• Title/Summary/Keyword: 권한 통제

Search Result 172, Processing Time 0.025 seconds

Design and Implementation of a Cloud-based Linux Software Practice Platform (클라우드 기반 리눅스 SW 실습 플랫폼의 설계 및 구현 )

  • Hyokyung Bahn;Kyungwoon Cho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.67-71
    • /
    • 2023
  • Recently, there are increasing cases of managing software labs by assigning virtual PCs in the cloud instead of physical PCs to each student. In this paper, we design and implement a Linux-based software practice platform that allows students to efficiently build their environments in the cloud. In our platform, instructors can create and control virtual machine templates for all students at once, and students practice on their own machines as administrators. Instructors can also troubleshoot each machine and restore its state. Meanwhile, the biggest obstacle to implementing this approach is the difficulty of predicting the costs of cloud services instantly. To cope with this situation, we propose a model that can estimate the cost of cloud resources used. By using daemons in each user's virtual machine, we instantly estimate resource usage and costs. Although our model has very low overhead, the predicted results are very close to the actual resource usage measured by cloud service providers. To further validate our model, we used the proposed platform in a Linux practice lecture for a semester and confirmed that the proposed model is very accurate.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

A Study on Improving Measures against Terrorism in Metropolitan Subways (지하철내 테러대응 개선방안의 연구)

  • Park, Woong-Shin
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.91-115
    • /
    • 2017
  • Recently the characteristics of those who committed serious terrorist crimes are not directly related to the direct command system of a specific terrorist organization (ex. IS) but are influenced by the political propaganda of terrorist organizations online, Terrorist crime under the loose form of the terrorist organization. Therefore, this study suggests ways to improve countermeasures against terrorism in metropolitan subways. Although it is important for the prevention of terrorism in the subway, it is important for the police officers of the subway police and the special police officers of the railway to have a physical limit to take charge of them, and after confirming that improvement measures are necessary, And pointed out the possibility of establishing independent security departments where judicial and administrative control is not feasible to grant police rights. In addition, I pointed out how to improve the safety of subways in the metropolitan area through the recruitment of core job candidates and the identity survey during the subway operation. Furthermore, it was confirmed that a special council on terrorism, which can take into consideration the characteristics of subway terrorism, such as airports and ports, is required to be established in charge of terrorism prevention under the current Anti-Terrorism Act. Finally, it is once again emphasized that the strengthening of the powers of the counterparts to terrorism must inevitably limit the basic rights of the people, so the principle of proportionality must be observed in their activities.

  • PDF

A Study on the Actual Condition of Electrical Construction Supervision and Countermeasure of It (전력시설물공사 감리제도의 현황과 실태분석 및 개선방안에 관한 연구)

