• Title/Summary/Keyword: 보안진단도구

Search Result 38, Processing Time 0.023 seconds

A Study on Development of the Digital Competence Measurement Tool for University Student

  • Kim, Dong-Man;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.191-199
    • /
    • 2019
  • In this paper, we propose to develop a diagnosis tool for measuring digital competence for university student. To this end, 223 students participated for the survey research. Based on the survey by 6 domain and 40 questions, 6 factors and 18 questions for digital competence measurement were drawn throughout the factors analysis. The results of the confirmatory factor analysis showed the fact that 6 factors and 18 questions that satisfied the model-fit indexes statistically were finally confirmed. And the developed tool demonstrated good results in reliability and validity verification, which were suitable for measuring digital competence for university students. The developed measurement tool of digital competence for university students consisted of 6 sub-components such digital device operation, communication and collaboration, information searching, processing, and management, problem solving and learning, security, digital ethics. The digital competence measuring tool developed in this study is expected to be used to identify the current level of competences for university student, and to enhance their own digital competences through educational supports.

Development Process and Methods of Audit and Certification Toolkit for Trustworthy Digital Records Management Agency (신뢰성 있는 전자기록관리기관 감사인증도구 개발에 관한 연구)

  • Rieh, Hae-young;Kim, Ik-han;Yim, Jin-Hee;Shim, Sungbo;Jo, YoonSun;Kim, Hyojin;Woo, Hyunmin
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.3-46
    • /
    • 2010
  • Digital records management is one whole system in which many social and technical elements are interacting. To maintain the trustworthiness, the repository needs periodical audit and certification. Thus, individual electronic records management agency needs toolkit that can be used to self-evaluate their trustworthiness continuously, and self-assess their atmosphere and system to recognize deficiencies. The purpose of this study is development of self-certification toolkit for repositories, which synthesized and analysed such four international standard and best practices as OAIS Reference Model(ISO 14721), TRAC, DRAMBORA, and the assessment report conducted and published by TNA/UKDA, as well as MoRe2 and current national laws and standards. As this paper describes and demonstrate the development process and the framework of this self-certification toolkit, other electronic records management agencies could follow the process and develop their own toolkit reflecting their situation, and utilize the self-assessment results in-house. As a result of this research, 12 areas for assessment were set, which include (organizational) operation management, classification system and master data management, acquisition, registration and description, storage and preservation, disposal, services, providing finding aids, system management, access control and security, monitoring/audit trail/statistics, and risk management. In each 12 area, the process map or functional charts were drawn and business functions were analyzed, and 54 'evaluation criteria', consisted of main business functional unit in each area were drawn. Under each 'evaluation criteria', 208 'specific evaluation criteria', which supposed to be implementable, measurable, and provable for self-evaluation in each area, were drawn. The audit and certification toolkit developed by this research could be used by digital repositories to conduct periodical self-assessment of the organization, which would be used to supplement any found deficiencies and be used to reflect the organizational development strategy.

Implementation of an Expert System for COTS Fault Diagnosis (COTS 고장진단을 위한 전문가 시스템 구현)

  • Kim, A-Ram;Roh, Jin-Song;Rhee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.275-281
    • /
    • 2013
  • This space is for the of your study in English. If simple menu item changes or the addition of check items are necessary on GUI menu of existing test equipments for military facilities that are programmed by using RAD tools such as Visual C++, they should go through complex steps, such as numerous conducting steps, coding, flash design modification, recompiling and distribution. It is cumbersome process and waste much time. Also, on implementing them, it was worried about leaking secrets because a number of military security considerations were included. To solve such as the above problem, we proposed commercial RIA technologies and a COTS fault diagnostic knowledge-based system that implemented by the XML data design technique in this research. The proposed approach solves the problem of existing methods, reduced inspection time, and improved performance, usability, and maintainability.

The theoretical study of Organizational Effectiveness (Indicators developed for the military security personnel evaluation) (조직효과성의 이론적 고찰(군사보안 담당자 평가를 위한 지표개발))

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.91-97
    • /
    • 2015
  • When we estimate any organization, we can use scientific tool such as organizational effectiveness. It is very difficult to know the level of organizational goal. If you plan how to assess the effectiveness of your organization, It is a complex and difficult problem, because a few social scientist think that there are many point of view of an concept of organizational goals based on the relatively concrete concept of organizational effectiveness. Social scientist Campbell insist that it is impossible to estimate organizational effectiveness accurately. So we should develope the perfect method to measure the organization as a system, the member's self satisfaction, the efficiency of the team. To achieve a good organizational effectiveness, we should study the method of approach about organizational effectiveness. This is theoretical study and show that the concept and method of approach about organizational effectiveness.

