• Title/Summary/Keyword: Military Security Level

Search Result 143, Processing Time 0.026 seconds

Formalism-Based Defense Safety/Security-Critical Software Development & Certification Criteria - Application of Formal Methods to Safety/Security-Critical Software Certification Process Activities - (정형성 기반 국방 안전/보안필수 소프트웨어 개발 및 인증 기준 - 안전/보안필수 소프트웨어 인증 프로세스에 대한 정형기법 적용 방안 연구 -)

  • Kim, Chang-Jin;Choi, Jin-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.1
    • /
    • pp.55-69
    • /
    • 2007
  • The paper provides the approach to apply formal methods to the development and certification criteria of defense safety/security-critical software. RTCA/DO-178B is recognized as a do facto international standard for airworthiness certification but lack of concrete activities and vagueness of verification/certification criteria have been criticized. In the case of MoD Def Stan 00-55, the guidelines based on formal methods are concrete enough and structured for the defense safety-related software. Also Common Criteria Evaluation Assurance Level includes the strict requirements of formal methods for the certification of high-level security software. By analyzing the problems of DO-178B and comparing it with MoD Def Stan 00-55 and Common Criteria, we identity the important issues In safety and security space. And considering the identified issues, we carry out merging of DO-178B and CC EAL7 on the basis of formal methods. Also the actual case studies for formal methods applications are shown with respect to the verification and reuse of software components.

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

A Study on the Method for Judging the EMP Protection Plan and Required Level through Decision Making (의사결정론을 통한 EMP 방호대책 및 수준 판단방안 제시에 관한 연구)

  • Kim, Kuk-Joo;Park, Sang-Woo;Baek, Jang-Woon;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.2
    • /
    • pp.193-200
    • /
    • 2019
  • In the context of increasing threats of EMP by neighboring countries in the security situation on the Korean peninsula, EMP protection facilities are a very important means of ensuring military operational capability. These EMP protection facilities should be constructed by comprehensively judging various factors about operation units. However, Defense Military Facilities Criteria and National Technical Guideline for EMP protection require at least 80dB shielding effectiveness without considering other options. In this study, we use objective and statistical methods to refine the consideration of the required EMP protection level based on the opinions of the experts. To do this, the Delphi technique is used for this study, and the survey was conducted from 53 experts related to EMP protection standard in the military and civilian sectors. The first questionnaire investigated the appropriate level of EMP protection, and the second questionnaire analyzed the factors considered in establishing EMP protection level. As a result of the factor analysis on the opinions of the experts, it was concluded that the EMP protection requirement level should be determined by variables of METT + TC.

Study on Changes in Military Negotiations under the Kim Jeong-eun Regime through Working-Level Talks for Gaeseong Industrial Complex (김정은시대 개성공단 실무회담 분석을 통한 군사협상 변화 연구)

  • Lee, Sung Choon
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.3-10
    • /
    • 2013
  • This study is trying to suggest the continuity and changes that would be made in inter-Korean military negotiations in the future under the Kim Jeong-eun regime by analyzing the recent inter-Korean Working-Level Talks for Gaeseong Industrial Complex based on 'anti-Japanese guerilla style negotiation model, the military negotiation model under Kim Jeong-il era. Especially, through analysis of the inter-Korean Working-Level Talks for Gaeseong Industrial Complex, it is verified that behavior similar to that in the military talks in the past is found even in the economic negotiations. Such analysis leads to an assumption that negotiations under the Kim Jeong-eun regime would be made within the category of the military negotiations under the Kim Jeong-il era. Fundamentally North Korea will change but try to achieve its objectives in the military talks within the existing frame of strategic culture rather than changing it. Such phenomenon will continue for some time. In the future inter-Korean military talks, however, North Korea will try to change its behavior to cope with its financial difficulties. Accordingly, the South Korea's government will have to have paradigm shift toward inter-Korean military negotiations. Especially, Kim Jeong-eun's studying abroad in the past will make him change in the negotiations. At this moment, the South Korean government must make continuous efforts to induce dialogue and negotiation. In order to induce the North Korea to change, the development of economic norm logic with the united front applied in the strategic culture of military negotiation and the formation of a value system in the North Korea's military negotiation policy makers will lead to the creation of a new military negotiation framework.

