• Title/Summary/Keyword: Physical Configuration Audit

Search Result 4, Processing Time 0.02 seconds

An Operational Scheme of Software Configuration Management (소프트웨어 형상관리 운영 방안에 관한 연구)

  • 김태달
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.10a
    • /
    • pp.165-171
    • /
    • 1999
  • 형상관리는 프로젝트를 추진함에 있어 현실적으로 필수적인 관리 항목으로 인식할 필요성이 대두되고 있다. 그 이유는 프로젝트를 성공적으로 완료하기 위해서는 전체 프로젝트 공정을 통해 사전에 계획된 절차에 준하여 단계별로 어떻게 추진되고 있는지 추진과정을 추적, 확인되어야 하며, 또한 추진 결과에 있어 단계별로 어떤 결과물이 양산되고 있는지를 검증 및 확인하여야 하기 때문이다. 본 논문에서는 이러한 형상관리를 위해서는 프로젝트 수행 초기에 형상관리 계획을 입안하기 위한 형상관리 조직형태를 제안하며 작성된 계획서에 수록된 형상관리 조직을 운영함에 있어 필요한 형상관리활동의 주요 내용들에 대해 국내외 표준 및 지침에 대해 조사하였으며, 현실적으로 공공 프로젝트를 추진함에 있어 형상관리를 위한 필수관리 항목과 문서화 기준 및 이들 문서들간의 연관성에 대해 연구, 제안한다.

  • PDF

A Proposal to Improve Standardization Process on Defense R&D for Quality and Reliability of Missile System (유도무기체계 품질 및 신뢰성 제고를 위한 개발단계 국방규격화 프로세스 개선 방안)

  • Cho, Yu-Seup;Kim, Jang-Eun;Yoon, Jae-Hyoung;Kim, Si-Ok;Lee, Su-Lim
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.3
    • /
    • pp.115-122
    • /
    • 2017
  • To achieve designed quality and reliability from R&D to force integration, an establishment of precise and distinct specifications and standards are required. However, the recent process of R&D standardization on defense acquisition system, has brought plenty of corrections on specifications and standards that may cause not only difficulties to production line and retardation to the military forces, but also a degradation of provided weapon systems. Therefore, a technical review should be performed by the developer, the producer, and the client, establishing the standard that include mass production requirements as well as clients' requirements. This paper propose a specified solution on process of R&D standardization, by applying a substantial FCA(Functional Configuration Audit) and PCA(Physical Configuration Audit) which implies participation of related agencies. By the improved PCA, 2,023 corrections on 74 types of QAR(Quality Assurance Requirement)s and 12,715 corrections on drawings are identified.

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF