• Title/Summary/Keyword: 내부통제시스템

Search Result 140, Processing Time 0.023 seconds

Effects of the Recognition of Business Information Protection Activities in Ranks on Leaks of Industrial Secretes (직위에 따른 기업정보보호활동인식이 산업기밀유출에 미치는 영향)

  • Choi, Panam;Han, Seungwhoon
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.475-486
    • /
    • 2015
  • The objective of this study is to analyze control factors in protecting activities of business information that affects the effects of protecting leaks of industrial secretes during business security works in the ranks of staffs. A regression analysis was implemented by 36 items of protecting activities of information and 10 items of preventing industrial secretes for a total of 354 users and managers who use internal information systems in governments, public organizations, and civilian enterprises. In the recognition of protecting activities of business information that affects the prevention of controlling industrial secretes, clerks showed recognitions in physical control, environmental control, and human resource control, and software control and assistant chiefs showed recognitions in hardware control and environmental control. Also, ranks of department managers and higher levels represented recognitions in security control activities. It showed that clerks, assistant chiefs, and above department managers show effects of technical control factors on protecting activities of industrial secretes but section chiefs represent system control factors in preventing industrial secretes.

Control Networks for Information Systems Development : Organizational and Agency Theory Perspectives (조직 이론과 대리 이론 관점에서 본 정보시스템 개발의 통제 네트워크에 관한 연구)

  • Hong, Sa-Neung
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.71-90
    • /
    • 2012
  • Although it has been studied for a long time in various disciplines, most of control theories remain being developed by analyzing relatively simple tasks. Even recent research on control of information systems development explains only a small part of control phenomena observed in the real world projects. This research focuses on identifying and analyzing the concepts and structures in order to make them useful for understanding and explaining control of information systems development comprehensively This investigation utilizes the complementary relationship between views on control from organizational and economic perspectives. A conceptual framework developed by integrating previous research on control allows us to analyze the development of information systems for control purposes. The results of discussion about control mechanisms and network can be used as guidelines for designing control systems in real projects. Analysis of control networks shows that control of development projects requires quite complex networks intertwining a variety of controllers and controlees. The results of this research are expected to contribute to correcting the unbalanced status of IS research which has emphasized too heavily on planning and implementation, and deepening and widening our understanding about controlling development projects. Practitioners can use the results as guidelines for designing control mechanisms and networks, and get alerted by them about the agency risks inherent in outsourced developments.

Implementation of the E-BLP Security Model for Trusted Embedded Systems (안전한 임베디드 시스템을 위한 E-BLP 보안 모델의 구현)

  • Kang Jungmin;Nam Taelliun;Jang Insook;Lee Jinseok
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.10
    • /
    • pp.512-519
    • /
    • 2005
  • E-BLP security model considers the reliability of the processes that are real subjects in systems. This paper deals with the implementation of the E-BLP model for secure embedded systems. Implemented EBSM(E-BLP Based Security Module) consists of three components: identification and authentication, access control and BRC(Dynamic Reliability Check) that checks the process behavior dynamically. Access Control of EBSM ensures unreliable processes not to access the sensitive objects and the DRC detects the buffer overflow attack by normal user. Besides, the performance overhead of the embedded system applying the EBSM is introduced.

Multimedia Service Gateway (멀티미디어 서어비스 게이트웨이 구성에 관한 연구)

  • Yoo, Jin-Ho;Kim, Sung-Hun;Lee, Jeun-Woo
    • Proceedings of the KIEE Conference
    • /
    • 2001.11c
    • /
    • pp.456-458
    • /
    • 2001
  • 본 논문은 가정 내나 소호용의 멀티미디어 게이트웨이 서버 시스템에 관한 것이다. 가정 내 컴퓨터 시스템의 보급률이 높아지고 그 활용에 대한 관심이 많아지고 있다. 현재는 가정 내까지 ADSL망이 들어와 있고 가정 내에나 소호에 컴퓨터 유사 시스템들이 사용되므로 이들을 연결하는 망의 구성이 필요하다 본 논문의 장비는 이러한 망의 구성과 내부에서 외부의 망으로 접근을 하는 방법을 제공할 뿐아니라 외부망에서 내부망을 접근하여 내부기기를 통제하는 서어비스에 관해서도 논한다. 또한 DVD나 DTV 등의 멀티미디어 서어비스에 관한 것도 논하기로 한다. 가정이나 소호에 관련한 장비로는 무선랜, 블루투스, HomePNA, IEEE1394, DVD, Ethernet 등으로 구성되며 PLC에 관해서도 간략하게 논하도록 한다. 이러한 멀티미디어 게이트웨이 서버는 인터넷 게이트웨이로서 뿐만아니라 서어비스 게이트웨이로서의 역할을 하게된다.

