• Title/Summary/Keyword: 비즈니스 연속성 관리시스템

Search Result 16, Processing Time 0.021 seconds

A study on how to build an efficient information system according to changes in IT infrastructure paradigm (IT 인프라 패러다임 변화에 따른 효율적인 정보 시스템 구축 방안에 대한 연구)

  • Kang, Hyun-Sun
    • Journal of Industrial Convergence
    • /
    • v.18 no.6
    • /
    • pp.27-32
    • /
    • 2020
  • Recently, as the business using IT has increased rapidly, a lot of budget is required to operate and manage the complex IT infrastructure. There is a need for a new IT infrastructure technology that can effectively and reduce costs. In this paper, we introduce CI(Converge Infrastructure) and HCI(Hyper Converge Infrastructure) methods, which are IT infrastructure methods for simplifying information systems and reducing operational management efficiency and cost. In addition, it proposes an information system using the HCI method, a new IT infrastructure technology, and a plan to establish a disaster recovery system to provide continuity of service in the event of a disaster or failure. In addition to the introduction of major technologies for using the HCI method, the area, power consumption, and operational efficiency of the information system before and after the introduction of HCI are compared and analyzed.

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

A Study on Activation of Authentication by Comparing ISMS and ISO22301 (ISMS와 ISO22301 비교를 통한 인증 활성화 방안)

  • Lee, Sun-Won;Lee, Sung-Yeop;Cheung, Chong-Soo
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.203-204
    • /
    • 2017
  • 본 연구에서는 국내의 정보보호관리시스템(ISMS)와 국외의 비즈니스연속성관리시스템(ISO22301)의 비교를 통해 ISO22301의 인증 활성화 방안을 모색하였다. 또한, ISMS와 ISO22301의 정의 및 필요성, 인증, 인증혜택 등을 알아보고 ISO22301 인증 활성화 방안에 대해 연구하였다. 연구 결과 ISMS 인증은 의무이고 인증 혜택도 전문업체 지정 시 가산점, 입찰 과제선정 평가 시 가산점 부여 등 명확한 혜택이 있었으나 ISO22301은 조직의 명성강화 브랜드 보호 등 인증의 혜택보다는 인증의 효과적인 측면이 강하므로 ISMS의 인증 중 입찰 과제선정 평가 시 가산점 부여, 정보보호관련 보험 가입 시 할인 혜택 등 명확한 혜택을 부여한다면 현재 ISO22301 인증 보다 활성화 될 것으로 판단한다.

  • PDF

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF

A Study for New Paradigm Settlement on Business Security Management: Focus on Global Business (산업보안관리에 관한 뉴패러다임의 정립: 글로벌 비즈니스를 중심으로)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.355-386
    • /
    • 2014
  • Current business environment asks the fundamental changes about business security. The essences of these changes are that the security management of today's global business is important task of managers and the security practitioner is professional who needs very specialized education and training with business thinking. Rapid process of globalization of global village tore down the business limit that was restricted on the geological areas' limitation. Rapid business environments' change that is driving depends on development of science and technology with globalization needs new paradigm to keep business continuity. With the process of globalization, Korea, which importance is gradually increasing in the national economy, has trade dependent economic system, which keeps power of national economy through trade, so Korean economic tendency is accelerating. To keep competitiveness in global market, new strategy that is different with existing domestic business management is necessary. That is, capacity of coping with outside risk in domestic business management is established in some degree, but business activities in foreign countries faces at numerous unexpected risks that differ from country to country such as difference with the custom, changes of corporate governance etc. To cope with these new risks effectively, new paradigm for business risk is necessary. Especially, flexibility of thinking like new paradigm is necessary to cope with new security risk effectively. To cope with security risk that occurs in the new business environment effectively and competes against international company in global market, company management and members' changes of cognition about security and innovative changes in security policy is necessary. In the basement of these changes, there is expansion of business security tasks, improvement of report line, enhancement of professionalism and status of security officers, variation of hands-on workers and increasing of investment to the security etc.

  • PDF

A Study on the Establishment of Business Continuity Management Systems of the Organization During a Pandemic Outbreak (Focusing on the finance correspond case) (유행병 발병 시 조직의 비즈니스연속성 관리체계 구축에 관한 연구(금융회사 사례 중심으로))

  • Kim, Dae Jin;Yang, Seung Weon;Choi, Deok Jae;Kim, Gi Won;Jang, Hyun Min;Kim, Dong Heon;Eun, Min Gyun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.93-101
    • /
    • 2016
  • In recent years, epidemics have raged with a 6-7 years period such as SARS (2002), Swine Flu (2009), MERS (2015). When an epidemic arises, the first advice is the isolation of infected patients and disease areas. Because it appears after a certain incubation period, the peoples worked with Infected (infection cause) staff and the place are largely exposed to the epidemic Risk. If you have an epidemic in the workplace, even if you close it, the business plan should be ready to continue the safety and protection measures for employees and the organization's core business. In this study We present the corresponding measures to protect the safety of the employees and to continue the core business during a pandemic outbreak and the introduction of BCP mainly corresponding practices of financial companies.