• 제목/요약/키워드: External Threats

검색결과 143건 처리시간 0.022초

제로 트러스트 기술 동향에 관한 연구 (A Study on Zero Trust Technology Trends)

  • 김미연;김대겸;장종민;박상준;정수환;박정수
    • 스마트미디어저널
    • /
    • 제12권2호
    • /
    • pp.15-26
    • /
    • 2023
  • 전 세계적인 COVID-19 팬데믹으로 인해 업무처리 방식이 원격으로 전환됨에 따라 기업의 외부에서 내부 중요리소스에 접근하는 빈도가 기하급수적으로 증가하였고 기업은 각종 보안 위협에 쉽게 노출되었다. 이러한 접근 보안 문제를 해결하기 위해 ZTA(Zero Trust Architecture) 솔루션이 주목받고 있다. ZTA는 사전에 설정한 정책에 따라 접근에 대한 인증과 허가를 엄격하게 관리하며 외부 유저는 물론 내부 유저도 신뢰하지 않는다는 원칙을 기반으로 동작한다. 본 논문에서는 ZTA의 정의를 포함해 주요 연구 동향을 분석하였고 각 기업별로 상이한 ZTA 솔루션을 정리하였다.

스마트 센서를 이용한 Baby Care 모바일 어플리케이션 개발 (Development of Baby Care Mobile Application Using Smart Sensor)

  • 정재필
    • 한국항행학회논문지
    • /
    • 제19권6호
    • /
    • pp.643-647
    • /
    • 2015
  • 최근 센서와 네트워크 기술을 접목한 유비쿼터스 기술이 부각되고 있으며 이를 USN (ubiquitous sensor network)라 한다. 본 논문에서는 이러한 USN 기술을 기반으로 영유아의 건강과 안전을 관리하기 위해 스마트 센서를 이용한 Baby care 모바일 어플리케이션을 제안하고 개발하였다. 개발한 모바일 어플리케이션은 영유아의 낙상 감지, 울음 감지, 발열 감지 등의 정보를 개발한 모바일 어플리케이션의 화면에 나타내었다. 개발된 모바일 어플리케이션은 모의 실험을 통하여 확인하였다.

CORBA 기반의 보안 플렛폼과 그 응용 (A Security Platform based on CORBA and its Application)

  • 나중찬;김영균;김경범;김명준
    • 한국정보처리학회논문지
    • /
    • 제6권11S호
    • /
    • pp.3278-3288
    • /
    • 1999
  • This paper proposes a security platform, called SCAP(Security platform for CORBA based APplication), to cope with potential threats in a distributed object system. SCAP supports CORBA security specification announced by OMG. SCAP is comprised of four functional blocks, which co-work with ORB to provide security services: Authentication Block, Association Block, Access Control Block, and Security Information Management Block. It is designed to support Common Secure Interoperability Functionality Level 2, which is useful for large-scale intra-, or inter-network based applications. Actual security services, which are dependent on supporting security technology, will be provided as external security service for replace ability. Implementation issues such as how to simulate an interceptor mechanism using a commercial ORB product without source code, and how to extend Current object required for security services are also described. At the end of the paper, the SCAP applied to the web environment is described to show its practical utilization.

  • PDF

대학도서관 경영전략에 관한 연구 (A Study on the Strategic Management of University Library)

  • 박인웅
    • 한국도서관정보학회지
    • /
    • 제30권3호
    • /
    • pp.97-116
    • /
    • 1999
  • The purpose of this paper is to develop a model of the strategic management of university library in Korea. The model from this study is summarized as follows: 1. External environment is divide into opportunities and threats. 2) Internal environment is divide into strengths and weakness. We can formulate a management strategy on the basis of library environment element from environment analysis and library situation. 2. Formulation of strategic management are formulated through three stages. 1) Library strategy: $\circled1$Growth strategy $\circled2$Stability $\circled3$Retrenchment 2) Business(competition) strategy 3) Functional strategy: $\circled1$Material organization strategy $\circled2$Collection strategy $\circled3$Reference service strategy $\circled4$Human resource management strategy $\circled5$marketing strategy 3. Implementation of strategic management 1) The chief of strategy implementation 2) Programs, budgets and procedures 3) Structure and strategy implementation 4) culture and strategy implementation 4. Evaluation and control of strategy implementation.

