• Title/Summary/Keyword: 점검체계

Search Result 527, Processing Time 0.022 seconds

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

Research on Application of Requirements-based Software Reliability Verification to Domestic Military Aircraft (요구사항 기반 소프트웨어 신뢰성 인증의 국내 군용 항공기 적용방안 연구)

  • Jeong, Sang-gyu;Seo, Young-jin;Jang, Min-uk;Lee, Yoon-woo
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.4
    • /
    • pp.264-270
    • /
    • 2018
  • In recent years, It is required to verify software reliability according to DO-178, which announced by radio technical commission for aeronautics (RTCA) and recognized by the Federal Aviation Administration (FAA), for civil aircraft developed or intended to fly in the United States or Europe. This is because the reliance on software in each field is deepening, and the efforts for improvement of software reliability have been made first in civil aviation field where economic and social impacts are catastrophic in the event of an accident. In this paper, we have identified some issues to be considered for requirements-based reliability verification required by DO-178 to improve software reliability and present the major elements of the present weapon system acquisition procedure of DAPA for each stage. In addition, we analyzed the results of applying the identified main check factors to a domestic aircraft development project based on the information accumulated in overseas aircraft development projects. As a result, we have shown that it is possible to verify requirements-based software reliability according to DO-178 by adding key checkpoints to the current weapon system acquisition procedure and providing objective inspection criteria.

Fault-Free Process for IT System with TRM(Technical Reference Model) based Fault Check Point and Event Rule Engine (기술분류체계 기반의 장애 점검포인트와 이벤트 룰엔진을 적용한 무장애체계 구현)

  • Hyun, Byeong-Tag;Kim, Tae-Woo;Um, Chang-Sup;Seo, Jong-Hyen
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.1-17
    • /
    • 2010
  • IT Systems based on Global Single Instance (GSI) can manage a corporation's internal information, resources and assets effectively and raise business efficiency through consolidation of their business process and productivity. But, It has also dangerous factor that IT system fault failure can cause a state of paralysis of a business itself, followed by huge loss of money. Many of studies have been conducted about fault-tolerance based on using redundant component. The concept of fault tolerance is rather simple but, designing and adopting fault-tolerance system is not easy due to uncertainty of a type and frequency of faults. So, Operational fault management that working after developed IT system is important more and more along with technical fault management. This study proposes the fault management process that including a pre-estimation method using TRM (Technical Reference Model) check point and event rule engine. And also proposes a effect of fault-free process through built fault management system to representative company of Hi-tech industry. After adopting fault-free process, a number of failure decreased by 46%, a failure time decreased by 56% and the Opportunity loss costs decreased by 77%.

Performance Evaluation and Suggestions Based on the 2013 Child Care Center Accreditation System (2013년도 어린이집 평가인증 운영체계 개선에 따른 성과평가와 개선안)

  • Jae, Kyung Sook
    • Korean Journal of Childcare and Education
    • /
    • v.11 no.1
    • /
    • pp.501-521
    • /
    • 2015
  • This study aims to examine the effects of the main eight items amended in the 2013 child care center accreditation system and to provide suggestions. The participants in the study were 200 child care center teachers and staff; 150 professionals consisting of public officials in charge of child care, members for the accreditation committee, and inspectors at the site; and 144 parents. They participated in an on-line questionnaire survey conducted during the end of February, 2014. The survey questions regarding the eight changed items were the same to all the three participating groups, and three more questions were asked to child care center teachers and staff. The collected data were analyzed with frequencies and percentages to present general recognition level. For a group comparison, analysis of variance was first performed among 3 professional groups, all of which has the same size. When there was not a statistically significant difference among the three groups, the second analysis of variance was done among three groups of professionals including the three groups, teachers and staff, and parents. The results showed that there were differences in recognition among the groups regarding each changed item in the 2013 child care center accreditation system, but overall, the groups evaluated the main amendments positively and the changes were considered appropriate and necessary. However, it was found that in-depth reviews are needed of procedure unification to check the basics to require legal compliance; management of unaccredited centers such as valid period reduction and no accreditation, or limit for re-accreditation application; and the burdens of child care centers about surprise visits and notice of inspection dates in advance.

Development of the Standard Model of a Stated Period Check and Precise Safety Diagnosis in the Research Lab for Prevention to Electrical Accidents (전기사고방지를 위한 연구실험실 정기점검/정밀안전진단 표준모델개발)

  • Lee, Dong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.858-864
    • /
    • 2011
  • There is no standard model for a Stated Period Check and a Precise Safety Diagnosis to remove electric fire and shock in the university Lab and institute. Especially, the research for the Stated Period Check and the Precise Safety Diagnosis of the Lab related to electrical field is very weak currently, and it is very necessary to build a detail safety plan. This paper informs the specific standard guideline of the safety check list, method and equipment and it shows the way to evaluate safety grade too. This paper also provides the information of R&D process through the analysis of electrical safety check list of ordinary R&D Lab. It shows a new detail guideline to R&D Lab, and the new guideline removes existing problem and deliver the effective standard model to each R&D Lab. The standard model developed in this research adopts the clear guideline of each check list for the electrical environment of current R&D Lab. This standard model can be applied for every R&D Lab to detect routine safety check and detail safety check immediately. This Research will generally improve not only the effective safety check, but also the safety level for R&D Lab to prevent the electrical accidents.

