Security enhancement in defense information system by active directory
Date
2019
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
University of Delaware
Abstract
The critical threat of ‘Cyber warfare’ is increasing day by day. In particular, after the hacking of a military intranet that was deemed safe in October 2016, it is believed that none of it is safe from the threat of cyberspace, and cybersecurity remains a constant issue. In addition, the current IT infrastructure environment is rapidly changing. In response to these changing requirements, many requirements have been reflected in the military, and the introduction, development, and construction of various equipment, programs and solutions are constantly changing and complicated and these are getting developed. However, the workload of Cyber Manpower (Soldiers in signal branch and civilians who has specialty regarding signal and computer) in the military, which helps organized management and control to maintain these environments and support users, is steadily increasing. ☐ In the private sector, the infrastructure has been changed to a centralized management system to reduce costs and enhance security. Currently, however, the ROK military has been limited to budget and regulations. Therefore, it is difficult to establish and apply a centralized security policy instead of providing services tailored to each user rather than consistent management due to congestion of various environments and assets. Therefore, unnecessary management time is increased due to a distributed system, Productivity is significantly deteriorated. So, our situation can’t concentrate on cyber warfare preparation. ☐ As IT assets expand day by day, they are experiencing difficulties in security and management. Internal data leakage through authorized and unauthorized persons in the organization, as well as hacking and infiltration through networks, are becoming increasingly intelligent. Therefore, as part of the effective preparation of the Cyber warfare, it is readily applicable to the current military, to minimize the risks associated with various security vulnerabilities and viruses and to improve the productivity of Cyber Manpower through reasonable costs and means. We will discuss the integrated management of PCs and accounts using the proven Active Directory, and how to improve security. ☐ In Chapter 1, I discuss the significance of the Cyber warfare, the concept of the overall Cyber warfare, and describe the ROK readiness of Cyber warfare, the status of the infringement and the protection system, and discusses the applicable scope of the Active Directory. In Chapter 2, I describe the overall network configuration that is currently used for Defense Information System to confirm the reliability of stable network service, which is an essential element of Active Directory implementation. In Chapter 3, I introduce the general aspects of Active Directory and discuss cases of foreign military and civilian applications. In Chapter 4, I discuss the requirements and their applications in terms of PMO (Present Method of Operation) and FMO (Future Method of Operation). In Chapter 5, I design the Active Directory for Defense Information System. and. In Chapter 6, I experiment with the new structure designed in Chapter 5. In Chapter 7, I discuss the changes and the results of experiments.