• Title/Summary/Keyword: 내부통제

Search Result 302, Processing Time 0.024 seconds

Efficient Operation Model for Effective APT Defense (효율적인 APT 대응 시스템 운영 모델)

  • Han, Eun-hye;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.501-519
    • /
    • 2017
  • With the revolution of IT technology, cyber threats and crimes are also increasing. In the recent years, many large-scale APT attack executed domestically and internationally. Specially, many of the APT incidents were not recognized by internal organizations, were noticed by external entities. With fourth industrial revolution(4IR), advancement of IT technology produce large scale of sensitive data more than ever before; thus, organizations invest a mount of budget for various methods such as encrypting data, access control and even SIEM for analyzing any little sign of risks. However, enhanced intelligent APT it's getting hard to aware or detect. These APT threats are too much burden for SMB, Enterprise and Government Agencies to respond effectively and efficiently. This paper will research what's the limitation and weakness of current defense countermeasure base on Cyber Kill Chain process and will suggest effective and efficient APT defense operation model with considering of organization structure and human resources for operation.

An Exploratory Study on Security Threats of Smartwork Environment (스마트워크 환경에서의 보안 위협에 관한 탐색적 연구)

  • Ra, Jong-Hei;Choi, Young-Jin;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2012
  • Present many organizations are introduced to smartwork for reducing the operational cost and getting the labor's flexibility. The smartwork is the future-oriented worker's environment in which they can engage in their task, anytime and anywhere conveniently and efficiently. In spite of many smartwork advantages, the security problems are major issues and prevent to introducing and spreading of smartwork for organizations. Therefore, the success of the organization for smartwork environment is put in place appropriate security control model. This study is about security threats for smartwork security control model. We apply the exploratory method for this research, which are reviewing, analyzing of literature for extracting the security threats and clustering of the extracted security threats. Finally we define the 16's security threats according to the aspect of smartwork service layers.

Promotion and Wage in the Internal Labour Market : Sexual Differences (기업내부노동시장의 승진과 임금: 성별 차이를 중심으로)

  • 금재호
    • Korea journal of population studies
    • /
    • v.25 no.1
    • /
    • pp.181-211
    • /
    • 2002
  • Using the fourth data of the Korea Labor and Income Panel Study (KLIPS), this paper analyzed sexual differences in the promotion possibility and the promotion experience. Effects on wage of the promotion possibility and the promotion experience have been also discussed in detail. The promotion probability of a male worker in his current job is as high as twice than that of a female worker after controlling other independent variables. However, if we restrict the analysis to workers who either can be or was promoted, the sexual difference in the promotion possibility is greatly narrowed. This result suggests that the continuous career development without disruption is critical for the promotion of female workers. Analysing the sexual difference in wage using Oaxaca and Ransom's methodology, explanatory variables, such as human capital, residential area, etc., explained 69.5% of wage difference between male and female workers. Especially, 13.9% of wage difference was contributed to sexual differences in the promotion possibility and the promotion experience. This kind of empirical result emphasized once again the importance of promotion on wage.

Privacy Leakage Monitoring System Design for Privacy Protection (개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계)

  • Cho, Sung-Kyu;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.99-106
    • /
    • 2012
  • Numerous private corporations and public institutions are collecting personal information through the diverse methods for the purpose of sales, promotion and civil services, and using personal information for the profits of the organizations and services. However, due to immaturity of the technical, managerial measures and internal control for the collected personal information, the misuse, abuse and the leaks of personal information are emerged as major social issues, and the government also is promoting implementation of the act on the privacy protection by recognizing the importance of the personal information protection. This research describes on the measures to detect the anomaly by analyzing personal information treatment patterns managed by the organizations, and on the measures to coup with the leaks, misuse, and abuse of personal information. Particularly, this research is intended to suggest privacy leakage monitoring system design, which can be managed by making the elements related to personal information leaks to numeric core risk indexes to be measured objectively.

