• Title/Summary/Keyword: ISMS

Search Result 180, Processing Time 0.024 seconds

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

A Development of Turbine Simulator and Foundation Excitation Test (모사터빈 시험기 개발 및 기초가진 시험)

  • 김영철;이안성;김병옥;김영춘;우성현
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2004.05a
    • /
    • pp.675-680
    • /
    • 2004
  • In this study, a turbine simuiator is designed and manufactured to investigate the transient response of an actual turbine. The rotor mass and bearing stiffness is reduced to 1/140 of its actual turbine. The dynamic characteristics of turbine simulator are similar to those of the actual turbine. The turbine simulator is excited by an electro-magnetic type exciter in the form of half sine wave. Duration time is con☞oiled by Sms, 10ms, and Isms, and maximum acceleration is applied by 3g. Foundation excitation test is performed in stationary condition and rotating condition(6000rpm). The test results can be used to verify the validif of the theoretical afproach for transient analysis of actual turbine.

  • PDF

Random Amplified Polymorphic DNA (RAPD) Identification of Genetic Variation in Chlorella species

  • CHO Jung Jong;KIM Yong-Tae;HUR Sung Bum;KIM Young Tae
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.29 no.6
    • /
    • pp.761-769
    • /
    • 1996
  • The random amplified polymorphic DNA (RAPD) technique was used to characterize 18 reference strains of microalgae, mostly Chlorella species, collected from various localities around Korea peninsular. Eighteen strains consist of four genera of the family marine Chlorella from 12 samples, two genera of fresh water Chlorella from three samples, and three genera on Nannochloris. Twenty 10-mer anonymous primers were screened for amplification of genomic DNA extracted from samples using the CTAB extraction method. Nineteen of these oligonucleotide primers were positive or band producing. Three of 20 random primers (OPA 10, OPA 12, and OPA 18) resulted in both clear band and a high degree of reproducibility and showed some potential to be used to discriminate individual samples of both genetically hetero-and homogeneous populations, in determining phylogenetic relationships between species within a genus and developing individual fingerprints for each samples.

  • PDF

Design of Financial Information Security Model based on Enterprise Information Security Architecture (전사적 정보보호 아키텍처에 근거한 금융 정보보호 모델 설계)

  • Kim, Dong Soo;Jun, Nam Jae;Kim, Hee Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.307-317
    • /
    • 2010
  • The majority of financial and general business organizations have had individual damage from hacking, worms, viruses, cyber attacks, internet fraud, technology and information leaks due to criminal damage. Therefore privacy has become an important issue in the community. This paper examines various elements of the information security management system and discuss about Information Security Management System Models by using the analysis of the financial statue and its level of information security assessment. These analyses were based on the Information Security Management System (ISMS) of Korea Information Security Agency, British's ISO27001, GMITS, ISO/IEC 17799/2005, and COBIT's information security architecture. This model will allow users to manage and secure information safely. Therefore, it is recommended for companies to use the security management plan to improve the companies' financial and information security and to prevent from any risk of exposing the companies' information.

Synthesis and in Vitro Antibacterial Activity of Cephalosporins with a Pyridiniume Substituent Carrying an Isoxazole Moiety at the C-3 Position

  • Park, Hae-Il;Choi, Hyun-Joo;Jang, Jin-Hee;Choi, Sung-Hak;Rhee, Jae-Keol;Chang, Min-Sun
    • Archives of Pharmacal Research
    • /
    • v.24 no.2
    • /
    • pp.89-94
    • /
    • 2001
  • Several quaternary pyridinium cephalosporin analogues were prepared analogues were Prepared and evaluated in vitro for antibacterial activity against selected Gram-positive and Cram-negative organisms. Most of the synthesized analogues were either as effective or less effective against the tested bacterial organ isms than the reference com pounds, Cefpirome and Ceftazidime.

  • PDF

Genetic Polymorphisms of t-PA and PAI-1 Genes in the Korean Population

  • Kang, Byung-Yong;Lee, Kang-Oh
    • Animal cells and systems
    • /
    • v.7 no.3
    • /
    • pp.249-253
    • /
    • 2003
  • Abnormalities in fibrinolysis system is associated with risk of hypertension. In this report, the Alu repeat insertion/deletion (I/D) polymorphism of tissue plasminogen activator (t-PA) and the Hind III RFLP of plasminogen activator inhibitor-1 (PAI-1) genes were investigated in 115 normotensives and 83 patients with hypertension, and their association with anthropometrical data and plasma biochemical parameters were analyzed. There were no significant differences in the gene frequencies of the two candidate genes between normotensives and hypertensives, respectively. Our results indicate lack of associations between the two polymorph isms in t-PA and PAI-1 genes and risk of hypertension in the population under study. However, the Hind III RFLP of PAI-1 gene was significantly associated with plasma glucose level, suggesting its role in glucose metabolism. It needs to be tested whether this RFLP of PAI-1 gene is associated with insulin resistance syndrome or non-insulin dependent diabetes mellitus (NIDDM) in the Korean population.

