• Title/Summary/Keyword: 내부통제

Search Result 302, Processing Time 0.026 seconds

The Design of Military Security Audit based on the M-ISMS Model (M-ISMS 모델 기반의 군(軍) 보안감사 설계에 관한 연구)

  • Kim, Dae Gyu;Cho, Hee Joon;Kim, Chang Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.761-769
    • /
    • 2014
  • We propose an improved M-ISMS(Military-ISMS) model which is based on common ISMS model for regarding military's unique characteristics. Our model focuses on 'Internal Security Audit' and 'Management of external activity' as military circumstances. So, we added the six control new items as internal security audits. Because the confidentiality is more important than availability in military service as compared with private sectors. In addition, we propose some control suggestions for establishing security management standards and keeping level maintenance when it will becomes to lose a value as confidential. The M-ISMS model in this paper has effectiveness which prevents security incidents in advance rapidly throughout a variety of common ISMS's advantages and security incidents of private sectors in consideration of military characteristics.

Attribution Style of the North Korean Defectors: A Research through Comparison with South Korean People (북한이탈주민의 귀인 양식: 남한주민과의 비교를 중심으로)

  • Jung-Min Chae
    • Korean Journal of Culture and Social Issue
    • /
    • v.12 no.3
    • /
    • pp.1-22
    • /
    • 2006
  • This study is performed to identify attribution styles of the North Korean Defectors more accurately. For this purpose, cartoon-form method designed to measure attributions is used and total 129 subjects including comparison group of South Koreans are participated in this research. Interestingly, the result showed that two groups had similar and different attribution styles at the same time. That is, there is a common aspect in using internal attributions more in general, but there is also a different aspect in that South Koreans used internal attribution much more. These tendencies emerged similarly at the controllable and uncontrollable attribution dimension. However, the results demonstrated that South Koreans mainly used stable attribution and the North Korean Defectors used unstable attribution at the stable and unstable attribution dimension. And, the attributional styles of both koreans appeared consistently in a variety of scenarios. Finally, there was the stronger relationship between North Korean defectors' life satisfaction and attributional styles.

Establishing Risk Management Process for Improved Business Value of a Multi-Purpose Building Project (복합 시설 프로젝트의 사업 가치 향상을 위한 리스크 관리 프로세스 구축 방안)

  • Lee, Jong-Sik;Cho, Seung-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.1
    • /
    • pp.64-71
    • /
    • 2018
  • Project Management Institute of America separates the types of risk with external risks and internal risks. The external risk is an uncontrollable risk in projects such as changes of policy and related systems, climate, natural disasters, exchange rates and so on. The internal risk is an existing risk in the project itself that is controllable items in the project. Technical risks in project management are cost, quality, time, safety and environment. Therefore, both the external and internal risks should be managed to perform the construction project successfully. In particular, we can secure the quality and safety of facilities through the technical risk management. The importance of potential risk management has been emerging as a major interest and the lack of risk management delays projects and increases construction costs with negative effects of the building safety since the complex building, which is composed of a great number of facilities, consists of many project units and there are conflicts between various participants and stake-holders. This study presents the ways of establishing risk management processes to ensure the safety of the complex building. To that end, establishing procedure of risk management processes is presented and types of risk and factors in construction projects and counter strategies are presented as available risk information on the stages.

EDI감사용 의사결정시스템의 개발

  • 이상재;한인구
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.234-251
    • /
    • 1995
  • 본 연구에서는 EDI감사 의사결정지원시스템을 개발하였다. 이를 위해서 기존의 EDP감사 의사결정지원시스템 및 감사전문가시스템분야의 연구를 고찰했다. EDI감사를 위한 의사결정지원시스템은 통계, 위험, 회사의 개요, 테스트 항목등의 데이타를 저장한 데이타베이스 시스템이다. 시스템 개발을 위해서 E/R(Entity Relation)이나 DFD(Data Flow Diagram)분석을 통해서 논리적인 설계를 하였다. 시스템 개발은 개인용 데이타베이스팩키지인 FoxPro를 사용하였다. 이 시스템을 통해서 감사인이 필요한 테스트 결과를 조회하거난 저장할 수 있고 통제, 위험, 회사등의 상호조회를 통한 필요한 통제나 위험정도를 쉽게 조회해 볼수 있다. 회사마다 필요한 통제, 위험, 테스트 항목등의 체크리스트가 달라지는 경우에 이 시스템을 통해서 입력 저장하여 각각의 회사에 대해 다른 체크리스트를 저장하여 놓을수 있다. 본 시스템은 EDI감사뿐만 아니라 일반 EDP감사분야에도 적용가능할 것이다. 종이를 사용한 감사증적이 없음으로 인해 수작업에 의한 EDI감사는 어려움이 있고 EDP감사시스템분야의 국내 연구가 전무한 실정에서 EDI감사를 지원하는 시스템의 연구는 의의를 갖는다고 생각된다. 본 시스템을 통해서 EDI의 보안 및 감사업무의 효율성이 높아지고 EDI에 대한 위험에 효율적으로 대처할수 있게 될 것이다. 그리고 이러한 보안 및 감사기법과 통제모형을 지식베이스로 구축해서 실제의 위험노출상황에서 가능한 보안을 위한 통제방안이 여러가지가 있는 경우에 비용/편익 분석, 효율성, 회사방침 및 법률적인 문제등을 고려해서 최적의 보안통제 및 감사기법을 선택하는 것을 지원할 수 있을 것이다.고리듬을 개발 함으로써 내부점 선형계획법의 수행속도의 개선에 도움이 될 것이다.성요소들을 제시하였다.용자 만족도가 보다 높은 것으 로 나타났다. 할 수 있는 효율적인 distributed system를 개발하는 것을 제시하였다. 본 논문은 데이타베이스론의 입장에서 아직 정립되어 있지 않은 분산 환경하에서의 관계형 데이타베이스의 데이타관리의 분류체계를 나름대로 정립하였다는데 그 의의가 있다. 또한 이것의 응용은 현재 분산데이타베이스 구축에 있어 나타나는 기술적인 문제점들을 어느정도 보완할 수 있다는 점에서 그 중요성이 있다.ence of a small(IxEpc),hot(Tex> SOK) core which contains two tempegatlue peaks at -15" east and north of MDS. The column density of HCaN is (1-3):n1014cm-2. Column density at distant position from MD5 is larger than that in the (:entral region. We have deduced that this hot-core has a mass of 10sR1 which i:s about an order of magnitude larger those obtained by previous studies.previous studies.업순서들의 상관관계를 고려하여 보다 개선된 해를 구하기 위한 연구가 요구된다. 또한, 준비작업비용을 발생시키는 작업장의 작업순서결정에 대해서도 연구를 행하여, 보완작업비용과 준비비용을 고려한 GMMAL 작업순서문제를 해결하기 위한 연구가 수행되어야 할 것이다.로 이루어

