• Title/Summary/Keyword: 위험관리 프로세스

Search Result 194, Processing Time 0.025 seconds

Risk Management System based on Grid Computing for the Improvement of System Efficiency (시스템 효율성 증대를 위한 그리드 컴퓨팅 기반의 위험 관리 시스템)

  • Jung, Jae-Hun;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.283-290
    • /
    • 2016
  • As the development of recent science and technology, high-performance computing resources is needed to solve complex problems. To reach these requirements, it has been actively studied about grid computing that consist of a huge system which bind a heterogeneous high performance computing resources into on which are geographically dispersed. However, The current research situation which are the process to obtain the best results in the limited resources and the scheduling policy to accurately predict the total execution time of the real-time task are very poor. In this paper, in order to overcome these problems, we suggested a grid computing-based risk management system which derived from the system structure and the process for improving the efficiency of the system, grid computing-based working methodology, risk policy module which can manage efficiently the problem of the work of resources(Agent), scheduling technique and allocation method which can re-allocate the resource allocation and the resources in problem, and monitoring which can manage resources(Agent).

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

A Case Study for Effectiveness Process Improvement of IT Organization (IT 조직의 효과적인 프로세스 개선을 위한 사례연구)

  • Song Ki-Won;Kim Jin-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.235-238
    • /
    • 2006
  • 최근 많은 기업들은 효과적인 소프트웨어 프로세스 개선을 위해 SPICE와 CMMI 프로세스 심사 표준을 도입하려는 노력을 하고 있다. 이러한 표준을 통해 효과적인 개선하기 위해서는 개선점과 위험을 식별하고 이들 이슈들을 소프트웨어 개발환경(software development environment)에 적용시켜서 조직의 비젼(organization vision)에 대응한 작업성능(work performance)를 높여야한다. 지속적인 개선을 필요로 하는 조직은 현재의 작업성능을 측정하고 이를 개선하기 위한 개선점을 찾아내는 능력과 경험을 축적하여 체계적으로 관리하는 것이 중요하다. 하지만 기존의 SPI 모델들은 무엇을 수행해야 하는지에 대한 지침은 제공하고 있지만, 정량적인 작업성능 측정 및 특정 환경의 소프트웨어 개발 조직의 SPI를 위해 필요한 구체적인 지침을 제시하고 있지는 않다. 따라서, 본 논문에서는 이러한 조직의 작업성능 측정 및 조직의 개선경험을 축적하여 프로세스를 개선전략에 반영하여 조직의 비젼에 최적한 전략을 제공해주는 OTEM(Opportunity Tree Enterprise Model)을 제안한다.

  • PDF

A Design of Process Model for Web-based Requirements Management (웹 기반의 요구사항 관리를 위한 프로세스 모델 설계)

  • 황만수;민태홍
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.517-522
    • /
    • 2003
  • As the Software development condition is changed into enlargement and complex, requirements generated in each step of Software development life cycle has important effects on the technique and management area. In this thesis, We propose so engineering approach for effective and systematic process and activities including Requirements acquisition and management based on activities proposed with Requirements Engineering and CMM that my special emphasis is putted on Software qualify improvement through the reduction of software development cost and danger.

  • PDF

Decision Method for Change Model using Discriminant Analysis Technique (판별분석을 이용한 변경모델 결정방법)

  • Park, Ha-Kyung;Kim, Sang-Soo;In, Hoh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.645-648
    • /
    • 2007
  • IT 에 대한 비즈니스 의존성이 증가하면서, 안정된 IT 서비스의 제공과 비용 효과적인 운영의 중요성이 강조되고 있다. ITIL 에서는 효율적이고 신속한 변경 처리를 위해 Service Support 영역에서 변경 관리 프로세스를 제시하고 있다. 하지만 고비용을 요하는 CAB 의 소집 여부 등 의사 결정이 변경 관리자의 자의적인 판단에 의존함으로써, 다른 비즈니스 및 안정된 IT 서비스 제공의 위험요소로 작용하고 있다. 본 논문에서는 이러한 문제점을 해결하기 위하여 요청된 변경 사안이 신중한 검토가 필요한 지 여부를 객관적으로 판단할 수 있도록, 판별분석기법을 적용한 변경 모델 결정 방법을 제안한다. 제안된 모델의 유효성을 검증하기 위해, 실제 운영에 적용된 변경 관리 모델과 제안된 모델을 이용했을 때의 결과를 비교하고 그 결과를 제시하였다. 제안된 방법은 동일한 사안에 대하여 일관성 있는 결정을 도출할 수 있어 프로세스 품질개선에 기여할 수 있으며, 궁극적으로 안정된 IT 서비스 제공에 기여하여 기업성과를 개선할 수 있을 것이다.

  • PDF

The Implementation of Business Process Animator (비즈니스 프로세스 애니메이터의 구현)

  • 백수기
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.77-86
    • /
    • 2004
  • In recent, workflow technology has been spotlighted in the literature, according for e-business processes and their automations to be taken important and essential parts into account in the enterprise information processing environment, because the workflow technology ought to be an impeccable solution for automating the e-business processes. When we analyze and model e-business processes in an enterprise, it is very important to verify and validate the e-business processes before they are deployed on the real business environment. Especially, it should be very worthy for the verification and validation work to be done by a kind of graphical visualization approaches. This paper propose a business process enactment animator implemented by Java Technologies. And it supports WPDL(Workflow Process Definition Language) as well as XPDL(XML-Based Process Definition Language), both of which are the standard specification language by WfMC that is the international standardization organization for Workflow Technology.

