• Title/Summary/Keyword: 단계적 대응 프레임워크

Search Result 37, Processing Time 0.027 seconds

SK텔레콤의 성공적인 다운사이징 사례;U.Key의 탄생

  • Jang, Si-Yeong;Lee, Sang-Gu
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.309-315
    • /
    • 2007
  • SK텔레콤은 급변하는 이동통신시장 환경의 변화에 적절히 대응하기 위하여 지난 10여 년간 사용해 온 메인프레임 기반의 COIS 시스템을 중단하고 Unix 기반의 NGM 시스템으로 다운사이징하기로 결정하였다. 2002 년 9 월 SK 텔레콤은 차세대 IT 인프라 혁신 전략 프로젝트를 완료하고 이에 근거하여 2003 년 말 1 단계 프로젝트를 추진하게 된다. 그러나 개발 툴의 문제점, Governance 의 확보 실패 등 문제점이 계속 누적되어 2005년에 접어들어서는 총체적 난국 상황에 봉착하게 되었다. 2005 년 2 월 자체 점검 결과 개발 진척도는 50%에 불과한 상황이었다. 결국 2005 년 3 월, NGM 추진본부는 프로젝트의 추진 중단을 선언하기에 이르렀다. NGM 프로젝트는 처음부터 재 검토하여 Re-planning 을 실시한 후 구축을 재개하기로 결정하였다. 2005 년 5 월 NGM 프로젝트의 Re-plan 이 수립되었다. 우선 Turn-key 방식의 문제점을 해소하기 위하여 SK 텔레콤이 구축의 총책임을 떠맡고, SK C&C 가 시스템 이행에 대한 책임을 지는 Governance 체제를 확립하였다. 또한 2 단계 프로젝트에서는 NGM 프로젝트를 기술적으로 원점부터 재 검토하여 이전과는 근본적으로 다른 In-House 구축 접근방식을 채택하기로 하였다. 2 단계 프로젝트에서 관심을 집중한 기술적 의사결정 영역은 크게 (1) 미들웨어 및 개발프레임워크의 적용, (2) DB 아키텍처의 결정 및 슬림화, (3) 시스템 성능 개선 등의 세 분야로 집약할 수 있다. 이 논문에서는 이들 각각의 분야를 구체적으로 검토하였다. 결국 2006 년 10 월 9 일 메인프레임 기반의 COIS 는 Shut-down 되어 가동을 멈추었고, Unix 기반의 NGM 시스템이 가동을 개시함으로써 차세대 마케팅을 본격 추진하기 위한 다운사이징 프로젝트가 성공적으로 완수되었다.

  • PDF

A Study of Web Hacking Response Procedures Model based on Diagnosis Studies for Cross-Site Scripting (XSS)Process (Cross-Site Scripting(XSS) 프로세스 진단을 기반으로 한 웹 해킹 대응절차 모델 연구)

  • Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.83-89
    • /
    • 2013
  • When applying web hacking techniques and methods it needs to configure the integrated step-by-step and run an information security. Web hackings rely upon only one way to respond to any security holes that can cause a lot. In this study the diagnostic process of cross-site scripting attacks and web hacking response procedures are designed. Response system is a framework for configuring and running a step-by-step information security. Step response model of the structure of the system design phase, measures, operational step, the steps in the method used. It is designed to secure efficiency of design phase of the system development life cycle, and combines the way in secure coding. In the use user's step, the security implementation tasks to organize the details. The methodology to be applied to the practice field if necessary, a comprehensive approach in the field can be used as a model methodology.

A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code (공격코드 사례분석을 기반으로 한 SQL Injection에 대한 단계적 대응모델 연구)

  • Kim, Jeom-Goo;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.17-25
    • /
    • 2012
  • SQL Injection techniques disclosed web hacking years passed, but these are classified the most dangerous attac ks. Recent web programming data for efficient storage and retrieval using a DBMS is essential. Mainly PHP, JSP, A SP, and scripting language used to interact with the DBMS. In this web environments application does not validate the client's invalid entry may cause abnormal SQL query. These unusual queries to bypass user authentication or da ta that is stored in the database can be exposed. SQL Injection vulnerability environment, an attacker can pass the web-based authentication using username and password and data stored in the database. Measures against SQL Inj ection on has been announced as a number of methods. But if you rely on any one method of many security hole ca n occur. The proposal of four levels leverage is composed with the source code, operational phases, database, server management side and the user input validation. This is a way to apply the measures in terms of why the accident preventive steps for creating a phased step-by-step response nodel, through the process of management measures, if applied, there is the possibility of SQL Injection attacks can be.

미국의 연방정보보안관리법에 대한 연구

  • Lee, Dong-Bum;Go, Woong;Kwan, Jin
    • Review of KIISC
    • /
    • v.21 no.1
    • /
    • pp.57-73
    • /
    • 2011
  • IT 진화의 다른 면으로는 정보 보안 위협의 심각화와 개별 위험 증가도 잠재하고 있어 이에 대응하는 정보 보안 정책도 나날이 변화가 요구된다. 이에 따라 미국에서는 연방정보보안관리법을 제정하여 연방정부의 운영 및 자산에 대한 정보보안 통제항목의 효율성을 강화하기 위한 총괄적인 프레임워크를 제공한다. 또한 연방정부 및 정보 시스템 보호를 위한 최소 통제 및 유지 방안 개발을 제공한다. 따라서 본 고에서는 미국의 연방정보보안관리법의 각 단계별 보안 활동을 분석하고자 한다.