  • PDF

A Case Study on the Developmental Bibliotherapy for Self-Actualization (자아실현을 위한 발달적 독서치료의 사례연구)

  • Nam Tae Woo;Lee Wone Jee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.2
    • /
    • pp.321-346
    • /
    • 2005
  • This research is a case study with the subject of 5th grade elementary students, practice a developmental bibliotherapy, and check the influence on the self-actualization. The subjects of this research is 20 students of 5th grade C elementary school in Gyeonggi Province, (including experimental group.10 students, control group: 10 students) and we practiced 12 times for 6 weeks. The result of the experimental group represents meaningful effects in the scales of inner-directed, self-actualization value, feeling reactivity, spontaneity, self-regard, self-acceptance. Then, we found in the lasting scale that the effect was lasting after 3 weeks. Therefore, we conclude that a developmental bibliotherapy can gives elementary students a positive influence, and help them form their proper notion as human being.

ICAN, I3A Design Criteria for Military Defense Command & Control Facilities (국방 지휘·통제 시설을 위한 ICAN, I3A 설계기준)

  • Jo, Yun-Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.806-815
    • /
    • 2017
  • Korean Ministry of National Defense has criteria for military facilities but most were made with the focus on design criteria of facilities and especially in the case of information and communication, only overall criteria with the level of conceptual design are suggested without details. By comparing the design standards of ICAN and I3A that are applied in US Department of Defense, this study will suggest the desirable design standard of Korean military on command/control facilities and general/administrative facilities.

A Study on Convergence Security of National Infrastructure (국가 인프라 시설의 융합보안 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.341-342
    • /
    • 2017
  • Control and development systems such as air traffic control systems, road traffic systems, and Korea Hydro &Nuclear Power are the infrastructure facilities of the country, and if the malicious hacking attacks proceed, the damage is beyond imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social problems. In this study, we analyze the environment of the development control system and analyze the status of the convergence security research, which is a recent issue, and propose a strategy system for stabilizing various power generation control systems and propose countermeasures. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control.

  • PDF

A Study on Convergence Security of Power Generation Control System (발전 제어시스템의 융합보안 연구)

  • Lee, Daesung
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.93-98
    • /
    • 2018
  • Korea Hydro & Nuclear Power Co., Ltd., Korea Electric Power Corporation, and Korea South-East Power Corporation are major infrastructure facilities of power supplying countries. If a malicious hacking attack occurs, the damage is beyond the imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social big problems. In this paper, we propose a strategy and countermeasures for stabilization of various power generation control systems by analyzing the environment and the current status of power generation control system for convergence security research, which is becoming a hot issue. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control.

  • PDF

Design and Implementation of Role Assignment Protocol for Active Role Assignment and Passive Role Assignment (능동적 역할 할당과 수동적 역할 할당을 수행하는 역할 할당 프로토콜의 설계 및 구현)

  • 나상엽;김점구
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.111-117
    • /
    • 2004
  • In distributed-computing environments, there is a strong demand for the authentication and the access control of distributed-shared resources. I have presented role-based access control (RBAC) concept that is in the spotlight recently. RBAC model shows the standardized access control of complicated organization's resources. In RBAC, senior role has junior role's permission by virtue of role hierarchy. But, junior role cannot perform the permission, which is granted to the senior or other role groups. Inheritances of permissions in role hierarchies are static. In order to tackle this problem, I propose a dynamic role assignment, which classified into passive role assignment and active role assignment, and design dynamic role assignment protocol and implement role assignment server.

  • PDF

A Study of Development of Diagnostic System for Web Application Vulnerabilities focused on Injection Flaws (Injection Flaws를 중심으로 한 웹 애플리케이션 취약점 진단시스템 개발)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.99-106
    • /
    • 2012
  • Today, the typical web hacking attacks are cross-site scripting(XSS) attacks, injection vulnerabilities, malicious file execution and insecure direct object reference included. Web hacking security systems, access control solutions, access only to the web service and flow inside but do not control the packet. So you have been illegally modified to pass the packet even if the packet is considered as a unnormal packet. The defense system is to fail to appropriate controls. Therefore, in order to ensure a successful web services diagnostic system development is necessary. Web application diagnostic system is real and urgent need and alternative. The diagnostic system development process mu st be carried out step of established diagnostic systems, diagnostic scoping web system vulnerabilities, web application, analysis, security vulnerability assessment and selecting items. And diagnostic system as required by the web system environment using tools, programming languages, interfaces, parameters must be set.