• Title/Summary/Keyword: Asset Database

Search Result 47, Processing Time 0.025 seconds

A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database (취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구)

  • Hyun, Suk-woo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1167-1177
    • /
    • 2019
  • In this paper, the improved security operation model based on the vulnerability database is studied. The proposed model consists of information protection equipment, vulnerability database, and a dashboard that visualizes and provides the results of interworking with detected logs. The evaluation of the model is analyzed by setting up a simulated attack scenario in a virtual infrastructure. In contrast to the traditional method, it is possible to respond quickly to threats of attacks specific to the security vulnerabilities that the asset has, and to find redundancy between detection rules with a secure agent, thereby creating an optimal detection rule.

Prospect Analysis for Utilization of Virtual Assets using Blockchain Technology

  • Jeongkyu Hong
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.64-69
    • /
    • 2024
  • Blockchain is a decentralized network in which data blocks are linked. Through a decentralized peer-to-peer network, users can create shared databases, resulting in a trustworthy and aggregated database known as a blockchain that enhances reliability and security. The distributed nature of the blockchain enables data to be stored on multiple nodes, eliminating the need for a central server or platform. This disintermediation significantly reduces the transaction and administrative costs. The blockchain is particularly valuable in applications where reliability and stability are critical because it establishes an open database that ensures data integrity, making it virtually impossible to tamper with or falsify data. This study explores the diverse applications of the blockchain technology in virtual assets, such as cryptocurrency, decentralized finance, central bank digital currency, nonfungible tokens, and metaverses. In addition, it analyzes the potential prospects and developments driven by these innovative technologies.

An Analysis on the Digital Contents of Costume Cultural Heritage (디지털기술을 이용한 복식 문화유산의 콘텐츠화 현황)

  • Kim, Yeo-Kyung;Kim, Jeong-Min;Hong, Na-Young
    • Journal of the Korean Society of Costume
    • /
    • v.62 no.4
    • /
    • pp.136-148
    • /
    • 2012
  • The purpose of this study is to investigate the current infrastructure of database on costume cultural heritage. The contents, kinds and accessibility regarding the digital contents of the websites of literature archives, museums and culturecontent.com by Korea Creative Content Agency were analyzed. First, it was evident that the quantity and quality of the database should be improved. The literature archives are mostly comprised of historical documents; however, the quantity of the database regarding the documents that are commonly studied in the field of traditional costume is not satisfactory. On the other hand, the quality of the database depends on the in-depth understanding of the terminology because errors occur when the contents of literature are transferred to an online database. Second, various information is required to meet the needs and interests of the digital environment. Most of the museums provide information on costume cultural heritage through their websites; nevertheless, it is not thorough and only partial. Third, the reliability of information needs to improve. The various contents provided by culturecontent.com lack reliability as it focuses on the entertainment values. To increase reliability, the source and origin of the information about the costume cultural heritage should be provided and the contents should be proofread before they are exposed to the public. Based on these findings, the researchers put forward the following suggestions: the quantity and quality of the databases should be enriched, and that more diverse information is required. Finally, more attention should be paid to increase the reliability of this information. This study will be an asset for the foundation to build solid databases and popularization of the traditional costumes.

Military Vulnerability Management Plan based on Military IT Asset Management System for Cyber Threat Response (사이버 위협 대응을 위한 군(軍) 정보화자산관리시스템과 연계한 군(軍) 취약점 관리 방안)

  • Kim, Jong Hwa;Lim, Jae Sung
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • The Cyber space of the ROK Army is constantly threatened by enemy. In order to reponse to such cyber treats, vulnerabilities of information assets of the ROK Army should be identified and eliminated early. However, the ROK Army currently lacks systematic management of vulnerabilities. Therefore, this paper investigates trends of each country's vulnerability management and the actual situation of the management of the vulnerabilities in the ROK Army, and suggests ways of linking vulnerability database and the ROK Army information asset management system for effective vulnerability management of the ROK Army information assets.

  • PDF

The Effect of Non-Performing Loan on Profitability: Empirical Evidence from Nepalese Commercial Banks

  • SINGH, Sanju Kumar;BASUKI, Basuki;SETIAWAN, Rahmat
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.709-716
    • /
    • 2021
  • The main objective of this research is to find out the effect of Non-Performing Loan (NPL) of Nepalese conventional banks. The population of this study is major commercial banks in Nepal and the data obtained for this study was from the period 2015-2019. This research used secondary data and it is collected from each bank's annual report and GDP and Inflation taken from the World Bank database. The method used for data analysis in this study is multiple regression analysis. The study used NPL as a dependent variable and Return on Asset (ROA), Capital Adequacy Ratio (CAR), Bank Size, GDP growth, and Inflation as independent/explanatory variables. The result of this research shows that ROA, Bank Size, GDP, and Inflation have a significant effect on NPL but CAR does not have a significant effect on the NPL of banks. In other words, the GDP effect on NPL in this study shows a positive and significant effect while most studies show a negative effect. It demonstrates that when GDP growth increases, there is a significant increase in the growth of Nepalese banks even though there were no significant changes in income growth. Therefore, GDP growth has a positive and significant effect on the NPL of commercial banks. Thus, the bankers and policymakers need to consider GDP growth carefully while taking NPL-related decisions.

