• Title/Summary/Keyword: IS Audit

Search Result 797, Processing Time 0.029 seconds

The Study on Corporate Information Security Governance Model for CEO (최고경영자를 위한 기업 정보보호 거버넌스 모델에 대한 연구)

  • Kim, Do Hyeong
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.39-44
    • /
    • 2017
  • The existing enterprise information security activities were centered on the information security organization, and the top management considers information security and enterprise management to be separate. However, various kinds of security incidents are constantly occurring. In order to cope with such incidents, it is necessary to protect information in terms of business management, not just information security organization. In this study, we examine the existing corporate governance and IT governance, and present an information security governance model that can reflect the business goals of the enterprise and the goals of the management. The information security governance model proposed in this paper induces the participation of top management from the planning stage and establishes information security goals. We can strengthen information security activities by establishing an information security plan, establishing and operating an information security system, and reporting the results to top management through compliance audit, vulnerability analysis and risk management.

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

Thermal Performance Evaluation of a Test Cell Thru Short Term Measurements (TEST CELL에서 단기측정에 의한 열성능 평가)

  • Jeon, M.S.;Yoon, H.K.;Chun, W.G.;Jeon, H.S.
    • Solar Energy
    • /
    • v.10 no.2
    • /
    • pp.10-17
    • /
    • 1990
  • Short-term tests were conducted on a house at KIER, Daejon for its thermal performance evaluation. The test procedure and data analysis were made according to the PSTAR method. Each test period was 3 days during which the building was unoccupied. The data measured with 8 channels were used to renormalize an audit based simulation model of the house. The following are the key parameters obtained in the present analysis: 1) the building loss coefficient(skin conductance plus infiltration conductance during coheating period); 2) the effective building heat capacity; and 3) the effective solar gain. An estimation of total heat required to maintain a standard level of comfort during a typical winter season is also calculated on the basis of the renormalized simulation model and typical long term weather data.

  • PDF

A two-year audit of non-vascularized iliac crest bone graft for mandibular reconstruction: technique, experience and challenges

  • Omeje, Kelvin;Efunkoya, Akinwale;Amole, Ibiyinka;Akhiwu, Benjamin;Osunde, Daniel
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.40 no.6
    • /
    • pp.272-277
    • /
    • 2014
  • Objectives: Non-vascularized iliac crest bone graft (NVIBG) is a known treatment option in mandibular reconstruction following jaw resection, but no documented review of patients treated with NVIBG exists for northern Nigeria. The experience and technique from a Nigerian tertiary hospital may serve as baseline data for comparison and improvement of practice for other institutions. Materials and Methods: A retrospective review of medical records and patient case files from January 2012 to December 2013 was undertaken. All case files and other medical records of patients who had reconstruction with NVIBG for benign or malignant lesions with immediate or delayed reconstruction were selected for review. Results: Twenty patients had mandibular reconstruction with NVIBG during the study period. Two patients were excluded because of incomplete medical records. Eighteen patients' (male=14, female=4) records were reviewed. Their ages ranged from 13 to 62 years (mean $26.0{\pm}10.6years$). Indications for NVIBG included jaw tumors (n=16; 88.3%), jaw cyst (n=1; 5.6%) and gunshot injury (n=1; 5.6%). Jaw tumors seen were ameloblastoma (n=15; 83.3%) and osteosarcoma (n=1; 5.6%). Treatments done were mandibular resection with condylar resection (n=7; 38.9%), mandibular segmental resection (n=10; 55.6%) and subtotal mandibulectomy (n=1; 5.6%). Patients' postoperative reviews and radiographs revealed good facial profile and continued bone stability up to 1 year following NVIBG. Conclusion: NVIBGs provide an acceptable alternative to vascularized bone grafts, genetically engineered bone, and distraction osteogenesis for mandibular reconstruction in resource-limited centers.

