• Title/Summary/Keyword: intranet

Search Result 267, Processing Time 0.033 seconds

Intranet Security Evaluation Using Hacking Techniques (해킹 기법을 이용한 내부망 보안 평가 방법)

  • Seo, Dong-Il;Choi, Byeong-Choel;Sohn, Sung-Won;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.337-342
    • /
    • 2002
  • In this paper, we proposed the ISL for evaluating the security level of Intranet. This method is composed of two parts First, Hacking Scenarios are the hacking stories by hacking/hackers levels. Second, Network Model is composed of the zone and intrusion paths. Our method is very active and practical. We divide ISL into five levels ISL1∼ISL5. Among the levels, ISL5 is the highest security level. Main purpose of this paper is to promote the security of Intranet. In this paper, we designed and analyzed the test-bed for ISL3.

Authentication using AAA for the Mobility Support of Mobile IPv6 Nodes in VPN Environments (VPN 환경에서 Mobile IPv6 노드의 이동성 제공을 위한 AAA 기반의 인증)

  • Kim Mi-Young;Mun Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.218-230
    • /
    • 2006
  • The enterprise service network is composed of internet, intranet and DMZ. The design rationale of Mobile IP is providing of seamless mobility transparency without regarding to the type of network topology and services. However, Mobile IP specification does not include the mobility support in case of using VPN environment and define the access scenarios to get into the VPN intranet without disturbing existing security policy. In this paper, we propose an authentication method using AAA infrastructure and keying material exchange to enable an user in internet to be able to access the intranet through the VPN gateway. Finally, performance analysis for the proposed scheme is provided.

XML Database Setup & Messenger Connection Research for Cyber University Supporting (가상대학 학사지원을 위한 XML 데이터베이스 구축과 메신저 관련 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.4 no.1
    • /
    • pp.115-126
    • /
    • 2003
  • In this paper, an objective of this research is to add convenience to the intranet operating within an educational institution, by setting up a messenger function to enable the faculties and teachers to make better use of the university database via Intranet. With this messenger services, the users can view the information about the members in a group they belong to, and register as friends a group of members they selected from the work group they are in. This function will reduce the cumbersome chores of adding one individual as a friend at a time. This research will enhance the Intranet within an educational institution by integrating new functions. Speciallly, In this paper, it is stored student data by the input form by the JDBC of XML standard data. Also, it is able to search of stored database to web sever from web client by the SQL quary.

  • PDF

Study on Personalization to Improve Usage Intention of Corporate Information System : An Empirical Analysis in Using Intranet System (기업 정보시스템 사용의도 향상을 위한 개인화 연구)

  • Lee, Sung-Woo;Chang, Won-Kyung;Kim, Tae-Kyun
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.4
    • /
    • pp.57-82
    • /
    • 2010
  • Many companies today use information systems to maintain competitive advantage and to give immediate responses to customer requests. Over time, however, many of these companies failed to make the most of such information systems because the users stopped utilizing the system. While many reasons offer explanations to the phenomenon, this study analyzes how usage intention of information system can be enhanced by changing the environment and usefulness of the system from the user's perspective. Active and wide-ranging researches using the Technology Acceptance Model (TAM) have been carried out on an individual's tendency to using new technology. But, many of the studies remain focused on improving user intention by enhancing the ease of use and usefulness of the system under PC applications or Enterprise applications. The personalized intranet system is not only bringing about sweeping changes to a company's information systems environment but also providing users with freedom to design their own working environment, personalization, to Corporate Information Systems (CIS). Results from empirical tests on intranet systems verify that through personalization, a more voluntary information system environment can be created and that by increasing the ease of use and usefulness of the system, users can become more favorable to accepting new technologies and ultimately result in improved usage intention. This study suggests personalization variables and model for implementing a voluntary CIS for information system developers.

  • PDF

A Study on Implement of Intranet System for Knowledge Management - For Government Sponsored Research Institute (지식경영을 위한 인트라넷 시스템 구축을 위한 연구 - 정부출연연구기관 대상 -)

  • Huh Tae-Sang;Lee Seung-Bock;Han Hee-Jun;Seo Hyun-Deok;Yae Yong-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.118-123
    • /
    • 2005
  • The intranet systems used in government sponsored research institutes have been faced with the change of knowledge management under a large scale project. The intranet structure have to be changed to knowledge management system so that every year, the increasing research results information may be effectively administrated by government control system and the competitive power of R&D may be gotten in the society of technical competition. In this paper, we've researched about the change of the times, legacy systems in each organization, the expected efficiency, which have been demanded in government sponsored research institutes through a real implementation process.

  • PDF

Analysis on the effects of the Security Awareness on Knowledge Sharing Process : Focusing on National Defence Intranet (군 조직지식 공유과정에 보안의식이 미치는 영향 분석(국방인트라넷 활용중심))

  • Han, Gyu-Ha;Kim, Hyeon-Jeong;Chung, Do-Bum;Lee, Choong-C.
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.3
    • /
    • pp.139-156
    • /
    • 2009
  • This study reviewed influential factors on knowledge sharing and examined to verify how attitude and recognition serve toward security in knowledge-related activities. This two-part study will dedicate to diffusion of knowledge sharing in the ROK Army. The findings indicate that trust and computer self-efficacy are influential factors which cause increase in knowledge sharing intention. Friendly attitude of the members result in strengthening the knowledge sharing in National Defense Intranet. As a result, it could be inferred that organizational and systematic efforts are required to foster the knowledge sharing in the army and policy to induce members' friendly attitude toward security is in need as well.

A Network Model for Technical Highschool (공고교육 네트워크 모델)

  • Choi Won-Sik
    • Journal of Engineering Education Research
    • /
    • v.4 no.1
    • /
    • pp.88-98
    • /
    • 2001
  • This paper proposes a new direction of technical highschool in Korea and presents a network model for technical highschool. As a distributed intelligent portal, the network model connects to anywhere and consists of simulated practical exercise in a school's self portal intranet. A title of the simulated practice contents developed in a school would be posted on any open site connected to the network model so that anyone who want to use it in his/her practice class could download to his/her intranet portal site. This mechanism works in two good ways. One is a wide area networkness and another is an easy utilization of broad band width since teacher could use the contents in his/her school's own intranet band width. The paper also emphasize that teachers and educators should make an effort to develop good quality meta-contents.

  • PDF

Internet과 Intranet

  • 황준하;이택경;원종필;이재웅
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.14 no.11
    • /
    • pp.52-57
    • /
    • 1996
  • PDF