• Title/Summary/Keyword: 정보보안관리체계

Search Result 516, Processing Time 0.025 seconds

The Development of Map Supply System Based on Web (웹 기반 지도공급 시스템 개발)

  • Park, Ki-Surk;Park, Kyeong-Sik
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • The telecommunication technology in the 21st century has come up to the standard which could transmit various spatial information by means of on-line and the printing technology using computers has been on a par with presswork in quality. In addition, map users also would like to get various spatial information through on-line directly or indirectly. None the less, the supply system of national base map in our country has maintained the off-line sales method. It is owing to this reason that the nation's supply system has shown a high degree of inefficiency from the viewpoint of the inventory control, rapidity, and economical efficiency as compared with the on-line sales system in the developed countries. This study tried to analyze some problems of the present supply system in order to build up the foundation of the efficient map supply system and also developed the system such as On-demand maps, on-line paying and sales, inventory control, meta dat establishment, and security module, etc. This study tried to analyze some problems of the present supply system in order to build up the foundation of the efficient map supply system and also developed the system such as On-demand maps, on-line paying and sales, inventory control, meta dat establishment, and security module, etc.

  • PDF

Special Theme - 클라우드 컴퓨팅 - ICT Expert Interview

  • Heo, Ui-Nam
    • TTA Journal
    • /
    • s.139
    • /
    • pp.40-43
    • /
    • 2012
  • 주로 컴퓨터 자원(Platform, HDD, CPU)의 가상화를 통한 IT 인프라 관리 및 아웃소싱의 효율성을 추구하던 클라우드 컴퓨팅이 이제는 다양한 서비스 분야로 전환되고 있다. 심지어 사용자의 개인 데이터, 홈 가전기기, 헬스 기기 등의 모든 디지털화된 IT 자원이 스마트 폰, 태블릿 PC, IP-TV 중심의 N-Screen 등의 사용자 단말 기술들과 연계 및 진화하여 더욱 편리한 디지털 라이프의 변화를 주도하고 있다. 따라서 본 특집에서는 더욱 발전하는 클라우드 컴퓨팅의 주요 분야들 - 모바일 클라우드, DaaS(Desktop as a Service: 데스크톱 클라우드), 공공 부문의 SLA(Service Level Agreement), 퍼스널 클라우드 보안과 프라이버시 - 대해 기술적 동향과 이슈 등을 고찰하고자 한다. 특히 작금의 국제적 표준화가 ITU-T, ISO에서 조직과 체계를 구체적으로 마련하고 2012년부터는 본격적인 경쟁에 들어가는 중요한 시대적 위치에 있으므로 본 특집을 통해 국내 연구자 및 개발자들에게 표준화된 기술 및 서비스 개발에 동기를 부여하고자 한다. 본 특집을 기획하면서 클라우드 컴퓨팅은 IT의 인프라에서 응용까지 연계되어 서비스 산업의 좋은 모델로서 국가적 경쟁력을 끌어올릴 수 있는 중요한 기술임이 자명하며, 단기적으로 끝나는 기술이 아님을 다시 한 번 확인할 수 있는 좋은 기회로 산업의 많은 분야에 뿌리 깊이 내려지길 기대해 본다. 이를 위해 기업과 국가의 지속적인 개발과 지원에 대한 결정이 그 어느 때보다 필요하다.

  • PDF

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.

Risks and Safeguards of the Spywares (스파이웨어의 위험관리에 대한 연구)

  • Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.305-313
    • /
    • 2005
  • Spyware is any software which employs a user's Internet connection in the background without their knowledge or explicit permission. The installation of spywares is generally done in a sneaky, misleading or unannounced manner. It does not only compromise the security and privacy of affected users but also be an obstruction to the digital convergence and ubiquitous computing environments. This paper provides a summary of the definition, status, risk analysis, and security controls of the spywares. Furthermore, this paper suggests additional controls which should be considered at an individual, organizational and national perspective.

  • PDF

The study on the Effectiveness Improvement of physical security system: Focused on the Disaster Safety Awareness (시설보안시스템의 효과적 안전관리를 위한 연구: 재난안전의식을 중심으로)

  • Kim, Changho;Shin, Soyoung
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.615-621
    • /
    • 2015
  • Man-made disasters are disastrous event, which can be reduced the damage through preventive measures and thorough inspections, unlike natural disasters. Thus, safety consciousness of citizens is not only important, but also safety consciousness of security guard who are involved with facility safety management. In other words, safety consciousness and fostering professionalism of security guards could reduce the damage, including human disaster and it enables the effective safety management. Therefore, this study selected the training and the organizational safety as variables with the influencing factors for improving the disaster safety consciousness of facility guard. After the analysis, the following results were confirmed. First, the training content and its environment would have a significant impact on the disaster safety consciousness. Second, organizational safety would have a significant impact on disaster safety consciousness. In other words, the improvement of training program and the formation of safety culture in organizational level will have a positive impact on the disaster safety awareness and enable effective safety management.

