• Title/Summary/Keyword: Endpoint Protect

Search Result 6, Processing Time 0.017 seconds

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

Toxic Concentration(T-LOC) Endpoint Distance Study for Fire Brigade Protection in Response to Chemical Accidents (화학사고 초기대응 소방대 보호를 위한 독성농도(T-LOC) 끝점거리 연구)

  • Jong Chan Yun;Chul Hee Cho;Jeong Hun Won
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.6
    • /
    • pp.60-71
    • /
    • 2023
  • The purpose of this study is to propose a quantitative toxicity endpoint distance suitable for the initial response of firefighters by comparing and analyzing the commonly applied toxic level of concern (T-LOC), specifically emergency response planning guidelines (ERPG), acute exposure guideline levels (AEGL), and immediately dangerous to life or health (IDLH). This is to protect the fire brigade, which responds to toxic chemical accidents first during the golden time. Using areal locations of hazardous atmospheres, a damage prediction program, the amount of leakage for both acidic and basic substances, along with the endpoint distance, were analyzed for alternative accident and worst-case accident scenarios. The results showed that the toxicity endpoint distance, serving as a compromise between Level-3 and Level-2 of T-LOC, was longer than ERPG-3 and shorter than ERPG-2 with IDLH, while its values were analyzed in the order of ERPG-2, AEGL-2, IDLH, AEGL-3, and ERPG-3. It is suggested that the application of IDLH in an emergency (red card) and ERPG-2 endpoint distance in a non-emergency (non-red card) can be utilized for the initial response of the fire brigade.

MITRE ATT&CK and Anomaly detection based abnormal attack detection technology research (MITRE ATT&CK 및 Anomaly Detection 기반 이상 공격징후 탐지기술 연구)

  • Hwang, Chan-Woong;Bae, Sung-Ho;Lee, Tae-Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.13-23
    • /
    • 2021
  • The attacker's techniques and tools are becoming intelligent and sophisticated. Existing Anti-Virus cannot prevent security accident. So the security threats on the endpoint should also be considered. Recently, EDR security solutions to protect endpoints have emerged, but they focus on visibility. There is still a lack of detection and responsiveness. In this paper, we use real-world EDR event logs to aggregate knowledge-based MITRE ATT&CK and autoencoder-based anomaly detection techniques to detect anomalies in order to screen effective analysis and analysis targets from a security manager perspective. After that, detected anomaly attack signs show the security manager an alarm along with log information and can be connected to legacy systems. The experiment detected EDR event logs for 5 days, and verified them with hybrid analysis search. Therefore, it is expected to produce results on when, which IPs and processes is suspected based on the EDR event log and create a secure endpoint environment through measures on the suspicious IP/Process.

Design and Implementation of Network Access Control for Security of Company Network (사내 네트워크 보안을 위한 네트워크 접근제어시스템 설계 및 구현)

  • Paik, Seung-Hyun;Kim, Sung-Kwang;Park, Hong-Bae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.12
    • /
    • pp.90-96
    • /
    • 2010
  • IT environment is rapidly changed, thus security threats such as worms and viruses have increased. Especially company's internal network requires to be inherently protected against these threats. In this respect, NAC(Network Access Control) has attracted attention as new network security techniques. The NAC implements the endpoint access decision based on the collected endpoint security status information and platform measurement information. In this paper, we describe the design and implementation of unauthorized NAC which protect against such as a worm, virus, malware-infected PC, and mobile device to connect to company's internal networks.

A Study on DLP System for Preventing Internal Information Leakage (내부정보유출방지를 위한 DLP시스템 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.121-126
    • /
    • 2018
  • The development of modern ICT and network technologies has made the business environment smart.and under such circumstances, a great deal of data is being generated, stored and used. The important information that becomes an energy source for corporate management creates economic profit and value and is also utilized as a basis for strong influence. Therefore, important information must ensure its availability and convenience while ensuring confidentiality and integrity, which is the basic objective of information protection. However, most companies are seeing more and more incidents of serious damage due to the leakage of important internal information. In this study, we deal with the Data Loss Prevention (DLP) technologies and solutions to prevent internal information leakage and establish stable data security and information protection management.

  • PDF

Current Mechanistic Approaches to the Chemoprevention of Cancer

  • Steele, Vernon E.
    • BMB Reports
    • /
    • v.36 no.1
    • /
    • pp.78-81
    • /
    • 2003
  • The prevention of cancer is one of the most important public health and medical practices of the $21^{st}$ century. We have made much progress in this new emerging field, but so much remains to be accomplished before widespread use and practice become common place. Cancer chemoprevention encompasses the concepts of inhibition, reversal, and retardation of the cancer process. This process, called carcinogenesis, requires 20-40 years to reach the endpoint called invasive cancer. It typically follows multiple, diverse and complex pathways in a stochastic process of clonal evolution. These pathways appear amenable to inhibition, reversal or retardation at various points. We must therefore identify key pathways in the evolution of the cancer cell that can be exploited to prevent this carcinogenesis process. Basic research is identifying many genetic lesions and epigenetic processes associated with the progression of precancer to invasive disease. Many of these early precancerous lesions favor cell division over quiescence and protect cells against apoptosis when signals are present. Many oncogenes are active during early development and are reactivated in adulthood by aberrant gene promoting errors. Normal regulatory genes are mutated, making them insensitive to normal regulatory signals. Tumor suppressor genes are deleted or mutated rendering them inactive. Thus there is a wide range of defects in cellular machinery which can lead to evolution of the cancer phenotype. Mistakes may not have to appear in a certain order for cells to progress along the cancer pathway. To conquer this diverse disease, we must attack multiple key pathways at once for a predetermined period of time. Thus, agent combination prevention strategies are essential to decrease cancer morbidity. Furthermore, each cancer type may require custom combination of prevention strategies to be successful.