• 제목/요약/키워드: Military security

검색결과 926건 처리시간 0.032초

네트워크 중심전(NCW)하의 국방정보체계 제대별/기능별 정보보호지침 연구 (A Study on the Defense Information System Security Guideline for Network Centric Warfare)

  • 권문택
    • 융합보안논문지
    • /
    • 제8권3호
    • /
    • pp.9-18
    • /
    • 2008
  • 본 연구는 네트워크 중심전(NCW) 환경하에서 국방정보체계에 대한 정보보호 지침을 마련하고자 수행하였다. 본 연구에서는 국방정보체계 분야에 다년간 근무했던 전문가들로 워킹그룹을 편성하여 그룹의사결정기법을 활용한 연구방법을 통해 네트워크 중심전(NCW)하에서의 정보보호 지침을 제대별, 기능별로 도출하였다. 본 연구에서 제시하는 제대별, 기능별 정보보호 지침을 활용하여 현존하는 국방정보체계의 정보보호 수준을 평가하고 미흡한 점을 보완한다면 보다 완벽한 정보보호 대책을 마련할 수 있을 것이다.

  • PDF

국방조직의 정보보호 평가 방법론 개발 (Development of the Information Security Methodology for Defense Organization)

  • 조성림;최인수;박지훈;신우창
    • 한국IT서비스학회지
    • /
    • 제12권4호
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

마이크로컴퓨터의 네트워크화 여부가 보안 위협 인식에 미치는 영향 : 군조직을 대상으로 (The Effects of Microcomputer Networking on the Perception of Threats to Security : the Military User크s Case)

  • 이찬희;김준석;서길수
    • 정보기술과데이타베이스저널
    • /
    • 제6권2호
    • /
    • pp.1-18
    • /
    • 1999
  • The purpose of this study was to identify the effect of microcomputer networking on user perception of potential threats to security employing user attitudes as a moderating variable. A research model consisting of microcomputer networking as the independent variable, user perception of potential threats to security as the dependent variable, and user attitude toward security control as the moderating variable was developed through literature review. The results of this study provide an empirical evidence of the importance of environmental change(information systems networking) on user perception of potential threats to security. Further-more the result imply that in order to improve security performance through the reinforcement of user perception of threats to security in the organization, user attitudes should be made favorable.

  • PDF

유비쿼터스 환경에서의 NCW 정보보호 대책 (A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing)

  • 권문택
    • 융합보안논문지
    • /
    • 제10권3호
    • /
    • pp.15-22
    • /
    • 2010
  • 본 연구는 유비쿼터스 환경에서 네트워크 중심전(NCW)을 원활하게 실시하기 위해 필요한 정보보호 대책을 제시하기 위한 것이다. 대책을 도출하기 위해 우선 유비쿼터스 환경에서 NCW가 구현 되었을 때 예상되는 전투양상을 전장기능별로 조명해보고, 유비쿼터스 환경에서 일어날 수 있는 정보보호 위협의 특징을 도출하였다. 이러한 특징을 바탕으로 위협을 해결하기 위한 국방 정보보호 대응 방안을 제시하였다. 본 연구에서 제시한 대응방안을 바탕으로 추후 세부 실행과제를 도출한다면 보다 완벽한 NCW 개념 실현을 위한 국방정보보호 대책이 마련될 수 있을 것이다.

네트워크 중심전(NCW)하의 정보보호체계 구축방안 연구 : 정보보호체계 평가지표 개발을 중심으로 (A Study on the Information Security Plan for Network Centric Warfare : Development of Information Security Governance Assessment Index)

  • 권문택
    • 융합보안논문지
    • /
    • 제7권4호
    • /
    • pp.83-91
    • /
    • 2007
  • 본 연구는 네트워크 중심전(NCW)을 원활하게 구현하기 위해 구축된 정보보호체계의 수준을 평가하고 미흡한 부분을 도출함으로서 미래전에 대비하는 예방적 지침을 마련하고자 수행하였다. 본 연구에서는 국방 정보체계 분야에 다년간 근무했던 전문가들로 워킹그룹을 편성하여 그룹의 사결정기법을 활용한 연구방법을 통해 NCW하에서의 정보보호체계 수준을 평가하는 지표를 개발하였다. 본 연구에서 개발 제시한 평가지표를 활용하여 시스템 수준을 평가하고 미흡한 점을 보완한다면 보다 완벽한 정보보호 대책을 마련할 수 있을 것이다.

