• Title/Summary/Keyword: 기관 내부 환경

Search Result 198, Processing Time 0.029 seconds

Information Asset Authentication Method for Preventing Data Leakage in Separated Network Environments (단독망 자료유출 방지를 위한 정보자산 인증 방안)

  • Ilhan Kim;Juseung Lee;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.3-11
    • /
    • 2024
  • Information security is crucial not only for protecting against external cyber-attacks but also for identifying and blocking internal data leakage risks in advance. To this end, many companies and institutions implement digital rights management(DRM) document security solutions, which encrypt files to prevent content access if leaked, and data loss prevention(DLP) solutions, which control devices such as USB ports on computing equipment to prevent data leaks. At a time when efforts to prevent internal data leaks are crucial, there is a growing need for control policies such as device control and the identification of information assets in standalone network environments, which could otherwise fall into unmanaged domains. In this study, we propose a Generation-Distribution-Application model for device control policies that are uniquely applied to standalone information assets that are not connected to internal networks. To achieve this, we developed an authentication technique linked with the asset management system, where information assets are automatically registered upon acquisition. This system allows for precise identification of information assets and enables flexible device control, and we have designed and implemented a system based on these principles.

A Study on the Countermeasures against APT Attacks in Industrial Management Environment (산업경영환경에서 지속적 APT 공격에 대한 대응방안 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.25-31
    • /
    • 2018
  • An APT attack is a new hacking technique that continuously attacks specific targets and is called an APT attack in which a hacker exploits various security threats to continually attack a company or organization's network. Protect employees in a specific organization and access their internal servers or databases until they acquire significant assets of the company or organization, such as personal information leaks or critical data breaches. Also, APT attacks are not attacked at once, and it is difficult to detect hacking over the years. This white paper examines ongoing APT attacks and identifies, educates, and proposes measures to build a security management system, from the executives of each organization to the general staff. It also provides security updates and up-to-date antivirus software to prevent malicious code from infiltrating your company or organization, which can exploit vulnerabilities in your organization that could infect malicious code. And provides an environment to respond to APT attacks.

Organizational Program Management of Multiple Maintenance Projects Under Fund Constraints (복수 개${\cdot}$보수 프로젝트의 자금제약하 프로그램 관리 - 자원제약 마스터-일정계획을 중심으로 -)

  • Koo Kyo-Jin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.2 s.18
    • /
    • pp.211-218
    • /
    • 2004
  • In a large owner organization, a program manager of multiple maintenance and remodeling projects has experienced increasing scale and complexity of coordinating the M/R projects with in-house technicians who belong to multiple trade shops. This paper proposes a dual-level hierarchical planning strategy that consists of a program master plan in the long-term horizon and a master construction schedule in an operational scheduling window. A rolling horizon approach to the program master plan is proposed to deal with the external uncertainty of unknown stream of project requests. A resource-constrained scheduling algorithm is developed to generate the master construction schedule in a scheduling window. During development of the algorithm, more emphasis is placed on long-term organizational resource continuity, especially flow management of program constraint resources, than ephemeral events of an individual activity and project. Monte Carlo simulation experiments of three scheduling windows are used to evaluate the relative performance of the proposed scheduling algorithm against three popular scheduling heuristics for resource-constrained multiple projects.

A Study on the Vitalization of Dong-office Minilibraries as Service Stations for Public Library in Daejeon City (봉사거점으로서 동사무소문고의 활성화 방안 연구 - 대전광역시를 중심으로 -)

  • Kim, Young-Shin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.1
    • /
    • pp.5-24
    • /
    • 2002
  • The purpose of this study is to find out ways for establishing the identity and for strengthening the function of Dong-office minilibraries, which are nation-widely sprouted according to the Government’s policy of converting the Dong-office’s functions. The general operating status of the minilibraries were investigated by telephone interviews with the minilibrary operators, the collection and usage status by on-site observation, and the user behaviour by user surveys. For the effective operation of the Dong-office minilibrariea they should be identified as service stations of public libraries, supported technically by the local public libraries, and connected to the local educational and social service institutions for the securance of users and volunteers. Networks among the minilibrary operators should also be established for exchanges and cooperations. Furthermore, operating models should be developed according to the library’s environments and the user’s needs.

