Comparison Overview

Republic of Korea Air Force

VS

Naval Sea Systems Command (NAVSEA) Careers

Republic of Korea Air Force

None
Last Update: 2025-12-09
Between 750 and 799

The Republic of Korea Air Force (ROKAF; Korean: 대한민국 공군; Hanja: 大韓民國 空軍; Revised Romanization: Daehanminguk Gong-gun), also known as the ROK Air Force, is the aerial warfare service branch of South Korea, operating under the South Korean Ministry of National Defense. The ROKAF has about 450 combat aircraft of American design, in addition to a few Russian, European, and indigenously-designed aircraft.

NAICS: 336
NAICS Definition:
Employees: 10,001
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Naval Sea Systems Command (NAVSEA) Careers

None
Last Update: 2025-12-10

We are NAVSEA. The Force Behind the Fleet. Join us and become part of a mission-driven team, at one of the best places to work in the federal government. This NAVSEA LinkedIn page is all about connecting with talented individuals ready to make a difference through a rewarding career with us. We share exciting job opportunities, recruitment events, highlight the NAVSEA mission, and show you how you can help support our warfighters and contribute to the Navy’s broader goals. When you join NAVSEA, you're joining a dynamic team committed to advancing naval capabilities. Whether you're an engineer, program manager, analyst, or IT professional, your work will directly impact the safety and success of our sailors, ensuring the Navy stays at the forefront of global maritime strength.

NAICS: 336
NAICS Definition:
Employees: 23,137
Subsidiaries: 16
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/republic-of-korea-air-force.jpeg
Republic of Korea Air Force
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Republic of Korea Air Force
100%
Compliance Rate
0/4 Standards Verified
Naval Sea Systems Command (NAVSEA) Careers
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Defense and Space Manufacturing Industry Average (This Year)

No incidents recorded for Republic of Korea Air Force in 2025.

Incidents vs Defense and Space Manufacturing Industry Average (This Year)

No incidents recorded for Naval Sea Systems Command (NAVSEA) Careers in 2025.

Incident History — Republic of Korea Air Force (X = Date, Y = Severity)

Republic of Korea Air Force cyber incidents detection timeline including parent company and subsidiaries

Incident History — Naval Sea Systems Command (NAVSEA) Careers (X = Date, Y = Severity)

Naval Sea Systems Command (NAVSEA) Careers cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/republic-of-korea-air-force.jpeg
Republic of Korea Air Force
Incidents

No Incident

https://images.rankiteo.com/companyimages/navseacareers.jpeg
Naval Sea Systems Command (NAVSEA) Careers
Incidents

FAQ

Naval Sea Systems Command (NAVSEA) Careers company demonstrates a stronger AI Cybersecurity Score compared to Republic of Korea Air Force company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Naval Sea Systems Command (NAVSEA) Careers company has historically faced a number of disclosed cyber incidents, whereas Republic of Korea Air Force company has not reported any.

In the current year, Naval Sea Systems Command (NAVSEA) Careers company and Republic of Korea Air Force company have not reported any cyber incidents.

Neither Naval Sea Systems Command (NAVSEA) Careers company nor Republic of Korea Air Force company has reported experiencing a ransomware attack publicly.

Neither Naval Sea Systems Command (NAVSEA) Careers company nor Republic of Korea Air Force company has reported experiencing a data breach publicly.

Naval Sea Systems Command (NAVSEA) Careers company has reported targeted cyberattacks, while Republic of Korea Air Force company has not reported such incidents publicly.

Neither Republic of Korea Air Force company nor Naval Sea Systems Command (NAVSEA) Careers company has reported experiencing or disclosing vulnerabilities publicly.

Neither Republic of Korea Air Force nor Naval Sea Systems Command (NAVSEA) Careers holds any compliance certifications.

Neither company holds any compliance certifications.

Naval Sea Systems Command (NAVSEA) Careers company has more subsidiaries worldwide compared to Republic of Korea Air Force company.

Naval Sea Systems Command (NAVSEA) Careers company employs more people globally than Republic of Korea Air Force company, reflecting its scale as a Defense and Space Manufacturing.

Neither Republic of Korea Air Force nor Naval Sea Systems Command (NAVSEA) Careers holds SOC 2 Type 1 certification.

Neither Republic of Korea Air Force nor Naval Sea Systems Command (NAVSEA) Careers holds SOC 2 Type 2 certification.

Neither Republic of Korea Air Force nor Naval Sea Systems Command (NAVSEA) Careers holds ISO 27001 certification.

Neither Republic of Korea Air Force nor Naval Sea Systems Command (NAVSEA) Careers holds PCI DSS certification.

Neither Republic of Korea Air Force nor Naval Sea Systems Command (NAVSEA) Careers holds HIPAA certification.

Neither Republic of Korea Air Force nor Naval Sea Systems Command (NAVSEA) Careers holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X