• Title/Summary/Keyword: Enterprise Security

Search Result 385, Processing Time 0.032 seconds

An Analysis on Awareness of Logistics Security in Korea Exporting Company (한국수출업체의 물류보안 인식에 관한 실태분석)

  • Choi, Hyuk-Jun;Choi, Mun-Sung
    • International Commerce and Information Review
    • /
    • v.12 no.1
    • /
    • pp.375-400
    • /
    • 2010
  • The recent financial crisis is not yet solved. Although economic conditions are improving, the real-economy is still frozen, and considering Korea's reality of relying heavily on external trade, hardships in the global economy fall entirely upon us. In particular, since developed nations like United States and the EU have intensified logistics security since the terror attacks on September 11, 2001 and can use it as a tool for protective trade, Korea with a high dependency rate on foreign trade needs to actively cope with changes to the trade paradigm in logistics security. This paper uses DAGMAR(Defining Goals for Measured Advertising Results), a model developed by the Association of National Advertisers(ANA) to measure the results of a communication campaign as its basic model, after partially modifying it to fit the paper's objective of conducting a more systematic analysis of awareness levels in Korean export enterprise regarding logistics security.

  • PDF

The method of recovery for deleted record in Oracle Database (Oracle 데이터베이스의 삭제된 레코드 복구 기법)

  • Choi, Jong-Hyun;Jeong, Doo Won;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.947-955
    • /
    • 2013
  • Most of the enterprise information is stored in the database. Therefore, in order to investigate the company's criminal behavior, forensic analysis is important for the database and delete record is a need to develop recovery techniques. This paper is explained structure of the oracle database tablespace file and analyzed system tables that stored table information. Further, we suggests a method of recovery for deleted record in oracle tablespace.

A Study on the Intrusion Detection Method using Firewall Log (방화벽 로그를 이용한 침입탐지기법 연구)

  • Yoon, Sung-Jong;Kim, Jeong-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.4
    • /
    • pp.141-153
    • /
    • 2006
  • According to supply of super high way internet service, importance of security becomes more emphasizing. Therefore, flawless security solution is needed for blocking information outflow when we send or receive data. large enterprise and public organizations can react to this problem, however, small organization with limited work force and capital can't. Therefore they need to elevate their level of information security by improving their information security system without additional money. No hackings can be done without passing invasion blocking system which installed at the very front of network. Therefore, if we manage.isolation log effective, we can recognize hacking trial at the step of pre-detection. In this paper, it supports information security manager to execute isolation log analysis very effectively. It also provides isolation log analysis module which notifies hacking attack by analyzing isolation log.

  • PDF

Analyses and Considerations for Data base Security Requirements for Desktop Virtualization (데스크톱 가상화를 위한 데이터 보안 요구 사항 분석 및 고찰)

  • Wu, Daming;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.634-636
    • /
    • 2015
  • As the expansion of enterprise scale and the increase of staff, the amount of terminal is increasing as well. It is very difficult to the system manager of traditional data protection scheme to manage and maintenance for the large number of terminals. This problem can be solved by desktop virtualization, which use traditional security problems still exist and new security problems occur at the same time. Using desktop virtualization, it needs a method of automatic security protection. In this paper, the desktop virtualization security requirements are discussed.

MFP Security Vulnerability Analysis and Security Policy for Enterprise Information Loss Prevention (기업 정보 유출 방지를 위한 MFP 보안 취약점 분석 및 보안대책)

  • Lee, Dongbum;Choi, Myeonggyun;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.627-630
    • /
    • 2012
  • MFP는 프린터, 복사기, 스캐너, 팩스 등의 장치가 결합되어 있는 임베디드 장치로써 출력, 복사, 스캔, 팩스 외에도 대용량의 문서 데이터를 저장하고 네트워크 통신을 이용한 원격 유지보수, 다중 전송 등의 기능을 갖고 있다. 이러한 MFP는 최근 기업 및 공공기관에서 업무의 효율성 증대와 경비절감을 위해 중요한 문서를 처리하는 장비로 널리 보급되고 있다. 하지만 내부 직원이나 공격자들에 의해 중요한 문서들이 외부로 유출되면서 기업의 피해가 증가하고 있다. 따라서 본 논문에서는 기업 내부 정보 유출을 방지하기 위해 MFP에서 발생할 수 있는 다양한 보안 취약점과 그에 따른 대책을 분석하였다.

