• Title/Summary/Keyword: 자산운용

Search Result 174, Processing Time 0.024 seconds

Design of N-IDS Log optimization system using correlativity of asset, vulnerability and threat (네트워크의 자산, 취약점 및 위협의 상관성을 이용한 N-IDS Log 최적화 시스템 설계)

  • 문호건;최진기
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.153-159
    • /
    • 2003
  • 수많은 정보자산들이 네트워크를 통해 연결된 환경에서 사이버 공격으로부터 정보자산들을 효과적으로 방어하기 위한 기본적인 수단으로 네트워크 침입탐지 시스템과 취약점 분석 시스템이 활용되고 있다. 그러나 네트워크 보안을 위해 개별적으로 운용되고 있는 네트워크 침입탐지 시스템과 취약점 분석 시스템이 보안관리 측면에서 오히려 보안 운용자의 부담을 가중시키는 요인으로 작용하고 있는 것이 현실이다. 따라서, 본 연구에서는 네트워크 보안 관리에 필수적인 정보 요소인 네트워크 자산, 취약점 및 위협이 갖는 의미와 상관성을 분석하고, 네트워크 침입탐지 시스템과 취약점 분석 시스템이 제공하는 정보들을 상호 연동하여 네트워크 침입탐지 시스템이 탐지하는 불필요한 경보정보의 양을 대폭 줄여 Log관리를 최적화할 수 있는 시스템을 구축하기 위한 설계방법을 제시하였다.

  • PDF

Analysis on Default Risk of Loan Assets of Commercial Chinese Banks (중국 상업은행의 대출자산에 대한 부실위험 분석)

  • Bae, Soo Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.47-52
    • /
    • 2022
  • The purpose of this study is to identify the risk level of Chinese commercial banks' loan assets and to analyze what factors affect the stability of Chinese commercial banks. In addition, Chinese commercial banks are classified based on the asset size of 200 billion yuan, and the difference in stability according to size is investigated. The analysis results are as follows. First, it was estimated that as the proportion of household and corporate loans of commercial banks in China increased, the stability of banks decreased. Although the Chinese financial authorities are currently restricting the conservative management of loan assets, it will be necessary to preemptively manage risk on loan assets by setting an appropriate standard for loan-to-deposit ratio in the future. Second, as a result of analyzing the stability of large banks based on 200 billion yuan of bank assets, it was estimated that the stability of large banks was lower. As large banks are likely to conduct aggressive loan asset management, continuous management of non-performing assets is required in the future. This study will serve as a measure for improving the stability of commercial banks in China by estimating the effect of loan asset management of Chinese commercial banks on financial stability. In particular, by examining the stability of large banks, a strategy for sustainable development of the financial industry is required by diagnosing the weaknesses of large banks.

A study on asset management investment strategy model by trade probability control on futures market (선물시장에서 거래확률 조정을 통한 자산운용 투자전략 모델에 관한 연구)

  • Lee, Suk-Jun;Kim, Ji-Hyun;Jeong, Suk-Jae
    • Management & Information Systems Review
    • /
    • v.31 no.3
    • /
    • pp.21-46
    • /
    • 2012
  • This paper attempts to offer an effective strategy of hedge fund based on trade probability control in the futures market. By using various technical indicators, we create an association rule and transforms it into a trading rule to be used as an investment strategy. Association rules are made by the combination of various technical indicators and the range of individual indicator value. Adjustments of trade probabilities are performed by depending on the rule combinations and it can be utilized to establish an effective investment strategy onto the risk management. In order to demonstrate the superiority of the investment strategy proposed, we analyzed a profitability using the futures index based on KOSPI200. Experiments results show that our proposed strategy could effectively manage and response the dynamics investment risks.

  • PDF

Information Asset Authentication Method for Preventing Data Leakage in Separated Network Environments (단독망 자료유출 방지를 위한 정보자산 인증 방안)

  • Ilhan Kim;Juseung Lee;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.3-11
    • /
    • 2024
  • Information security is crucial not only for protecting against external cyber-attacks but also for identifying and blocking internal data leakage risks in advance. To this end, many companies and institutions implement digital rights management(DRM) document security solutions, which encrypt files to prevent content access if leaked, and data loss prevention(DLP) solutions, which control devices such as USB ports on computing equipment to prevent data leaks. At a time when efforts to prevent internal data leaks are crucial, there is a growing need for control policies such as device control and the identification of information assets in standalone network environments, which could otherwise fall into unmanaged domains. In this study, we propose a Generation-Distribution-Application model for device control policies that are uniquely applied to standalone information assets that are not connected to internal networks. To achieve this, we developed an authentication technique linked with the asset management system, where information assets are automatically registered upon acquisition. This system allows for precise identification of information assets and enables flexible device control, and we have designed and implemented a system based on these principles.

A Study on Dynamic Glide Path of Target Date Fund Reflecting Market Expectations (시장기대를 반영한 타겟 데이트 펀드의 동적 글라이드패스에 관한 연구)

  • Moon, Myung-Deok;Kim, Sun Woong;Choi, Heung Sik
    • Knowledge Management Research
    • /
    • v.22 no.3
    • /
    • pp.17-29
    • /
    • 2021
  • The purpose of this study is to analyze investment performance by applying dynamic methodologies that reflect market expectations rather than traditional static methodologies in applying the glide path of target date fund. In calculating market expectations, the number of distributed shares in the ETF market was used, and the dynamic glide path model portfolio considering market expectations in the analysis period from late 2011 to October 2020 could show better results than the existing static glide path. According to the analysis, increasing the portion of risky assets at a time when the number of shares in the ETF's distribution increases, and in the opposite case, reducing the portion of risky assets is advantageous for profit. The results of this study are expected to provide useful theoretical and practical implications for researchers and asset management workers who are interested in knowledge management from a broad perspective beyond the boundary of pension asset management to the public fund market and ETF market.

Construction of web-based IT Assets Management System (웹기반 IT 자산관리 시스템의 구축)

  • Kim, Jae-Saeng;Sin, Hoa-Seang
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.193-200
    • /
    • 2012
  • As IT is also recognized as assets, IT assets management system is trying to introduce for the management and operation in domestic enterprises and public institutions. The general assets management system was introduced in domestic companies, but because it managed mainly the only simple information about the assets, there were a lot of operational difficulties of the assets. In order to operate effectively the IT assets used in special business such as bank, prosecutors, railway, etc the classification system of IT assets based on the EA was needed first of all. Accordingly, in this paper, we classified IT assets systematically according to the EA meta model Application Guide V1.4 in consideration of the characteristics about the IT asset business for A public institution, and performed to improve the operating costs and efficiency by implementing a web-based IT assets management system for this public institution.