• Title/Summary/Keyword: ISMS

Search Result 180, Processing Time 0.022 seconds

Information Security Management System Evaluation Criteria with availability for Korean Smart Grid (한국형 스마트 그리드의 가용성을 고려한 정보보호 관리체계 평가 기준 제안)

  • Heo, Ok;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.547-560
    • /
    • 2014
  • Smart Grid, which maximize the efficiency of energic utilization by applying Information and Communication Technology to Power Grid, requires high availability. Attacks, such as DDoS, which cause suspension of service and lead to social disruptions have recently been increasing so that systematic management over availability becomes more important. In this paper, we presents a new evaluation criteria of Korean Smart Grid by comparing availability assessment items of international standards specified in management system and then overcome the limitations of availability evaluation of existing information security management system.

Genetic Polymorphisms in Drug Transporters and Regulatory Xenobiotic Receptors in Korean Population

  • Lee, Sang-Seop;Shin, Jae-Gook
    • Proceedings of the Korean Society of Toxicology Conference
    • /
    • 2004.05a
    • /
    • pp.27-29
    • /
    • 2004
  • Drug transporters play an essential role in the absorption, distribution and elimination of clinical drugs, nutrients and toxicants. The importance of the transporters is exampled by therapeutic failure in cancer chemotherapy that is mainly caused by the overexpression of multidrug resistance (MDR)-related transporters. In addition, the transporters may involve in drug-drug interactions that lead to serious adverse drug responses and some transporters also contribute to inter-individual variation in drug responses. As an effort to understand the mechanism underlying the inter-individual variation of transporters activity, genetic and environmental factors influencing the expression or function of the transporters have extensively explored through last decade. Among them, genetic polymorphism of drug transporter encoding genes has generated much interest since the discovery of functional single nucleotide polymorphisms (SNP) of MDRl gene. Besides drug transporters, xenobiotic receptors also modulate drug disposition by regulating the transcription of drug metabolizing enzymes and drug transporters. Among many xenobiotic receptors, pregnane X receptor (PXR) and constitutive androstane receptor (CAR) are two most well characterized since these receptors show wide substrate specificities and regulate the expression of various enzymes involved in drug disposition. Recently, several functional genetic polymorphisms were reported in PXR coding gene. In the present study, genetic polymorph isms of two drug transporters, MDR1 and BCRP, and two xenobiotic receptors, PXR and CAR, were investigated in Korean population.

  • PDF

"To Invent the Truth": Ford Madox Ford's Life and His Literary Impression ("진실의 창안": 포드 매독스 포드의 삶과 문학적 인상주의)

  • Kim, Heesun
    • English & American cultural studies
    • /
    • v.14 no.2
    • /
    • pp.127-157
    • /
    • 2014
  • Among many literary isms, impressionism is often regarded as the most frank expression of personality. As a masterpiece of modernism, Ford Madox Ford's The Good Soldier is a celebration of the subjectivity which reflects the writer's experiential reality. For Madox Ford, art is not to achieve the true objectivity of human society, but to seize the momentary perception in personal life. As the beginning of modernism, Madox Ford's impressionaism was mostly devoted to give fictive life to subjective impressions. And his heroes are usually the egoless person who can absorb the intense rapidity of consciousness without any prejudice. However, the innocent mind's receptions of myriad impressions, like those of the protagonist John Dowell or his idealized version of Major Ashburnham in The Good Solidier, were described as the enjoyable yet deceptive ones in Madox Ford's works. To engrave more sold perceptive impressions into life, Madox Ford often contrasts or mixes truth with deception, life with death as he did in his real life. Speicially as the result of thick application of real-life subject matters to his writings, Madox Ford's literary works get more vivid colors and penetrating forms. Thus, his literary impressionism based upon his harsh and passionate realities overcomes the limitations of shifting moments of senses, demolishing the boundaries between what is objective and what is subjective, like post-impressionism or expressionism. Namely, as Walter Lowenfels said, Madox Ford did not follow the impossible objectivity passively, yet instead "knew how to invent the truth."