A Study on the Security Assessment for Information System Risk Management and Budget Management (보안성 평가를 통한 정보시스템 위험관리 및 예산관리 연구)

  • Kim, Sun-Tae;Jun, Moon-Seog;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.69-77
    • /
    • 2008
  • 정보보호를 효율적이고 효과적으로 실천하는 방법으로 정보자산을 기준으로 위험관리를 수행하는 GMITS(ISO 13335)과 정보보호 관리체계 수립을 위한 ISMS(ISO 27001), 정보보호 능력성숙도 모델을 제시하는 SSE-CMM 등의 국제 표준이 존재한다. 그러나 각 표준은 위험관리를 위한 절차를 제시하거나 관리체계 수립방안, 그리고 능력성숙 수준을 제시하는 등 관리, 기술, 운영의 종합적인 보안방안을 제시하지는 못하고 있다. 또한 현 보안문제를 최고 관리자 수준에서 판단할 수 있는 종합적인 방안을 제시하지 못하고 있다. 본 논문에서는 정보시스템 보안평가를 통해 보안 기술, 관리, 운영측면의 문제점을 종합하여 위험관리가 가능하도록 하는 방안을 제안하고, 또한 제안한 위험관리를 통해 도출된 문제점을 최고관리자 수준에서 직관적으로 판단 할 수 있는 방안을 제시하여 정보보호 예산과 연계할 수 있는 방법을 제안한다.

  • PDF

Security Improvement to a Remote User Authentication Scheme for Multi-Server Environment (Multi-Server 환경에서의 사용자 인증 스킴의 안전성 향상)

  • Lee, Young Sook;Kim, Jee Yeon;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.23-30
    • /
    • 2011
  • Recently, Tsai proposed a remote user authentication scheme suited for multi-server environments, in which users can be authenticated using a single password shared with the registration center. Our analysis shows that Tsai et al's scheme does not achieve its fundamental goal of password security. We demonstrate this by mounting an undetectable on-line password guessing attack on Tsai et al.'s scheme.

보안을 고려한 무중단 환경에서 개발운영조직 통합관리(DevOps)

  • Jeon, In-Seok
    • Review of KIISC
    • /
    • v.25 no.1
    • /
    • pp.47-52
    • /
    • 2015
  • 보안에서 인적보안(Personal Security)의 예방통제 중 하나로 개발/운영을 분리하는 직무분리(Separation of Duty)를 해오고 있다. 고의적인 시스템의 오용을 줄이기 위한 방법이며, 많은 국제 표준과 국내 표준(COBIT, ISMS, 등)에서 직무분리를 명시하고 있다. 하지만 무중단 시스템이면서, 운영자가 특정 전문가 집단으로 한정되고, 수 많은 변경이 발생하는 무중단 환경에서 개발/운영이 분리 됨으로 인한 여러 가지 문제점이 발생 하고 있다. 체계를 운영하면서 전문지식을 기반으로 한 요구사항을 명확하게 이해하지 못하면, 추가적인 요구사항이 발생한다. 이는 체계의 품질저하와 위험(Risk)증가로 이어지게 된다. 따라서 본 연구에서는 개발운영조직 통합관리(DevOps) 방법론을 SCADA와 같이 운영자가 해당 분야의 전문성을 가지고, 무중단으로 운영되며, 수많은 변경이 반영되는 시스템에서 개발 및 운영을 통합하였을 때, 발생할 수 있는 문제점과 개선방안을 제시하고자 한다.

SNP Detection of Arraye-type DNA Chip using Electrochemical Method (전기화학적 방법에 의한 신규 바이오칩의 SNP 검출)

  • 최용성;권영수;박대희
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.17 no.4
    • /
    • pp.410-414
    • /
    • 2004
  • High throughput analysis using a DNA chip microarray is powerful tool in the post genome era. Less labor-intensive and lower cost-performance is required. Thus, this paper aims to develop the multi-channel type label-free DNA chip and detect SNP (Single nucleotide polymorphisms). At first, we fabricated a high integrated type DNA chip array by lithography technology. Various probe DNAs were immobilized on the microelectrode array. We succeeded to discriminate of DNA hybridization between target DNA and mismatched DNA on microarray after immobilization of a various probe DNA and hybridization of label-free target DNA on the electrodes simultaneously. This method is based on redox of an electrochemical ligand.