• Title/Summary/Keyword: Enterprise Security

Search Result 385, Processing Time 0.046 seconds

Innovation and investment strategies to intensify the potential modernization and to increase the competitiveness of microeconomic systems

  • Tulchynska, Svitlana;Vovk, Olha;Popelo, Olha;Saloid, Stanislav;Kostiunik, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.161-168
    • /
    • 2021
  • Within the article, strategic guidelines for the modernization of microeconomic systems are identified. Modernization levels of the potential implementation are formalized for enterprises: contractile, extensive technical, technological, progressive, adaptive, steady, intensive, creative, absolute and leader modernization. This allowed to specify the directions and tasks of the enterprise modernization at different management levels. Accordingly, the conditions and criteria for selecting resource tools are set. It is proved that the strategies of the potential modernization of enterprises must be carried out at four main management levels: first, at the enterprise level; secondly, for a particular type of product / service; third, by functional directions of modernization of separate spheres of the enterprise activity or responsibility, fourth, at the level of structural units of the enterprise. It is substantiated that in the processes due to the activation of the potential modernization, the resources are transformed into the results of the innovation implementation and the investment strategies modernization. A system of tasks for the corporate strategies implementation in order to modernize microeconomic systems has been formed. Key vectors of the activation determine the nature and properties of investment resources and necessary innovations to enhance the modernization potential. Therefore, the system of innovation and investment strategies' modernization, based on the vector and resource provision of the modernization process, is specified:

The Role of the Mechanism of Attracting Investment Resources in the Innovative Development of Enterprises in the Context of the Digital Economy Development

  • Lepeyko, Tetyana;Chernoivanova, Hanna;Pererva, Ivanna;Poberezhna, Zarina;Zabashtanska, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.223-229
    • /
    • 2021
  • The presented research is devoted to determining the role of the mechanism of attracting investment resources in innovative development in the conditions of transformation using the process approach. It is proved that the process approach is dominant for this study because investments are considered as a process of investing in innovative development in the enterprise in the context of digitalization, and its application allows to take into account the impact on the mechanism of attracting investment resources. related to the mechanism of attracting investment resources of the enterprise. It is substantiated that the mechanism of attracting investment resources for innovative development in the context of digitalization is a specific way of organizing, mobilizing and using investment resources for innovative development of the enterprise in the context of digitalization under the influence of economic development laws, government regulation. The effectiveness of attracting investment resources in innovative development is ensured by the mechanism that exists in the enterprise. The mechanism of attraction of investment resources in innovative development in the conditions of digitalization gives the chance to define an optimum ratio between sources and volume of attraction of investments in innovation sphere.

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

A Study on Establishment of Small and Medium Business Information Security Plan under Resource Restrictions (자원 제약하의 중소기업 정보보안계획 수립방안 연구)

  • Kwon, Jang-Kee;Kim, kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.119-124
    • /
    • 2017
  • Information is a valuable asset regardless of the size of the enterprise and information security is an essential element for the survival and prosperity of the enterprise. However, in the case of large corporations, Security is ensured through rapid introduction of information security management system. but In the case of SMEs, security systems are not built or construction is delayed due to complex factors such as budget constraints, insufficient security guidelines, lack of security awareness. In this paper, we analyze the actual situation of information security management of SMEs through questionnaires, and We would like to suggest a comprehensive security plan for SMEs in free or inexpensive ways. We believe that by applying the method presented in this paper, SMEs will be able to implement the lowest cost basic information security and will benefit SMEs who plan to establish an information security plan.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

A Study for Enterprise Type Realtime Information Security Management System (기업의 상시 보안관리 체계 연구)

  • Noh, Shi-Yeong;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.617-636
    • /
    • 2017
  • Many businesses have adopted the standard security management structure such as ISO27001 and K-ISMS for strengthening business's security management structure to protect their core information assets and have acquired partial output from such effort. However, many risk factors such as recent advances in Information Technology and evolution of intrusion methods have increased exponentially requiring the businesses to response even more quickly with better accuracy. For such purpose, a study of 'Real Time Security Management Structure for Business' based on security management process optimization, defining a set of security index for managing core security area and calculation of risk indices for precognition of intrusion risk area has been made. Also, a survey on opinions of an expert panel has been conducted. The effectiveness of studied structure was analyzed using AHP method as well. Using this study, security personnels of a company can improve efficiency of the preemptive responsive and quicker measure from the current security management structure.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

Design and Implementation of Unified Network Security System support for Traffic Management (종단간 트래픽 관리를 지원하는 통합 네트워크 보안시스템 설계 및 구현)

  • Hwang, Ho-Young;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.267-273
    • /
    • 2011
  • The importance of networking capability is gaining more weight for enterprise business and high-speed Internet access with guaranteed security management is essential to companies. This paper presents a unified network security management solution to support high-speed Internet access, active security management, traffic classification and control. The presented system provides firewall, VPN, intrusion detection, contents filtering, traffic management, QoS management, and history log functions in unified manner implemented in a single appliance device located at the edge of enterprise networks. This will enable cost effective unified network security solution to companies.

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.