Drug Use Evaluation of the Elderly Patient with Major Depressive Disorder (Major Depressive Disorder 질환성 노인 환자들의 치료제 평가)

  • Lim, Ok-Jeong;Lee, Ok Sang;Yun, Hye-Sul;Choe, Kevin Kyungsik;Lim, Sung Cil
    • YAKHAK HOEJI
    • /
    • v.57 no.2
    • /
    • pp.101-109
    • /
    • 2013
  • Depressive disorders are the most common psychiatric problem in the elderly. Most depression treatment guidelines emphasize treatment with antidepressant medication and recommend that benzodiazepine use be minimized for limited period, particularly to elderly patients. In order to evaluate appropriate use of antidepressants and benzodiazepine, retrospective review of prescriptions was performed. The study population are older than 65 years who had been newly diagnosed with major depressive disorder in specialty mental health at a community general hospital from January $1^{st}$, 2007 to October $31^{th}$, 2012 (N=373). Initial antidepressant accounted for 89.5% with SSRI, and escitalopram accounted for 60.9% of SSRI group. 79% or more of the patients were prescribed the recommended dosage. The maintenance rate for 4 weeks of initial antidepressant was 48% and 6 weeks was 39%. Treatment-discontinuation rate was 68% at 3 month. Alprazolam (short acting benzodiazepine) was prescribed the most, followed by clonazepam (long acting benzodiazepine) and then diazepam. 55% of patients received a duplicated prescription for short acting plus long acting benzodiazepine. 61% of patients used long acting benzodiazepines. Prescribed dosages of benzodiazepines were commonly within a recommended range, while no one was prescribed a appropriate period (up to 2 weeks) except for the early discontinued patients. Appropriate use of zolpidem was only 16.2%. The depressed elderly treated in specialty mental health mostly received long-term treatment with benzodiazepines in combination with antidepressants, guideline recommendations was not followed. Multidisciplinary interventions like audit and feedback of benzodiazepine use are needed and education for the elderly is needed to properly maintain antidepressant treatment.

Reconstruction on Application Category of Pharmaceutical Additives and Boundaries of Pharmaceutical Additives according to the Dosage Forms (첨가제의 배합목적 재정비와 제형에 따른 첨가제의 범위)

  • Cho, Cheong-Weon;Kim, Seung-Soo;Cho, Won-Kyung;Park, Hyo-Min;Park, In-Sook;Jung, Joo-Yeon;Chung, Sang-J.;Lee, Sun-Hee;Hwang, Sung-Joo
    • Journal of Pharmaceutical Investigation
    • /
    • v.37 no.6
    • /
    • pp.403-411
    • /
    • 2007
  • The importance of pharmaceutical additives is increasing and the sorts and application categories are being classified in detail. International pharmaceutical council based on IPEC-America, IPEC-Europe and JPEC was established for specifications, safety and efficacy, approval regulations of pharmaceutical additives in 1992. Therefore, scrutinized examination of pharmaceutical additives used for already approved domestic drug was performed under the supervision of KFDA and nomenclature on application categories of pharmaceutical additives was summarized and endowed their glossary. Additionally, the boundaries of pharmaceutical additives according to the dosage forms based on the principle of the dosage forms of Korean pharmacopoeia were classified. These informations could be available for standards & experimental methods, approval, evaluation, audit of drug and contribution for national welfare.

A Study on the Validity of DSOM According to Alcohol Intake (알코올 섭취량에 따른 한의변증설문(DSOM)의 타당성에 대한 연구)

