• Title/Summary/Keyword: Industrial Security Management

Search Result 595, Processing Time 0.023 seconds

Factor Analysis of the Defense Industry Environment affecting Defense Industry Company's Business Performance (방위산업체의 경영성과에 미치는 방위산업 환경의 영향요인분석)

  • Lee, Janghyong;Kim, Dong-Hwi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.9
    • /
    • pp.5534-5542
    • /
    • 2014
  • The defense industry plays a larger role than merely maintaining national security; it also has ripple effects in society, such as employment growth through increased domestic demand and advancement of industrial structures. In this study, the factors affecting the defense industry were divided into military support and government support. Previous research dealing with the correlation of management of the defense industry and each of these important factors was then investigated and analyzed. These results are believed to contribute to growth of the defense industry through building an environment that positively affects the defense industry's growth, profitability and productivity, and achieves higher business performance.

A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments (센서네트워크 환경에서 경량화된 키 교환 및 상호인증 라우팅 프로토콜)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung;Min, So-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7541-7548
    • /
    • 2015
  • Wireless Sensor Networks is the technology which is used in explore role for military purposes, as well as various fields such as industrial equipment management, process management, and leverage available technologies by distributing node into various areas. but there are some limitations about energy, processing power, and memory storage capacity in wireless sensor networks environment, because of tiny hardware, so various routing protocols are proposed to overcome it. however existing routing protocols are very vulnerable in the intercommunication, because they focus on energy efficiency, and they can't use existing encryption for it, Because of sensor's limitations such like processing power and memory. Therefore, this paper propose mutual authentication scheme that prevent various security threats by using mutual authentication techniques and, Key generation and updating system as taking into account energy efficiency.

Development of Multi-person remote collaboration system using WebRTC for fields adaptation (WebRTC를 이용한 현장 적응형 다자간 원격협업 시스템 개발)

  • Lee, Kwanhee;Kim, Ji-In;Kwon, Goo-Rak
    • Smart Media Journal
    • /
    • v.10 no.4
    • /
    • pp.9-14
    • /
    • 2021
  • In the case of the existing remote collaboration, the remote support service-oriented system is not suitable for the use of the field-oriented multi-person remote collaboration system. This paper is a remote collaboration system development for various industrial sites. We develop remote support and work management that faces the various needs of industrial sites, real-time video remote support between workers, and real-time voice work sharing between workers. In addition, The goal of the development aims to increase the usability by strengthening the security function through encryption in the video and to develop a more efficient system. Finally, the development contents are the remote management and the support software development, Android app development for worker, WebRTC-based remote collaboration system construction and development, and prototype development. These products are expected to increase demand and increase sales by installing and operating at industrial sites, and can promote manpower training, understanding trending technologies, and improving capabilities.

A study on improvement of policy of artificial intelligence for national defense considering the US third offset strategy (미국의 제3차 상쇄전략을 고려한 국방 인공지능 정책 발전방안)

  • Se Hoon Lee;Seunghoon Lee
    • Industry Promotion Research
    • /
    • v.8 no.1
    • /
    • pp.35-45
    • /
    • 2023
  • This paper addressed the analysis of the trend and direction of the US defense strategy based on their third offset strategy and presented the practical policy implication of ensuring the security of South Korea appropriately in the future national defense environment. The countermeasures for the development ability of advanced weapon systems and secure core technologies for Korea were presented in consideration of the US third offset strategy for the future national defense environment. First, to carry out the innovation of national defense in Korea based on artificial intelligence(AI), the long-term basis strategy for the operation of the unmanned robot and autonomous weapon system should be suggested. Second, the platform for AI has to be developed to obtain the development of algorithms and computing abilities for securing the collection/storage/management of national defense data. Lastly, advanced components and core technologies are identified, which the Korean government can join to develop with the US on a basis of the Korea-US alliance, and the technical cooperation with the US should be stronger.

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

Development of a Manual for Simulation Training in Preparation for the Fall Disasters of Urban Residential Housing Construction Works and Apply (도시형 생활주택신축공사의 추락재해 발생대비 모의훈련 실시 매뉴얼 개발 및 적용)

  • Kim, Sung Soo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.3
    • /
    • pp.39-49
    • /
    • 2021
  • According to the recent "Status of Industrial Accidents at the End of December 2020" released by the Ministry of Employment and Labor, each industry is subject to industrial accidents. The number of accident deaths by construction industry, accident deaths by accident type fell, and accident deaths by workplace size were 5 to 49, indicating that most accident deaths occurred due to falling accidents at small construction sites. Therefore, urban living houses are small construction sites, and the probability of falling accidents is very high. Fall simulation training for disaster occurrence is conducted mainly by large construction ordering organizations in the public sector, and it is the first case in Korea that a housing construction company has conducted at a small construction site. This study analyzed and presented the definition, construction characteristics, and safety management status of urban living houses, and developed and spread an emergency relief procedure manual in the event of a fall accident to minimize deaths.