Detecting Errors and Checking Consistency in the Object-Oriented Design Models (객체지향 설계방법에서 오류 검출과 일관성 점검기법 연구)

  • Jeong, Gi-Won;Jo, Yong-Seon;Gwon, Seong-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2072-2087
    • /
    • 1999
  • As software size ever increases and user's requirements become more and more sophisticated., the importance of software quality is more and more emphasized. However, we are not satisfied for the present techniques on detecting errors and checking consistency in the object-oriented design model. This paper proposes a systematic approach which produces implementable rules to detect errors and check consistency. At first, the meta-models for UML diagrams are constructed, generalized meta-rules are reduced from the meta-models, and then the meta-rules are applied to produce the implementable rules. This approach enables to pursue the completeness of the rules and the automation of rule application. An example of rule application shows the feasibility of the rule application.

  • PDF

Game Theory-Based Vulnerability Quantification Method Using Attack Tree (Attack Tree를 활용한 Game Theory 기반 보안 취약점 정량화 기법)

  • Lee, Seokcheol;Lee, Sang-Ha;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.259-266
    • /
    • 2017
  • In modern society, IT technology based systems are introduced and operated in various fields such as home, industry, and finance. To ensure the safety of society, IT systems introduced throughout society should be protected from cyber attacks. Understanding and checking the current security status of the system is one of the important tasks to response effectively against cyber attacks. In this paper, we analyze limitations of Game Theory and Attack Tree methodologies used to inspect for security vulnerabilities. Based on this, we propose a security vulnerability quantification method that complements the limitations of both methodologies. This provides a more objective and systematic way to inspect for security weaknesses.

Validity Elevation Scheme of Quality Inspection System for Defect Prevention & Management in Apartment Housing Construction (공동주택 하자예방 및 관리를 위한 품질점검제도의 실효성 제고방안 연구)

  • Park, Geun-Soo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2020.06a
    • /
    • pp.220-221
    • /
    • 2020
  • Strarting with Buyeong Apartment in Dongtan-2 disrict in 2017, collective complaints of residents are frequently occurring due to low quality problem such as improper construction and defects of apartment houses. Because of this, the Ministry of Land and Transport is preparing a comprehensive improvement scheme to improve the quality of Apartment Housing(AH), taking into account the continuing complaints from the residents of AH and the problem raised by the National Assembly. The basic profile of the improvement scheme is induce the tenants and experts to discover and point out defects that are repaired until the date of use inspection or due date. For this purpose, we suggested this defects management system linkaged by the preliminary inspection and quality inspection system for prospective occupants. In this context, this paper aims to suggest an effective likage method between the preliminary inspection of prospective residents and the quality inspection system implemented by local governments as an ordinance.

  • PDF

Performance Evaluation Method for Facility Inspection and Diagnostic Technologies (첨단기술을 활용한 시설물 점검 및 진단 기술 검·인증을 위한 성능평가 방법론)

  • Lee, Young-Ho;Bae, Sung-Jae;Jung, Wook;Cho, Jae-Yong;Hong, Sung-Ho;Nam, Woo-Suk;Kim, Young-Min;Kim, Jung-Yeol
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.1
    • /
    • pp.178-191
    • /
    • 2020
  • Purpose: This paper proposes a performance evaluation method for state-of-the-art facility inspection/diagnostic equipment through a trend survey of equipment and standardization systems of US, Japan, and Korea. This paper also suggests the priority of developing a performance evaluation method through expert interviews and surveys. Method: In this study, report for the last 5 years of FMS, state-of-the-art equipment of facility maintenance companies/safety diagnosis specialist agencies and papers/research reports/patents of NTIS were analyzed to identify recent trends of facility inspection/diagnostic equipment usages. standardization system of US, Japan, and Korea were analyzed to figure out a suitable form of a performance evaluation method for the domestic situation. And expert interview and survey were conducted to identify the priority of developing a performance evaluation method. Result: The performance evaluation method must be developed by the shape that only evaluates performance, regardless of types of equipment, on inspection item level for creative technology development. The priority of developing the performance evaluation method was identified as crack detection of concrete for durability evaluation and displacement/deformation/fatigue detection of concrete and steel for stability evaluation. Conclusion: The performance evaluation method will be developed firstly for the crack detection of concrete for durability evaluation and displacement/deformation/fatigue detection of concrete/steel for stability evaluation. In order to promote creative technology development, the performance evaluation method should be developed in a form that provides standardized specimens or testbeds and can be applied regardless of types of technologies.

Study on Information Security Management System Evaluation Methodology (국내환경에 적합한 정보보호관리체계 평가 방법론에 대한 연구)

  • Hong, Sung-Hyuk;Park, Jong-Hyuk;Seo, Jung-Taek
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.4
    • /
    • pp.384-391
    • /
    • 2008
  • These days, along with the information society, the value of information has emerged as a powerful factor for a company's development and sustainability, and therefore, the importance of the Information Security and Management System (ISMS) has emerged and become an integral part of all areas of business. In this paper, ISMS evaluation methods from around the world are compared and analyzed with the standards of various management guidelines, definitions, management of threats and vulnerability, approaches to result calculations, and the evaluation calculation indexes for domestic to propose the best method to evaluate the Information Security Management System that will fit the domestic environment.

  • PDF