• Title/Summary/Keyword: 비즈니스 서비스 연속성

Search Result 15, Processing Time 0.021 seconds

사이버 환경에서의 보안위협

  • KIm, Ji-Hoon;Cho, Si-Haeng
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.11-20
    • /
    • 2010
  • 정보시스템과 인터넷의 발전은 모든 정보 자산의 네트워킹이 가능해짐에 따라, IT 인프라를 중심축으로 한 정보사회 발전의 견인차 역할을 하였다. 최근에는 참여 공유 개방으로 대변되는 웹 2.0 기술과 함께 가히 폭발적인 스마트폰 시장환경이 맞물리면서 "모바일 웹 2.0" 시대로의 빠른 진화를 거듭하고 있다. 하지만 그에 따른 정보사회의 역기능도 만만치 않게 나타나고 있다. 우리는 이미 해킹 및 악성코드로 인한 정보 유출 피해를 비롯하여 서비스 거부 공격으로 인한 비즈니스 연속성 침해에 이르기까지 끊이지 않는 사이버 침해사고를 겪고 있다. 본 논문에서는 진화하고 있는 악성코드에 대한 최근 동향 분석을 통해 미래 정보 사회를 주도할 소설 네트워킹 환경에서의 보안위협이 어떻게 진화해 나가고 있는지 살펴보고자 한다. 또한 사이버범죄 및 사이버전쟁의 사례 분석을 통해 사이버 보안 문제에 대한 보다 적극적인 대응책 마련이 필요하다는 사회적 인지와 인식이 확립되고 보다 강력하고 안전한 대응 체계를 위한 우리의 노력이 끊임없이 연구되길 기대해 본다.

A study for improving database recovery ratio of Disaster Recovery System in financial industry (금융권 재해복구 시스템의 DB 데이터 복구율 향상을 위한 연구)

  • Kim, Jin-Ho;Seo, Dong-Kyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.655-667
    • /
    • 2014
  • A disaster is the time-excess case that computerized service can tolerate a failure and financial industry is being set up the disaster recovery system based on the disaster recovery plan and the business continuity plan for preparing these disasters. However, existing system can not guarantee the business continuity when it comes to cyber terror. This paper analyzes the building type and building technology of disaster recovery system for the financial fields. Also this paper explain the type of data backup using online redo log and type of archive log backup using WORM storage. And this paper proposes the model of improved data recovery combining above two types. Lastly this paper confirm the effectiveness and reliability for proposal rocovery model through the implementation of the test environment.

A study on how to build an efficient information system according to changes in IT infrastructure paradigm (IT 인프라 패러다임 변화에 따른 효율적인 정보 시스템 구축 방안에 대한 연구)

  • Kang, Hyun-Sun
    • Journal of Industrial Convergence
    • /
    • v.18 no.6
    • /
    • pp.27-32
    • /
    • 2020
  • Recently, as the business using IT has increased rapidly, a lot of budget is required to operate and manage the complex IT infrastructure. There is a need for a new IT infrastructure technology that can effectively and reduce costs. In this paper, we introduce CI(Converge Infrastructure) and HCI(Hyper Converge Infrastructure) methods, which are IT infrastructure methods for simplifying information systems and reducing operational management efficiency and cost. In addition, it proposes an information system using the HCI method, a new IT infrastructure technology, and a plan to establish a disaster recovery system to provide continuity of service in the event of a disaster or failure. In addition to the introduction of major technologies for using the HCI method, the area, power consumption, and operational efficiency of the information system before and after the introduction of HCI are compared and analyzed.

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF

A Study on the Factors of Individual Acceptance for Online Game (온라인게임의 개인적 수용 요인에 관한 연구)

  • Yoon, Gun-Woo;Kim, Won-Joon;Ryu, Seoung-Ho
    • Journal of Korea Game Society
    • /
    • v.9 no.3
    • /
    • pp.107-119
    • /
    • 2009
  • Online games belong to a technology-oriented service industry that has emerged from the assimilation of game contents and communication networks in the respective realms of culture technology (CT) and information technology (IT). This study examines the individual acceptance of online games as entertainment-oriented technology based on the belief-attitude-intention paradigm and the underlying hedonic and utilitarian motivations. To measure the latent variables influencing the acceptance process, a structured questionnaire was developed based on the existing Technology Acceptance Model. Research model analysis and hypothesis testing were carried out using a structural equation model. Results indicated that latent variables reflecting hedonic and utilitarian characteristics had a significant influence on user behavior in the acceptance of online games. By uncovering the core factors in! fluencing the acceptance of online games and thereby theoretically verifying the latent variables influencing the acceptance of entertainment-oriented technology, this study provides strategic implications for business models by game companies aimed at attracting a large user base and dominating the market.

  • PDF