• Title/Summary/Keyword: Integrated Security Manager

Search Result 17, Processing Time 0.03 seconds

Integrated Security Manager with Agent-based automatic vulnErability checking code generating scanner from intermediate vulnerability checking Language (ISMAEL) (매개 취약점 점검 언어로부터 점검 코드를 자동으로 생성하는 에이전트를 이용한 취약점 관리 시스템)

  • 김수용;서정석;김한성;조상현;임채호;차성덕
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.453-458
    • /
    • 2001
  • 악의의 침입자로부터 시스템을 보호하기 위한 첫 번째 단계는 시스템의 취약점을 분석하는 일이다. 기존의 시스템 취약점 분석 방법은 주로 네트워크 기반 취약점 점검 도구에 의존해 왔다. 하지만, 네트워크 기반 취약점 점검 도구는 대상 시스템의 제한된 정보만을 이용하여 취약점을 점검하기 때문에 시스템의 모든 취약점에 대한 검사가 불가능하다는 단점이 있다. 호스트 기반 취약점 점검 도구를 사용하면 시스템 내부의 모든 정보를 이용할 수 있지만, 시스템의 OS 종류나 버전에 따라 각기 다른 호스트 기반 취약점 점검 도구를 개발해야 한다는 단점이 있다. 또한, 호스트 기반 취약점 점검 도구들은 많은 호스트들을 동시에 점검하기 힘들다는 점이 문제로 지적되고 있다. 본 논문에서는 호스트 기반 취약점 점검 도구를 에이전트로 구현하여 대상 시스템에 설치하고, 하나의 관리 프로그램에서 여러 에이전트들을 관리함으로써 동시에 많은 호스트의 취약점들을 관리할 수 있는 모델인 ISMAEL을 제시한다. 또한 ISMAEL은 OS에 맞는 여러 호스트 기반 취약점 점검 도구들을 개발해야 하는 문제를 해결하기 위해 OS에 독립인 부분만을 뽑아내고, 그 외 OS에 종속된 부분은 Library 형태로 제공하여, OS에 독립인 부분에서 이 Library를 참조하여 특정 취약점 점검 코드를 자동 생성하고 이를 실행하여 취약성 여부를 판단할 수 있는 구조를 채택하고 있다.

  • PDF

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

Design and Implementation of Road Construction Risk Management System based on LPWA and Bluetooth Beacon

  • Lee, Seung-Soo;Kim, Yun-cheol;Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.145-151
    • /
    • 2018
  • While commercialization of IoT technologies in the safety management sector is being promoted in terms of industrial safety of large indoor businesses, implementing a system for risk management of small outdoor work sites with frequent site movements is not actively implemented. In this paper, we propose an efficient dynamic workload balancing strategy which combined low-power, wide-bandwidth (LPWA) communication and low-power Bluetooth (BLE) communication technologies to support customized risk management alarm systems for each individual (driver/operator/manager). This study was designed to enable long-term low-power collection and transmission of traffic information in outdoor environment, as well as to implement an integrated real-time safety management system that notifies a whole field worker who does not carry a separate smart device in advance. Performance assessments of the system, including risk alerts to drivers and workers via Bluetooth communication, the speed at which critical text messages are received, and the operation of warning/lighting lamps are all well suited to field application.

A study on the integrated management model of the national disaster resources (국가 방재 자원 통합 운영 모델에 관한 연구)

  • Lee, Changyeol;Kim, Taehwan;Park, Giljoo
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.358-364
    • /
    • 2013
  • Conventional disaster resources management systems among the several institutes are not mutually connected. In case of NDMS(National Disaster Management System), the data of the system is confined to the resources of the local governments and not connected with any other disaster resource management systems. Therefore, it is difficult to find the needed resources, when the large scale disaster is occurred. In this paper, we developed the integrated model of the distributed resources management framework considering the current resource management environment among the institutes. It is loosely coupling model under the centralized system, called IDRM(Integrated Disaster Resource Manager). The system will be verified with the test sites including Korea Expressway Corporation, JeonBuk local government, and Korea Construction Equipment Association. Via the field testing, the system will be the base of the real available system in the future.

THE INVESTIGATION OF PROPERTY MANAGEMENT AND DEVELOPMENT OF "BUILDING ADMINISTRATION SYSTEM"

  • Yan-Chyuan Shiau ;Cheng-Wei Liu ;Shu-Jen Sung;Chih-Kun Chu;Tsung-Pin Tsai
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.550-557
    • /
    • 2005
  • Because each building is built in different time, there exists different equipment to meet the need for each age. Before the announcement of "Community Management Regulation", the old communities usually suffer the problem of lower requirement and living quality. This may bring some security problem that we should face. In this research, we construct "Building Administration System" to provide users a tool to perform a standard operation procedure in community management. This powerful tool will also help manager to effectively handle important tasks in property administrating by reducing unnecessary documentation. In the current regulation, all community committee members shall be voted each year. This will seriously affect the cumulative of management knowledge and cause a worse efficiency. In this research, we use Object Oriented concept and Visual Modeling techniques to combine with Interbase, ER/Studio, and Delphi to develop this management system for Building Property. Through the help of current computing technology, we can solve the problem that can not be inherited and the storing of the huge amount of data. In this system, we develop the modules such as Basic Data Module, Administrative Expense Calculation, Receipt Print, and Inquiring for Inheritance. In this system, we have integrated all houses, parking lots, and public equipments in it. Manager will only need to handle some basic accounting data; the system will automatically handle the rest. Through the help of this system, the community management staff can be easily accomplished and put more manpower on some needed aspect to improve the living quality.

  • PDF

The Development of Exhibition Grounds Management System Using the Ubiquitous Computing (Ubiquitous Computing을 이용한 전시회장 관리 시스템 개발)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.149-156
    • /
    • 2008
  • In this paper, we develope the Exhibition Grounds Management System utilizing the ubiquitous computing which integrates the RFID ubiquitous main technology, existing use technology Bar-code, the Mobile communication technology for IT main technology field. The developed system consists of the program for exhibition information. the visitor registration program, manager program and mobile program for the visitor's current location inquiry and the exhibition management. This system is realized and designed based on database, web program, mobile program, wireless telecommunication technology. The automation technology utilizing the developed RFID system and the Exhibition Grounds Management System integrated with the wireless packet telecommunication using the mobile telecommunication technology could have a ripple effect on whole information industrial application fields.

  • PDF

An Automatic Network Vulnerability Analysis System using Multiple Vulnerability Scanners (다양한 취약점 점검 도구를 이용한 자동화된 네트워크 취약점 통합 분석 시스템 설계)

  • Yoon, Jun;Sim, Won-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.246-250
    • /
    • 2008
  • This paper presents the design of network vulnerability analysis system which can integrate various vulnerability assessment tools to improve the preciseness of the vulnerability scan result. Manual checking method performed by a security expert is the most precise and safe way. But this is not appropriate for the large-scale network which has a lot of systems and network devices. Therefore automatic scanning tool is recommended for fast and convenient use. The scanning targets may be different according to the kind of vulnerability scanners, or otherwise even for the same scanning target, the scanning items and the scanning results may be different by each vulnerability scanner, Accordingly, there are the cases in which various scanners, instead of a single scanner, are simultaneously utilized with the purpose of complementing each other. However, in the case of simultaneously utilizing various scanners on the large-scale network, the integrative analysis and relevance analysis on vulnerability information by a security manager becomes time-consumable or impossible. The network vulnerability analysis system suggested in this paper provides interface which allows various vulnerability assessment tools to easily be integrated, common policy which can be applied for various tools at the same time, and automated integrative process.