The Concept of Human Resource Management in Logistics Processes

  • Shtuler, Iryna;Zabarna, Eleonora;Kyrlyk, Nataliya;Kostovyat, Hanna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.110-116
    • /
    • 2021
  • The article focuses on the need to deepen the issue of human resource management in logistics processes. It is noted that changes in market conditions and turbulence in the institutional environment require managers to form a highly effective human resources policy capable to ensure the innovative development of the enterprise. Functional strategies for human resource management in logistical processes are proposed, namely: adaptive, innovative, selective and exclusive. Innovative technologies that should be used in the adaptive human resources policy process are identified.

A Study on Preparation Plan against National Industrial Technology Outflow (국가 산업기술유출 대비 방안 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.55-62
    • /
    • 2009
  • Industrial Security is a management activity protecting industrial asset of enterprise by application of security elements(physical, IP, conversion security tools) and can be understood as a comprehensive term including software aspect(establishment of policy and strategy, maintenance operation, post- response act, etc.) as well as the operation of hardware elements. In this paper, after recognizing the definition and relative concept of industrial security, the role and its relative laws of the industrial security organizations, the management system and the reality, I will find some problems and submit a reform measure. Furthermore I would like to propose the policy direction to enhance the national competitiveness and to become one of the advanced nations in 21st industrial security through the effective industrial security activities of our enterprises.

  • PDF

The Case Study on Weighted DB Security Appliance Development (Light Weighted DB 보안 어플라이언스 개발 사례 연구)

  • Seo, Yang-Jin;Lee, Jae-Pil;Lee, Chang-Hoon;Chang, Hang-Bae
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.397-408
    • /
    • 2010
  • SMEs (Small and Medium-sized Enterprise) have became competitive by improvement of work efficiency due to utilization of DBMS, which is mainly used among large enterprises, but reverse functions such as security events and vulnerabilities have been increasing. SMEs without enough investment on security infrastructure have difficulties with implementing DB security products. Therefore the most of SMEs are exposed to hacking and security accidents defensivelessly. Hence this study offers distributional H/W DB security solution which is affordable for SMEs.

Business Performance Impact Caused by Display Restriction of Customer Information Identifier: Focusing on Domestic Securities Business (고객정보 식별자 표시제한으로 인한 업무영향에 관한 연구 - 국내 증권 업무를 중심으로 -)

  • Shin, Sangchul;Lee, Youngjai
    • The Journal of Information Systems
    • /
    • v.22 no.4
    • /
    • pp.49-69
    • /
    • 2013
  • Recently, enterprises have reinforced security control in order to prevent infringement of personal information and abuse of customer information by insiders. However, the reinforcement of security control by enterprises makes it difficult for internal users to perform business by using a business information system. There is, therefore, a need for research on various fields, which makes it possible to establish an appropriate security control policy while minimizing an impact on business. The present research verifies and analyzes an impact on difficulty in business of internal users using customer information, which is caused by security control performed by display restriction on customer information identifiers. The present research is intended to academically develop a technique for statistically analyzing an impact degree and a causal relationship between security control and an impact on business, which is a dichotomous variable, and to practically contribute to the establishment of an efficient security policy in consideration of an impact on business when an enterprise applies security control. A research target was internal business information systems of domestic securities enterprises, data was collected by questionnaire, and verification/analysis was performed by logistic regression analysis.

Grand Strategy Framework for Information Systems Security in Organizations (조직 정보 시스템 보안을 위한 총괄 전략 프레임워크)

  • Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.7-21
    • /
    • 2009
  • Strategies have to be employed in information systems security in order to build and operate systems for information systems security in effective and structured manner. It is also essential for the entire organization to participate for successful implementation of the strategies and making them work. Current researches on information systems security strategy in organizations, however, have mainly been focused on deployment and operation of countermeasures based on strategic thinking and decision. In consequence, it is lack of research on overall frame for containing consideration factors required for moving and leading the whole enterprise for the holistic security purpose. Therefore, this paper proposes a framework for use in establishment of organization-wide information systems security strategies based on the concept of grand strategy from the traditional strategy research and on the four dimensional features of it.

  • PDF