cho, Yongsun
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.333-352
    • /
    • 2019
  • In January and August 2019, there were amendments to the Unfair Competition and Trade Secrets Protection Act (UCPA) and the Industrial Technology Protection Act(ITPA). These amendments will contribute to technology protection. But these amendments need to be supplemented further. In the area of civil remedies, despite the introduction of treble damages in the case of the UCPA and ITPA, the provisions related to the submission of supporting data have not been maintained. Therefore, it is necessary to recognize the claim of the other party as true if it is maintained at the level of the revised Patent Act and the scope of submission of supporting data. And the enforcement of the case of compulsory submission for the calculation of damages, and the order of filing documents are not followed. ITPA, on the other hand, has introduced the compensation for damages, but there is no provision for estimating the amount of damages. Therefore, it is necessary to estimate the amount of lost profits, profits, and royalties. In the area of criminal remedies, both the UCPA and ITPA have raised the penalty, but the sentencing regulations are not maintained. In addition, although the recent outflow of technology has expanded beyond organizational deviations to organizational outflows, amendments need to be made in relation to the serious consequence for the punishment of related juristic persons, such as companies involved in it. It should be noted that Japan and the United States have corporate regulations and regulations. In addition, in relation to the confiscation system, Act on Regulation and Punishment of criminal proceeds concealment require that domestic defenses be confiscated by defense industry technology, while trade secrets and industrial technologies are confiscated only by "foreign" outflows, and an amendment is necessary.

A Authentication technique of Internal Information Hacking Protection based on H/W Information (H/W 정보의 인증을 통한 내부정보유출 방지 기법)

  • Yang, Sun Ok;Choi, Nak Gui;Park, Jae Pyo;Choi, Hyung Il
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.

A Study on Foothold Mountain Fortress in Gyeongsang-do the Late Chosun Daynasty - Focussing on Geumo·Cheonseng·Gasan Mountain Fortress - (조선후기 경상도의 거점 산성 연구 - 금오·천생·가산산성을 중심으로 -)

  • Kim, Chan-Yeong;Kwak, Dong-Yeob
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.11
    • /
    • pp.135-144
    • /
    • 2018
  • During the Late Joseon dynasty, abandoned mountain fortresses were urgently repaired for the operation of foothold mountain fortresses in Gyeongsang-do, during the Japanese Invasion of Korea in 1592 and immediately after the Qing Invasion of Korea in 1636. Immediately after the Qing Invasion of Korea, an external fortress wall was built and added to each of Cheonsaeng Fortress and Geumo Fortress to establish a system of protecting locals inside a fortress at important locations for border defense against Japan in the Yeongnam region. Cheonseng Fortress, however, did not have sufficient geographical and protection conditions as a mountain fortress for protecting people inside it; thus, Gasan Fortress was newly built to replace Cheonsaeng Fortress. Geumo and Gasan Fortresses were used in border defense against Japan during the period from King Injo's reign to the end of Joseon Dynasty, because the fortresses served the purpose of defending Nakdonggang River and middle roads located at important roads along the border in the Yeongnam region and because it was possible to quickly repair and use their existing fortress walls and internal facilities, such as middle fortress walls and ponds, that were constructed for long-term protection of locals inside the fortress. In addition, it was found, in this study, that a continuous discussion on how to supplement fortresses led to the reinforcement and improvement of fortress facilities and fortification technology through the application of major strengths of Chinese (Ming) and Japanese fortress systems.

Effect of Ventilation on Heat Stress in the System of Short-Sleeve T-Shirt-Combat Uniform-Chemical, Biological, and Radioactive Protective Clothing (반팔 내의-전투복-화생방보호의 시스템에서 환기가 열적 스트레스에 미치는 영향)

  • Lee, Okkyung;Eom, Rani;Jung, Heesoo;Cho, Kyeong Min;Lee, Yejin
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.46 no.5
    • /
    • pp.836-847
    • /
    • 2022
  • This study establishes basic data for the development of a new Chemical, Biological, and Radioactive (CBR) protective clothing by selecting the ventilation position to optimize thermal comfort on the basis of the opening and closing of each part. Participants were eight men in their 20s who had previously worn CBR protective clothing. After vigorous exercise and perspiration, the microclimate of the clothing and skin temperature was measured. Results revealed that when the ventilation zipper was opened after exercising, the skin and clothing microclimate temperatures, which had increased during the exercise, decreased in the chest and shoulder blade regions. The clothing microclimate humidity decreased in the chest area. The change was greatest in the chest region; the skin temperature decreased by 0.2℃, the clothing microclimate temperature by 2.7℃, and the clothing microclimate humidity by 3.2%RH through ventilation. Thus, the opening that allows the exchange of accumulated heat and moisture while wearing the CBR protective clothing is efficient.