  • PDF

Comparison of Honeypot System, Types, and Tools

  • Muhammad Junaid Iqbal;Muhammad Usman Ahmed;Muhammad Asaf
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.169-177
    • /
    • 2023
  • Network security is now more crucial than ever for consumers, companies, and military clients. Security has elevated to the top of the priority list since the Internet's creation. The evolution of security technology is now better understood. The area of community protection as a whole is broad and dynamic. News from the days before the internet and more recent advancements in community protection are both included in the topic of observation. Recognize current research techniques, previous Defence strategies that were significant, and network attack techniques that have been used before. The security of various domain names is the subject of this article's description of bibliographic research.

총괄평가 개념의 한국군 적정 상비병력 산출 방안 연구 (Net Assessment-Based Study to Determine the Optimal Size of the ROK Military's Standing Force)

  • 김정혁;최명진
    • 산업경영시스템학회지
    • /
    • 제46권4호
    • /
    • pp.272-280
    • /
    • 2023
  • For the past 70 years, an intense rivalry has persisted on the Korean Peninsula, and North Korea's nuclear and missile threats are becoming increasingly imminent. Facing a shortage of military resources, South Korea has pursued a national defense reform, significantly reducing the number of units and troops while focusing on ground forces. However, North Korea's strategic objective of unifying South Korea through surprise attacks, prompt responses, and combined nuclear and missile assaults remains unchanged. The central issue in this context revolves around determining the appropriate size of the Korean military's standing forces. This study employs the concept of net assessment as a novel method to ascertain the optimal size of the Korean military. Threats, strategic objectives, doctrine, and unit rotations are simultaneously considered from the enemy's perspective. In anticipation of security risks on the Korean Peninsula, an acceptable troop size will be proposed using the net assessment approach to calculate the appropriate standing force size.

대규모 시설에서 이용가능한 미활용 에너지의 부존량과 그 이용 가능성에 관한 조사연구-하천수.해수.하수처리수를 중심으로 (An Estimation of Quantity of Unused Energy of River Water, Seawater and Treated Sewage as Heat Source and Its Availability in Large Facilities)

  • 허재영
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.423-446
    • /
    • 2003
  • While the demand for energy has shown a sharp increase recently, the supply seems to be limited by the fact that the conventional fossil fuel energy or nuclear energy has its own environmental problems such as, for example, global warming or nuclear waste disposal. To overcome such limited supply of energy, the utilization of natural thermal energy such as river water and seawater as well as treated sewage can be a substantial supplement. The potential use of the unused energy has become more and more feasible these days as the heat pump technology has been advanced. In the present study, the unused energy resources are estimated on regional and monthly basis for each resource by the method proposed here in order to establish the fundamental data for its utilization. The potential use of the unused energy is a1so discussed.

  • PDF

미사일 Fin 액츄에이터용 서보모터의 외란 토크 억제 제어 (Disturbance Torque Suppression Control of Servo Motors for Missile Fin Actuators)

  • 김창환
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.311-343
    • /
    • 2003
  • In this paper, we propose a generalized disturbance torque suppression control scheme of servo motors for missile fin actuators. Our controller consists of both a model based feed-forward controller and a stabilizing feedback controller. The feed-forward controller is designed such that the output of nominal plant tracks perfectly the reference position command with a desired dynamic characteristics. The feedback controller stabilizes the overall closed loop system. Furthermore, the feedback controller contains a free function that can be chosen arbitrary. The free function can be designed so as to achieve both the suppression of disturbances and the robustness to model uncertainties. In order to illuminate the superior performance of our control scheme to the conventional ones, we present some simulation results.

  • PDF

지상표적식별을 위한 다중센서기반의 정보융합시스템에 관한 연구 (A Study on the Multi-sensor Data Fusion System for Ground Target Identification)

  • 강석훈
    • 안보군사학연구
    • /
    • 통권1호
    • /
    • pp.191-229
    • /
    • 2003
  • Multi-sensor data fusion techniques combine evidences from multiple sensors in order to get more accurate and efficient meaningful information through several process levels that may not be possible from a single sensor alone. One of the most important parts in the data fusion system is the identification fusion, and it can be categorized into physical models, parametric classification and cognitive-based models, and parametric classification technique is usually used in multi-sensor data fusion system by its characteristic. In this paper, we propose a novel heuristic identification fusion method in which we adopt desirable properties from not only parametric classification technique but also cognitive-based models in order to meet the realtime processing requirements.

  • PDF