• Title/Summary/Keyword: Enterprise Network

Search Result 433, Processing Time 0.031 seconds

Study of Conversions Security Management System, Co-Relation Rule-Set scenario and architecture for incidence detection (융합보안관제환경을 위한 아키텍처 구축 및 활용 방안에 대한 연구)

  • Hwang, Donguk;Lee, Sanghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.353-371
    • /
    • 2014
  • We already have seen many studies and articles about the methodology responding the security risks and threats. But we still have some controversial subjects to be settled. Now, we are living in the era that we should focus on how to use the security systems instead of how to make it. In this point of view, a company need to find out the answer for these questions, which security risks have to be handled in a corporate, which system is better for responding the security threats, and how we can build necessary security architecture in case of developing systems. In this article, we'd like to study on-site scenarios threatening the corporate assets, the limit on dealing with these threats, and how to consolidate the security events and information from enormous assets. Also, we'd like to search for the direction form the actual cases which have shown the desired effect from converging the assets and network informations.

Design of DRM System in P2P Network Environment (P2P네트워크 환경을 위한 DRM 시스템 설계)

  • Lee Jeong-Gi;Kim Kuk-Se;Lee Gwang;Ahn Seong-Soo;Lee Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.829-832
    • /
    • 2006
  • The word P2P implies significant changes in current business dynamics. The P2P service enables individuals to be connected to the Internet for the direct provision of information and even downloads from one another without the conventional method of passing through search engines. This can be utilized to extend the path of retrieving information from limited web sites to personal and enterprise databases. That is, it is now possible for individuals to manage their own information on a national or global scope, share various information with other members, form communities of users interested in sharing homogeneous information, and utilize remote conference and remote education using groupware.

  • PDF

The Risk of Wardriving Attack Against Wireless LAN and its Counterplan (무선랜 워드라이빙 공격의 위험성과 대응방안)

  • Choi, Young-Nam;Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2121-2128
    • /
    • 2009
  • The application range of IEEE 802.11 wireless LAN has rapidly expanding from campus, enterprise to the public network of Hot Spot area due to the advantages of easiness of construction, mobility of wireless client station, convenience of usage and so on. However the security of WLAN(Wireless LAN) is vulnerable inherently because of using RF as a medium, and so the dangers of infringement of personal information and inside data of enterprises have increased and wardriving attack searching for security vulnerability in wireless LAN has become more serious especially. In this paper, we find out the overview of various procedures and preparatory stages for wardriving attack against wireless LAN, and propose complementary methods to prevent information infringement accidents from wardriving attack in wireless LAN. For this purpose, we make an equipment which is suitable for wardriving in wireless LAN and show security vulnerability of AP(Access Point) operation in WLAN around Yangjae-Dong in Seoul as a result of using the equipment.

Design of an Massive Storage System based on the NAND Flash Memory (NAND 플래시 메모리 기반의 대용량 저장장치 설계)

  • Ryu, Dong-Woo;Kim, Sang-Wook;Maeng, Doo-Lyel
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1962-1969
    • /
    • 2009
  • During past 20 years we have witnessed brilliant advances in major components of computer system, including CPU, memory, network device and HDD. Among these components, in spite of its tremendous advance in capacity, the HDD is the most performance dragging device until now and there is little affirmative forecasting that this problem will be resolved in the near future. We present a new approach to solve this problem using the NAND Flash memory. Researches utilizing Flash memory as storage medium are abundant these days, but almost all of them are targeted to mobile or embedded devices. Our research aims to develop the NAND Flash memory based storage system enough even for enterprise level server systems. This paper present structural and operational mechanism to overcome the weaknesses of existing NAND Flash memory based storage system, and its evaluation.

A Study on the Development Processes for Digital Contents in the Animation Industry (국내 애니메이션 기업의 애니메이션 콘텐츠 개발과정에 관한 연구)

  • Lee, Han-Chul;Jung, Jai-Jin
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.2
    • /
    • pp.246-259
    • /
    • 2007
  • The animation industry, which accelerates the overall development of the Digital contents industry, is a high value-added industry that produces synergy effects in cooperation with key industries such as IT. Effectively serving as a vital energy source for the Korean economy through its positive effects, such as employment creation. In particular, there is the real prospect that the Korean animation industry will gain ground in overseas markets and thus occupy them ahead of others, by advancing overseas in uni son with the hypersonic network industry. In this regard, this study aims to suggest some concrete ways in which to Korean animation companies can enhance their competitiveness. This is accomplished by positively verifying that some major representative methods of competitiveness enhancement, whose effectiveness has been proved in existing manufacturing and production systems. a re also excellently effective for the animation enterprise. In effect, the study has positively applied and carried out such research on Korean animation enterprises.

