• Title/Summary/Keyword: Defense Industrial Security

Search Result 98, Processing Time 0.028 seconds

Conceptualization of Defense Industrial Security in Relation to National Security (국가 안보와 연계한 방위산업 보안 개념 정립)

  • Go, Hee-Jae;Lee, Yong-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.265-270
    • /
    • 2019
  • In order to protect the advancement of defense technology that has a tremendous e?ect on both the national security and the economy, the Republic of Korea established the Defense Technology Security Act in 2015. As the new enactment brought changes to the landscape of the defense industry and defense industrial security, a new examination of the concept of the defense industrial security has now become necessary. Even after taking into consideration the undisclosed nature of defense industrial security research, and the fact that only the limited number of firms participates in the subject matter, scientific studies related to the topic have not been active. However, with the new enactment of the Defense Technology Security Act, it is necessary to expand the scope of security and to redefine the concept of defense industrial security. In this paper, we analyzed the research works on related technology protection policies and our environment of the defense industry in order to conceptualize defense industrial security. The established concepts are expected to provide a systematic way to protect the confidential and defense technology.

Resaerch Trend and Cocentualization of Defense Industry Security From Convergence Security Perspective (융합보안 관점에서 방위산업보안 개념 정립과 연구동향 분석)

  • Woo, Kwang Jea
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.69-78
    • /
    • 2015
  • Methods that industrial spies use to smuggle core technology out are becoming more intelligent, technological, and complex, thus resulting in more serious damages. In particular, defense industries in which involve national core technology as well as institutions including labor force are industries that are in a greater need of the convergence security. Defense Industry develops, experiments, and produces defense security supplies for national security protection. Defense industry involves a number of security elements such as military secret, industrial secret, core technology labor force, defense industry supply, critical national facility, and information communication system. Defense industry security is a complex of military security and industrial security which is convergence security that integrates all security elements of defense industry. Therefore, defense industry security is a typical ideal model for convergence security. Research on defense industry security is relatively insufficient compared to research of security in other industrial fields. In order to prevent core technology of denfese industry from leaking and to protect technical professionals and institutions, research and action on defense industry security from convergence security perspective are therefore essential at this point of time.

A Study on Establishment of Criteria to Identify the Defense Industrial Technology of Diesel Engine for Military Vehicle (군용차량을 위한 디젤기관의 방산기술 식별기준 정립에 관한 연구)

  • Yoon, Heung-Soo;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.177-184
    • /
    • 2019
  • The Defense Technology Security Act was enacted in 2015 to protect the defense industrial technology from being duplicated or interfering technologies being developed, which prevents its value and utility from deterioration and prevents inappropriate export. Defense industrial technology refers to technology that should be protected for national security among the national defense science and technology related to the defense industry. However, technical identification criteria of identification and management system of protection technology are not regulated. Therefore, in this study, through the Delphi survey, diesel engine core technology identification criteria related to the high efficiency internal combustion engine propulsion technology among the 141 defense industrial technologies is established to improve the identification and management system of the technology to be protected among the defense industrial technology protection system. As a result of the study, operational operability, durability, safety, sequencing and modularization were established as diesel engine core technology identification criteria.

A Study on the Implementation of Defense Technology Master Data Management System for Defense Technology Security (방산기술보호를 위한 방산기술 마스터 데이터 관리 체계 구현 방안)

  • Park, Heungsoon;Kim, Seyong;Kwon, Hyukjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.111-122
    • /
    • 2021
  • With the spread of technology in the 4th Industrial Revolution, the defense industry in South Korea is getting developed into an industrial structure in which high-tech technologies are concentrated. As the importance of defense technology has gradually increased, the government has enacted the Defense Technology Security Act and required to build a protection system for institutions that possess or manage defense technology. In order for the target institution to introduce a protection system, it is necessary to identify the defense technologies that are protected and to ensure systematic data management. In order to cope with this, we derived master data items for data management and analyzed the implementation types of defense technology master data system suitable for the defense industry environments. The derived method identified the defense technology master data, such as primary and secondary master data, and through AHP analysis, Co-existence type was suitable as the target model for the master data management system. We expect that stronger defense technology security policy will be implemented through the defense technology MDM system.

Developing Strategies to Improve Operational Test and Evaluation of Weapon System in the Age of the Fourth Industrial Revolution (4차 산업혁명 시대에 적합한 무기체계 운용시험평가 개선전략 도출)

  • Lee, Kangkyong;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.591-601
    • /
    • 2020
  • After North Korea's sixth nuclear test, the operational environment on the Korean Peninsula has fundamentally changed, and the South Korean military faces various security challenges, including a reduction in military service resources and shorter military service periods. In particular, the South Korean military is seeking a new paradigm in military construction amid changes in the defense acquisition environment linked to the push for defense reform 2.0 and the utilization of the fourth industrial revolution. Therefore, this study considered strategies for improving the operational test and evaluation of weapons systems suitable for changes in the defense acquisition environment to effectively prepare for existing military threats and future warfare patterns. For this purpose, external environment analysis and internal capabilities were diagnosed using PEST Analysis and SPRO Analysis, and improvement strategies were derived through SWOT analysis.