  • Seo, Hwang-Hyeon
    • Proceedings of the KIEE Conference
    • /
    • 2008.09a
    • /
    • pp.15-17
    • /
    • 2008
  • 본 논문은 현행 전력기술 관리법에 의하여 시행되고 있는 전력시설물공사 감리제도의 제도개선에 관한 연구로서 연구자의 현장 실무경험과 감리제도의 일반사항, 감리업자와 감리원에 대한 사항, 감리업자 선정 및 입찰에 관한 사항을 조사하여 전력시설물공사 감리제도의 현황과 실태분석 및 개선방안을 제시한 내용으로 연구결과는 다음과 같다. 첫째, 법적 및 제도적 측면에서 시급히 개선될 사항이다. 정부는 1995년 12월 법률 제5,132호로 전력기술관리법을 제정하여 전력시설물에 대한 공사감리 업무를 별도 분리 발주하여 전문성을 높이도록 전기 분야 전문기술자에 의해 수행토록 하는 것을 골자로 하는 책임 감리제도를 도입하여 오늘에 이르고 있다. 그러나 공사 준골단계에서 전기사업법 제98조 2항에 의해 위탁업무를 하고 있는 전기 안전공사가 사용전 검사를 함으로서 책임 감리제도의 도입 취지를 무색케 한 정도로 심각한 국면에 접어들었다. 전력기술관리법이 제정되어 13년이 지난 오늘까지도 책임 감리제도가 성공적으로 정착되지 못한 근본적인 문제는 사용전 검사를 전기 안전공사에서 대행하고 있다는 것이다. 물론 그동안의 많은 노력으로 어느 정도의 개선은 있었지만 근본적인 문제가 해결되지 않고서는 전력시설물공사의 감리기술의 전문화를 기대하기 어려운 실정이다. 따라서 책임 감리계도의 성공적인 정착을 위해서는 전기사업법 제98조 2항에 의한 위탁 업무인 사용전 감사 제도를 감리업자에게 돌려줌으로서 책임과 권한을 실질적으로 부여하고 감리회사 자체의 기술력 및 기술자 확보와 기술개발에 필요한 운영자금 및 투자 확대를 유도해 나가야 하며, 무엇보다도 확실한 법적 제도적 뒤받침이 선행되어야 한다. 둘째, 제도적 측면에서 일반건축물은 사업주가 전력시설물공사 감리업자를 임의선정 및 수의계약에 의해 감리업자를 지정하고 해당 공사기간동안 전기 감리원을 투입토록 되어 있어 인건비에 미치지 못하는 저가수주와 다음계약을 위해 어쩔 수 없이 사업주에게 종속되는 경우가 많으며, 이로 인해 감리수행에 혼란이 야기되고 책임소재의 불분명 책임 감리원의 조정 및 통제기능이 약화되는 부작용이 나타나고 있다. 전력시설물공사의 감리는 전력시설물의 안전사고, 비효율 및 부실소지 둥을 방지하기 위해서 필수적이고 발주자 감리업자 시공업체에게 모두 도움을 주는 업무이며, 일정규모이상의 건축물은 자발적인 참여로 유도할 수 있도록 적격심사제도(PQ심사)도입이 적극 필요한 실정이다. 셋째, 운용측면에서 공동주택의 주택법에 의한 전력시설물공사 감리는 사업승인권자가 사업수행능력 평가기준(PQ 심사)에 따라 감리업자를 지정하고 해당 공사기간 동안에 전기 감리원을 투입토록 되어 있으나 평가기준이 세대수에 따라 정해져 있어 효율적, 기술적 측면에 미치지 못하는 경우가 많다. 수준 높은 감리를 수행하려면 그에 맞는 적정한 감리원의 투입이 필수적이다. 넷째, 운용 및 제도적 측면에서 공공발주 건축물(공동주택 포함)의 전력시설물공사는 사업수행능력 평가기준(PQ 심사)에 따라 감리업자를 지정하고 해당 공사기간 동안에 전기 감리원을 투입토록 되어 있으나 발주자 소속직원의 감리수행 근거에 의해 자체 감리를 함으로서 시장경쟁 및 민간경제 활성화의 제약, 부정부패 및 비효율 등 사회에 전반적으로 악영향을 끼쳐 하루 빨리 민간 감리업자에게로의 개선이 시급한 실정이다.

  • PDF

IT Governance of the Korean Conglomerates: A Comparative Case Study (국내 대기업들의 IT 거버넌스: 비교 사례 연구)

  • Zo, Hang-Jung;Song, Chan-Hoo;Kang, Hyun-Goo;Lim, Dong-Won
    • Journal of Korea Technology Innovation Society
    • /
    • v.12 no.2
    • /
    • pp.335-359
    • /
    • 2009
  • This study explores the IT governance structures of the Korean conglomerates. It investigates IT organization structures, decision making frameworks and processes, communication channels, implementation mechanisms, and performance evaluation methods around IT activities of the Korean conglomerates by analyzing four different cases. The results show that all of the conglomerates have an IT service firms as one of their subsidiaries, and all the subsidiaries in the conglomerates outsource their IT divisions to the IT service firms, The client firms in the conglomerates operate IT strategy and planning teams to coordinate their IT activities with their outsourcing partners. The IT governance archetype of the Korean conglomerates is found to be "business monarchy" because the client firms mostly make IT decisions. However, the IT service firms provide the information of IT trends and solutions to their clients, so the IT governance archetype of input framework for IT decisions can be "IT monarchy". In addition, the conglomerate which has the more centralized IT governance architecture appears to prefer the more integrated implementation mechanisms for IT decisions. The results of this study are expected to be used as a benchmarking model for the organizations which try to develop an effective IT governance structure.