How "Covid-19" Affected Reporters' News Coverage?: Focusing on Reporters' Perception of Changes in Work Environment Before and After the Pandemic (코로나 19는 기자들의 취재관행에 어떤 영향을 주었나?: 팬데믹 전후의 근무형태 변화에 대한 기자 인식을 중심으로)

  • Yang, Young-Yu
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.11-21
    • /
    • 2021
  • The purpose of this study is to explore and analyze how the Covid-19 pandemic has affected the reporting practices and news production of the reporters working with Korean media over the past one year. To this end, this study has conducted in-depth interviews with reporters working with daily newspapers, news agencies, and broadcasting companies. The analysis of the interviews resulted in the following generalizations. The reporters are working at home, which was never experienced before the Covid-19 pandemic, and they have difficulties in covering their reporting beats because they have little or no access to contact points. The reporters rely heavily on indirect coverage and online briefings via phones or SNS because they have difficulties in meeting news sources in person. As a result, the diversity of news contents and the media's on-site monitoring functions has been severely weakened. In addition, the reporters have no chances to both exchange ideas with fellow reporters and to transfer the know-how of collecting news items to their juniors. This paper has also discussed the disruption of practices that the ongoing Covid-19 has brought to the media ecosystem from a variety of perspectives.

Study on Methodology of Collecting Realtime File Access Event Information (실시간 파일 접근 이벤트 정보 수집 방법에 관한 연구)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.447-448
    • /
    • 2021
  • The boundary-based security architecture has the advantage of easy deployment of security solutions and high operational efficiency. The boundary-based security architecture is easy to detect and block externally occurring security threats, but is inappropriate to block internally occurring security threats. Unfortunately, internal security threats are increasing in frequency. In order to solve this problem, a zero trust model has been proposed. The zero trust model requires a real-time monitoring function to analyze the behavior of a subject accessing various information resources. However, there is a limit to real-time monitoring of file access of a subject confirmed to be trusted in the system. Accordingly, this study proposes a method to monitor user's file access in real time. To verify the effectiveness of the proposed monitoring method, the target function was verified after the demonstration implementation. As a result, it was confirmed that the method proposed in this study can monitor access to files in real time.

  • PDF

Interactions between the National Assembly and the Executive in Korea: With Emphasis on Legislative, Budgetary and Investigatory Powers (국회와 정부의 관계: 입법권, 재정권, 국정조사권을 중심으로)

  • Park, Jai-Chang
    • Korean Journal of Legislative Studies
    • /
    • v.15 no.1
    • /
    • pp.39-63
    • /
    • 2009
  • Retrospecting the past 60 years of interactions between the executive and the legislature in Korea, it is found that the Korean National Assembly is neither a minimal legislature nor a marginal legislature any more. The symbolic role of the Assembly has acquired a remarkable growth and profound strength and there is no need to worry about institutional viability any further. However, its role as a resolver or manager of social conflicts is still under the dominance of the executive and shows even an indication that it might be worsened. Such incapability of the legislature owed much to the vertical control from the outside especially during the authoritarian regimes, however, nowadays it owes much to the inability of consensus building among the out-bursting controversial and horizontal opinions inside of it. Not sufficient managerial capability required for exercising autonomous decision making power efficiently is a major detrimental factor. It traces back to the inability of party politics and demassifying political leadership. Normalization of party politics is identified as one of the essential prerequisites for Korean political development in this regard.

Simulation of Optimized Production Technology System to verify the Supply Chain Management's Effectiveness (공급사슬경영의 유효성 입증을 위한 최적화생산시스템의 시뮬레이션)

  • 김종상
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.95-102
    • /
    • 2001
  • Supply Chain Management drawing attention of business management all over the world. This study has simulated OPT(Optimized Production Technology) to verify the Supply Chain Management's effectiveness The OPT system develops a detailed operating Philosophy, not just an operating procedure, and it includes many of the features of the JIT system and additional benefits as well The important OPT concepts such as. transfer batch. manufacturing process batch and batch it self served as a Pivotal role in increasing the productivity in manufacturing when they were altered. In this respect, this study develop the OPT simulation model, and this OPT model are evaluated by using a simulation study. It has proved that the performances of OPT model are excellent.

  • PDF

Economic Justification of the Internet Access Management (인터넷 차단 시스템의 경제성 분석에 대한 연구)

  • Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.269-278
    • /
    • 2005
  • To justify the economic impacts of the internet access management is a purpose of this paper. Previous researches on economic justification were reviewed and the internet access management system. sniffer, and firewall were implemented to monitor real-time sessions and to record blocked attempts. This paper suggests the impact factors and measurement methods to justify the economic values of the internet access management system. Finally, this paper Proves that the overall impacts of the internet access management system have a Positive value because filtering mechanisms cause users to lose a small number of URLs including useful information and to diminish refreshment but save users from various risk points and enhance labor productivity.

  • PDF

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.