• Title/Summary/Keyword: ESM

Search Result 192, Processing Time 0.027 seconds

Evaluation Items of ESM S/W by Case Analysis (사례분석을 통한 ESM S/W의 평가항목)

  • Kang, Deuk-Soo;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.84-94
    • /
    • 2010
  • ESM can do and wishes to investigate ESM software field base technology and investigate ESM software technology, market, standard and evaluation certification trend and develop evaluation model of ESM software that it becomes foundation to protect ESM software effectively that develop quality evaluation model of ESM software in this research by integration security administration system that gather fire wall, IDS, VPN etc. various kind of security solution by one. That is, because reflecting requirement of ESM software, develop evaluation module and proposed evaluation example along with method of exam.

Preparation and Tactile Performance of Soluble Eggshell Membrane (S-ESM) Embedded Waterborne Polyurethane (WPU) Composite

  • Soohyun Joo;Tridib Kumar Sinha;Junho Moon;Jeong Seok Oh
    • Elastomers and Composites
    • /
    • v.58 no.3
    • /
    • pp.112-120
    • /
    • 2023
  • Herein, we propose a facile water-processible method to develop an eggshell membrane (ESM)-embedded waterborne polyurethane (WPU)-based bio-degradable and bio-compatible coating material that exhibits attractive tactile properties. Virgin ESM is not dispersible in water. Hence, to develop the ESM-based WPU composite, soluble ESM (S-ESM) was first extracted by de-crosslinking the ESM. The extracted S-ESM at different concentrations (0, 0.5, 1.0, 1.5 wt %) was mixed with WPU. Compared to virgin WPU, the viscosity of S-ESM/WPU dispersion and the in-plane coefficient of friction (COF) of the composite film surfaces decreased with an increase in the S-ESM content. In addition, an increase in the S-ESM content improved the tribo-positive characteristics of the film. Different good touch-feeling biomaterials, such as fur, feather, and human skin exhibit tribo-positivity. Thus, the enhanced tribo-positive characteristics of the S-ESM/WPU and the decrease in their COF owing to an increase in the S-ESM content imply the enhancement of its touch-feeling performance. The S-ESM embedded WPU composites have potential applications as coating materials in various fields, including automobile interiors and artificial leather.

Development of an ESM System using Authentication Gateway (인증 게이트웨이를 활용한 ESM 시스템의 개발)

  • 김재한;한기준;백석철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.509-511
    • /
    • 2003
  • 인터넷을 이용하는 인구가 늘어남에 따라 인터넷을 통해 제공되는 서비스도 점점 다양해지고 있다. 이로 인하여, 다양한 서비스를 제공하는 각종 서버들에 대한 보안 사고도 증가하고 있다. 그리고, 보안에 대한 관심과 필요성이 증가하면서 많은 보안 솔루션들이 개발되었으며. 다양한 보안 솔루션을 상호 연동함으로써 종합적인 보안 관리를 하기 위한 ESM 시스템이 제시 되었다. ESM 시스템은 보안 위협에 대해 빠른 판단, 대응, 그리고 원격지 네트워크에 대한 보안 관리를 가능하게 한다. 그러나, 원격지 네트워크에 대한 보안 관리는 인터넷을 거치기 때문에 많은 보안 위협에 직접적으로 노출될 수 있다. 이를 해결하기 위해서 ESM의 메인 시스템 부분이 인터넷과 직접 연결되지 않도록 하여 직접적인 보안 위협으로부터 보호하고, 타겟 시스템의 모니터링 정보가 유출, 위조, 변조되는 것을 방지하기 위해서 사용자의 접근을 인증해주는 인증 게이트웨이의 활용이 필요하다. 따라서, 본 논문에서는 ESM의 메인 시스템 부분에 인증을 거친 에이전트만이 접근할 수 있도록 하여 ESM 시스템의 에이전트로부터 오는 정보를 안전하게 받음으로써 원격지 네트워크상의 서버나 보안 솔루션에 대한 통합 보안 관리를 안전하게 수행할 수 있는 인증 게이트웨이를 활용한 ESM 시스템을 개발하였다. 본 논문의 ESM시스템은 에이전트, 인증 게이트웨이, 매니저, CA 서버, 운용 소프트웨어로 구성되어 있다.

  • PDF

A Research on the LYNX-ESM System Operating and Performance Prediction Simulation Based on DEVS (이산사건 모델링 및 시뮬레이션 기반 LYNX-ESM 체계 시뮬레이션에 관한 연구)

  • Shin, Dong-Cho;Yun, Ki-Cheonn
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.4
    • /
    • pp.61-70
    • /
    • 2006
  • This paper is to describe LYNX-ESM Simulation System to simulate for EW operating environment analysis and system performance verification of LYNX-ESM system using Discrete Event Simulation(DEVS) Methodology. This system consists of 3 PC with TCP/IP network. Each PC is loaded with Modeling & Simulation program based DEVS. Each connected program conducts EW simulation. As a result, we analyze the operating environment of the maritime EW threat, simulate the EW threat discrimination and geolocation capability, and estimate the LYNX-ESM system effectiveness before real LYNX-ESM system development.