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

A Study on the Changes of US Policy in International Defense Industry Cooperation and the Fure Korea-US Defense Industry Cooperation (미국의 국제 방산협력 정책 변화와 한미 방산협력 방안 연구)

  • Kim, Jong Ryul
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.35-44
    • /
    • 2014
  • It has been shown that the lack of sufficient defense industry cooperation between Korea and the US. The severe imbalance in defense trade between tow countries and Korea's weak defense industrial base has been a problem. This paper suggests the enhancement of defense industry cooperation with the US as a defense policy. The US policy has been changed to utilize the globalization of defense industries. The following cases were analyzed to show the policy change; The security of supply arrangement with 6 countries, the defense cooperation treaty with the United Kingdom and Australia. the defense Memorandum of Understanding with 23 countries, and the international cooperation with 8 countries for F-35 JSF program. Korea government needs to sign a defense MOU with U.S. and the defense industries are recommended to increase the opportunities of weapon system co-development and co-production. So that the Korea defense industry may improve competitiveness and to overcome the current weaknesses.

The study of the relationship of the defense industry-specific factors effect the innovation of manufacturing technology and the market share. (방위산업의 시장구조 결정요인이 기술혁신과 시장지배에 미치는 영향)

  • Chung, Young-Hyun
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.241-280
    • /
    • 2007
  • This study examines the relationship of the industry-specific factors that effect innovation of manufacturing technology and the market share within the defense industry. Since the establishment of the basic defense industry framework in 1973, there were numerous interactions of the industry-specific factors of the defense industry structure with the technological innovation and market organization of the defense industry. During last three decades, the domestic defense industry has achieved the considerable level but the framework of the basic system has not developed much in areas of the military science and the defense manufacturing technology. Industry-specific factors were formed in the process and appeared in a variety of behavioral characteristics as subsystems. Currently, there IS a growing trend where the management of defense industry is gradually deteriorating due to limitation of the domestic industry-specific factor (e.g. defense technologies, amount of demand, etc.). If there is a prominent imbalance of the industry-specific factors. it can trigger the potential problem of conflict, lack of cooperation and control, slowing the growth of the manufacturing technology thereby diminishing the market and deteriorating the defense supply/demand relationship. In a research conducted by Joe S. Bain, Bain analyzed the relationship of the traditional industrial organization where industry-specific factor(S) not only impacts the conductor(C). And, conductor(C) influences the shaping of the performance(P) of relationship of the traditional industrial organization. Consequently, the researcher has identified the demand monopoly, barriers to entry, and market competition with comparison of defense industry issues. These defense issues were three industry-specific factors identified, which are 1) The demand monopoly and The entry barriers to new market competition, 2) the industrial technical factor to a production technical competitiveness and a market sharing competitiveness, 3) the probability factor to revolution for military affairs(RMA) and a R&D production. According to baseline with these factors, the following research model is established from the special companies group(Group A), the systematization companies group(Group B), and the general companies group(Group 0. The hypothesis is that if there are more industry-specific factors, then there will be more relationships of defense industry relation statutes. This research is an empirical study on the relationship that the industry specific factors effects the innovation of manufacturing technology and the shaping of the market in the defense industry. Moreover, the existing models to evaluate the industry specific factors of the defense industry IS much to be desired with the controlled statistical analysis of the result. It is vital to study on current situation with suggesting alternative strategy to the efficient strategy. The descriptive analysis approach analysis is conducted with SPSSWIN to conduct reliability test, factor analysis, correlation analysis, cross-tabulation analysis, one-way ANOVA, and multiple regression analysis. However, there were some limitations of the survey such as the rigidity of concept about the technical factors and various market management factors. The wishes is that the decision-maker could be utilized these defence industrial factors to formulate efficient defence policy and strategy in the future.

  • PDF

Analysis of Domestic Security Solution Market Trend using Big Data (빅데이터를 활용한 국내 보안솔루션 시장 동향 분석)

  • Park, Sangcheon;Park, Dongsoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.492-501
    • /
    • 2019
  • To use the system safely in cyberspace, you need to use a security solution that is appropriate for your situation. In order to strengthen cyber security, it is necessary to accurately understand the flow of security from past to present and to prepare for various future threats. In this study, information security words of security/hacking news of Naver News which is reliable by using text mining were collected and analyzed. First, we checked the number of security news articles for the past seven years and analyzed the trends. Second, after confirming the security/hacking word rankings, we identified major concerns each year. Third, we analyzed the word of each security solution to see which security group is interested. Fourth, after separating the title and the body of the security news, security related words were extracted and analyzed. The fifth confirms trends and trends by detailed security solutions. Lastly, annual revenue and security word frequencies were analyzed. Through this big data news analysis, we will conduct an overall awareness survey on security solutions and analyze many unstructured data to analyze current market trends and provide information that can predict the future.

A Study on Designing of Information Integration Framework and Architecture with Enhanced Security Focused on defense field (보안성을 강화한 정보연계 프레임워크 및 아키텍처 설계에 관한 연구 - 국방 분야를 중심으로)

  • Kang, Min-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.248-255
    • /
    • 2016
  • The amount and diversity of information is increasing, as is the information integration connecting data among the related institutions. In the defense field, DTAQ, which is in charge of the quality of military supplies, is attempting to collect and analyze the information which is related with it. In addition, the object of information integration is to expand civil data as well as defense data. There are many ways to integrate data in various environments. In the defense field, which needs enhanced security, it is necessary to establish and apply the information integration methods which are enhanced with more security. In this study, the framework and architecture of information integration was designed by considering task requirements and security conditions. As a result of example application of this framework for information systems to the selected 4 institutions, it was confirmed that the task can be performed through data connections. From the study result, integration architecture which can be applied securely in defense field was suggested. The data accumulated by using this framework with strengthened security are expected to be utilized for the quality improvement of military supplies.