• Title/Summary/Keyword: Information System Audit

Search Result 274, Processing Time 0.027 seconds

Configuration Management Processes and Its Information Systems Development Environments (형상관리 절차 및 정보시스템 개발환경)

  • 김선호;김태환;김철환;정석찬
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.2
    • /
    • pp.1-30
    • /
    • 1997
  • In this research, the concept of CM (configuration management) is introduced for proper applications to the life-cycle product data management. In addition, the activities for CM - CM management and planning, configuration identification, configuration control, configuration status accounting, and configuration verification and audit - are described in detail. For the management of distributed configuration data among governments, prime contractors, and subcontractors, development environments and functions for the configuration management information system (CMIS) are proposed.

  • PDF

A License Audit Model for Secure DRM Systems in IP-based Environments

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.253-260
    • /
    • 2010
  • Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.

A Case Study on IT Audit Issue for e-Business Pilot Project in Public Fields (공공분야 전자상거래 시범사업의 정보기술.감리 관점의 사례분석 연구)

  • Lee, Jae-Du
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.329-338
    • /
    • 2007
  • As the roles and interests or audit are growing with ITA law in operation from 2006, the interests about the way which makes project qualifies to improve is increasing through it. In this point of view, this study is trying to find the issue that can promote the efficiency and effectiveness of IT projects decreasing some trials and errors relevant to IT, when government or some public agency field promote e-Business. For this purpose, this study analyze IT application result about e-business project in some public agency field. And the case study will be checked out and evaluated by the quality-contents analysis study method on the point of view of the IT audit. The study result is expected to provide a more practical policy implications than traditional researches based on specific-element technology or business process model by making use of major review areas and improvement methods. In thus, it is expected that it will be helpful not only references of IT quality improvement but also policy promotions when the public promotes IT projects related with e-Business.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Design of agent intrusion detection system applying data mining (데이터 마이닝을 적용한 에이전트 침입 탐지 시스템 설계)

  • Jeong Jong Kun;Lee Sung Tae;Kim Yong Ho;Lee Yun Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.676-679
    • /
    • 2001
  • As network security is coning up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more reliable network and system security rather than firewall. In this paper, we propose the new IDS model which tan detect intrusion in different systems as well as which ran make real-time detection of intrusion in the expanded distributed environment in host level of drawback of existing IDS. We implement its prototype and verify its validity. We use pattern extraction agent so that we can extract automatically audit file needed in distributed intrusion detection even in other platforms.

  • PDF

Secure QoS Billing System Using Audit Trail Subsystem Design & Implementation (감사 추적 시스템 설계 및 구현을 통한 안전한 QoS 빌링 시스템)

  • Park, U-Chul;Kim, Jeong-Nyeo;Lee, Byeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.597-606
    • /
    • 2001
  • In this paper, we propose the delay sensitive traffic and a high bandwidth QoS service in order to supply real-time traffic such as VoIP, multimedia service. We use IntServ over DiffServ network to supply end-to-end QoS service in the IETF. We define the proposed QoS services which are Best, Good, Default service. We analyze the performance using NS simulator with end to end QoS service in IntServ over DiffServ network. The proposed billing system uses the Accounting, Authentication, Authorization (AAA) functions of RADIUS protocol and proposes the dynamic pricing method according to network usage state using end-to-end QoS of IntServ over DiffServ network. In order to secure billing system, we design and implement audit trail system by the IEEE POSIX.1E standard.

  • PDF

Impact of the IS Audit on Software Process (정보시스템 감리가 소프트웨어 프로세스에 미치는 영향)

  • 정승렬;문대원;신동익
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.425-434
    • /
    • 1999
  • 감리 효과성에 관한 연구가 중요한 이유는 효과적인 감리 수행이 조직의 정보시스템 개발 및 자원관리에 어떠한 영향을 미치는 지를 파악하여, 그 결과 향후 감리 제도의 추진방향 제시 및 역할 정립을 할 수 있기 때문이다. 본 연구는 정보시스템 감리의 효과성을 프로세스 관점에서 정의하고 실제로 이러한 감리가 소프트웨어 프로세스를 향상시키는데 영향은 미치는 지를 살펴본다. 이를 위해 본 연구는 정보시스템 감리를 실시한 공기업을 대상으로 설문 조사를 실시하며 그 효과를 CMM 모델을 이용하여 분석한다.

  • PDF

A Study on the Effect of the Relation-by-Item of the Computer Audit to the Quantification (전산감리의 항목별 연관관계가 계량화에 미치는 영향에 관한 연구)

  • 신승중;김현수
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.435-444
    • /
    • 1999
  • 현재까지 연구되고 있던 정보보호관련분야의 계량화방법을 좀 더 다른 방법으로 접근하여, 정보시스템 환경 하에서 보안 및 관리 운영 평가 지수에 계량화하여 1차 집단과 2차 집단간의 차이를 연구하였다. 정보화 관련항목에 대하여 빈도 분석을 적용함으로서 군별, 항목별 분류를 통한 항목 비례 가중치법을 산출하였다. 또한, 선지정 가중치법을 이용하여, 보호지수와 관리운용지수에 따른 상관관계를 조사하여 안전관리 지수를 계량화 하였다.

  • PDF

Agent Intrusion Detection Model In Attributed Environment

  • Jeong, Jong-Geun;Kim, Chul-Won
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.2
    • /
    • pp.84-88
    • /
    • 2004
  • Firewall is not perfectly prevent hacker, Intrusion Detection System(IDS) is considered a next generation security solution for more trusted network i and system security. We propose a agent IDS model in the different platforms that can detect intrusions in the expanded distributed host environment, since that is a drawback of existing IDS. Then we implement a prototype and verify validity. We use a pattern extraction agent so that we extract audit files needed in intrusion detection automatically even in other platforms.