• Title/Summary/Keyword: Security Management Process

Search Result 799, Processing Time 0.023 seconds

Related Carriage and Facility Management Service Quality Systems (운송 및 시설관리 서비스 관련 품질시스템)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.11a
    • /
    • pp.475-480
    • /
    • 2007
  • This paper introduces service quality systems such as furniture removal for households, carriage of parcels, commercial motorcycle carriage service, the service for warehousing, car rental services, exhibition service, security service, and, facility management services. These service quality systems include terminology, process, and, infrastructure.

  • PDF

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.

A Study on Integration Security Management Model in Cloud Environment (클라우드 환경에서의 통합 보안관제 모델 연구)

  • Byun, Yun Sang;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.407-415
    • /
    • 2013
  • Recently, Interest variety of IT services and computing resources are increasing. As a result, the interest in the security of cloud environments is also increasing. Cloud environment is stored that to provide services to a large amount of IT resources on the Cloud. Therefore, Cloud is integrity of the stored data and resources that such as data leakage, forgery, etc. security incidents that the ability to quickly process is required. However, the existing developed various solutions or studies without considering their cloud environment for development and research to graft in a cloud environment because it has been difficult. Therefore, we proposed wire-wireless integrated Security management Model in cloud environment.

Strategic Business Process Based on Business Intelligence by Connected with BPM & 6 Sigma (BPM과 6 Sigma 연계에 의한 BI기반의 전략적 비즈니스 프로세스)

  • Park, Sang-Min;Nam, Ho-Ki;Shin, Seung-Ho;Kim, Qui-Nam
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.27-37
    • /
    • 2007
  • Companies have to take agility against change of environment and build up the capacity of new value creation in today's management environment. Until now, there are so many management method for efficiency of management, rationality of management and IT (information technology) supported this method by integration of enterprise task and process automation. but company's competitiveness through the efficiency of management realized the limitations recently. so companies needs the new management method to raise core value of enterprise. This study applies strategy intelligence which is some part of Business Intelligence. We can identify the core value driver by using this method. and the core value driver is connected the KPI (key performance indicator) of processes in BPM (Business Process Management). This help the management of process focused on value driver. and some part of activity driver that effect the process performance can be use the Six Sigma method to strategic business process. This study first introduces the concept of Business Intelligence, Business Process Management and Six Sigma. and then efficient connection plan for value based strategic business process is introduces.

  • PDF

The Concept of Human Resource Management in Logistics Processes

  • Shtuler, Iryna;Zabarna, Eleonora;Kyrlyk, Nataliya;Kostovyat, Hanna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.110-116
    • /
    • 2021
  • The article focuses on the need to deepen the issue of human resource management in logistics processes. It is noted that changes in market conditions and turbulence in the institutional environment require managers to form a highly effective human resources policy capable to ensure the innovative development of the enterprise. Functional strategies for human resource management in logistical processes are proposed, namely: adaptive, innovative, selective and exclusive. Innovative technologies that should be used in the adaptive human resources policy process are identified.

Security Risk Evaluation Scheme for Effective Threat Management (효과적인 위협관리를 위한 보안 위험도 평가기법)

  • Kang, Pil-Yong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.380-386
    • /
    • 2009
  • It is most important that identifying security threats(or vulnerabilities) of critical IT assets and checking the propriety of related security countermeasures in advance for enhancing security level. In this paper, we present a new security risk evaluation scheme based on critical assets and threats for this. The presented scheme provides the coverage and propriety of the countermeasures(e.g., intrusion detection rules and vulnerability scan rules, etc.), and the quantitative risk level of identified assets and threats. So, it is expected that the presented scheme will be utilized in threat management process efficiently compared to previous works.

A Common Data Model for Bridge Management and Maintenance Activities (교량 유지관리 업무를 위한 공통 자료모델)

  • Lee, Ji- Hoon;Kim, Bong-Geun;Lee, young Jung;Lee, Sang-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.41-49
    • /
    • 2008
  • As bridges have been longer and bigger recently, lots of bridge management systems (BMS) have been developed for each bridge. However, the differences among the data models developed by different system developers give a serious problem in integrated information management for national security. The aim of this study is to develop a common data model which can be referred in development of the BMS. The existing BMS and work process by laws are carefully analyzed. Based on the analysis results, the bridge management and maintenance process is categorized into the four basic activity types. In addition, common data models for each the unit activity type are defined.

  • PDF

Structure and Challenges of a Security Policy on Small and Medium Enterprises

  • Almeida, Fernando;Carvalho, Ines;Cruz, Fabio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.747-763
    • /
    • 2018
  • Information Technology (IT) plays an increasingly important role for small and medium-sized enterprises. It has become fundamental for these companies to protect information and IT assets in relation to risks and threats that have grown in recent years. This study aims to understand the importance and structure of an information security policy, using a quantitative study that intends to identify the most important and least relevant elements of an information security policy document. The findings of this study reveal that the top three most important elements in the structure of a security policy are the asset management, security risk management and define the scope of the policy. On the other side, the three least relevant elements include the executive summary, contacts and manual inspection. Additionally, the study reveals that the importance given to each element of the security policy is slightly changed according to the sectors of activity. The elements that show the greatest variability are the review process, executive summary and penalties. On the other side, the purpose of the policy and the asset management present a stable importance for all sectors of activity.

Elevator error detecting Using Intelligence Algorithm (지능형 알고리즘을 이용한 엘리베이터의 에러검출)

  • Kang, Doo-Young;Kim, Hyung-Gwon;Javid, Hossain;Ahn, Tae-Chon
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2741-2743
    • /
    • 2005
  • In this paper, Elevator is designed for real time security & management. Security & Management System is designed for wireless communication between an Elevator and an manager, between Elevation and an manager. Also, to have remote control capability, embedded system platform with TCP/IP techniques are applied to process control system with independent open structure for the precise data transmission and without constraint of operating system. Security and Management system is designed to solve problem of network port by Bluetooth module. Moved recording, unworked table, life of device and replacement time of device are made database, database is applied to Fuzzy Rule for pre-detection unworked Elevator. Security & Management system is designed safety and convenience for customers using Elevator as well as rapidly treatment with unworked Elevator.

  • PDF

Security Improvement Methods for Computer-based Test Systems (컴퓨터 기반 평가 시스템의 보안성 강화 방안)

  • Kim, Sang Hyun;Cho, Sang-Young
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • ICT technology has been applied to various educational fields, but applying to educational test field is limited. Computer-based test (CBT) can overcome temporal and spatial constraints of conventional paper-based test, but is vulnerable to fraud by test parties. In this paper, we propose real-time monitoring and process management methods to enhance the security of CBT. In the proposed methods, the test screens of students are periodically captured and transferred to the professor screen to enable real-time monitoring, and the possible processes used for cheating can be blocked before testing. In order to monitor the screen of many students in real time, effective compression of the captured original image is important. We applied three-step compression methods: initial image compression, resolution reduction, and re-compression. Through this, the original image of about 6MB was converted into the storage image of about 3.8KB. We use the process extraction and management functions of Windows API to block the processes that may be used for cheating. The CBT system of this paper with the new security enhancement methods shows the superiority through comparison of the security related functions with the existing CBT systems.

  • PDF