• Title/Summary/Keyword: Enterprise Network

Search Result 433, Processing Time 0.024 seconds

A Probabilistic Model of Damage Propagation based on the Markov Process (마코프 프로세스에 기반한 확률적 피해 파급 모델)

  • Kim Young-Gab;Baek Young-Kyo;In Hoh-Peter;Baik Doo-Kwon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.524-535
    • /
    • 2006
  • With rapid development of Internet technology, business management in an organization or an enterprise depends on Internet-based technology for the most part. Furthermore, as dependency and cohesiveness of network in the communication facilities are increasing, cyber attacks have been increased against vulnerable resource in the information system. Hence, to protect private information and computer resource, research for damage propagation is required in this situation. However the proposed traditional models present just mechanism for risk management, or are able to be applied to the specified threats such as virus or worm. Therefore, we propose the probabilistic model of damage propagation based on the Markov process, which can be applied to diverse threats in the information systems. Using the proposed model in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

A Study on Acceptance Factors for MND-MDM (국방 MDM 수용요인에 관한 연구)

  • Lee, In-Seog;Lee, Choon-Yeul
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.355-368
    • /
    • 2011
  • For an effective warfare under the condition of NCW, the sharing of data between systems must be essential. Thus, the standardization and the integration of data which is considered as the MND-EA improvement and the Megacenter is important. The purpose of this research is to investigate the factors that affected the BI(Behavioral Intention to USE) by using the TAM(Technology Acceptance Model), That is to introduce the MDM into the national defense field which is an issue in every agency sector for data sharing. Also, based on the implementation architecture of Gartner which applies depending on the business enterprise type, the preferred architecture should be selected considering the national defense environment and the characteristics, and suggest an effective MND-MDM plan by analysing the effects on the BI. The survey was done through 19th September till the 7th of October 2011, by investigating the people in charge of the development and maintenance of the national defense information systems and the SI company's national defense team people who have experienced the development of the national defense information systems.

A Study on Efficient Software Education Donation Ecosystem

  • Kil, Hyunyoung;Lee, Won Joo;Lim, Chunsung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.175-182
    • /
    • 2018
  • In this paper, we propose a software education ecosystem model for activating software education donation. First, in order to investigate current software education donation status, we will conduct a survey on software education donors and analyze the results. 39.6% of the software education donors responded that they were introduced to software education donation activities through their affiliated companies, institutions, organizations. Therefore, it can be seen that the promotion of software education donation activities is the most effective by promoting through software companies, organizations, and organizations and using human networks. The subjects of software education donation activities were the highest at middle school students (73.9%), and the contents of software education donations were the highest at programming practice (63.3%). Donors' satisfaction with software education donation activities was 57.9%. The social support for SW education donors was in the order of software education contents support, activity cost support, equipment and network support, and place sponsorship. 87.4% of donors were willing to continue to donate to software education. The reason why they did not want to continue donating software education was 'lack of personal time' (65.4%). Therefore, it is necessary to develop appropriate social support and incentive system to overcome shortage of personal time in order to activate software education contribution. In order to promote sustainable software education donations, it is essential to establish a virtuous circle of software education donation ecosystem based on cooperation and solidarity with various organizations such as government, corporations, institutions, universities and civil society organizations.

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

Derivation of Functional Architecture of Cooperative Engagement for a Theater Ballistic Missile Defense (TBMD를 위한 협동교전 기능아키텍처 도출)

  • Kwon, Yong-Soo;Eom, Jin-Wook;Jung, So-Yeon;Lee, Yong-Ook;Choi, Kwan-Seon
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.391-400
    • /
    • 2012
  • This work describes a derivation of functional architecture of Cooperative Engagement (CE) for a Theater Ballistic Missile Defense (TBMD). The TBMD is composed of multi-layered defense systems as system of systems which includes network-based sensors, shooters and battle management. The Cooperative Engagement Capability (CEC) is a typical real-time battle management system, and the key function of the CEC is CE. The CE is a warfighting concept designed to defeat threats through the synergistic integration of distributed resources among two or more units. In this point of view, this paper proposed functional architecture through analyzing the CE concept, and was conducted as a pre-study to develop a CE based combat system of TBMD.

An Iterative Algorithm for the Bottom Up Computation of the Data Cube using MapReduce (맵리듀스를 이용한 데이터 큐브의 상향식 계산을 위한 반복적 알고리즘)

  • Lee, Suan;Jo, Sunhwa;Kim, Jinho
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.455-464
    • /
    • 2012
  • Due to the recent data explosion, methods which can meet the requirement of large data analysis has been studying. This paper proposes MRIterativeBUC algorithm which enables efficient computation of large data cube by distributed parallel processing with MapReduce framework. MRIterativeBUC algorithm is developed for efficient iterative operation of the BUC method with MapReduce, and overcomes the limitations about the storage size and processing ability caused by large data cube computation. It employs the idea from the iceberg cube which computes only the interesting aspect of analysts and the distributed parallel process of cube computation by partitioning and sorting. Thus, it reduces data emission so that it can reduce network overload, processing amount on each node, and eventually the cube computation cost. The bottom-up cube computation and iterative algorithm using MapReduce, proposed in this paper, can be expanded in various way, and will make full use of many applications.

The Study of Web Services Adaptation in Ubiquitous Environments (유비쿼터스 환경에서의 웹서비스 적용 기술)

  • Lee, Won-Suk;Lee, Kang-Chan;Jeon, Jong-Hong;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1031-1034
    • /
    • 2005
  • The beginning of Web Services was aware of efficient technology for application integration, thus it was used to integrating the distributed enterprise applications or the applications between business partners. But, recently the usage of Web Services is spreaded out not only internet applications but also wireless network applications. The main reasons are that Web Services is the international standard of W3C, and Web Services is based on XML that has the neutralized characteristics. Currently Major company of Web Services such as MS, IBM, etc. focus on the inte In this paper, we define and explain technical issues for adapting web services to ubiquitous Environment.

  • PDF

A Study on the Effective in the Internet News site of Banner Advertisement (인터넷 뉴스사이트 배너광고의 표현에 관한 연구)

  • 김문석
    • Archives of design research
    • /
    • v.12 no.2
    • /
    • pp.199-207
    • /
    • 1999
  • The internet technology is sufficient to attract our curiosity and adequate for enterprises to advertise its commercial message very effectively. It is a network that makes the computer be a major media. We have leading concerns in the internet advertisement because we expect that it will be the tool of a chief communication in the future. The banner advertisement in the Internet is considered as an active media. The banner advertisement is greatly various as the effective marketing tool from commercial banner to the personal homepage. Considering to the user's computer environment and Internet environment, this thesis shows what the banner advertisement of the enterprise's marketing and general understanding Influences expressions of the banner advertisement's creative factors and effective methods. It also suggests the analysis about the banner advertisement expression's creative factors. According to the analysis of banner advertisement in the domestic news site, It might be investigated the creative factor's absence and problems in design field.

  • PDF

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.