• Title/Summary/Keyword: Government Cloud

Search Result 139, Processing Time 0.021 seconds

A Study on the Metadata Schema for the Collection of Sensor Data in Weapon Systems (무기체계 CBM+ 적용 및 확대를 위한 무기체계 센서데이터 수집용 메타데이터 스키마 연구)

  • Jinyoung Kim;Hyoung-seop Shim;Jiseong Son;Yun-Young Hwang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.161-169
    • /
    • 2023
  • Due to the Fourth Industrial Revolution, innovation in various technologies such as artificial intelligence (AI), big data (Big Data), and cloud (Cloud) is accelerating, and data is considered an important asset. With the innovation of these technologies, various efforts are being made to lead technological innovation in the field of defense science and technology. In Korea, the government also announced the "Defense Innovation 4.0 Plan," which consists of five key points and 16 tasks to foster advanced science and technology forces in March 2023. The plan also includes the establishment of a Condition-Based Maintenance system (CBM+) to improve the operability and availability of weapons systems and reduce defense costs. Condition Based Maintenance (CBM) aims to secure the reliability and availability of the weapon system and analyze changes in equipment's state information to identify them as signs of failure and defects, and CBM+ is a concept that adds Remaining Useful Life prediction technology to the existing CBM concept [1]. In order to establish a CBM+ system for the weapon system, sensors are installed and sensor data are required to obtain condition information of the weapon system. In this paper, we propose a sensor data metadata schema to efficiently and effectively manage sensor data collected from sensors installed in various weapons systems.

Analysis of ICT Converged Smart Factory and its Driving Strategy (ICT 융합 스마트공장의 분석 및 추진전략)

  • Moon, Seung Hyeog
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.235-240
    • /
    • 2018
  • ICT converged smart factory started from German Industry 4.0 has been the driving force for the $4^{th}$ Industrial Revolution and the center of manufacturing innovation for major industrial countries. It will be developed according to industry characteristics of each country. Korea is relatively later than other competing countries in the smart factory area. So, the government is establishing related policy and tendering all sorts of supports for smart factory mainly to the small and medium-sized enterprises to spread over the manufacturing industry. It is necessary for government to categorize among similar manufacturing industry and make them share digitalized production information mutually. It will be more effective method for securing global competitiveness than the uniform support. Also, large companies need to establish cloud based production forecasting system over similar industry and share it with other companies rather than expansion of individual smart factory. Mutual development in the manufacturing industry will be realized when the small and medium-sized enterprises and large companies take part in the cooperating ground of smart factory.

Operational Big Data Analytics platform for Smart Factory (스마트팩토리를 위한 운영빅데이터 분석 플랫폼)

  • Bae, Hyerim;Park, Sanghyuck;Choi, Yulim;Joo, Byeongjun;Sutrisnowati, Riska Asriana;Pulshashi, Iq Reviessay;Putra, Ahmad Dzulfikar Adi;Adi, Taufik Nur;Lee, Sanghwa;Won, Seokrae
    • The Journal of Bigdata
    • /
    • v.1 no.2
    • /
    • pp.9-19
    • /
    • 2016
  • Since ICT convergence became a major issue, German government has carried forward a policy 'Industry 4.0' that triggered ICT convergence with manufacturing. Now this trend gets into our stride. From this facts, we can expect great leap up to quality perfection in low cost. Recently Korean government also enforces policy with 'Manufacturing 3.0' for upgrading Korean manufacturing industry with being accelerated by many related technologies. We, in the paper, developed a custom-made operational big data analysis platform for the implementation of operational intelligence to improve industry capability. Our platform is designed based on spring framework and web. In addition, HDFS and spark architectures helps our system analyze massive data on the field with streamed data processed by process mining algorithm. Extracted knowledge from data will support enhancement of manufacturing performance.

  • PDF

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

The Dynamic Effects of China's Agricultural Technology Progress and Agricultural Environment Grants on Agricultural Development - Focusing on 3 Dongbei Province in China - (중국의 농업기술진보와 농업환경보조금이 농업발전에 미치는 동태적 파급효과 - 동북 3성을 중심으로 -)

  • Jin, Lin;Mun, Hong Sung
    • Journal of Korean Society of Rural Planning
    • /
    • v.26 no.3
    • /
    • pp.57-65
    • /
    • 2020
  • Agricultural research and development (R&D) investment has contributed not only to agriculture but also to the overall economic growth of the country. The recent arrival of the fourth industrial revolution has raised the need for agricultural R&D as a preparation. Agriculture R&D is directly related to the fourth industrial revolution in the agricultural and livestock sectors that utilize big data, robots, artificial intelligence and cloud. Meanwhile, subsidies or grants are considered the most widely used means of policy. Therefore, in light of the current situation in which Chinese agriculture values R&D investment, this study attempted to analyze the dynamic relationship between variables by establishing a model of agricultural environment subsidy representing the role of government, agricultural technology progress representing existing agricultural R&D investment, agricultural income representing agricultural development and total agricultural output. The analysis results showed that each variable's reaction to the rise in China's agricultural R&D investment has a positive effect on agricultural development, in line with the theory that the investment in science and technology in the agricultural sector has a positive effect. In addition, the response of each variable to China's rising agricultural environment subsidy is shown to have a positive relationship, which can also be said to be in line with the theory that the government's market-friendly intervention is beneficial to economic development.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

