• Title/Summary/Keyword: assets control

검색결과 169건 처리시간 0.026초

Laboratory Diagnosis of Invasive Candidiasis

  • Ellepola Arjuna N.B.;Morrison Christine J.
    • Journal of Microbiology
    • /
    • 제43권spc1호
    • /
    • pp.65-84
    • /
    • 2005
  • Invasive candidiasis is associated with high morbidity and mortality. Clinical diagnosis is complicated by a lack of specific clinical signs and symptoms of disease. Laboratory diagnosis is also complex because circulating antibodies to Candida species may occur in normal individuals as the result of commensal colonization of mucosal surfaces thereby reducing the usefulness of antibody detection for the diagnosis of this disease. In addition, Candida species antigens are often rapidly cleared from the circulation so that antigen detection tests often lack the desired level of sensitivity. Microbiological confirmation is difficult because blood cultures can be negative in up to 50% of autopsy-proven cases of deep-seated candidiasis or may only become positive late in the infection. Positive cultures from urine or mucosal surfaces do not necessarily indicate invasive disease although can occur during systemic infection. Furthermore, differences in the virulence and in the susceptibility of the various Candida species to antifungal drugs make identification to the species level important for clinical management. Newer molecular biological tests have generated interest but are not yet standardized or readily available in most clinical laboratory settings nor have they been validated in large clinical trials. Laboratory surveillance of at-risk patients could result in earlier initiation of antifungal therapy if sensitive and specific diagnostic tests, which are also cost effective, become available. This review will compare diagnostic tests currently in use as well as those under development by describing their assets and limitations for the diagnosis of invasive candidiasis.

Analysis of Threat Information Priorities for Effective Security Monitoring & Control (효과적인 보안관제를 위한 위협정보 우선순위 도출)

  • Kang, DaYeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • 제26권5호
    • /
    • pp.69-77
    • /
    • 2021
  • This study aims to identify security-based threat information for an organization. This is because protecting the threat for IT systems plays an important role for an corporate's intangible assets. Security monitoring systems determine and consequently respond threats by analyzing them in a real time situation, focusing on events and logs generated by security protection programs. The security monitoring task derives priority by dividing threat information into reputation information and analysis information. Reputation information consisted of Hash, URL, IP, and Domain, while, analysis information consisted of E-mail, CMD-Line, CVE, and attack trend information. As a result, the priority of reputation information was relatively high, and it is meaningful to increase accuracy and responsiveness to the threat information.

Piosk : A Practical Kiosk To Prevent Information Leakage

  • Lee, Suchul;Lee, Sungil;Oh, Hayoung;Han, Seokmin
    • International journal of advanced smart convergence
    • /
    • 제8권2호
    • /
    • pp.77-87
    • /
    • 2019
  • One of important concerns in information security is to control information flow. It is whether to protect confidential information from being leaked, or to protect trusted information from being tainted. In this paper, we present Piosk (Physical blockage of Information flow Kiosk) that addresses both the problems practically. Piosk can forestall and prevent the leakage of information, and defend inner tangible assets against a variety of malwares as well. When a visitor who carries a re-writable portable storage device, must insert the device into Piosk installed next to the security gate. Then, Piosk scans the device at the very moment, and detects & repairs malicious codes that might be exist. After that, Piosk writes the contents (including sanitized ones) on a new read-only portable device such as a compact disk. By doing so, the leakage of internal information through both insiders and outsiders can be prevented physically. We have designed and prototyped Piosk. The experimental verification of the Piosk prototype implementation reveals that, Piosk can accurately detect every malware at the same detection level as Virus Total and effectively prevent the leakage of internal information. In addition, we compare Piosk with the state-of-the-art methods and describe the special advantages of Piosk over existing methods.

A study on classification of the security controls for the effective implementation to nuclear power plant

  • Han, Sang Min;Lee, Chanyoung;Chae, Young Ho;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • 제54권4호
    • /
    • pp.1245-1252
    • /
    • 2022
  • As regulatory bodies require full implementation of security controls in nuclear power plants (NPPs), security functions for critical digital assets are currently being developed. For the ultimate introduction of security controls, not alternative measures, it is important to understand the relationship between possible cyber threats to NPPs and security controls to prevent them. To address the effectiveness of the security control implementation, this study investigated the types of cyber threats that can be prevented when the security controls are implemented through the mapping of the reorganized security controls in RS-015 to cyber threats on NPPs. Through this work, the cyber threat that each security control can prevent was confirmed, and the effectiveness of several strategies for implementing the security controls were compared. This study will be a useful reference for utilities or researchers who cannot use design basis threat (DBT) directly and be helpful when introducing security controls to NPPs that do not have actual security functions.