Technique of Range Query in Encrypted Database (암호화 데이터베이스에서 영역 질의를 위한 기술)

  • Kim, Cheon-Shik;Kim, Hyoung-Joong;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.22-30
    • /
    • 2008
  • Recently, protection of personal information is getting more important. Many countries have legislated about the protection of personal information. Now, the protection of relevant personal information is required not for a simple image of enterprises but law obligation. Most databases in enterprises used to store customers' names, addresses and credit card numbers with no exceptions. The personal information about a person is sensitive, and this asset is strategic. Therefore, most enterprises make an effort to preserve personal information safely. If someone, however, hacks password information of DBMS manager, no one can trust this system. Therefore, encryption is required based in order to protect data in the database. Because of database encryption, however, it is the problem of database performance in terms of computation time and the limited SQL query. Thus, we proposed an efficient query method to solve the problem of encrypted data in this paper.

Study on the Method of Expressing the Genealogy of the formation of herbal treatments from Treasure Mirror of Eastern Medicines (인터넷상 동의보감 방제의 약물구성 계보 표현 방법에 관한 연구)

  • Lee, Byung Ook;Jung, Hoon;Kwon, Yung Kyu
    • The Journal of Korean Medical History
    • /
    • v.21 no.2
    • /
    • pp.41-47
    • /
    • 2008
  • As the IT technology develops there is a service on internet in which the herbal treatments from medicinal classics can be found in a form of a database. If an assay, and a verification on individual informations on materia medica and the herbal treatments from medicinal classics is established, it would be an enormously efficient asset for the formation of new treatment as well as interpreting the basic information on the efficacy of a treatment. If asp.net is used to make such a system, the user can have access to the informations on materia medica and its treatment without having to setting up a separate system, and especially the user can attain visual information on the genealogy of the herbal treatments in its formation. However, there is a need to develop a more efficient program in terms of organizing the informations on herbs and herbal treatments.

  • PDF

Models of Database Assets Valuation and their Life-cycle Determination (데이터베이스 자산 가치평가 모형과 수명주기 결정)

  • Sung, Tae-Eung;Byun, Jeongeun;Park, Hyun-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.676-693
    • /
    • 2016
  • Although the methodology and models to assess the economic value of technology assets such as patents are being presented in various ways, there does not exist a structured assessment model which enables to objectively assess a database property's value, and thus there is a need to enhance the application feasibility of practical purposes such as licensing of DB assets, commercialization transfer, security, etc., through the establishment of the valuation model and the life-cycle decision logic. In this study, during the valuation process of DB assets, the size of customer demand group expected and the amount of demand, the size and importance of data sets, the approximate degree of database' contribution to the sales performance of a company, the life-cycle of database assets, etc. will be analyzed whether they are appropriate as input variables or not. As for most of DB assets, due to irregular updates there are hardly cases their life-cycle expires, and thus software package's persisting period, ie. 5 years, is often considered the standard. We herein propose the life-cycle estimation logic and valuation models of DB assets based on the concept of half life for DB usage frequency under the condition that DB assets' value decays and there occurs no data update over time.

A Study on the Visualization and Utilization of Mapbox Online Map based on Citizen Science Using Park Tree Database - Focused on Data by Tree species in Seoul Forest Park - (공원 수목 데이터베이스를 활용한 시민 과학 기반 Mapbox 온라인 지도 시각화 및 활용 연구 - 서울숲 공원의 수종별 수목 데이터를 활용하여 -)

  • Kim, Do-Eun;Kim, Sung-hwan;Choi, Seong-woo;Son, Yong-Hoon;Zoh, Kyung-jin
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.4
    • /
    • pp.49-65
    • /
    • 2022
  • Since trees in the city are green assets that create a healthy environment for the city, systematic management of trees improves urban ecosystem services. The sporadic urban tree information centered on the site is vast, and it is difficult to manage the data, so efforts to increase efficiency are needed. This paper summarizes tree data inventory based on data constructed by Seoul Green Trust activists and constructs and discloses online database maps using Tableau Software. In order to verify the utilization of the map, we divided into consumer and supplier aspects to collect various opinions and reflect feedback to implement tree database maps for each area and species of Seoul Forest. As a result, the utilization value of tree database in urban parks was presented. The technical significance of this study is to systematically record the process of constructing and implementing a dashboard directly using the Mapbox platform and Tableau Software in the field of landscaping for the first time in Korea. In addition, the implications and supplements of landscape information were derived by collecting user opinions on the results. This can be used as an exploratory basis in the process of developing online-based services such as web and apps by utilizing landscaping tree information in the future. Although the visualization database currently constructed has limitations that ordinary users cannot interact in both directions because it utilizes business intelligence tools in terms of service provision it has affirmed both the database construction and its usability in web public format. In the future it is essential to investigate the assets of the trees in the city park and to build a database as a public asset of the city. The survey participants positively recognized that information is intuitively presented based on the map and responded that it is necessary to provide information on the overall urban assets such as small parks and roadside trees by using open source maps in the future.

Intelligent distribution equipment based distribution management system for fauIt prediction (고장예지를 위한 지능형기기 기반 배전운영시스템)

  • Lee, Hak-Ju;Kim, Ju-Yong;Chu, Cheol-Min;Kim, Joon-Eel
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2009.10a
    • /
    • pp.223-226
    • /
    • 2009
  • Various database and analysis system has been used for the cost effective maintenance of distribution facility but it is not effective because of the lack of interconnection among these systems. In order to overcome this problem this paper proposes reliability centered maintenance system based on the on-line monitoring of distribution system through intelligent distribution equipment. This system is made by the interconnection of distribution automation system, asset management system, failure analysis system and failure mode effect analysis system.

  • PDF