• Title/Summary/Keyword: 자산관리 시스템

Search Result 386, Processing Time 0.022 seconds

The ISO the research also the ISMS security maturity of 27001 regarding a measurement modeling (ISO 27004 information security management measurement and metric system) (ISO 27001의 ISMS 보안성숙도 측정 모델링에 관한 연구 (ISO 27004 정보보호관리 측정 및 척도 체계))

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.153-160
    • /
    • 2007
  • Recently, the demand against the system risk analysis and security management from the enterprises or the agencies which operate a information system is increasing even from domestic. The international against the standardization trend of information protection management system it investigates from the dissertation which it sees. It analyzed and against information property information protection management system integrated it will be able to manage a danger modeling it did it proposed. Having analyzed as well as compared the matureness of security-measurement models in regard to the global standard of proposal system, the administrative presentation for various IT technology resources. which have been managed singly so far, is now well applied under the united control of the company itself, and enabled the automated management of authentication support and renewal for ISO 27001, ISO 9000, ISO 14000, resulting in much advanced operation for both material and human resources.

  • PDF

Development of Location Data Stream Processor for RTLS (RTLS를 위한 위치 데이터 스트림 처리기 개발)

  • Lee, Seung-Chul;Hong, Bong-Hee;Kim, Gi-Hong;Park, Jae-Kwan
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.15-20
    • /
    • 2007
  • 최근 항만 물류 및 자산 관리 분야에서 실시간 위치 정보를 처리하는 RTLS(Real Time Locating System)시스템이 도입되고 있다. 이러한 시스템에서 RTLS 서버는 태그를 부착한 이동 객체들의 위치 데이터 스트림을 일정 시간 동안 수집하여 애플리케이션으로 전달한다. 이 때 위치 정보는 전파 굴절 현상으로 인해 오차가 발생하며, 이동 객체에 부착된 태그는 수 초 마다 위치 정보를 보고하기 때문에 시스템의 과부하를 초래하게 된다. 본 논문에서는 표준과의 호환성을 고려하고, 요구사항을 반영한 위치 데이터 스트림 처리기를 설계 및 개발하였다. RTLS 시스템의 전파 굴절 현상으로 야기되는 비정상적인 위치 오차를 보정하기 위해 맵 매칭 기법을 도입하여 위치 데이터 스트림의 신뢰성을 제공하며, 위치 변화가 없는 객체의 위치 데이터 스트림을 빠르게 정제하는 정지 상태 제거 필터를 개발하여 질의 처리 시 부하를 줄인다. 또한 각 애플리케이션의 질의 결과에 무의미한 위치 정보를 배제하는 중요 위치 수집기를 개발하여 시스템 성능을 향상시킨다.

  • PDF

Vulnerability Analysis and Research on Digital Contents Storage System (디지털콘텐츠 저장장치시스템의 취약성 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun;Choi, Jae-Wan;Kim, Won-Gil;Lee, Joong-Seok
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.35-41
    • /
    • 2007
  • In accordance with increasing of digital contents and rising of property value, the importance of storing equipment system which can store and control essential contents has been maximized, and securer storing equipment system overcoming various vulnerabilities is now required. Therefore, in this paper, we analyzed misuse, abuse, modification, leak, and various vulnerabilities of storing equipment system that might be damaged, and we researched into an intrusion detection & recovery system which can solve potential vulnerabilities.

  • PDF

Cyber Threat Military Response Strategy Using Information Security Risk Management (정보보안 위험관리를 활용한 사이버 위협 군사 대응 전략)

  • Jincheol Yoo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.173-179
    • /
    • 2023
  • The 4th Industrial Revolution technology has emerged as a solution to build a hyper-connected, super-intelligent network-oriented operational environment, overcoming the obstacles of reducing troops and defense budgets facing the current military. However, the overall risk management, including the increase in complexity of the latest inform ation technology and the verification of the impact with the existing information system, is insufficient, leading to serious threats to system integrity and availability, or negatively affecting interoperability between systems. It can be inhibited. In this paper, we suggest cyber threat response strategies for our military to prepare for cyber threats by examining information security risk management in the United States in order to protect military information assets from cyber threats that may arise due to the advancement of information technology.

The Integrated Cyber SRM(Security Risk Monitoring) System Based on the Patterns of Cyber Security Charts

  • Lee, Gang-Soo;Jung, Hyun Mi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.99-107
    • /
    • 2019
  • The "Risk management" and "Security monitoring" activities for cyber security are deeply correlated in that they prepare for future security threats and minimize security incidents. In addition, it is effective to apply a pattern model that visually demonstrates to an administrator the threat to that information asset in both the risk management and the security system areas. Validated pattern models have long-standing "control chart" models in the traditional quality control sector, but lack the use of information systems in cyber risk management and security systems. In this paper, a cyber Security Risk Monitoring (SRM) system that integrates risk management and a security system was designed. The SRM presents a strategy for applying 'security control' using the pattern of 'control charts'. The security measures were integrated with the existing set of standardized security measures, ISMS, NIST SP 800-53 and CC. Using this information, we analyzed the warning trends of the cyber crisis in Korea for four years from 2014 to 2018 and this enables us to establish more flexible security measures in the future.