BR2K: A Replication and Recovery Technique Using Kubernetes for Blockchain Services

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.77-86
    • /
    • 2020
  • In this paper, we propose a technique for blockchain service replication and recovery using kubernetes(BR2K) that robustly executes blockchain services based on replication and supports systematic recovery in case of the service failure. Blockchain services are being developed and applied in various fields such as administration, finance, and medical systems based on the features of blockchain, such as decentralization, high security, and data integrity. In such areas where service continuity is important, it is necessary to provide robustness for execution of blockchain services, and a recovery plan for service failure is also required. To this end, BR2K provides an execution replication technique that systematically supports the sustainable execution of blockchain application services. Also, it introduces a robust container registry based on the blockchain service registry, systematically supporting the recovery of service failures by using it. In addition, Truffle, a blockchain service development framework, is extended to utilize the Kubernetes container management tool, and BR2K provides a technique for rapidly deploying blockchain services using the extended framwork.

A Study of the Effectiveness and Status of the Information Security Disclosure System (정보보호 공시제도의 운영실태와 효과성 분석)

  • Baek, Seung Jun;Lee, Hong Joo
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.309-330
    • /
    • 2021
  • The information security disclosure system (ISDS) has been implemented since 2016 to ensure the protection of stakeholders and the right to know, and to promote voluntary investment in information protection by companies. Regarding the information security disclosure system, there have been studies that urge the implementation of the system, but studies that analyze the contents disclosed after the implementation of the system or suggest improvement directions are few. In this study, the contents of the information security disclosure system that had been announced on the information security industry promotion portal until 2019 were analyzed, the current status was summarized, and the direction of system improvement was suggested. In some cases, companies that disclosed information through the disclosure system increased the number of personnel in charge and obtained certifications related to information security, but did not find any effect on the increase/decrease in investment. The current disclosure system has not been activated because it has difficulty in giving individual companies incentives to disclose. Thus, this study suggests the inclusion of ISDS to information security management system (ISMS), which is currently mandatory for certain companies. In the current disclosure system, it is difficult for the company's stakeholders or customers to check the contents of the disclosure. As a way to do this, a method of including in the contents of the personal information processing policy or the notification of the use of personal information was suggested.

An Exploratory Study on the impact of EU Adequacy Decision on GDPR compliant companies (EU 적정성 결정이 GDPR 대상기업에 미치는 영향에 관한 탐색적 연구)

  • Kim, YoungSoo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.32-41
    • /
    • 2021
  • The EU enacted a law strongly regulating the GDPR to protect the privacy of its citizens on 25 May 2018. Compliance with GDPR is an essential prerequisite for companies to enter the European market in the global economic era. In this paper, Step-by-step measures have been defined to conclude DPA agreements for the appropriate level of protection against EU personal data transfer. To explore the benefits and expected effects of determining appropriateness at the government level. As a result, enterprises benefit from simplifying processes, reducing time, and reducing costs when entering the EU. Government-level support in response to personal data breach and communication with the EU Commission will have a positive impact, However, even after the adequacy decision, the entity continues to need activities to secure personal data through compliance with GDPR principles and obligations. Major operations of companies that comply with GDPR are also maintained as important tasks that must be observed in most cases except for the Data Protection Agreement.

A Study on the Improvement of the Intention of Continuous Use of Enterprise Content Management System: Focusing on the Technology Acceptance Model (기업콘텐츠관리시스템의 지속적 이용의도 향상에 대한 연구: 기술수용모델을 중심으로)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.229-243
    • /
    • 2021
  • As systematic information protection and management is recognized as an organization's core value, organizations are pursuing a shift from an individual-centered information management method to an organization-oriented information management method. The Enterprise content management system(ECMS) is a solution that supports document security and information sharing by insiders and is being introduced by many organizations due to recent technological developments. The purpose of this study is to present a method of improving performance through continuous use of the ECMS from the user's point of view and also suggest a method to improve the intention of continuous use through the expansion of the technology acceptance model. This study surveyed the employees of organizations that adopted the ECMS and verified the research hypothesis derived from previous studies through structural equation modeling. As a result of the analysis, usefulness, and ease of use affected on the intention of continuous use of the ECMS, and the knowledge sharing culture and the ECMS quality factors affected the technology acceptance model factors. The results of this study have academic and practical significance in terms of suggesting a plan to increase the usability of the ECMS from the user's point of view.

A Study on the Institutional Limitations and Improvements for Electronic Financial Fraud Detection (전자금융 이상거래 분석 및 탐지의 법제도적 한계와 개선방향 연구)

  • Jeon, Geum-Yeon;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.255-264
    • /
    • 2016
  • Due to the development of information and communication technology, the great change on economics has grown and the biggest change is the e-commerce. With the methods of electronic financial frauds becoming advanced, reported phishing incidents have greatly increased. The Fraud Detection System(hereafter FDS) has taken effect to prevent electronic financial frauds, but economic losses still occurring. This Paper aims to analyze the financial environment, financial information technology environment, financial information technology security environment and some features of the institutional changes. In order to supplement the defect of FDS, it gives some recommendations for the improvement of the effective FDS Management System and information sharing on frauds with some public institution and a major consideration for collection or utilization of personal information.