지역보건의료 정보화 사업의 현황과 발전방향

  • Sin Ui-Gyun
    • 대한예방의학회:학술대회논문집
    • /
    • 2001.04a
    • /
    • pp.27-38
    • /
    • 2001
  • 보건소 정보화 사업은 지역단위 공공보건의료의 최일선 기관인 보건소에 정보시스템을 설치하여 내부운영을 효율화하고 생산성을 증대시킴으로써 양질의 보건의료 서비스를 제공하고, 동시에 지역보건의료의 효과적인 정보체계 구축과 정보의 원활한 교류를 통하여 국가보건정책수립을 위한 기본정보를 제공하며, 이를 통해 공공보건의료의 환경변화를 이끌어 갈 기반을 확충하려는 목적으로 추진되었다. 보건소 전산화 사업을 근간으로 하는 지역보건의료분야 정보화 사업은 보건 의료부문의 정보화를 위한 국민복지망 기본계획에 의거하여 94년 12월부터 2기로 나누어 8차 년도에 걸쳐('94.12 $\sim$ '01. 10) 연차사업으로 시행 중에 있다. 보건소 정보화 프로그램 개발을 목적으로 시행된 제1기 정보화 사업('94.12 $\sim$ '98.7)을 통해 개발된 보건소 정보시스템이 현재 242개 보건소 중 108개 보건소에서 사용중이며, 이를 통해 보건소 업무의 효율화와 함께 지역보건의료분야 전산화 구축의 기초단계가 확립되었다. 제2기 사업은('98.10 $\sim$ '01.10) 보건소 중심의 지역보건의료망 구축과, 보건소 정보시스템의 전국 확산, 관련기관 정보망과의 연계를 통한 정보교류 확대와 정보활용도 제고 등의 목표로 시행중이다. 2기 1차 사업을 통하여 보건소-보건지소 진료소간 지역보건의료망의 기본 하부골격의 토대가 구축되었고, 2기 2차 사업에서는 보건의료원의 전산화 프로그램이 개발되었다. 또한 현재 진행중인 2기 3차 사업에서는 지역보건정책 수립을 지원하는 진료현황, 보건사업현황 등의 자료를 통합D/B로 구축하여 시범적으로 운영함으로써 정보망의 활용도를 높이고, 광역단위의 지역보건정보 의사결정시스템(EIS) 개발을 추진하고 있다. 한편, 최근 급속한 정보기술의 발달과 보건의료 환경의 변화로 인하여 보건정보시스템의 변화 필요성이 증대되고 있다. 이를 위해서 중앙정부와 광역자치단체, 보건소를 연결하는 전국 단위 정보네트워크 구축에 있어 신기술 적용방안 연구를 통하여 보건소 정보화 사업의 발전 방향(ISP)을 모색 중에 있으며, 시군구 행정정보망과 연계를 통해 생애주기에 따른 주민 평생건강관리를 위한 정보시스템 구축을 도모하고 있다.

  • PDF

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

Study on the Performance Improvement of Marine Engine Generator Exciter Control using Neural Network Controller (신경망 회로 제어기를 이용한 선박 엔진 발전기의 여자기 제어 성능 개선에 관한 연구)

  • HeeMoon Kim;JongSu Kim;SeongWan Kim;HyeonMin Jeon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.6
    • /
    • pp.659-665
    • /
    • 2023
  • The exciter of a ship generator adjusts the magnetic flux through excitation current control to maintain the output terminal voltage constant. The voltage controller inside the exciter typically uses a proportional integral control method. however, the response characteristics determined by the gain and time constant produce unwanted output owing to an inappropriate setting value that can reduce the quality and stability of power within the ship. In this study, a neural network circuit is learned using stable input/output data that can be obtained through the AC4A type exciter model provided by IEEE, and the simulation is performed by replacing the existing proportional integral control type voltage controller with the learned neural network circuit controller. Consequently, overshooting was improved by up to 9.63% compared with that of the previous model, and excellence in stable response characteristics was confirmed.

