• Title/Summary/Keyword: Active Directory

Search Result 16, Processing Time 0.024 seconds

A Study on Making of Infrastructure through Utilizing USB Security Module and Active Directory (USB 보안 모듈과 Active Directory를 활용한 인프라 구축에 관한 연구)

  • Nam, Gi Cheol;Lee, Deok Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.65-68
    • /
    • 2020
  • 자체 제작한 프로그램인 USB 보안 모듈과 Active Directory를 활용하여 서버에서 다수의 클라이언트를 관리할 수 있는 인프라를 구축한다. USB 보안 모듈과 기존 소극적인 보안 정책으로 인해 개인 또는 내부망으로 사용하고 있는 Active Directory의 보안 정책을 결합하여 극단적이고 폐쇄적인 강력한 보안 기능을 가능케 하며 그 효용성을 제안 한다.

A study on optimal security policy using USB security module and Active. (USB 보안 모듈과 Active Directory를 활용한 최적의 보안정책에 관한 연구)

  • An, Su Yong;Lee, Deok Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.475-476
    • /
    • 2020
  • 자체 제작한 프로그램인 USB security module과 Active Directory를 활용하여 서버에서 다수의 클라이언트를 관리할 수 있는 시스템을 구축한다. USB 보안 모듈과 Active Directory의 보안정책을 결합하여 극단적이고 폐쇄적인 강력한 보안을 가능케 하며 보안정책별 효용성을 살펴보고자 한다.

PC Audit and Forensics using Active Directory (Active Directory를 이용한 PC 감사 및 포렌식)

  • Lee, Yu-Bin;Lee, Seong-Won;Cho, Taenam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.212-215
    • /
    • 2019
  • Active Directory(AD)는 윈도우즈 환경 하에서 LDAP 디렉터리 서비스나 Keberos 기반의 컴퓨터 인증 등을 제공한다. 본 논문에서는 AD의 감사 기능을 이용하여 여러 컴퓨터들을 하나의 서버에서 로그를 관리하고 감사할 수 있는 2가지 방안을 제시한다. 이러한 로그를 이용하여 특정 컴퓨터에 대한 디지털 포렌식에 활용할 수 있을 것이다.

Dynamic Directory Table: On-Demand Allocation of Directory Entries for Active Shared Cache Blocks (동적 디렉터리 테이블 : 공유 캐시 블록의 디렉터리 엔트리 동적 할당)

  • Bae, Han Jun;Choi, Lynn
    • Journal of KIISE
    • /
    • v.44 no.12
    • /
    • pp.1245-1251
    • /
    • 2017
  • In this study we present a novel directory architecture that can dynamically allocate a directory entry for a cache block on demand at runtime only when the block is shared by more than one core. Thus, we do not maintain coherence for private blocks, substantially reducing the number of directory entries. Even for shared blocks, we allocate directory entry dynamically only when the block is actively shared, further reducing the number of directory entries at runtime. For this, we propose a new directory architecture called dynamic directory table (DDT), which is implemented as a cache of active directory entries. Through our detailed simulation on PARSEC benchmarks, we show that DDT can outperform the expensive full-map directory by a slight margin with only 17.84% of directory area across a variety of different workloads. This is achieved by its faster access and high hit rates in the small directory. In addition, we demonstrate that even smaller DDTs can give comparable or higher performance compared to recent directory optimization schemes such as SPACE and DGD with considerably less area.

An active object-oriented directory database model for management of telecommunication (통신망 관리를 위한 능동 객체 지향 디렉토리 데이타베이스 모델)

  • 이재호;임해철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.2
    • /
    • pp.435-446
    • /
    • 1996
  • In this paper, we present database model of directory systems that perform a task for distributed information repositories in communication network environments. A new model is developed through four phase: (1) A diretory database information is classified that would be stored in directory database as user, administrative, and supplementary information. (2) The modeling criteria are captured that would be used to model information classified. (3) Object-Oriented concepts are used in modeling classified information according to modeling criteria captured. (4) Methods applied to developed model are grouped, and active-based mechanisms such as trigger and constraints are developed. These selected methods and attributes are encapsulated into objects. Consequently they compose an Active Object-Oriented Directory Database Model.

  • PDF

A Study on Utilization Effect and Implementation Model of Directory Service Based Information Resource Management System (디렉터리 서비스 기반 정보자원 관리시스템의 활용 효과 및 구축 모델에 대한 연구)

  • Lee, Sung-Jun;Kim, Hyuk;Lee, Kwang Soo;Kim, Minsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.427-439
    • /
    • 2014
  • Introduction of new information systems due to continuous progress of ICT has made the enterprise IT environment into a mixed pot of various IT resources. Rapidly changing business situation has emphasized the integration of organizational IT resources as one of key competitive advantages. Those distributed IT resources are now demanding to solve the problems not only on their own effective management but also on security and control issues against unauthorized infiltration and information leakages. Under the situation that the number of IT resources is constantly increasing, it is needed to study a management model and its implementation that integrally solves above all problems. In this paper, it is revealed that a directory service can be used to integrally manage distributed IT resources and a directory service based system model for distributed IT resource management is suggested. By implementing an HR solution over active directory service, it is demonstrated that our integrated management model for distributed resources is applicable to real business cases. It is expected that for small and medium sized enterprises with limited IT investments, directory service based IT resource management system can be a cost-effective solution for increasing security threats and lack of governance.