Impact of ITSM Military Service Quality and Value on Service Trust

  • Woo, Hanchul;Lee, Sangdo;Huh, Jun-Ho;Jeong, Sukjae
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.55-72
    • /
    • 2020
  • As the IT service environment grows, it is critical in terms of IT service quality to minimize the occurrence of failures due to changes in applications and to diagnose and recover in a short period of time how failure will affect the business. Thus, the Defense Acquisition Program Administration (DAPA) has been building and operating ITSMs to implement IT service management in a leading manner. Information Technology Service Management (ITSM) is divided into events, obstacles, changes, versions and setup management to ensure flexibility and stability in service delivery. It is also operated separately from service level, availability, capacity, financial and IT service continuity management to ensure service quality and cost efficiency. Based on ITSM military service history, this study looks at the impact of quality of service on value, satisfaction, and trust. The results of the analysis are highly valuable for future ITSM implementation and operation.

Socio-Economic Aspects of the Impact of Military Actions on the Labor Force

  • Melnyk, Stepan;Petrukha, Nina;Shuprudko, Nataliia;Ilychok, Bohdan;Balanutsa, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.252-258
    • /
    • 2022
  • Ukraine has a significant in quantity and unique in quality parameters, in particular, the level of education, a resource - the labor force, which, along with natural resources, can serve as the basis for economic growth and the achievement of sustainable development goals. The study is aimed at a thorough identification of the main factors influencing the formation and use of the labor force in Ukraine, including by comparing with the indicators of the EU countries, before the start of the active phase of military aggression by the Russian Federation. It was found that until February 24, 2022, there were negative trends in the change in the quantitative and qualitative indicators of the labor force due to the demographic crisis, the transformation of the national economy and shortcomings in state regulation of labor market development processes. The military actions not only exacerbated pre-existing problems, but also led to the emergence of new ones. A significant number of refugees and internally displaced persons, with the termination of the activities of half of the economic entities, provoked a sharp increase in real unemployment and a decrease in wages. The specific problem of the labor market of Ukraine - the "labor crisis", which has and will have a significant impact on the labor force, is carefully considered.

Analysis of Operational Efficiency of Military Department of University Using Data Envelopment Analysis Method (자료포락분석법을 활용한 일반대학 군사학과의 운영 효율성 분석)

  • Young-Min Bae;Sweng-Kyu Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.95-102
    • /
    • 2023
  • The purpose of this paper was to confirm the operational level of the military department of universities, which plays a key role in the officer training process, through empirical research and confirm meaningful results for improvement. There are 11 university military departments operated through the Army, agreements, and semi-agreement, and the Data Envelopment Analysis (DEA) was applied from the perspective of resource input and performance for each university's military department operation to analyze relative efficiency and confirm specific directions for improvement. As a result of operational efficiency analysis, 6 DMUs (Decsision Making Unit) were found to be efficient in the BCC model out of 11 DMUs, and the evaluation results could be confirmed through classification of efficient and inefficient groups through data capture analysis. This paper may be of practical value in that it checks the efficiency of the comparative university military departments and confirms specific information for development through the DEA-Additive model that reflects several evaluation factors at once. Through this, the operators of each university's military department are admitted.

Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period (사이버 무기체계 핵심기술 실현시기의 영향 요인 분석)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.281-292
    • /
    • 2017
  • It is demanded to promote research and development of cyber weapons system and core technology in response to the ongoing cyber attack of North Korea. In this paper, core technologies of the future cyber weapon system are developed and the factors affecting the realization timing of core technologies were analyzed. 9 core technology groups and 36 core technologies are derived. Afterwards, these core technology groups are compared to the operation phase of the joint cyber warfare guideline and the cyber kill chain of Lockheed Martin. As a result of the comparison, it is confirmed that the core technology groups cover all phases of the aforementioned tactics. The results of regression analyses performed on the degree of influence by each factor regarding the moment of core technology realization show that the moment of core technology realization approaches more quickly as factors such as technology level of the most advanced country, technology level of South Korea, technology transfer possibility from the military sector to the non-military sector(spin-off factor), and technology transfer possibility from the non-military sector to the military sector(spin-on factor) increase. On the contrary, the moment of core technology realization is delayed as the degree at which the advanced countries keep their core technologies from transferring decrease. The results also confirm that the moment of core technology realization is not significantly correlated to the economic ripple effect factor. This study is meaningful in that it extract core technologies of cyber weapon system in accordance with revision of force development directive and join cyber warfare guideline, which incorporated cyber weapon system into formal weapon system. Furthermore, the study is significant because it indicates the influential factor of the moment of core technology realization.