• Title/Summary/Keyword: 업무 연속성

Search Result 152, Processing Time 0.031 seconds

A Proposal of the Disaster Mitigation Activity Management System Model for Strengthening Disaster Prevention Activities (재난 예방활동 강화를 위한 재해경감활동관리체계 모델 제안)

  • Kim, Sang Duk;Kim, Chang Soo
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.502-513
    • /
    • 2019
  • Purpose: This study intends to review the procedures for the establishment of the plan for disaster mitigation activities and the system for the management of disaster mitigation activities for the requirements of the enterprise disaster management standard. Method: The requirements, including the activities of each stage of disaster management defined within the scope of the corporate disaster management standard, were identified, the operational cases of 'A' institution were reviewed, and the targets of continuous planning were reviewed to meet the requirements. Result: It was reviewed that the contents and procedures of each phase of disaster management, which is a requirement of the enterprise disaster management standard, are clearly defined, and a task continuity plan is established for each stage of activity. Conclusion: Conclusion : The PDCA model including the activities of each stage of disaster management activities was presented for the requirements of the enterprise disaster management standard, and the disaster mitigation activity management system model of the broad concept of disaster management including prevention and preparedness plans for disasters was presented.

A Study on the Application of Business Disaster Reduction Activities to Strengthen the Business Continuity of Hydrogen Charging Stations (수소충전소의 사업연속성 강화를 위한 기업재해경감활동 적용 연구)

  • Jang Won Lee;Chang Soo Kim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.411-420
    • /
    • 2023
  • Purpose: In order to compensate for the limitations of the risk assessment of hydrogen charging stations, it is proposed to apply business disaster reduction activities as a way to strengthen safety and business continuity for accidents that may occur during operation. Method: We explored the application of business disaster reduction activities that can reduce, eliminate, transfer, and accept risks by classifying risks according to the passage of time in the installation and operation of hydrogen charging stations, identifying key tasks, deriving risk scenarios. Result: Existing research results are appropriately applied to the risk assessment conducted in the stage before the installation of hydrogen charging stations. However, there is a limit to the risks that can occur at the operational stage, so applying business disaster reduction activities with several example scenarios has resulted in that it can be applied as a way to strengthen safety and business continuity. Conclusion: All of the currently implemented risk assessments for hydrogen charging stations are being used appropriately. However, it proposes business disaster reduction activities that apply various risk scenarios as an evaluation and response to possible risks at the operational stage.

Study of effectiveness for the network separation policy of financial companies (금융회사 망분리 정책의 효과성 연구)

  • Cho, Byeong-Joo;Yun, Jang-Ho;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.181-195
    • /
    • 2015
  • Financial industries have operated internal and external network with an unified system for continual business process of customers and other organizations in the past. The financial supervising authority requires more technical and managerial protecting policy to financial industries related to the exposure as danger of external attacks or information leakage. Financial industries performed network separation into internal business and external internet networks for protecting IT assets from malware infection accessing internet or hacking attacks and prohibiting leakage of customers' personal and financial information following financial supervising authority and redefine security policy to fit on network separated-condition. In this study, effectiveness for network separation policy was examined on malware inflow and verified that malware inflow in all routes can be blocked by the policy with analyzing operration data of a financial company, estimating network separation. Result of this study proves that malware infection route by portable storages was not completely blocked even on adapting network-separated condition. As a solution for this, efficient security policy would be suggested in this paper as controlling portable storages for maximizing effectiveness of network separation.

3D + Temporal Object Modeling (3D+Temporal 시공간 객체 모델링)

  • Lee, Hyun-Ah;Lim, Hun-Ki;Jin, Yong-Ri;Nam, Kwang-Woo;Ryu, Ken-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.89-92
    • /
    • 2000
  • 실세계 객체의 정보는 공간상에서 위치 또는 영역을 가지고 있으며 시간에 따라 변한다. 또한 여러 분야의 응용 업무들 또한 시간과 공간 개념을 합께 포함하고 있으므로 시간 데이터와 공간 데이터에 대한 동시 지원의 필요성이 부각되었으며 시공간 데이터베이스(spatiotemporal databases)의 필요성이 제기 되었다. 그러나, 지금까지 제안된 시공간 객체 모델은 2 차원 공간 데이터로 제한되어 있었으나, 이 논문에서는 3 차원 공간에 시간 영역을 확장하여 시공간 데이터를 제공하기 위한 통합데이터 모델을 제시한다. 여기서 제안된 3 차원 시공간 객체 모델은 이력 객체(discretely moving object)의 표현에 중점을 두었고, 이동 객체(continuously moving object)에 대한 모델은 연속적인 위치의 변화를 표현하기 위한 객체의 모델링에 초점을 맞추고 있다.