A Study on the Collaboration between Government Departments in the Fourth Industrial Revolution Era (4차산업혁명시대의 정부부처 간 협력에 관한 연구)

  • Lee, Sun Young;Cho, Kyung Ho;Park, Kwang Kook
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.35-42
    • /
    • 2019
  • This study was conducted to identify the determing factors of the success and constraints based on the perception of public officials preparing for the Fourth Industrial Revolution(4IR) and the collaboration among ministries. The analytic method performed an average value analysis based on the survey of public officials' awareness, and the results of the study are as follows. First, officials from nine ministries who are responsible for the 4IR recognized that they were regarded that the 4IR as a new opportunity, but if it failed to respond properly, there might be a crisis. Second, it recognizes the era of 4IR as the number one priority in big data, second in artificial intelligence and machine learning, and third in cloud computing technology. Third, they recognized that 'flexibility of the institutions' and 'recruitment of experts' were needed to prepare for the 4IR effectively.

Effective Risk Management Technique through OSINT and Cyber Threat Intelligence within the Enterprise (OSINT와 기업 내 사이버 위협 인텔리전스를 통한 효과적인 위험 대응 기법)

  • Kwangsuk Moon;Junbeom Hur
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.949-959
    • /
    • 2024
  • Recently, as enterprises utilize the cloud and artificial intelligence, it is becoming increasingly difficult to protect exposed interfaces with existing perimeter security methods. Accordingly, zero trust-based comprehensive risk management is becoming necessary. Most enterprises use vulnerability inspection and bug bounty (security vulnerability reporting system) as basic risk management methods, but it is difficult to effectively respond to unpredictable problems such as zero-day attacks or open source vulnerabilities with these methods alone. Therefore, in this paper, we propose a risk response technique for the entire enterprise that links external OSINT (open source information) and CTI of national government agencies to detect threats through CTI (cyber threat intelligence) and collects the enterprise's own CTI. As a result of comparing the method of threat detection and blocking that collects the enterprise's own CTI by configuring a honeypot for effective threat detection and links it to the CTI of an external government agency, the proposed technique showed a 65.8% higher performance improvement in detection accuracy and verified the effect of reducing the number of attackers in the organization through this method

The KALION Automated Aerosol Type Classification and Mass Concentration Calculation Algorithm (한반도 에어로졸 라이다 네트워크(KALION)의 에어로졸 유형 구분 및 질량 농도 산출 알고리즘)

  • Yeo, Huidong;Kim, Sang-Woo;Lee, Chulkyu;Kim, Dukhyeon;Kim, Byung-Gon;Kim, Sewon;Nam, Hyoung-Gu;Noh, Young Min;Park, Soojin;Park, Chan Bong;Seo, Kwangsuk;Choi, Jin-Young;Lee, Myong-In;Lee, Eun hye
    • Korean Journal of Remote Sensing
    • /
    • v.32 no.2
    • /
    • pp.119-131
    • /
    • 2016
  • Descriptions are provided of the automated aerosol-type classification and mass concentration calculation algorithm for real-time data processing and aerosol products in Korea Aerosol Lidar Observation Network (KALION, http://www.kalion.kr). The KALION algorithm provides aerosol-cloud classification and three aerosol types (clean continental, dust, and polluted continental/urban pollution aerosols). It also generates vertically resolved distributions of aerosol extinction coefficient and mass concentration. An extinction-to-backscatter ratio (lidar ratio) of 63.31 sr and aerosol mass extinction efficiency of $3.36m^2g^{-1}$ ($1.39m^2g^{-1}$ for dust), determined from co-located sky radiometer and $PM_{10}$ mass concentration measurements in Seoul from June 2006 to December 2015, are deployed in the algorithm. To assess the robustness of the algorithm, we investigate the pollution and dust events in Seoul on 28-30 March, 2015. The aerosol-type identification, especially for dust particles, is agreed with the official Asian dust report by Korean Meteorological Administration. The lidar-derived mass concentrations also well match with $PM_{10}$ mass concentrations. Mean bias difference between $PM_{10}$ and lidar-derived mass concentrations estimated from June 2006 to December 2015 in Seoul is about $3{\mu}g\;m^{-3}$. Lidar ratio and aerosol mass extinction efficiency for each aerosol types will be developed and implemented into the KALION algorithm. More products, such as ice and water-droplet cloud discrimination, cloud base height, and boundary layer height will be produced by the KALION algorithm.

A Case Study on Foreign Smart City (해외 스마트 시티 사례 연구)

  • Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.305-310
    • /
    • 2014
  • We called a current society the convergence generation. In information society, digital convergence means a service or new product which appeared through fusion of unit technologies in information and communication regions. The effects of convergence technologies and social phenomenons are visualized in overall regions of society such as economy, society, culture, etc. In 2011, The Government introduced "IT Convergence Technology Prediction Survey 2025". This report includes 10 ICT industries. In this paper, we described a smart city which was leading case in digital convergence and related with our life.