Active Directory 환경에서의 침해사고 동향 분석 및 활용방안

  • Lee, Seulgi;Kim, Kayoung;Kim, Dongwook;Lee, Taewoo;Lee, JaeKwang
    • Review of KIISC
    • /
    • v.31 no.3
    • /
    • pp.73-80
    • /
    • 2021
  • 기업 내부 전산망을 관리하는데 용이한 Active Directory(AD) 환경이 보편적으로 사용되는 가운데, 적절치 않은 정책 설정으로 대형 침해사고로 이어지는 경우가 발생하고 있다. AD는 다수 시스템과 사용자 등 자원을 관리하기 효율적이라는 장점이 있지만, 핵심 권한을 탈취당하면, 모든 자원에 접근할 수 있다는 반작용도 존재한다. 한국인터넷진흥원은 기업의 보안성 제고를 위하여 AD 환경에서 발생하는 침해사고를 상세히 분석하고 최신 동향을 지속적으로 공유하고 있다. 하지만, 침해사고 보고서는 사업 특성 및 구축환경의 다양성으로 인하여 획일화된 대응 전략을 제시할 수 없으며, 기업에 특화된 적용방안은 각자 마련해야 한다. 본고에서는 공개된 보고서를 기업 환경에 적용하기 어렵다는 문제를 해결하기 위하여 최근 발생한 AD 환경에서의 침해사고를 분석하고, 각 기업에서 어떻게 활용할 수 있는지 방안을 제시한다.

Proposes the Total Management Model by using Directory Service and through the development HR Solution (Directory Service와 HR 솔루션 개발을 통한 IT 통합 관리 모델 제안)

  • Lee, Sung-jun;Kim, Min-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.684-689
    • /
    • 2013
  • The reality is that many security and administrative issues with the expansion of the IT assets in accordance with the abrupt change in the business environment, most companies today are struggling. Information within an organization is a party through external hackers and viruses that are increasingly intelligent risk, and the risk of internal data spills occur through an unauthorized party and internal information in accordance with the co-operation of the outsourcing company and the employee wants to see a sense of security and due to the frequent project asset outflows the risk is increasing gradually. In this paper, in preparation for such a growing security risk management and the increasing of problems, proposes the Total Management Model by using Microsoft's Directory Service & HR Solution that is an integrated management model that can take low-cost, high-efficiency.

  • PDF

Deployment of Standard Subdivisions Topics in Directory Classification Scheme (디렉토리 분류체계의 표준구분 관련 항목 전개)

  • Kim, Sung-Won
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.357-375
    • /
    • 2008
  • With the rapid distribution and active usage of the Internet, information search and retrieval through Internet has become a primary form of information access. This ubiquity of information access through Internet means the increased significance of search performance offered by Internet portals, since the optimization of search performance by portal has strong implication for the effective access of information through Internet in general. In this context, this paper investigates the classification scheme used in the directory service of internet portals, which provides selected and organized access to Internet information. First, the author analyzes the deployment of directory classification of standard subdivision topics used in traditional library classification system, with emphasis on the table composed of the form and approach, which are applicable to diverse subject areas. Then, based on this analysis, he proposed a method of applying certain subdivisions of the standard subdivision to directory service of Internet portals.

The Design and Implementation of the Directory Service for the utilization of USN (USN 활용을 위한 계층형 서비스 설계 및 구현)

  • Roh, Changbae;Na, Wonshik
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.2
    • /
    • pp.1-5
    • /
    • 2014
  • Connotation and unlimited growth potential as the core infrastructure to implement the u-Korea RFID/USN is emerging to lead to a future Internet that can bring a huge transformation in the industry sector. On RFID/USN increase overall social interest of our country, if the world who want to dominate the market by securing the u-Korea vision and global RFID/USN technologies IT839 depending on the policy, has been active research on the USN and USN infrastructure in the future building is completed as quickly to take advantage of the USN. USN applications will increase. Of USN middleware and necessitate USN infrastructure-based application development in order to more easily USN middleware configuration directory service is one of the core services. USN infrastructure suitable for the directory service when considering the characteristics of WSN, such as the USN components, update existing directory services and search focused on the problem and receive, this paper can overcome this directory service design and implementation discussed.

  • PDF