Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study

Author:

Jeong Giseok12,Kim Kookjin3ORCID,Yoon Sukjoon3,Shin Dongkyoo234ORCID,Kang Jiwon23

Affiliation:

1. Maritime Guided Weapon Program Team, Defense Acquisition Program Administration, Gwacheon 13809, Republic of Korea

2. Department of Computer Engineering, Sejong University, Seoul 05006, Republic of Korea

3. Cyber Warfare Research Institute, Sejong University, Seoul 05006, Republic of Korea

4. Department of Convergence Engineering for Intelligent Drones, Sejong University, Seoul 05006, Republic of Korea

Abstract

As the world undergoes rapid digitalization, individuals and objects are becoming more extensively connected through the advancement of Internet networks. This phenomenon has been observed in governmental and military domains as well, accompanied by a rise in cyber threats consequently. The United States (U.S.), in response to this, has been strongly urging its allies to adhere to the RMF standard to bolster the security of primary defense systems. An agreement has been signed between the Republic of Korea and the U.S. to collaboratively operate major defense systems and cooperate on cyber threats. However, the methodologies and tools required for RMF implementation have not yet been fully provided to several allied countries, including the Republic of Korea, causing difficulties in its implementation. In this study, the U.S. RMF process was applied to a specific system of the Republic of Korea Ministry of National Defense, and the outcomes were analyzed. Emphasis was placed on the initial two stages of the RMF: ‘system categorization’ and ‘security control selection’, presenting actual application cases. Additionally, a detailed description of the methodology used by the Republic of Korea Ministry of National Defense for RMF implementation in defense systems is provided, introducing a keyword-based overlay application methodology. An introduction to the K-RMF Baseline, Overlay, and Tailoring Tool is also given. The methodologies and tools presented are expected to serve as valuable references for ally countries, including the U.S., in effectively implementing the RMF. It is anticipated that the results of this research will contribute to enhancing cyber security and threat management among allies.

Funder

Agency for Defense Development Institute

Publisher

MDPI AG

Subject

Information Systems

Reference58 articles.

1. Cyber security in new space: Analysis of threats, key enabling technologies and challenges;Manulis;Int. J. Inf. Secur.,2021

2. Cyber security meets security politics: Complex technology, fragmented politics, and networked science;Wenger;Contemp. Secur. Policy,2020

3. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments;Li;Energy Rep.,2021

4. Risk management framework for information systems and organizations;Force;NIST Spec. Publ.,2018

5. Sherman, J.B. (2022). DoD Instruction 8510.01 Risk Management Framework for DoD Systems.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3