A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model (보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구)

  • Lee, Sang-kyu;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1585-1594
    • /
    • 2018
  • In recent years The importance of information security management for securing information collection and analysis, production and distribution is increasing. Companies are assured of confidence in information security through authentication of information Security Management System. However, level assessment and use of domains that make up the management system is limited. On the other hand, the security maturity model is able to diagnose the level of information protection of the enterprise step by step. It is also possible to judge the area to be improved urgently. It is a tool to support goal setting according to the characteristics and level of company. In this paper, C2M2, which is an example of security maturity model, is compared and analyzed with Korea Information Security Management System certification. Benchmark the model to check the level of information security management and derive the priority among the items that constitute the detailed area of information security measures of ISMS certification. It also look at ways to check the level of information security management step by step.

A Design and Implementation Linux Log Analysis System for effective Log Analysis (효과적인 로그 분석을 위한 로그분석기 설계 및 구현)

  • 우연옥;황성철;이상인;강흥식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.376-378
    • /
    • 2004
  • 리눅스에서는 시스템상의 문제와 보안상의 이유로 특정 파일에 로그를 기록하게 된다. 이 로그파일을 보고 시스템의 문제를 진단하고 시스템을 효과적으로 관리할 수 있다. 또한 이것은 시스템을 안전하게 지키기 위한 도구가 될 수 있다. 그러나 이러한 로그파일은 항상 백업이 필요한 방대한 양의 로그를 지니고 있어 않은 양의 디스크 공간을 차지하고 있으며, 혹시 무슨 일이 있을지 몰라 정기적으로 남기고는 있는데 무슨 내용이 담겨 있는지 의미를 제대로 이해하지 못해 별 도움이 안될 뿐만 아니라, 분석하기도 쉽지 않은 어려움이 있다. 이에 본 논문에서는 보다 효과적으로 리눅스 시스템의 로그파일을 분석 가능하며, 전문가가 아닌 초급 시스템 관리자들도 충분히 이해할 수 있는 리눅스 시스템 로그 분석기를 설계 및 구현 해 보았다.

  • PDF

Design and Implementation of Quantitative Risk Analysis System for ISP Network (ISP(Internet Service Provider) 네트워크의 정량적인 위험분석을 위한 시스템 설계 및 구현)

  • 문호건;최진기;김형순
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.101-111
    • /
    • 2004
  • Risk analysis process, which identifies vulnerabilities and threat causes of network assets and evaluates expected loss when some of network assets are damaged, is essential for diagnosing ISP network security levels and response planning. However, most existing risk analysis systems provide only methodological analysis procedures, and they can not reflect continually changing vulnerabilities and threats information of individual network system on real time. For this reason, this paper suggests new system design methodology which shows a scheme to collects and analyzes data from network intrusion detection system and vulnerability analysis system and estimate quantitative risk levels. Additionally, experimental performance of proposed system is shown.

Recent Research Trends of Process Monitoring Technology: State-of-the Art (공정 모니터링 기술의 최근 연구 동향)

  • Yoo, ChangKyoo;Choi, Sang Wook;Lee, In-Beum
    • Korean Chemical Engineering Research
    • /
    • v.46 no.2
    • /
    • pp.233-247
    • /
    • 2008
  • Process monitoring technology is able to detect the faults and the process changes which occur in a process unpredictably, which makes it possible to find the reasons of the faults and get rid of them, resulting in a stable process operation, high-quality product. Statistical process monitoring method based on data set has a main merit to be a tool which can easily supervise a process with the statistics and can be used in the analysis of process data if a high quality of data is given. Because a real process has the inherent characteristics of nonlinearity, non-Gaussianity, multiple operation modes, sensor faults and process changes, however, the conventional multivariate statistical process monitoring method results in inefficient results, the degradation of the supervision performances, or often unreliable monitoring results. Because the conventional methods are not easy to properly supervise the process due to their disadvantages, several advanced monitoring methods are developed recently. This review introduces the theories and application results of several remarkable monitoring methods, which are a nonlinear monitoring with kernel principle component analysis (KPCA), an adaptive model for process change, a mixture model for multiple operation modes and a sensor fault detection and reconstruction, in order to tackle the weak points of the conventional methods.