  • Hong, Sang-Hoon;Kim, Jung-Eun;Kim, Sung-Hwan;Park, Sang-Eun;Hong, Su-Hvun;Kang, Chang-Wan;Lee, In-Sun
    • The Journal of Internal Korean Medicine
    • /
    • v.30 no.1
    • /
    • pp.119-128
    • /
    • 2009
  • Purpose : This study was conducted to find the possibility of DSOM (Diagnosis System of Oriental Medicine) as a diagnostic method according to alcohol intake. Method : 49 men who drink alcohol over 40g per day and whose AUDIT scores were over 12 were allocated to the drinker group. 30 men who do not drink alcohol at all were allocated to the control (non-drinker) group. The study period was from June 15, 2006 to September 30, 2008. All of both groups were analyzed using DSOM. Result : There were some differences between the drinker group and the non-drinker group in stagnation of Ki(氣滯), deficiency of Yin(陰虛), insufficiency of Yang(陽虛), heat syndrome(熱), dryness (燥), and lung(肺). A group whose gamma-GTP is over twice the normal condition shows meaningful difference in stagnation of Ki(氣滯), heat syndrome(熱), dryness(燥), and insufficiency of Yang(陽虛). Conclusion : We found out that DSOM can be a diagnostic method on alcoholic liver disease patients. However, other studies to supplement it should be continued.

  • PDF

An Exploratory Study on Buyer-Supplier Relationship in B2B with Internet (기업간 인터넷 전자상거래에서 구매자와 공급자간의 관계 형성에 관한 탐색적 연구: 건설부문 사례를 중심으로)

  • Kim, Hyo-Gun;Cho, Hyung-Seung;Choi, In-Young
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.169-182
    • /
    • 2003
  • The growth of electronic commerce make business to business electronic commerce market grow dramatically due to dramatic decrease of transaction cost and increase of productivity. It also influences the way of building transaction relationship between buyers and suppliers. This study tends to prove electronic market theory for Internet based 13213 commerce. We observe and analyze the implementation and usage patterns of procurement system of I company. The result shows that even through Internet enable many buyers and suppliers to participate and transact each other, the transaction pattern is different according to asset specificity and uncertainty as follows. First, with adoption of internet, the product with the higher asset specificity rather than lower asset specificity can be easily purchased. Second, Internet doesn't make any significant influence on the transaction of the product with higher uncertainty. But, organization's pre-audit process can indirectly influence on the decrease of the transaction uncertainty.

A Study on the Risk Management Framework for the Long-term Preservation Business of Electronic Records (DRAMBORA를 응용한 전자기록 장기보존 업무 위험관리체계 연구)

  • Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.27
    • /
    • pp.119-168
    • /
    • 2011
  • This paper proposed risk management approach as a self-audit framework to achieve the goals which might be common among the records management organizations in Korea governmental and public area. After introducing the history and the concept and process of risk management approach and examining DRAMBORA's framework, the processes and the methods of risk management for the electronic records which are customized from DRAMBORA are explained in details: How to define the business context of organizations, how to determine the business functions and activities and related risks, how to assess the level or severity of each risks and some considerations related to risk assessment. As a result, this paper shows that application of DRAMBORA's framework to the electronic records management organizatioins is not only possible but also useful and effective. The critical point for the success of application for DRAMBORA's framwork or the risk management approach itself each organizations which wants to accept that framework should define its own business functions and activities and the goals in respect areas.

Information security auditing Framework in Industrial control system (산업제어시스템 정보보안 감리 프레임워크 연구)

  • Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.139-148
    • /
    • 2008
  • Information technology have led to change the automation of large industrial control system as well as business system and environments. Industrial control system(ICS) is vital components of most nation's critical infrastructures such as electricity, natural gas, water, waste treatment, transportation and communication that are based of national security, safety of citizen and development of national economy According to the change of business environment, organizational management pushed integration all of the system include MIS and ICS. This situation led to use standard information technologies for ICS, this transition has been to expose ICS to the same vulnerabilities and threats that plague business system. Recently government obliged owners of the public information system to audit for safety, efficiency and effectiveness, and also obliged the owners of national infrastructure to improve their system security as a result of vulnerability analysis. But there doesn't prepare a security architecture and information security auditing framework of ICS fur auditing. In this paper, I suggested the security architecture and information security auditing framework for ICS in order to prepare the base of industrial system security auditing.