Designing a Framework of Multimodal Contents Creation and Playback System for Immersive Textbook (실감형 교과서를 위한 멀티모달 콘텐츠 저작 및 재생 프레임워크 설계)

  • Kim, Seok-Yeol;Park, Jin-Ah
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.1-10
    • /
    • 2010
  • For virtual education, the multimodal learning environment with haptic feedback, termed 'immersive textbook', is necessary to enhance the learning effectiveness. However, the learning contents for immersive textbook are not widely available due to the constraints in creation and playback environments. To address this problem, we propose a framework for producing and displaying the multimodal contents for immersive textbook. Our framework provides an XML-based meta-language to produce the multimodal learning contents in the form of intuitive script. Thus it can help the user, without any prior knowledge of multimodal interactions, produce his or her own learning contents. The contents are then interpreted by script engine and delivered to the user by visual and haptic rendering loops. Also we implemented a prototype based on the aforementioned proposals and performed user evaluation to verify the validity of our framework.

REL Rights document editing and client system based on MPEG-21 Framework (MPEG-21 프레임워크에 기반의 REL 저작권 문서편집 및 클라이언트 시스템)

  • 조휘경;송병규;김태희;홍진우;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.520-524
    • /
    • 2003
  • Problem of compatibility, content protection, contents circulation ok. was caused between contents offerer and consumers by indiscreet right technical development about digital contents. The MPEG committee proposed MPEG-21 framework for these problem solution and for right managing in MPEG-21 inside XML(eXtensible Markup Language)'s structure REL(Right Expression Language) that is a right expression language propose. Contents protection, circulation, standard right information representation for administration that is reasonable and is the transposition enemy mutually by REL's use doing based on this MPEG-21 were available. Fast correspondence about new technology is necessary circumstance because present MPEG-21 is in study step and REL edit solution as infra technology is required. Also, development of REL document edit system is required mere because this REL document edit has difficulty in edit except expert with MPEG-21 Framework. In this paper, designed and embody about REL document mastication system that right creation and edit are available efficiently about contents easily without comprehension of MPEG-21 framework and client system that present consumption method of REL right document.

  • PDF

A Study on the Security Management System Model for the Information Security of the Aviation infrastructure (항공기반시설의 정보보호를 위한 보안관리체계 모델에 관한 연구)

  • Jung, Chang-Hwa;Lee, Joon-Taik;Chung, Dong-Keun
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.87-96
    • /
    • 2011
  • The importance of the security management system for the aviation infrastructure cannot be overemphasized. What is especially important on the security management system for it is the assessment that is detaild and systematic. This article presents a framework based on a Hanulcha-type security management system model for a Information security of the Aviation infrastructure. This system checks, estimates and analyzes the goal of security with effect, especially in case of the security-accident on the aviation infrastructure because this system model gives the integrated security assessment method.

Optimal Structural Design Framework of Composite Rotor Blades Using PSGA (PSGA를 이용한 복합재료 블레이드의 최적 구조설계 프레임워크 개발 연구)

  • Ahn, Joon-Hyek;Bae, Jae-Seong;Jung, Sung Nam
    • Composites Research
    • /
    • v.35 no.1
    • /
    • pp.31-37
    • /
    • 2022
  • In this study, an optimal structural design framework has been developed for the structural design of composite helicopter blades. The optimal design framework is constructed using PSGA (Particle Swarm assisted Genetic Algorithm), which combines the genetic algorithm and particle swarm optimizer. The optimization process consists of a finite element (FE) modeling over the blade section, two-dimensional (2D) cross-sectional FE analysis, and 1D rotating blade analysis. In the design process, the geometric curves and surfaces are formed using the B-spline scheme while discretizing the sections via a FE mesh generation program Gmsh. The blade cross-sections are created in accordance with the design variables when performing the blade structural analysis. The proposed optimization design framework is applied to a modernization of the HART II (Higher-harmonic Aeroacoustics Rotor Test II) blades. It is demonstrated that an improved blade design is reached through the current optimization framework with the satisfaction of all design requirements set for the study.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

A Multipurpose Design Framework for Hardware-Software Cosimulation of System-on-Chip (시스템-온-칩의 하드웨어-소프트웨어 통합 시뮬레이션을 위한 다목적 설계 프레임워크)

  • Joo, Young-Pyo;Yun, Duk-Young;Kim, Sung-Chan;Ha, Soon-Hoi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.485-496
    • /
    • 2008
  • As the complexity of SoC (System-on-Chip) design increases dramatically. traditional system performance analysis and verification methods based on RTL (Register Transfer Level) are no more valid for increasing time-to-market pressure. Therefore a new design methodology is desperately required for system verification in early design stages. and hardware software (HW-SW) cosimulation at TLM (Transaction Level Modeling) level has been researched widely for solving this problem. However, most of HW-SW cosimulators support few restricted ion levels only, which makes it difficult to integrate HW-SW cosimulators with different ion levels. To overcome this difficulty, this paper proposes a multipurpose framework for HW SW cosimulation to provide systematic SoC design flow starting from software application design. It supports various design techniques flexibly for each design step, and various HW-SW cosimulators. Since a platform design is possible independently of ion levels and description languages, it allows us to generate simulation models with various ion levels. We verified the proposed framework to model a commercial SoC platform based on an ARM9 processor. It was also proved that this framework could be used for the performance optimization of an MJPEG example up to 44% successfully.