  • PDF

전자정부의 내부통제를 위한 정보시스템 도입에 있어서 제도적 개선방안에 관한 연구 : 바름 e 시스템을 중심으로 (Study on Improvement for Information System Installation for e-Government's Internal Control through Legal Review : Focused on Barum e-System)

  • 이동한;이욱
    • 한국IT서비스학회지
    • /
    • 제12권3호
    • /
    • pp.179-193
    • /
    • 2013
  • E-Government refers to government to use ICT (information and communications technology) to work more effectively, share information and deliver better services to the public. With ICT, e-Government has increased transparency of governments. However even there has been much trial for transparency, corruption has been growing with the form of e-corruption. While external threats such as hackers and viruses can have serious consequences, currently most crime involving emerging technology is carried out by insiders i.e. employees in the e-government. Among the many tools being developed to fight e-corruption, there has been much focus lately on internal control system. So, South Korea developed and test-operated "Barum e-system" for internal control last year. This research establishes legal basis, information system link and privacy policy for settlement of this information system through legal review.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권8호
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

보안성을 고려한 스마트 의료기기 관리(Secure-MEMP) 방법에 관한 연구 (A Study on the Smart Medical Equipment Management Program (Secure-MEMP) Method Considering Security)

  • 김동원
    • 융합보안논문지
    • /
    • 제21권1호
    • /
    • pp.63-72
    • /
    • 2021
  • 병원의 Biomedical engineering team은 의료기기가 안전하고 신뢰할 수 있도록 의료기기 관리 프로그램(MEMP, Medical Equipment Management Program)을 수립하고 규제할 책임이 있다. 기술의 발전으로 인공지능, 정밀의료 등 의료기기는 언제 어디서나 사물들 간 연결이 가능한 형태로 발전하고 있으며 다양한 기술의 융합에 따라 내외·부 보안위협이 지속적으로 증가하고 있다. 본 논문에서는 기술의 발전으로 지속적으로 증가하는 의료기기의 보안위협을 고려하여 안전한 의료기기 관리 프로그램(Secure-MEMP) 방법을 연구 제시한다.

A Decision Making Model Proposal for Firewall Selection

  • Akturk, Cemal;Cubukcu, Ceren
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권10호
    • /
    • pp.3588-3607
    • /
    • 2021
  • Covid-19 pandemic required all the world to use internet more actively. As a result, individuals and businesses are more open to digital threats. In order to provide security within the network, firewalls should be used. Firewalls act as a gateway between the corporate and the external networks. Therefore, it is more important than ever to choose the right firewall for each network. In this study, a new linear decision making model is proposed in order to find out the most suitable firewall and the estimates are completed according to this new model. Also, this model is compared with multi-objective optimization on the basis of ratio analysis (MOORA) method. This study distinguishes from other studies by proposing a new solution which ranks the firewall alternatives using linear and MOORA approaches. These approaches are used in many fields before but not in information technologies. Thus, this study can be considered quite innovative in terms of the problem it handles and the approaches used. It offers up-to-date and practical suggestions related to a decision making problem that has not been previously studied in the literature.

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

Success Factors of Paris Baguette's Bakery Franchise Business: Industry Competition and Core Competence Analysis

  • Jeong, Jaeseok;Jeong, Hannara;Ko, Kihyeon;Moon, Junghoon;Kang, Hyoung Goo
    • Asia Marketing Journal
    • /
    • 제15권2호
    • /
    • pp.1-27
    • /
    • 2013
  • The main goal of this study is to examine the competition intensity in the Korean bakery franchise industry and to identify the core competencies of the industry's leading company, Paris Baguette. The frameworks of PEST analysis, Cross Impact analysis, a Five Forces Model, a Value Chain, and VRIO analysis. PEST and Cross Impact analysis were employed to investigate the industry's external environment, and the results indicated that 'increased attention on corporate's Creating Shared Value (CSV) activities' is the most influential factor among others. The analysis using the Five Forces Model found industry rivalry and substitutes were the greatest threats. Finally, the results of Value Chain and VRIO analysis identified four core competencies of Paris Baguette: its CEO's craftsmanship, e-procurement system, quality of dormant dough, and hub system. Multiple managerial implications are suggested for practitioners in the marketing area, especially in the saturated market environment.

  • PDF