• Title/Summary/Keyword: 점검항목

Search Result 304, Processing Time 0.027 seconds

A Study on the Improvement of the Operation Audit Through Quantitative Operation Check Sheet (정량화된 운영점검표를 활용한 정보시스템 운영감리의 개선 연구)

  • Sung, In-Ryong;Lee, Don-Hee
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.452-457
    • /
    • 2010
  • 정보시스템 운영은 연속성, 장애에 대한 민감성 등 정보시스템 구축과는 다른 특성을 많이 가지고 있어 감리방법에 있어서도 새로운 방법이 필요하다. 본 논문은 정량화된 운영점검표를 제시함으로써, 운영감리의 객관성과 신뢰성을 확보하고, 감리결과를 정량화하며, 타 운영사례나 과거 운영 상태와의 비교를 가능케 하여, 감리의 품질과 운영감리의 효용성 향상에 기여하고자 하였다. 시스템 운영 정보시스템 감리지침의 기본점검항목을 기준으로 13가지 기본점검항목을 도출하였고, 각 기본점검항목 별로 현재 운영상태가 어떤 수준인지를 평가할 수 있도록 하였으며, 전문가 인터뷰와 현장적용을 통하여 검증하였다.

  • PDF

Response to Security Threats through Importance Analysis of NFT Service Provider Security Level Check Items (NFT 서비스 제공자 보안 수준 점검 항목 중요도 분석을 통한 보안 위협 대응)

  • Dong Sung Im
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.126-135
    • /
    • 2023
  • Demand for NFT is expanding along with Blockchain. And cyber security threats are also increasing. Therefore, this study derives security level inspection items by analyzing status related to NFT security such as NFT features, security threats, and compliance for the purpose of strengthening NFT security. Based on this, the relative importance was confirmed by applying it to the AHP model. As a result of the empirical analysis, the priority order of importance was found in the order of Security management system establishment and operation, encryption, and risk management, etc. The significance of this study is to reduce NFT security incidents and improve the NFT security management level of related companies by deriving NFT-related security level check items and demonstrating the research model. And If you perform considering relative importance of the NFT check items, the security level can be identified early.

  • PDF

Factor analysis of VoIP Security Checklists using AHP (AHP를 이용한 VoIP 정보보호 점검항목의 중요도 분석)

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1115-1122
    • /
    • 2012
  • VoIP service is steadily growing due to the spread of smartphones, enhanced network, and various VoIP applications. But, VoIP has many security vulnerabilities because it is based on IP network. This paper analyzes the important weight of VoIP security checklists for incident prevention and response using AHP. The results of AHP analysis showed that network security, incident response, and access control were the most important in technical, administrative, physical standpoint. This study proposes factor analysis of VoIP security checklist at first time. By doing this, it will be used helpfully when VoIP service providers establish their own security policies and inspect their VoIP environment according to their security policies.

Radiation Safety Management Guidelines for PET-CT: Focus on Behavior and Environment (PET-CT의 방사선안전관리 가이드라인 개발: 행위와 환경을 중심으로)

  • Jung, Jin-Wook;Han, Eun-Ok
    • Journal of Radiation Protection and Research
    • /
    • v.36 no.3
    • /
    • pp.140-147
    • /
    • 2011
  • Our purpose is to specify behavior and environmental factors aimed at reducing the exposed dosage caused by PET-CT and to develop radiation safety management guidelines adequate for domestic circumstances. We have used a multistep-multimethod as the methodological approach to design and to carry out the research both in quality and quantity, including an analysis on previous studies, professional consultations and a survey. The survey includes responses from 139 practitioners in charged of 109 PET-CTs installed throughout Korea(reported by the Korean Society of Nuclear Medicine, 2010). The research use 156 questions using Cronbach's ${\alpha}$ (alpha) coefficients which were: 0.818 for "the necessity of setting and installing the radiation protective environment"; 0.916 for "the necessity of radiation protection", "setting and installing the radiation protective environment"; and 0.885 for "radiation protection". The check list, derived from the radiation safety management guidelines focused on behavior and environment, was composed of 20 items for the radiation protective environment: including 5 items for the patient; 4 items for the guardian; 3 items for the radiologist; and 8 items applied to everyone involved; for a total of 26 items for the radiation protective behavior including: 12 items for the patient; 1 item for the guardian, 7 items for the radiologist; and 6 items applied to everyone involved. The specific check list is shown in(Table 5-6). Since our country has no safety management guidelines of its own to reduce the exposed dosage caused by PET-CTs, we believe the guidelines developed through this study means great deal to the field as it is not only appropriate for domestic circumstances, but also contains specific check lists for each target who may be exposed to radiation in regards to behavior and environment.