The effect of Internal control over financial reporting on probability of firm failure (내부회계관리제도가 기업실패가능성에 미치는 영향)

  • Kim, Hyun-Jin
    • Management & Information Systems Review
    • /
    • 제33권1호
    • /
    • pp.173-190
    • /
    • 2014
  • According to COSO(2013) "Internal control is a process that is designed to provide reasonable assurance that a firm can achieve its objectives, where differing aspects of internal control can be partitioned into operating objectives, reporting objectives, and compliance objectives." Internal control over financial reporting(ICFR) is focus on reporting objectives and includes that provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use or disposition of the company's assets that could have a material effect on the financial statements. Thus, firms with weak ICFR have negative a effect on Firm value because those firms are great likelihood of misappropriation and inefficiency decision. In this regard, this study investigates the association of ICFR with the likelihood of firm failure. Specially, I measure the characteristic of ICFR as disclosures of material weaknesses and operating personnel of ICFR. I identify the likelihood of firm failure as going-concern opinion issued in audit report. As result, I find that a higher probability of firm failure is positively associated with the material weakness in ICFR also I find that a higher probability of firm failure is negatively associated with experience and qualified CPA of personnel in ICFR.

  • PDF

Impact of MOPs on Effectiveness for M-to-M Engagement with the Counter Long Range Artillery Intercept System (다대다 교전 효과도에 있어서 각 요소 성능의 영향력 연구 - 장사정포 요격체계 시뮬레이션)

  • Yook, Jung Kwan;Hwang, Su Jin;Kim, Tae Gu
    • Journal of the Korea Society for Simulation
    • /
    • 제29권3호
    • /
    • pp.57-72
    • /
    • 2020
  • To respond to the threat of Long range artillery of North Korea, it is necessary to establish the Korean counter long range artillery intercept system(CLRAIS). The purpose of this study is to study the operational concept of the CLRAIS against the threat of long range artillery of North Korea, and to develop the operational effectiveness process of the CLRAIS. First, we set up the operating concept of the CLRAIS and established the concept of an effectiveness in a many-to-many engagement situation and a process to derive it. Based on this, a tool was developed to analyze the actual effectiveness. In order to find out the factors influencing the effectiveness in many-to-many engagement situations, simulation experiments were performed by combining various variables such as detection assets, engagement control, and launchpad performance. As a result, it was found that in addition to the missile performance, the performance of the detection assets and the engagement control center had a significant impact on the intercept rate and the defense success rate. These findings can be used to understand important indicators in terms of effectiveness in many-to-many engagement situations in the future development of weapon system, and to determine the development direction and target value of each element necessary for the level of defense success rate to be achieved.

A Study on the Framework of Integrated Vulnerability Analysis of Domestic Nuclear Facilities (국내 원자력 시설 통합 취약점 분석 프레임워크 연구)

  • Mi-Joo Shin;Seong-su Yoon;Ieck-chae Euom
    • Convergence Security Journal
    • /
    • 제22권1호
    • /
    • pp.11-17
    • /
    • 2022
  • Cyber attacks on national infrastructure, including large-scale power outages in Ukraine, have continued in recent years. As a result, ICS-CERT vulnerabilities have doubled compared to last year, and vulnerabilities to industrial control systems are increasing day by day. Most control system operators develop vulnerability countermeasures based on the vulnerability information sources provided by ICS-CERT in the United States. However, it is not applicable to the security of domestic control systems because it does not provide weaknesses in Korean manufacturers' products. Therefore, this study presents a vulnerability analysis framework that integrates CVE, CWE, CAPE, and CPE information related to the vulnerability based on ICS-CERT information (1843 cases). It also identifies assets of nuclear facilities by using CPE information and analyzes vulnerabilities using CVE and ICS-CERT. In the past, only 8% of ICS-CERT's vulnerability information was searched for information on any domestic nuclear facility during vulnerability analysis, but more than 70% of the vulnerability information could be searched using the proposed methodology.