A Study on Strengthening Domestic Personal Information Impact Assessment(PIA)

  • Young-Bok Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.61-67
    • /
    • 2024
  • In this paper, we presented a strengthening plan to prevent personal information leakage incidents by securing legal compliance for personal information impact assessment and suggesting measures to strengthen privacy during personal information impact assessment. Recently, as various services based on big data have been created, efforts are being made to protect personal information, focusing on the EU's GDPR and Korea's Personal Information Protection Act. In this society, companies entrust processing of personal information to provide customized services based on the latest technology, but at this time, the problem of personal information leakage through consignees is seriously occurring. Therefore, the use of personal information by trustees.

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.

Mapping QTLs for drought tolerance using an introgression line population from a cross between Ilpumbyeo and Moroberekan in rice (벼 일품벼/모로베레칸 조합의 이입계통을 이용한 내건성 유전자 탐지)

  • Kang, Ju-Won;Ju, Hong-Guang;Yang, Paul;Ahn, Sang-Nag
    • Korean Journal of Agricultural Science
    • /
    • v.38 no.2
    • /
    • pp.199-204
    • /
    • 2011
  • This study was conducted to map quantitative trait loci (QTLs) related to drought stress tolerance. An introgression line population derived from a cross, "Ilpum" / "Moroberekan" was used in this study. $F_1$ plants were backcrossed three times to Ilpum to produce $BC_3F_1$ plants. These plants were advanced by selfing for four generation and a total of 117 $BC_3F_5$ introgression lines were developed. These lines were evaluated for percent seed set and spikelets per panicle under the control (field) and drought condition. To identify QTLs related to drought tolerance, 134 SSR markers showing polymorph isms between the parents were genotyped for the 117 $BC_3F_5$ lines. A total of 6 QTLs associated with drought stress were detected on chromosomes 1, 3, 4, 7 and 10. These include two QTLs for phenotypic acceptability, two QTLs for percent seed set ($R^2$ = 19.0 - 20.9%), and two QTLs for spikelets per panicle ($R^2$ = 22.3 - 23.10%). The Moroberekan alleles at three loci contributed the positive effect for drought tolerance. The SSR markers linked to drought stress tolerance can not only facilitate the selection of valuable genes from Moroberekan, but also allow identification of lines with drought tolerance.

A Study on Design Direction of Industry-Centric Security Level Evaluation Model through Analysis of Security Management System (보안관리체계 분석을 통한 산업중심 보안수준평가 모형 설계 방향 연구)

  • Bae, Je-Min;Kim, Sanggeun;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.177-191
    • /
    • 2015
  • Recently, the necessity of systematic security management system that consider company' character and environment has appeared because of increasing security accident continuously in domestic companies. However, most of companies has applied to only K-ISMS which is existing information security management system, although They are different from object, purpose and way of security level evaluation by companies. According to this situation, Many experts have questioned that there are many problems with effectiveness of introducing security management system. In this study, We established definition of information security management system, industrial security management system and research security management system through analysis of previous study and developed evaluation item which can implement security in whole industry comparing and analyzing the control items of them. Also, we analyzed existing security level evaluation and suggest design direction of industry-centric security level evaluation model considering character of industry.

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

STAT6 Gene Polymorphisms in Allergic Rhinitis

  • Kim, Jeong Joong;Kim, Min Su;Lee, Jung Hun;Choi, Tae Wook;Choi, Sang Heon;Lee, Jae Hoon;Chung, Hun Taeg
    • Genomics & Informatics
    • /
    • v.2 no.3
    • /
    • pp.126-130
    • /
    • 2004
  • T helper-type 2 cytokines, such as IL-4 and IL-13, may play a central role in allergic diseases. The protein known as signal transducers and activators of transcription 6 (STAT6) is a key transcription factor involved in both IL-4- and -13-mediated biological responses. Two polymorphisms of the STAT 6 gene (exon 1 and G2964A variant) have been found. We investigated whether these STAT6 gene polymorph isms were associated with allergic rhinitis. Blood samples for genetic analysis were obtained from 285 individuals with allergic rhinitis and from 271 healthy subjects without atopic disease. The G2964A variant of the STAT6 gene was genotyped using PCR-RFLP analysis. The GT repeat polymorphism in exon 1 of the STAT6 gene was genotyped by fragment analysis. There was no association between the 2964A variant and GT repeat polymorphism in exon 1 of the STAT6 and allergic rhinitis in a Korean population (both p > 0.05). Our results suggest that a combination of STAT6 gene polymorphisms is not a useful marker for predicting allergic rhinitis.