  • PDF

Establishing the Progress Orientation of Flood Management and a Framework for Sustainable Flood Management Employing an Interview Survey (설문조사를 통한 홍수관리 발전방향과 지속가능한 홍수관리 프레임워크 수립)

  • Kang, Min Goo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.6B
    • /
    • pp.527-535
    • /
    • 2009
  • In this study, employing an interview survey, the progress orientation of flood management is established, and a framework and process for sustainable flood management in a river basin's context are developed to effectively achieve its goals and objectives. The Interview survey about flood management shows that to reduce flood damage, it is necessary to subdue injudicious man-made developments, to make systematic long-term plans, and to consistently implement them. In the framework, the goal is established as minimizing flood damage and building resilience against flooding, and an implementing methodology is developed, integrating five elements: integrated flood management, flood risk management, integrated watershed management, participatory decision-making process, and adaptive management. Also, evaluating the state of flood management in river basins' context is incorporated into the framework, and the evaluation results are fed back to the goal and the methodology. To effectively implement flood management, an adaptive flood management process is developed, reflecting the results of the interview survey. In this process, the participation of the persons concerned is secured, the state of flood management are evaluated periodically, and measures appropriate to the specific sites are selected and are adaptively carried out.

A Proposal of Risk Management Framework for Design as a Secure Power Control System (안전한 전력 제어시스템 설계를 위한 위험관리 프레임워크 제안)

  • Park, Jun Yong;Shin, Sumin;Song, Kyoung-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.425-433
    • /
    • 2016
  • In smart grid, enhancement of efficiency and interoperability of electric power system is achieved through the connection with outer network, and this induces that power grid system is threatened increasingly, becomes the main target of cyber terrorism, and is sincerely required to design the secure power system. Although SSDLC(Secure System Development Life Cycle) is used for risk management from the design phase, traditional development life cycle is somewhat limited for satisfaction of information security indicator of power control system. Despite that power control system should reflect control entities of information security considering its own characteristics, validation elements are insufficient to apply into real tasks based on existing compliance. To make design of diagnostic model and assessment process for power control system possible and to give a direction for information security and present related indicator, we propose the new risk management framework of power control system which is applied operational security controls and standard architecture presented by IEC 62351 TC 57 with enterprise risk management framework.

Workflow Procedures and Applications in BIM-based Design for Safety (DfS) (BIM 기반 설계안전성검토의 업무 절차와 활용 방안에 관한 연구)

  • Jaewoong Hwang;Heetaek Yoon;Junhyun Bae;Youngkon Park
    • Land and Housing Review
    • /
    • v.15 no.2
    • /
    • pp.125-137
    • /
    • 2024
  • A conventional Design for Safety (DfS), introduced to eliminate potential hazards in the design phase proactively, has encountered persistent challenges, such as perfunctory risk assessments and hazard identifications based on 2D drawings and inefficient workflow processes. This study proposes a BIM-based approach to Design for Safety (DfS) to address the limitations of conventional methods, aiming to enhance efficiency and achieve practical safety management benefits. The proposed workflow process for BIM-based DfS has been refined and validated for on-site applicability through various case studies, including risk assessments during the design phase and field applications for safety management activities during the construction phase. Specifically, the critical process of risk assessment within the DfS methodology has also been transitioned to a BIM-based approach. This BIM-based risk assessment process has been evaluated through case studies, encompassing safety reviews for structural design, construction equipment operation, and construction methodology with sequence in design projects. Additionally, the proposed BIM-based DfS has demonstrated exceptional on-site applicability and efficiency, as validated by the application of a BIM deliverable embedded in DfS information for CDE-based daily activity briefing, VR-based safety training, AR-based mitigation measures inspections, and other safety management activities in the construction phase.

Hazard Analysis Process Based on STPA Using SysML (SysML을 이용한 STPA 기반의 위험원 분석 프로세스)

  • Choi, Na-yeon;Lee, Byong-gul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.1-11
    • /
    • 2019
  • Today's software systems are becoming larger and more complicated, and the risk of accidents and failures have also grown larger. Software failures and accidents in industrial fields such as automobiles, nuclear power plants, railroad industries, etc. may lead to severe damage of property and human life. The safety-related international standards, such as IEC 61508 have been established and applied to industries for decades. The safety life cycle specified in the standards emphasize the activities to develop safety requirements through hazard and risk analysis in the early stage of software development. In this paper, we propose 'Hazard Analysis Process based on STPA using SysML' in order to ensure the safety of software at the early stage of software development. The proposed hazard analysis can be effectively performed minimizing the loss of hazard by using the BDD and the IBD of SysML to define the control structure of a system. The proposed method also improves the specification of the safety constraints(requirement) by using SD. As a result, it is possible to identify the hazard without missing and identify the hazard scenarios in detail, and safety can be sufficiently ensured in the early stage of software development.