Development of the Integrated Management System of the Control Points (기준점 통합관리시스템 개발)

  • Lim, In-Seop;Lee, Jae-Kee
    • Journal of Korean Society for Geospatial Information Science
    • /
    • 제12권4호
    • /
    • pp.45-51
    • /
    • 2004
  • Control stations managed by national and local governmes are associated with other survey work and constructing geography information and they are important assets in the national level as the positional standard of the country. Since these control points are managed as some type of register and the control points could not be easily updated due to the loss of control stations from construction work or urban development. Therefore, the users could not understand the present situation of the changed control stations. In this background, the aim of this study was to develop control station management system which the managers can use to efficiently maintain control points and to support the usage of the survey control points. For developing this system, we have designed input, update, network, analysis and statistic functions, and have constructed the system using Mapobject as main engine with other languages such as Visual C++ and Visual Basic. The graphic data used in this system are 1/5,000 digital map and digital cadastral map, and the attribute data of each control station are point name, map tile name, longitude and latitude coordinates, TM coordinates, surveying data with the format of year-month-day and control situation photos and so on. In the result of constructing this control station management system, we could achieve integrated management of graphic, attribute and positioning information of each control station.

  • PDF

An Empirical Investigation of Relationship Between Interdependence and Conflict in Co-marketing Alliance (공동마케팅제휴에 있어 상호의존성과 갈등의 관계에 대한 연구)

  • Yi, Ho Taek;Cho, Young Wook;Kim, Ju Young
    • Asia Marketing Journal
    • /
    • 제13권3호
    • /
    • pp.79-102
    • /
    • 2011
  • Researchers in channel dyads have devoted much attention to relationship between interdependence (i.e. interdependence enymmetry and total interdependence) and conflict that promote channel performance. In social science, in spite of the inconsistent results in marketing practice, there are two contradictory theories explain the relationship between interdependence and conflict - bilateral deterrence theory and conflict spiral theory. The authors apply these theories to co-marketing alliance situation in terms that this relationship is also incorporated both company's dependence, either from one company's perspective or each partner about its respective dependence. Using survey data and archival data from 181 companies enlisted in a telecommunication membership program, the authors find out the relationship between interdependence and conflict as well as investigate the antecedents of interdependence - transaction age, transaction frequency, the numbers of alliance partner, and co-marketing alliance specific assets according to previous researches. Using PLS analysis, the authors demonstrate that, with increasing total interdependence in a telecommunication membership program, two co-marketing partners' conflict level is increased in accord with the author's conflict spiral theory predictions. As expected, higher interdependence asymmetry has negative value to level of conflict even though this result is not statistically significant. Other findings can be summarized as follows. In the perspective of telecommunication company, transaction age, transaction frequency, and co-marketing alliance specific assets have influence on its dependence on a partner as independent variables. To the contrary, in a partner's perspective, transaction frequency, co-marketing alliance specific assets and the numbers of alliance partner have significantly impact on its dependence on a telecommunication company. In direct effect analysis, it is shown that transaction age, frequency and co-marketing alliance specific assets have direct influence on conflict. This results suggest that it is more useful for a telecommunication company to select a co-marketing partner which is frequently used by customers and earned high rates of mileage. In addition, the results show that dependence of a telecommunication company on a co-marketing partner is more significantly effected to co-marketing alliance conflict than partner's one. It provide an effective conflict management strategy to a telecommunication company for controling customer's usage rate or having the co-marketing partner deposit high level of alliance specific investment (i.e. mileage). To a co-marketing partner of telecommunication company, it is required control the percentage of co-marketing sales in total sales revenue or seek various co-marketing partners in order for co-marketing conflict management. The research implications, limitation and future research of these results are discussed.

  • PDF

An Empirical Analysis about the usefulness of Internal Control Information on Corporate Soundness Assessment (기업건전성평가에 미치는 내부통제정보의 유용성에 관한 실증분석 연구)

  • Yoo, Kil-Hyun;Kim, Dae-Lyong
    • Journal of Digital Convergence
    • /
    • 제14권8호
    • /
    • pp.163-175
    • /
    • 2016
  • The purpose of this study is to provide an efficient internal control system formation incentives for company and to confirm empirically usefulness of the internal accounting control system for financial institutions by analyzing whether the internal control vulnerabilities of companies related significantly to the classification and assessment of soundness of financial institutions. Empirical analysis covered KOSPI, KOSDAQ listed companies and unlisted companies with more than 100 billion won of assets which have trading performance with "K" financial institution from 2008 until 2013. Whereas non-internal control vulnerability reporting companies by the internal control of financial reporting received average credit rating of BBB on average, reporting companies received CCC rating. And statistically significantly, non-reporting companies are classified as "normal" and reporting companies are classified as "precautionary loan" when it comes to asset quality classification rating. Therefore, reported information of internal control vulnerability reduced the credibility of the financial data, which causes low credit ratings for companies and suggests financial institutions save additional allowance for asset insolvency prevention and require high interest rates. It is a major contribution of this study that vulnerability reporting of internal control in accordance with the internal control of financial reporting can be used as information significant for the evaluation of financial institutions on corporate soundness.