• Title/Summary/Keyword: 관리통제시스템

Search Result 632, Processing Time 0.031 seconds

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

Subject Searching Using Controlled Vocabulary Versus Uncontrolled Vocaburary in Online Catalog System: Focusing on Multilingual Environment

  • Choi, Hee-Yoon
    • Journal of Information Management
    • /
    • v.26 no.2
    • /
    • pp.61-79
    • /
    • 1995
  • The purpose of this paper is to investigate search efficiency of controlled vocabulary versus uncontrolled vocabulary subject access in online catalog systems. The question of the effectiveness of controlled versus uncontrolled vocabulary in information retrieval has been raised in many literatures. A debate continues in the Library and Information Science Professions over the relative merit, appropriateness, and efficiency of uncontrolled vocabulary subject access in online catalog systems. Actually users used to combine uncontrolled vocabulary subject searching with controlled vocabulary subject searching. But the success of user's subject search depends on his choice of search terms. Also the technical developments that facilitate cooperation among information services in general make it increasingly possible for such cooperation to take place on an international level. In this study, several common types of vocabularies on online catalog systems are described and compared, especially usages of vocabularies in multilingual environment are analyzed.

  • PDF

A Study on the Survey for efficient Management of the Information Resource in Pubic Sector (공공부문의 효율적인 정보자원관리를 위한 조사 개선방안 연구)

  • Choi, Young-Jin;Ra, Jong-Hei
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.269-277
    • /
    • 2007
  • In this days, information resources are very important in the organization. So, firms and public department eager to management and use the information resources. Our country is surveyed on Information Resource status from 1997 in the public sector. Information Resource survey contributed to check the status. But, the survey has some weakness. thus we have to redesign the Information Resource survey. In this paper, we analyzed the IRM researches, checked the IR survey's weakness, and studied the improvement methods.

  • PDF

The Effect of the fit between Innovation Strategy and Company Characteristics on Innovation Performance (혁신전략과 기업특성 간의 적합성이 혁신성과에 미치는 영향)

  • Shin, Sung-Wook;Choi, Won-Ju
    • Management & Information Systems Review
    • /
    • v.37 no.3
    • /
    • pp.131-145
    • /
    • 2018
  • The purpose of this study is to analyze the effect of the fit between innovation strategy and firm characteristics on innovation performance. We conducted surveys for venture companies in the Southeast region, The results of multiple regression analysis based on 135 questionnaires are as follows : First, the higher the fitness between innovation strategy and social network level, the higher the innovation performance. Second, the higher the fitness between innovation strategy and management control system level, the more positive effect on innovation performance. Finally, the higher the fitness between innovation strategy and innovation culture, the higher the innovation performance. This result implies that the enterprise characteristics should be designed and operated in accordance with the innovation strategy implementation.

Realtime Process Management in A Mission Critical System (미션 크리티컬시스템에서 실시간 처리를 위한 프로세스 관리 방법)

  • Han, Goan-Ho;Park, Geun-Ok;Lim, Jong-Tae
    • Annual Conference of KIPS
    • /
    • 2002.11c
    • /
    • pp.2261-2264
    • /
    • 2002
  • 미션 크리티컬 영역의 실시간 소프트웨어의 프로세스들은 시스템 요구사항에 맞게 제한된 시간안에 수행되도록 프로세스를 설계되고 구현되어야 한다. 본 논문에서는 원자력발전소의 감시와 제어를 담당하는 MMIUNIX 소프트웨어 실시간 프로세스들을 관리 통제하는 방법을 제안한다. 제안한 방법이 원자력 발전소의 특수한 환경에 적합하게 사용할 수 있는지 알아보기 위해서 시간제약 조건 관점에서 성능평가를 수행한다.

  • PDF

정보보안관리 평가방법론 고찰: BS7799를 중심으로 한 운영적 접근법

  • 이철원;김종기;이동호;박춘식
    • Review of KIISC
    • /
    • v.11 no.3
    • /
    • pp.38-48
    • /
    • 2001
  • 다양한 정보보안 평가 방법론들 중에서 BS7799는 정보시스템을 운영하는 조직 전반의 보안 상태를 평가하는데 유용한 방법론으로서, 여러 나라에서 활용하고 있으며 최근에는 국제표준으로 채택되었다. 본 고에서는 BS7799에서 제시하고 있는 보안통제 항목과 정보보안관리시스템의 구축 및 이의 객관적인 평가를 위한 인증 방법을 살펴본다. BS7799는 전자상거래를 수행하는 기업들 사이에 보안 수준에 대한 상호 신뢰를 확인하기 위한 방법으로 활용될 수 있으며, 최근에 제정된 정보통신기반보호법에서 요구하고 있는 취약성 평가에도 적용될 수 있을 것이다.