  • PDF

The Role of Local Government in Building Regional Innovation System (지역혁신체제 구축과 지방정부의 과제)

  • Lee, Chul-Woo
    • Journal of the Korean association of regional geographers
    • /
    • v.10 no.1
    • /
    • pp.9-22
    • /
    • 2004
  • This paper aims to identify the role of local governments in building regional innovation system. The central government has recently decided to support the promotion of innovation capacities of local innovators and innovation networks among thor The central government forces local governments to establish the council for regional innovation in order to implement these goals. Meanwhile, there is no consensus about the way in which the council for regional innovations constitute and operate. I think it is the time for us to talk about this seriously. It is widely conceived that local governments in Korea have still been hierarchical. Thus, they would be difficult to make the decision effectively on regional innovation and development initiatives. In this context, I suggest that the regional innovation promoting agency needs to take authorities to secure transparency and autonomy in planning, implementing, evaluating regional innovation initiatives. The local government no! ed to play a central role in establishing the agency. However, the local government should not try to intervene and control its operations.

  • PDF

Ideal Relationship between Police and Press through the Analysis of 4P Model (4P모델 분석을 통한 경찰과 언론의 바람직한 관계 정립 방안)

  • Kim, Yong-Sik;You, Jae-Seol
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.340-349
    • /
    • 2011
  • This research analyzes the 4P(Police-Press-Politics-Public) model for establish an ideal relationship between press and police and suggests some practical policies. Through the examination of the relations among 4Ps(Police-Press-Politics-Public), Jean-Louis Loubet Del Bayle proposes 3 models from three aspets : exchange of information, relation of power, relation of legitimacy. The analysis of his models shows that politics and public give social and political legitimacy to police and press which, based on the legitimacy, thereby obtain necessary informations from external entities to fulfil their original functions. On the other hand, the inevitable relation of press and police with politics and public caused from their social functions, in turn, makes the relationship between press and police more complicated and delicate. This research concludes, the relationship between police and press should be well balanced for their successful social functions and benefits of the public. To this end, this study suggests that a specific press guideline which is imposed on press and police, must be prepared and that a specialized press office must be established in the police.

Study on the Technical Security Factor for the Implementation of Secure DB System (안정적인 DB보안 시스템 구축을 위한 보안기술요소 분석에 관한 연구)

  • Yoon, Sun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.143-152
    • /
    • 2014
  • This paper introduces Database security to prevent the rapidly increasing issue of private information leakage. The Database security examined in the paper separates into DB access control area and DB encryption area which further leads the paper to analyze the factors of the two areas and suggest necessary elements for creating stable Database security. In addition, the paper examines previous DB security programs by areas and analyzes pros and cons from the tested result. The experiment indicated that while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength in protecting the data from unauthorized access. On the other hand, DB access control is less useful in preventing the attack in advance which leaves the log to enable tracking afterward while DB encryption can only be operated by limited types of Database and causes degradation due to system load and shows higher percentage of failure when creating the system. This paper examines characteristics of Database security areas in order to be used as a reference for institutions or companies seeking stable Database security.

Emotional Labor and Human Rights Protection in the case of airlines (감정노동과 인권보호 - 항공사를 중심으로)

  • Shin, Dong Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.87-108
    • /
    • 2014
  • Recent examples of abuse by black consumers (including air travellers) against emotional laborers have become a serious social issue in Korea in that they are likely to violate human rights of those laborers. Emotional labor is a form of emotion regulation that creates a publicly visible facial and bodily display, and also emotional management within the workforce that creates a situation in which the emotion management by workers can be exchanged in the marketplace. Example professions that require emotional labor are: nurses, doctors, waiting staff, and television actors. However, as the economy moves from a manufacturing to a service-based economy, many more workers in a variety of occupational fields are expected to manage their emotions according to employer demands when compared to the past. One of symptoms deriving from emotional labor is smile mask syndrome abbreviated SMS, which is a psychological disorder proposed by professor Makoto Natsume where subjects develop depression and physical illness as a result of prolonged, unnatural smiling. And higher degree of using emotion regulation on the job is related to higher levels of employees' emotional exhaustion, and lower levels of employees' job satisfaction. In most part, emotional laborers are more abused and hurt by so called black consumers who are raising complaints relating to products and services purchased against service providers for the purpose of maliciously getting compensation. Against this background, the Korean Government abolished "the Consumer Protection Act" and instead promulgated "the Basic Consumer Act" in September 2006 which stipulates that consumers are expected to have protection as well as responsibility and duty. The Aviation Security Act cites the examples of prohibited behaviors (unruly passengers) while they are travelling. In addition, human rights of emotional laborers could be more protected by the enhancement of etiquettes and cavalry and improvement of culture and working environment.