The Impact of Internal Customer Awareness of ESG Importance on the Organization's ESG Management Needs and ESG Performance Awareness -Focusing on Vocational Training Institutions- (내부고객의 ESG중요도 인식이 조직의 ESG경영 필요성과 ESG성과 인식에 미치는 영향 -공공기관(직업능력개발 조직)을 중심으로 -)

  • Dong-tae Kim;Eun-young Lee;Ji-hwan Park
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.663-670
    • /
    • 2023
  • Unlike previous studies that have looked at ESG management and ESG performance from a consumer perspective, this study aims to examine the relationship between attitudes toward ESG and ESG performance perception from the perspective of internal customers who are members of the organization. To this end, the impact of internal members' perceptions of the importance of each ESG area on the organization's ESG management necessity and performance perception was summarized into three research questions and the impact was identified using a structural equation model. As a result of the study, internal customers highly recognized the organization's ESG management needs when they recognized the E (environmental) and G (governance) areas as important, but there was no significant relationship with the ESG management needs in the S (social) area (Research Question 1). In addition, the relationship between the perception of importance in each ESG area and the organization's ESG management needs was found to be little different depending on internal customers' interest in ESG, the degree of ESG knowledge, and age (Research Question 2). Finally, it was found that internal customers who highly perceive the organization's ESG management needs were also positively aware of the organization's ESG performance level.

A Study on the Life Risk Assessment of Ship's Engine Room Fire (기관실화재 인명위험성평가에 관한 연구)

  • Han, Sang-Kook;Cho, Dae-Hwan;Park, Chan-Soo
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.11a
    • /
    • pp.283-289
    • /
    • 2006
  • This study is a preparation for the application of FSA (Formal Safety Assessment) to the fire safety of ships. FSA is the new-fashioned methodology proposed to prevent ships from the accidents. To make a base of the fire safety assessment about ship's fire protection design and Classification Society rule, statistical informations for the fire safety engineering are investigated. From results, the necessity of new criterion for ship's fire safety design, the need to study the human behavior in the evacuation from fire, and the development of new fire progress model considering special situations in ships are acknowledged.

  • PDF

A Secure Key Generation and Device Authentication Mechanism Using Certificateless Public Keys (비인증서 공개키를 사용하는 보안키 생성 및 장비인증 메커니즘)

  • Heo, Joon;Cho, Eing-Jun;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.77-80
    • /
    • 2008
  • IP 네트워크(공중망)에 새로운 네트워크 기술들의 결합, 예를 들면 IP-USN, IP-Mesh, IP-PLC 등의 이종 네트워크가 생겨나면서 이러한 네트워크를 안전하게 관리하기 위한 보안 기술의 개발이 요구되고 있다. 기존 IP 네트워크가 가지는 다양하고 견고한 보안 기술들이 이종 네트워크에 그대로 사용될 수 없으면서 생겨나는 문제 중 PKI 기반 인프라를 적용할 수 없다는 것이 가장 현실적이고 중요한 문제로 여겨지고 있다. 이러한 문제로 인해, 새로운 네트워크 기술들은 주로 내부에서 사용하는 대칭키 방식의 암호화, 복호화만을 정의하고 있다. 공개키 방식을 사용할 수 없는 가장 큰 이유는 인증기관에서 발급되는 인증서 중심의 인프라를 사용할 수 없기 때문이다. 본 논문에서는 이러한 문제를 해결하기 위해서, 이종 네트워크 환경에서 비인증서 기반의 공개키를 활용하는 보안키 관리 메커니즘을 제안한다. 제안하는 방식은 신원기반 공개키 개념을 도입하여 적용하였으며, 디바이스간 인증을 위한 인증 티켓 방식 및 보안키의 유효범위를 정하고 이를 활용하여 보다 안전한 네트워크 환경을 구축할 수 있는 방안들을 제시하였다.

  • PDF