• Title/Summary/Keyword: 오피스의 복합화

Search Result 5, Processing Time 0.023 seconds

Analysis on Importance of Information Security Factors for Smart Work using AHP -Based on the Mobile Office for Small Businesses- (AHP를 활용한 스마트워크 정보보호 요소의 중요도 분석 -중소기업의 모바일 오피스를 중심으로-)

  • Kang, Kyung-Hoon;Lim, Chae-Hong;Lim, Jong-In;Park, Tae-Hyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.415-426
    • /
    • 2013
  • Smart work has recently introduced as a way to solve problems such as greenhouse gas emissions, low birth rate and aging as well as to improve productivity. Because of development of ICT infrastructure and the proliferation of smart devices, the mobile office has the most commonly used within types of smart work in Korea. But the adoption of the mobile office in small businesses is only half of that of large corporations. The security issue appears to be one of the biggest obstacles to the introduction of smart work in small businesses. Therefore, the purpose of this study is to analyze the information security factors that should be considered when the mobile office is introduced to small businesses. By analyzing the previous studies, the information security factors of the mobile office are classified 5 groups composed of 24 factors. 5 groups are terminals, applications and platforms, networks, servers and users. According to the survey result using AHP, 'User' was drawn to the most important group, and 'Data Encryption', 'Wireless LAN Control' and 'Terminal Recovery When Leaving' were drawn to the important information security factors of the mobile office among 24 factors.

A Study of Office Open XML Document-Based Malicious Code Analysis and Detection Methods (Office Open XML 문서 기반 악성코드 분석 및 탐지 방법에 대한 연구)

  • Lee, Deokkyu;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.429-442
    • /
    • 2020
  • The proportion of attacks via office documents is increasing in recent incidents. Although the security of office applications has been strengthened gradually, the attacks through the office documents are still effective due to the sophisticated use of social engineering techniques and advanced attack techniques. In this paper, we propose a method for detecting malicious OOXML(Office Open XML) documents and a framework for detection. To do this, malicious files used in the attack and benign files were collected from the malicious code repository and the search engine. By analyzing the malicious code types of collected files, we identified six "suspicious object" elements that are meaningful in determining whether they are malicious in a document. In addition, we implemented an OOXML document-based malware detection framework based on the detection method to classify the collected files and found that 98.45% of malicious filesets were detected.

Study of Mobile App GUI Interface for SAP (SAP에 대한 모바일앱 GUI 인터페이스 연구)

  • Yoon, KyungBae;Park, Jong-Youel;Park, Dea-Woo
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.201-207
    • /
    • 2013
  • Recently, the interest in a Mobile Office is increasing dramatically and the Smart Phone App Service begin in earnest to be requested in an area of applying SAP system to PC. This study aims to research the system which can be easily implemented with the configuration and Mobile App which cause difficulties in embodying SAP system-based Apps suitable for a mobile environment. First, by realizing SAP system interface that can operate in mobile devices in the form of GUI, assisting the connecting parts of SAP for the users-friendly set-up, providing the communication method of Client, Application, and SAP Service in the form of web service through TCP/IP, and finally showing cases of implementing the method of delivering the data request and result value of Server and Client in the form of XML suggest more effective and new method, the research suggests a new way of making the linkage of SAP more efficient.

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

A Productivity Analysis Method of Curtain Wall Works Using Construction Simulation (건설 시뮬레이션을 활용한 커튼월 적층공법의 생산성 분석방안)

  • Park, Dong-Geun;Lee, Kyung-Suk;Yu, Byung-In;Kim, Young-Suk;Han, Seung-Woo
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.256-261
    • /
    • 2008
  • The curtain-wall work has been more frequently applied in the construction industry since demand of high-rise buildings has been increased. The curtain-wall work is usually performed with the frame work simultaneously for reducing construction period, but it might be delayed because of several problems caused by interference of process. However, there is not an appropriate tool which can be used by a work manager for adjusting quantity of the construction equipments or the workers when the curtain-wall work was delayed. To resolve this problem a construction simulation anticipating and analyzing potential problems before starting the work can be applied in the curtain wall work. This research suggests a general model for the curtain-wall work by using construction simulation and produces a combination of construction equipments and workers which can estimate optimum work productivity.

  • PDF