  • PDF

A Configuration Change Control Procedure for Software Maintenance (소프트웨어 유지보수를 위한 형상변경통제절차)

  • Choe, Gwang-Jun;Kim, Gi-Bong;Jin, Seong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2745-2755
    • /
    • 1997
  • Many large-scale enterprises have developed software systems to build management information system for their business. However, it is hard to maintain share ability of data, compatibility of operation methedology, and interoperability among subsystems when the development project progresses since each distributed team prepares a development plan for its subsystem and must have poor communication problem among those teams. We must apply software configuration management to the whole life cycle of the software system in order to solve those Problems. We need a model and a repository in order to execute configuration management on configuration products like document, data, and source code which are generated through the life cycle of software development. In this paper, we suggest a model for configuration change control where cross- referencing among life cycle Phases and data-sharing are highlighted, and define ER model to use IRDS(Information Resource Dictionary system) and IRD schemas.

  • PDF

NMS Integrated Simulation System using SNMP (SNMP를 이용한 NMS 통합 시뮬레이션 시스템 개발)

  • Seo, Jeong-Hun;Jeong, Sang-Ngun;Kim, Jong-Uk
    • Annual Conference of KIPS
    • /
    • 2001.04b
    • /
    • pp.709-712
    • /
    • 2001
  • 네트워크 관리 시스템이란 네트워크의 효율성과 생산성을 최대화하기 위해 복잡한 네트워크를 관찰, 통제하는 시스템이다. 네트워크에서 발생한 장애의 위치와 그 원인을 신속히 파악하고 그에 대응할 수 있는 능력의 제공은 네트워크 운영의 필수조건이라 할 수 있다. 그러나 네트워크는 서로 다른 환경과 여러 회사에서 생산한 제품으로 구성됨에 따라 관리상의 상호연동(Interoperability)문제가 발생할 수 있으므로 이러한 문제를 해결하고 네트워크의 효율적 관리를 위한 네트워크 관리 표준 프로토콜을 적용한 프로토타입의 시스템을 개발하였다.

  • PDF

Design of Security Management Function for SNMPv3 using Role-Based Access Control Model (역할기반 접근통제 모델을 이용한 SNMPv3 보안관리기능 설계)

  • 이형효
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.1-10
    • /
    • 2001
  • SNMPv3 provides the security services such as authentication and privacy of messages as well as a new flexible and extensible administration framework. Therefore, with the security services enabled by SNMPv3, network managers can monitor and control the operation of network components more secure way than before. But, due to the user-centric security management and the deficiency of policy-based security management facility, SNMPv3 might be inadequate network management solution for large-scaled networks. In this paper, we review the problems of the SNMPv3 security services, and propose a Role-based Security Management Model(RSM), which greatly reduces the complexity of permission management by specifying and enforcing a security management policy far entire network.

  • PDF

A Study on Primary Control Area for Information Security Management System (ISMS): Focusing on the Domestic Three Industries (정보보호 관리체계를 위한 주요 통제영역에 대한 연구: 국내 3개 산업을 중심으로)

  • Kang, Youn-Chul;Ahn, Jong-Chang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.140-149
    • /
    • 2021
  • Most industries have introduced and operate an information security management system (ISMS) or a personal information security management system (PIMS) to suitably protect and maintain customer's information and company trade secrets. This study starts with the premise that it is desirable for every industry considering information security to maintain an ISMS. ISMS can be of different types among various organizations, taking into consideration culture, practical work procedures, and guidelines for information security. This study intends to derive primary control areas of an ISMS for each industry based on organizational size and audit type by analyzing non-conformity trends and control factors according to certification audits for organizations introduced for international ISMS under ISO27001. This study analyzed improvement effects of ISMS through case analyses. It is meaningful as exploratory research, although it was difficult to acquire data for empirical study because few organizations maintain certification in major industrial sectors. The requirements presented the highest frequency of non-conformity for each type from the 2013-initiated ISO27001; the years 2013 to 2020 were extracted as the primary control area. The study found that for primary control areas of ISMS for each of three industries, organizational size and audit type had differences.