  • PDF

Corporate Financial Fraud and Countermeasures in the Internet Era (인터넷 시대 기업의 재무부정과 대책)

  • Huang, Weidong;Jin, Shanyue
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.35-40
    • /
    • 2022
  • With the advent of the internet age and the outbreak of COVID-19, many companies have embraced online trade. However, due to the way the cyber economy works, the number of companies engaged in financial fraud by falsifying their transaction amounts and customer numbers has been gradually increasing. The purpose of this study is to analyze financial fraud of companies in the Internet era and to present solutions. Therefore, this study analyzed the financial fraud behavior of Luckin Coffee in China as an example and studied the causes and countermeasures of financial fraud. As a result, it was found that the cause of financial fraud lies in the opacity of cash flows from online transactions. The recommendations proposed by this study is to improve internal control systems in companies, develop risk management system, and establish comprehensive external supervision system

The development of remote control system using optical fiber communication on the basis of PLC (PLC 기반의 광통신을 이용한 원격 제어시스템 개발)

  • Kim, Jae-Moon
    • Proceedings of the KIEE Conference
    • /
    • 2001.11c
    • /
    • pp.327-330
    • /
    • 2001
  • 본 논문에서는 위험요소를 내재하고 있는 로켓시스템에 대해 원거리에서 실시간 모니터링 및 제어를 할 수 있도록 원격 제어시스템을 설계, 개발하였다. 뿐만 아니라 로켓 근처에 위치한 무인 시설물 내에는 원격제어에 따른 로켓내부 시스템의 각종 센서 출력값을 멀티채널방식을 이용하여 장시간에 걸쳐 저장하고 원격지에 위치한 유인 시설물 내에서 LAN 통신을 통해 데이터를 분석할 수 있도록 DAS(Data Acquisition System)을 설계하고 개발하였다. 개발된 시스템은 간이 연계시험을 통해 입증하였으며, 향후 3단형 과학로켓발사통제시스템에 적용할 예정이다.

  • PDF

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

효과적인 정보시스템 아웃소싱을 위한 개념적 모형에 관한 연구

  • 사공혜숙
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2000.11a
    • /
    • pp.17.2-25
    • /
    • 2000
  • 국내에서 아웃소싱은 선진국들과 다르게 비용절감을 목적으로 도입되고 있는 것으로 알려져 있다. 아웃소싱을 하는 기업들 중에는 서비스 인력을 충분히 내부화 할 수 있음에도 불구하고 단순히 관리상의 편의를 위해 아웃소싱을 하는 기업들도 적지 않다. 그리고 실제 기업에서 아웃소싱을 할 경우 기대치에 미치지 못하는 위험성이 대두되고 있다. 이에 본 연구의 목적은 선행연구에서 여러 학자들의 견해를 정리해서 아웃소싱의 성공에 영향을 미칠 수 있는 요인인 기술적 위험과 통제적 위험, 비용적 위험과 업무 유연성, 신뢰성, 시스템 확장성, 우수한 정보기술, 전문화된 인력으로 분류하여 연구모형과 가설을 설정하고 향후 실증연구 분석을 위한 토대를 마련하고자 한다.

  • PDF

Design of the Secure File System Module in the Operating System (운영체제에서의 보안 파일 시스템 모듈 설계)

  • Mun, Ji-Hun;Jang, Seung-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05a
    • /
    • pp.423-426
    • /
    • 2003
  • 본 논문에서는 외부의 접속을 파악하고 운영체제의 파일 시스템 레벨에서 보안 기능을 제공할 수 있는 커널 모듈을 구현한다. 네트워크를 통한 통제를 뚫고 침입해오더라도 파일 시스템에 저장 된 데이터를 읽을 수 없다면 내부의 중요한 자료 유출은 방지할 수 있을 것이다. 구현한 보안 파일 시스템 모듈은 운영체제의 동적 적재 모듈을 사용하여 커널 레벨에서 보안 기능을 제공할 수 있도록 구현하였다. 보안 모듈에서 제공하는 기능은 파일 및 디렉토리의 암호화 및 복호화하는 기능을 가지고 있다.

  • PDF

Development of Fire Control System with an Analysis of Impact Vibration and Impact Energy (충격체의 진동 및 충격량 분석을 이용한 사격 통제장비 개발)

  • Lee, Dong-Hee;Lee, Jong-Heon;Youn, Ju-Houc;Park, Noh-Sik
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.58-63
    • /
    • 2011
  • This paper presents a development of a fire control system with an intelligent judgment algorithm of hit or not. The presented algorithm analyzes an impact energy and impact signals according to impact materials. And the detected signals are used to judge the correct hit or not. Furthermore, Zigbee wireless communication technology is applied in the developed fire control system. The wireless communication technology can supply a simple installation of the practical system and free from ageing of communication wire. The presented system is verified in the practical fire test, and the results show the effectiveness of the development system.