• Title/Summary/Keyword: IS Audit

Search Result 802, Processing Time 0.023 seconds

Clustering Normal User Behavior for Anomaly Intrusion Detection (비정상행위 탐지를 위한 사용자 정상행위 클러스터링 기법)

  • Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.857-866
    • /
    • 2003
  • For detecting an intrusion based on the anomaly of a user's activities, previous works are concentrated on statistical techniques in order to analyze an audit data set. However. since they mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In this paper, a new clustering algorithm for modeling the normal pattern of a user's activities is proposed. Since clustering can identify an arbitrary number of dense ranges in an analysis domain, it can eliminate the inaccuracy caused by statistical analysis. Also, clustering can be used to model common knowledge occurring frequently in a set of transactions. Consequently, the common activities of a user can be found more accurately. The common knowledge is represented by the occurrence frequency of similar data objects by the unit of a transaction as veil as the common repetitive ratio of similar data objects in each transaction. Furthermore, the proposed method also addresses how to maintain identified common knowledge as a concise profile. As a result, the profile can be used to detect any anomalous behavior In an online transaction.

Study of the Plan for Revitalizing Reemployment and Inauguration of Retired Military Person (제대군인의 재취업 및 창업 활성화 방안에 대한 연구)

  • Lee, Jae-Hee;Ha, Kyu-Soo;Kim, Hong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.1
    • /
    • pp.83-108
    • /
    • 2007
  • This study conducted research over status of employment and living by collecting questions & answers from retired soldiers after service in ROK Army more than 5 years in last 5 years. As the methodology of this research, the status of employment has been provided from the Citizen Insurance Public Corporation, and conducted interviews for all individuals in addition to the receiving of questions & answers. Also, the statistic data prepared and submitted for Congressional Audit & Inspection from MND was also utilized for the purpose of research. In conclusion, the situation faced with retired soldiers after their retirement is showing the future of reflection of oneself to the personnel in active service who must do their best only for their duty to keep national security. If those personnel in active service are worrying about their future returning to civilian society after retirement, it will not only become an impediment to perform their duty but also bring invisible weakening of military power to defend our nation in result. This is the rationale for the necessity of providing support for social adaptation, reemployment and inauguration of retired soldiers.

  • PDF

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis (로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석)

  • Hong, Jun Suk;Park, Won Hyung;Kim, Yanghoon;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

The gratitude disposition of geriatric hospital employees Impact on job satisfaction and life satisfaction and the moderating effect of the gratitude diary experience (노인요양병원 근무자의 감사성향이 직무만족 및 삶의 만족에 미치는 영향과 감사일기 경험의 조절효과)

  • Park, Soon-myeong;Kim, Ja-Ok;Kim, Ja-Sook
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.9
    • /
    • pp.351-358
    • /
    • 2020
  • The purpose of this study is to investigate the effect of gratitude disposition of geriatric hospital employees on job satisfaction and life satisfaction, and the moderating effect of the gratitude diary experience. A total of 485 copies of the research questionnaire were selected for workers in four geriatric hospitals who are promoting campaigns related to the gratitude diary. For data processing, a simple or hierarchical regression analysis was performed using SPSS 26.0. As a result of the study, The gratitude disposition had a statistically significant effect on job satisfaction and life satisfaction. However, the effect of gratitude disposition on job satisfaction and life satisfaction and the moderating effect of the audit diary experience were not statistically significant. The purpose of this study is to develop programs for job satisfaction and life satisfaction of geriatric hospital employees and provide basic data on manpower management of geriatric hospital.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

Architecture for Secure Mobile Agent through STAS System (STAS 시스템을 적용한 안전한 이동 에이전트구조)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1873-1879
    • /
    • 2007
  • As the mobile terminal which uses P2P service increases and it comes to be applied to many fields, mobile agent technology has been applied to P2P and its innovative services has been offered to various fields. However, free mobility of mobile agent technology works like worm, the problem which is contaminated by malicious attacker's attack quickly has appeared and fundamental solution has not been developed yet. This paper proposes STAS (Security Tracking and Auditing Server) system which can offer verification for security of mobile agent in structured P2P environments. Mobile Agent will send data value to STAS via peer so that STAS can verify secure audit and integrity and Mobile agent initiator will obtain the final value of the data from STAS. It can minimize overload of mobile terminal which is occurred by verification of mobile agent and its accomplishment.

An Analysis of the Improvement before and after Economic-Base Urban Regeneration Projects using the Difference in Difference Method (이중차분법 적용을 통한 경제기반형 도시재생선도사업 전·후 개선실태 분석)

  • Kim, Seong-Yeun;Kwon, Sung Moon
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.5-20
    • /
    • 2020
  • This study analyzed the effect of social, economic, and physical improvement in urban regeneration projects using difference in difference method in Busan and Cheongju City, utilizing population, regional economic, and old building data. The results of analysis indicated that the urban regeneration project had no effect on the social, economic, and physical improvement of the project area comparing the neighboring areas. In other words, at the end of the urban regeneration project, the business performance was not evident. Therefore, it is difficult to expect social, economic, and physical improvement if the urban regeneration project does not consider the linkage with the detailed project composition. In particular, it is necessary to carefully select detailed projects that meet the purpose of the project when establishing urban regeneration plans in the future.

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.

Improvement Research for Information Protection Management System of Small and Medium Enterprises (중소기업의 정보보호 관리체계 개선방안 연구)

  • Hye-Joung Yun;Yong-Woo Lee;Hee-Doo Heo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.15-20
    • /
    • 2023
  • Recently, digitalization is accelerating in all industries, and the use of information and personal information produced and used in the process of it is very important for the success or failure of a company. However, malicious attempts to steal or leak major information and personal information of a company as an adverse effect continue to increase, and appropriate defense and response are absolutely necessary. However, in the case of small and medium-sized enterprises, the priority of information protection and the possession of professional manpower are very insufficient compared to large enterprises. This paper studies the certification and audit implemented in Korea, and suggests ways to expand the certification of the information protection system suitable for SMEs and improve the effectiveness of the support system through the expansion of the privacy law notification standard and operation of support system.