  • PDF

A Study of Basic Design Method for High Availability Clustering Framework under Distributed Computing Environment (분산컴퓨팅 환경에서의 고가용성 클러스터링 프레임워크 기본설계 연구)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.17-23
    • /
    • 2013
  • Clustering is required to configure clustering interdependent structural technology. Clustering handles variable workloads or impede continuity of service to continue operating in the event of a failure. Long as high-availability clustering feature focuses on server operating systems. Active-standby state of two systems when the active server fails, all services are running on the standby server, it takes the service. This function switching or switchover is called failover. Long as high-availability clustering feature focuses on server operating systems. The cluster node that is running on multiple systems and services have to duplicate each other so you can keep track of. In the event of a node failure within a few seconds the second node, the node shall perform the duties broken. Structure for high-availability clustering efficiency should be measured. System performance of infrastructure systems performance, latency, response time, CPU load factor(CPU utilization), CPU processes on the system (system process) channels are represented.

Business impact analysis for disaster management of large underground limestone mine (석회석광산 지하대형공간의 재난관리를 위한 업무영향력 분석)

  • Lee, Seong-Min;Kim, Sun-Myung;Lee, Yeon-Hee
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.15 no.6
    • /
    • pp.613-623
    • /
    • 2013
  • As Limestone mines have been operated with various environmental, societal and managemental problems depending on their characteristics and developing methods, many great efforts have been applied to solve these problems. Installing the mining facilities underground is one of the successful efforts to keep the sustainable limestone mine development. This effort could reduce these problems. However, unfortunately it made an side effect of constructing a large underground space in mining site. Moreover, this space caused a necessity of various disaster managements for the safety of workers and facilities. This study introduces the priority list of a limestone mining process if there are disasters in underground mining site. This result is coming from the risk assessment and business impact analysis on survey data which were obtained from the miners of that particular limestone mine. According to the result, the highest risk is 'disregard of safety guidelines in crushing & classifier process'. The result also shows the highest priority business, above all things, is 'a pit linked work of in & out process'.

The Construction of Logical, Physical Network Separation by Virtualization (가상화를 이용한 논리적, 물리적 망분리 구축)

  • Lee, YongHui;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.

The Risk Factors of IT Outsourcing Decision in the Korean Firms (기업의 IT 아웃소싱 수행의사에 영향을 미치는 위험요인 분석)

  • Moon, Song-Chul;Ahn, Yeon-S.
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.341-348
    • /
    • 2009
  • This paper analyzes the outcomes surveying 79 firms in Korea to investigate how Information Technology(IT) Outsourcing risk factors affects IT Outsourcing intention. Based on our literature reviews based on number of key articles, journals, and the focus group interviews, IT Outsourcing risk factor s are proposed into three different domains: Transaction, Client, Vendor perspectives. As the statistic al analysis, it found that the risk factors related on the client, vendor perspectives, is closely related to the IT Outsourcing intention of the Korean firms. So It will be desirable to prepare and resist the risk factors of clients of themselves and IT service vendor's for the adopting and enlarging the IT outsourcing implementation.

  • PDF

Analysis of University Information System Based on the Continuous Simulation Model (연속적 시뮬레이션 모델을 이용한 대학정보화의 도입효과 분석)

  • 박영홍;김경수
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.3
    • /
    • pp.10-17
    • /
    • 2000
  • This paper focuses m the measurement of increased work efficiency and competitive advantage expected from the implementation of information systems through random interactions of the organizational behavioral factors whose attributes can be changed with. Specifically, the work reported here is concerned with modeling and analyzing the interrelationships among the organizational behavioral factors which a university information system can have impact on throughout the time horizon of its implementation in terms of productivity. In addition, it is also concerned with developing a continuous simulation model to be used to assess the impact of the information system.

  • PDF

The feasibility study of the application of PRA(probabilistic reliability assessment) at the practical operational planning task (계통운영분야에 확률론적 신뢰도 평가 적용 가능성에 관한 연구)

  • Choi, H.S.;Song, T.Y.;Rju, H.K.;Jeon, D.H.;Kyak, N.H.;Choi, J.S.;Jeong, S.H.;Kwon, J.J.;Park, J.J.;Yoon, Y.T.;Lee, H.C.;Cha, J.M.
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.50-51
    • /
    • 2007
  • 과거 단일 회사로 구성된 전력산업 체제하에서의 신뢰도에 대한 인식과 중요성들이 전력시장과 경쟁이 도입된 다각화된 이해 주체들 이 존재하는 현행의 국내 전력산업 구조에서는 서로 다른 양상을 띄고 변화하고 있다. 전원 및 송?변전 시설계획에서부터 계통운영 계획 및 실시간 급전에 이르기까지 연속선상의 계통운영 업무에 있어 전력공급의 안정성 확보와 더불어 보다 합리적이고 효율적인 또는 경제적인 계획과 운영에 대한 요구(Needs)가 기존의 결정론적인 신뢰도 평가의 다각적 접근 즉, 확률론적인 신뢰도평가 기법을 개발하게 하였으며, 이에 미국 전력중앙연구소(EPRI)의 PRA(Probabilistic Reliability Assessment) S/W를 도입하여 실제 계통운영의 단위업무와 접목하여 리스크를 고려한 계통안전도평가 구현의 잠재적 가능성과 극복해야 할 한계를 파악하였다.

  • PDF