  • PDF

Implementation of Web services for Slip Data Process (전표데이터 처리를 위한 웹서비스 구현)

  • 황의철;정민영;정선태
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.57-64
    • /
    • 2003
  • A Web Service is an URL addressable set of functionality that is exposed over a network to serve as a building Hock for creating distributed applications. SOAP is a protocol that Web Service consumers often use, when they request and response to a Web Service, and it is a lightweight, XML-based protocol over HTTP for exchange to information in decentralized, distributed environments. A Web Service is very useful forimplementing common functions in especially a large size business area, because it is invoked by a protocol like HTTP or SOAP that we easily use, and by an XML-based data format In this paper, we implement Web Services that process dip data by computers in enterprise accounts in order to enhance the transparency and productivity of enterprises. we analyse the structure of slip data, design dip database, implement stored procedures for manipulating data of slip database, and make thorn controlled by Web Services. The result of this paper will contribute to the standardization and activation of accounting process systems for e-business area.

  • PDF

A Business Cluster of IT Enterprise (IT기업의 비즈니스클러스터)

  • Park, Jae-Sue;Park, Jung-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1558-1564
    • /
    • 2019
  • Corporate business clusters create a borderless business network through value chains and value creation activities. Clusters in the IT sector are crossing regional boundaries because of their rapid technological development and short product life cycle. To investigate this phenomenon, we examined the value activities of IT companies. As a result, the global expansion of the case companies was limited, but they had business clusters that exceeded the regional boundaries. However, because the order of business clusters is not advanced, value activities are focused on productivity rather than innovation. Given the rapidly evolving nature of IT, it is necessary to evolve into a business cluster that can create new value. Companies must design and implement value-creating processes to develop new technologies or enter new markets, which can lead to cluster growth. Companies must design and implement value-creating processes to develop new technologies or enter new markets, which can lead to cluster growth.

The Relationship Between Sustainability, SCM Performance, and Financial Performance of Korean SMEs

  • Han, Neung-Ho;Choi, Doo-Won
    • Journal of Korea Trade
    • /
    • v.26 no.2
    • /
    • pp.84-99
    • /
    • 2022
  • Purpose - This study carried out an empirical study of the impact of sustainability - which has been gaining attention as challenges are arising in supply chains based on existing trade networks due to the impact of the COVID-19 pandemic - on SCM performance and financial performance of Korean SMEs. The study seeks to propose a measurement model to enhance the SCM performance and financial performance of Korean SMEs and to identify the relationship between sustainability, SCM performance and financial performance to suggest implications to SMEs, governments, and relevant organizations. Design/methodology - Our Analysis established hypotheses that economic sustainability, environmental sustainability, and other factors related to sustainability have a positive impact on SCM performance and financial performance as well as SCM performance has a positive impact on financial performance, making empirical validations by utilizing Structural Equation Modeling based on data collected through survey from Korean SMEs. Findings - According to an empirical study, although environmental sustainability and economic sustainability among factors of sustainability had a positive influence on SCM performance, social sustainability did not have a statistically significant influence. Furthermore, it was learned that only economic sustainability had a positive influence on financial performance while SCM performance has a positive influence on financial performance. Originality/value - This empirical study explored the relationship between SCM performance and financial performance of Korean SMEs with a high tendency to depend on specific supply chains when the international trade network is in confusion and/or the global supply chain has collapsed. If Korean SMEs allocate management resources to the factors deducted from this study, they would be able to build more efficient supply chains and improve financial performance to improve sustainability.

Mobility and productivity: brain circulation and sustainability of the Korean academic system

  • Ki-Seok Kwon;Jeongmin Park;Somin Kim
    • Asian Journal of Innovation and Policy
    • /
    • v.12 no.1
    • /
    • pp.27-53
    • /
    • 2023
  • The purpose of this study is to examine the unique characteristics of the Korean academic system with regard to brain circulation, with a specific emphasis on the influence of overseas-trained academics on research activities within the Korean academic system. We have analyzed the statistical data on individual characteristics and performances of 48,499 Korean academics in science and engineering. We have examined the results at both the system and individual levels within the broader context of the macro characteristics of the Korean academic system. Our analysis reveals that the total number of domestically-trained academics exceeds the number of overseas-trained academics. However, in terms of research funding, overseas-trained academics tend to receive more funding than domestically-trained academics. Furthermore, after controlling other factors such as funding, personal attributes, and environmental factors, our analysis demonstrates that overseas training has a significant and favorable impact on the publication of internationally renowned journals. As such, the presence of overseas returnees has been essential for the effective functioning of the Korean academic system in the global research network and for conducting high-quality academic research. Therefore, the advantages of dependence on scientific core countries such as the US for overseas training have persisted. Nevertheless, upon scrutinizing the group of recently appointed 5,806 academics exclusively, we have discovered that junior academics who received their education domestically exhibit sufficient academic proficiency compared to their colleagues educated overseas. This observation highlights the potential for the Korean academic system to evolve into a self-sustaining system.

Modeling on Policy Conflict for Managing Heterogeneous Security Systems in Distributed Network Environment (분산 환경에서 이종의 보안시스템 관리를 위한 정책 충돌 모델링)

  • Lee, Dong-Young;Seo, Hee-Suk;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we defined the security policies using Z-Notation and the detection algorithm of policy conflict for managing heterogeneous firewall systems. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. With the process of the detection and resolution for policy conflict, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.