Development of a Standard Checklist for Protection to Electrical Accidents of Laboratory (연구실 전기사고방지를 위한 표준체크리스트개발)

  • Lee, Dong-Yoon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.108-115
    • /
    • 2011
  • This paper informs the standard guideline of electrical inspection for the University laboratories and R&D institutes. A routine electrical inspection is there to prevent an electric shock and electrical fire accident in the Lab. The main issue of this paper is to check the problem of a routine electrical inspection and this paper provides a detailed guideline of a checklist for the Lab which do not have detailed instruction. It mentions the standard model of an effective routine inspection to upgrade the weak electrical environment in the Lab. One of the main purposes of this paper is to develop a routine checklist to control the electrical environment in the Lab. The evaluation checklist we develop will then be applied to every Lab. Introducing an electrical safety checklist builds a clear standard guideline for a real safety check. This will be used as a regular routine check-up for every Lab. The goal of this paper is to enforce safety from electrical accidents in the lab and it will provide safety guidelines for every Lab.

An Audit Method on Information System Audit using Delphi Method - Based on Hyperledger Fabric (델파이기법을 이용한 감리점검항목 도출 방안 - 하이퍼레저 패브릭 기반으로)

  • Lee, Youngjoo;Park, Sooyong
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.7-12
    • /
    • 2020
  • A project to establish an information system with a project cost of more than 500 million won at a local public firm is subject to the Information System Audit (hereinafter referred to as IS Audit), and the IS Auditor shall conduct audit according to the audit criteria. Recently, as blockchain technology has been applied to various fields such as manufacturing, healthcare, distribution, and public sectors beyond the financial industry, the development of systems that apply blockchain technology is increasing. The use of Hyperledger Fabric, a private blockchain, is on the rise to utilize blockchain technology in public firms and private firms. However, the newly emerging blockchain-based system is not sufficient to carry out auditing with existing audit check items, so it has no choice but to make and use audit items individually. Therefore, a need for verified audit items for systems that base on blockchain technology has emerged. In this study, we customized the Delphi process to derive audit items suitable for the system development project using the blockchain technology, and verified the completeness and accuracy of the audit items derived through a survey by the IS Auditor. This research will be of direct help to the IS Auditor, and it is expected that operators and organizers who provide services through the blockchain-based system will also contribute to improving the quality of the system.

Development of Fuzzy Inference Systems for Protection to Electrical Accidents of Laboratory (연구실 전기사고방지를 위한 퍼지 추론 시스템 개발)

  • Park, Keon-Jun;Lee, Dong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3636-3643
    • /
    • 2011
  • To prevent the electrical accidents in the laboratory, we identify problems for periodic inspections of the electric field and develop a fuzzy inference system that can be practically applied to check items. Focusing on electrical safety in the lab environment, we draw check items that can be applied in common and develop a standard checklist that is consistent with the laboratory electrical safety and the periodic inspections. Using the standard checklist we select the items that may contain a linguistic ambiguity and define the membership functions for these items. We also have a safety rating defined by the membership function. Using these fuzzy variables we form the fuzzy rules in the form of 'If-Then' and develop a fuzzy inference system through the fuzzy engine. From this, electrical accidents could be prevented in advance continuously by managing the intelligent and efficient inspection and electrical safety to prevent the electrical accidents in the laboratory.

ESE 피뢰침 설비의 인하도선

  • Gang, In-Gwon
    • Electric Engineers Magazine
    • /
    • v.206 no.10
    • /
    • pp.18-23
    • /
    • 1999
  • 본고에서는 최근에 많이 설치되고 있는 선행스트리머 방사형 피뢰침 설비에 대하여 적용 기준인 NF C 17102에 의거한 ESE 피뢰침설비의 점검기준 및 구체적인 상세 점검항목을 기술한다.

  • PDF

Improvement of Computer Security Check Program and User Inspection Items In Response To Military Cyber Security Breachment(For Army sector) (국방 사이버 침해 대응을 위한 전산보안점검 프로그램 및 사용자 진단항목 개선 연구(육군 중심))

  • Kim, Jee Won;Jung, Ui Seob;Jung, Chan Gi
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.101-107
    • /
    • 2017
  • Recent cyber attacks on South Korea, including hacking and viruses, are increasing significantly. To deal with the cyber invasion of cyber aggression, the Ministry of National Defense defined the necessary procedures for cyber security with guidelines for cyber security. In spite of, based on the analyses the cyber defense operations published, the number of violations are increasing. To address issues stated above, the safety check items should be reviewed and revised. This paper will revisit current safety check items and provide new guidelines to prevent cyber security breaches, which will provide more safe and efficient cyber environment.