A Study on the E-Learning System by Model Driven Architecture (Model Driven Architecture를 적용한 E-Learning 시스템에 관한 연구)

  • Song, Yu-Jin;Cho, Hyen-Suk
    • Journal of the Korea society of information convergence
    • /
    • v.1 no.1
    • /
    • pp.41-46
    • /
    • 2008
  • Contents application from contents development of web technical base and with the operation different environment information of the educational resources integration the importance and necessity of the management central chain e-Learning system will be able to operate are raising its head with base. Is the actual condition which develops the development process where but, the education application currently is not standardized in base. Approaches with an educational domain from the present paper consequently, and defines MDA(Model Driven Architecture) coats e-Learning System. Also uses a studying contents standard metadata and about the contents storage space analyzes and plans the core property which uses MDA automatic tools leads and under developing boil e-Learning System will be able to provide the contents which does in actual professor own necessity.

  • PDF

A System Dynamics Simulation on KIKO Derivatives and its Implications from International Trade (국제통상에서 KIKO 파생금융상품과 그 영향에 대한 시스템 다이내믹스 시뮬레이션)

  • Eom, Jae-Gun;Chung, Chang-Kwon
    • Korean System Dynamics Review
    • /
    • v.15 no.4
    • /
    • pp.5-28
    • /
    • 2014
  • Derivatives can be easily bought by those companies that need to hedge foreign currency debt or foreign currency assets through the financial market, considering their exchange rate exposure from international trade. The derivatives market has been growing rapidly due to the needs for investment and hedging. To manage foreign exchange risk, companies hedge risks through financial derivatives. According to our study, hedging is an effective way to mitigate the impact of exposure to exchange risk, as long as companies are only hedging underlying assets. Yet, covetous attitude toward the profit from derivatives and unexpected changes in exchange rate can cause problems for companies. This study analyzed the structural risks of derivatives with analysis of system dynamics. In particular, many companies suffered substantial loss due to KIKO during the economic crisis. We explained the problem therein through dynamic analysis. In addition, we revealed the structural problem that could cause a sudden spike in losses through simulations.

  • PDF

A Study on the Reference System for Spatial Information of Railway Object (철도 선로 및 시설물 공간정보 참조체계에 관한 연구)

  • Won, Jong-Un
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.441-448
    • /
    • 2014
  • The application of spatial information has drawn significant attention from a wide range of industries. Railway spatial information facilitates the cooperation among related parties and improves the efficiency of asset management and operations. This study proposes the structure of Railway Object IDentifier(ROID) on railway spatial information. Current facility management and train operation are based on relative positioning system. Despite many advantages, relative positioning system causes serious problems such as the entire reconfiguration of positioning in the case of line change. Another major concern is the interface compatibility between individual facilities with different relative positioning. ROID based on absolute positioning addresses these issues, allowing the information exchange and convergence between independent parties. This study proposes ROID based on OID standard with object IDentifier and service object-oriented reference system. Our ROID employs the absolute positioning and the unique identifier, maintaining the compatibility with existing management system.

Design and Application of Metadata Schema in Datawebhouse System (데이터웹하우스 시스템에서 메타데이터 스키마의 설계 및 활용)

  • Park, Jong-Mo;Cho, Kyung-San
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.701-706
    • /
    • 2007
  • Datawebhouse consists of both web log analysis used for customer management and datawarehouse used for decision support. However, datawebhouse needs complex operations for management in order to transform and integrate data from heterogeneous data sources and distributed systems. We propose a metadata schema in order to enable data integration and data management which are essential in datawebhouse environments. We show that our proposed schema supports datawebhouse development and enables integrated asset management of business information. With ETL metadata for web log extract, we can improve the data processing time of web log.

Development of Workshop Sensing SMS Systems (작업장 감지 SMS 시스템의 개발)

  • Kim Taek-Soo;Yoo Young-Dae;Sim Jung-Sub;Jo Myoung-Jin;Bae Jae-Hak J.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.601-604
    • /
    • 2006
  • 본 논문에서는 기업에서 관리되고 있는 설비 및 자산을 여러 가지 요인의 재난 위험으로부터 보호하는 것을 목적으로 하여 작업장 감지 시스템 WMS(Workshop Monitoring System)를 개발하였다. 이 시스템은 세 부분으로 구성된다. (1) 작업장 환경 자료를 수집하기 위한 센서 (2) 센서 데이타를 기록하고 SMS 메시지를 발생시키는 Status Logging Server (3) SMS Gateway 등으로 구성된다. 이러한 WMS는 각종 재해 발생시에 치명적인 손실을 초래 할 수 있는 시설들에 대해 즉각적인 조치를 위한 통보 시스템으로 활용할 수 있을 것이다.

  • PDF