A study on the exchange method of audit data among ESM systems (ESM 시스템간 감사기록 교환방식에 관한 연구)

  • 민동옥;손태식;구원본;문종섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.394-396
    • /
    • 2004
  • 근래 네트워크환경에서 기업네트워크의 보안은 가장 중요하게 고려되고 있는 문제 중 하나이다. 기업네트워크의 보안을 위해 활용하고 있는 VPN, IDS, IPS VDS 등의 다양한 솔루션들은 일관된 관리가 용이하지 않기 때문에 ESM이라는 새로운 대안을 제시했다. ESM은 여러 가지 보안 솔루션을 통합관리 해 주므로, 솔루션의 낭비가 없고 효율적인 관리를 가능하게 하였다. 그러나, 이 ESM들이 가지고 있는 감사 데이터들은 타 ESM들과의 연계가 없기 때문에 독립된 데이터로만 존재하게 되었고, 그에 따르는 한계를 지니게 되었다. 본 논문에서는 이 ESM들의 감사 데이터를 보다 효율적으로 사용하기 위해 타 ESM들과 연계하여 감사 데이터를 교환하는 방식에 대해서 제시하도록 한다.

  • PDF

Efficient security solution structure design for enterprise security management system (통합 보안 관리 시스템 구축을 위한 효율적인 보안 솔루션 구조 설계)

  • Kang Min-gyun;Han Kun-Hee;Ha Kyung-Jae;Kim Seok-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.824-831
    • /
    • 2005
  • Past corporaion's network security system is single security solution, or mixed several ways, but there was inefficient system because doing not get into organic link But, constructed more strong security system by ESM enterance on. ESM uses way to integrate of each agent to manage easily various kinds security solution. That is, it is system that connect system of existent VPN, FireWall, IDS and so on configurationally depending on security policy and manage. ESM is security system that is developed more than existent security system. But, practical use of network and the development speed of technology being increasing with the mon faster speed, is heightening the level more as well as dysfunction of information crime and so on. Many improvements are required at ESM system, this research wished to make up for the weak-point in the ESM system about interior security. Studied on structure of security solution that is basis of security policy. VPN, Firewall, IDS's link that is main composition of existing security system analysis, reconstructed. And supplemented security of ESM system itself. Establish imaginary intrusion and comparative analysis access data that apply each Telnet Log analysys IDS existent ESM system and proposed ESM system comparative analysis. Confirm the importance of interior security and inspected security of proposed system.

A School Network Construction using the ESM System (ESM 시스템을 이용한 안정된 학내망 구축)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2005
  • Today, network is a fragile state in many threat attacks. Especially, the company serviced like internet or e-commerce is exposed to danger and targeted of attacker Therefore, it is realistic that the company use the security solution. It exist various security solution in our school network. For example, Firewall, IDS, VirusWall, VPN, etc. The administrator must manage various security solution. But it is inefficient. Therefore, we need the Management System to controll every security solution. In this paper, we deal with basic contents of security solution to manage the ESM and merits and demerits when use it. Also we suggest method that the Administrator can manage his network more efficiently and systematically by using the ESM in our school network.

  • PDF

Research about Asynchronous LAS Advanced & WRC Weblog Analysis of Practical use ESM (LAS Advanced & WRC 웹로그 분석을 활용한 ESM에 관한 연구)

  • Woo, Seung-Ho;Kang, Soon-Duk
    • The Journal of Information Technology
    • /
    • v.7 no.4
    • /
    • pp.9-20
    • /
    • 2004
  • Result Dos that materialization KNU Virus Wall to solve serious problem Hurtfulness Virus is present network chiefly in this research to do not become and do correct disposal in situation such as internet and Multiple Protocol that is done intelligence anger for ESM, CIS and MIS side as secondary to solve this problem about out log analysis system embody. As a result, could use comprehensively, and can click by Site Design, Packet transmission, and used to interior internet (GroupWare) in information protection aspect because intelligence enemy to face each other ESM's various hacking and virus uses Enterprise Security Management system and CIS, whole web through Smart View and relation of security could do monitoring.

  • PDF

Development of Security Evaluate Model and Test Methodology of Enterprise Security Manageent (ESM) Product (기업보안관리(ESM) 제품의 보안성 평가모델 및 시험방법론 개발)

  • Cha, Young-Hwan;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.156-165
    • /
    • 2010
  • ESM(Enterprise Security Management) is representing domestic security management, and there is requirement to enhance it. This paper will evaluate quality of ESM products, understand its quality level, and derive method to improvement so as to develop security evaluation model and test methodology which can support quality enhancement. In addition, it presented the performance test cases and evaluation method to measure product's security quality, and to perform research on the judgement method for the results based on appropriate criteria. Developed quality evaluation model is expected perform important role in evaluating and enhancing the quality of intrusion prevention system.

A Study on ESM(Enterprise Security Management) System Standard (통합 보안 관리 시스템 표준화에 대한 연구)

  • 소우영
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.109-121
    • /
    • 2002
  • As the development of information technology and thus the growth of security incidents, there has been increasing demand on developing a system for centralized security management, also known as Enterprise Security Management(ESM), uniting functions of various security systems such as firewall, intrusion detection system, virtual private network and so on. Unfortunately, however, developers have been suffering with a lack of related standard. Although ISTF recently announced firewall system and intrusion detection system log format, it still needs for truly efficient ESM further development of the related standard including event and control messaging. This paper analyses ISTF standard and further suggests an additional event and control messaging standard for firewall and intrusion detection systems. It is expected that this effort would be helpful for the development of ESM and further related standard.

  • PDF