A Study on the Strategic Application of National Defense Data for the Construction of Smart Forces in the 4th IR (4차 산업혁명시대 스마트 강군 건설을 위한 국방 데이터의 전략적 활용 방안연구)

  • Kim, Seyong;Kim, Junsang;Kang, Seokwon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.113-123
    • /
    • 2020
  • The fourth industrial revolution can be called the hyper-connected-based intelligent revolution triggered by advanced information technology and intelligent technology, and the basis for implementing these technologies is 'data'. This study proposes a way to strategically use data in order to lead this intelligent revolution in the defense area. First of all, implications through analysis of domestic and international trends and prior research and current status of defense data management were analyzed, and four directions for development were presented. If the government composes conditions for building, releasing, sharing, distribution, and convergence of defense data considering the environment of national defense in the future, it is expected that it will serve as a foundation and a shortcut to be a digitalized strong military through smart defense innovation in the era of the fourth industrial revolution.

A Study on the Effective Countermeasure of SPAM : Focused on Policy Suggestion (불법스팸 방지를 위한 개선방안 : 정책적 제안을 중심으로)

  • Sohn, Jong-Mo;Lim, Hyo-Chang
    • Journal of Industrial Convergence
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2021
  • Today, people share information and communicate with others using various information and communication media such as e-mail, smartphones, SNS, etc. However, it is being used in malicious attacks to send a large amount of illegal spam or to use it for fraud by using illegally collected personal information and devices that are vulnerable to security. Illegal spam, smishing, and fraudulent mail(SCAM) cause a lot of direct and indirect damage to companies and users, including not only social costs such as mental fatigue, but also unnecessary consumption of IT infrastructure resources and economic losses. Although there are regulations related to spam, violators of the law are still on the rise by circumventing the law, and victims are constantly occurring, so it is necessary to review what the problem is. This study examined domestic and foreign spam-related regulations and spam-related response activities, identified problems, and suggested improvement countermeasures. Through this study, it was intended to suggest directions for improving spam-related systems in order to block illegal spam and prevent fraudulent damage.

ECU Data Integrity Verification System Using Blockchain (블록체인을 활용한 ECU 데이터 무결성 검증 시스템)

  • Sang-Pil, Byeon;Ho-Yoon, Kim;Seung-Soo, Shin
    • Journal of Industrial Convergence
    • /
    • v.20 no.11
    • /
    • pp.57-63
    • /
    • 2022
  • If ECU data, which is responsible for collecting and processing data such as sensors and signals of automobiles, is manipulated by an attack, it can cause damage to the driver. In this paper, we propose a system that verifies the integrity of automotive ECU data using blockchain. Since the car and the server encrypt data using the session key to transmit and receive data, reliability is ensured in the communication process. The server verifies the integrity of the transmitted data using a hash function, and if there is no problem in the data, it is stored in the blockchain and off-chain distributed storage. The ECU data hash value is stored in the blockchain and cannot be tampered with, and the original ECU data is stored in a distributed storage. Using the verification system, users can verify attacks and tampering with ECU data, and malicious users can access ECU data and perform integrity verification when data is tampered with. It can be used according to the user's needs in situations such as insurance, car repair, trading and sales. For future research, it is necessary to establish an efficient system for real-time data integrity verification.

A Study on Improvement of Test & Evaluation of Vehicle Part in Mixed Equipment and Defense Industrial Technology (혼성장비 차량부 시험평가 및 방위산업기술 보호 제도 개선에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.241-249
    • /
    • 2018
  • The military purpose vehicles are developed by using the platform of civil vehicles according to the commercial vehicle expansion plan and military supplied product commercialization policy. But the information related to the military purpose vehicle which adopts the same platform with the civil vehicle is forced to be exposed because its information is revealed by containing into the maintenance manual and electric circuit diagram. Especially, the information disclosure should be blocked by reviewing the application of technology protection because the military vehicle becomes combating purposed mixed equipment when the missile and radar are mounted. The mixed equipment means the one configured with more than 2 types of equipment, and it is categorized into the main and sub equipment. This study was performed to derive the problems in Korean system for vehicle part test evaluation on the mixed equipment and the defense industry technology protection system, and to derive the methods for improving through interviews with the specialists. The conflicts between the civil laws and army regulation were reduced by adding a clause that the engine reflected with the newest emission gas standard should be mounted based on the time of force integration, and the commercialized military supplies were designated as element technology of defense industry technology in consideration of its roles and functions.