• Title/Summary/Keyword: Configuration Audit

Search Result 17, Processing Time 0.021 seconds

The Effect of Legal Political Determination of Perpu Number 1 of 2020 on Financial Markets in Indonesia During the COVID-19 Pandemic

  • RAJAGUKGUK, Blucer Welington;NAJIB, Muhammad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.655-664
    • /
    • 2021
  • The purpose of this research paper is to overcome the impact the COVID-19 in Indonesia, the Government of the Republic of Indonesia has set Perpu No.1 of 2020 concerning State Financial Policies and Financial System Stability for Handling COVID-19 Pandemic. This paper uses a descriptive analysis method with a normative juridical approach, namely by explaining the politics of law in the stipulation of Perpu No. 1 of 2020 into Law, then analyzing its effect on the character of legal products contained in the Act. The data sources used in this paper are the 1945 Constitution of the Republic of Indonesia, Perpu Number 1 of 2020 which has been ratified into Law Number 2 of 2020, Legislation in the field of state finance, literature books, and several articles from print and electronic media. This paper concludes that the legal politics of establishing Perpu No.1 of 2020 into Act was born from a democratic political system and configuration, but the character of its legal products was conservative. The aim of the paper is to focus on the discussions related to the new regulations that have been made by the Indonesian government and analyse the impact resulting from the enactment of these regulations.

An Implementation of Configuration Management in ISO 9000 Quality System (ISO 9000 품질시스템에서 형상관리의 구현에 관한 연구)

  • Chung, Nam-Kee;Choi, Jeong-Gil;Kim, Young-Sik;Park, Sang-Kyu;Kim, Jae-Jon;Hwang, Bu-Hyun
    • Journal of Korean Society for Quality Management
    • /
    • v.28 no.2
    • /
    • pp.176-191
    • /
    • 2000
  • Configuration Management (CM) is a management discipline that applies technical and administrative direction to the development, production and support life cycle of a configuration item. This paper introduces an application of this disicipline to ISO 9000 quality systems. A proto type CM information system caned CM / ISO 9000 is implemented via a comparison and anal37sis of CM standards such as ISO 10007, MIL-STD-2549 and EIA Standard IS-649. This system demonstrates 4 basic CM functions consisting of configuratin identification, change control, configuration status accounting and configuration audit. In the system, configuration items such as documents and drafts can be managed to ensure effective ISO 9000 quality systems. Implementation is supported by IDEF0, IDFF1x in modeling, MS SQL Server Ver. 7.0 as DBMS and Visual Basic Ver. 6.0 for interface programming.

  • PDF

Configuration Management based Configuration File Version Integrity Auditing Framework (형상관리 기반 설정파일 버전 무결성 감사 프레임워크)

  • Kim, Seonjoo;Lee, Sukhoon;Baik, Doo-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1511-1514
    • /
    • 2012
  • 최근 기업에서 구축하는 IT 아키텍쳐가 점점 복잡해져 가는 환경변화에 따라 각 시스템 구성요소의 조건이나 특성을 저장하는 설정파일(Configuration file)의 중요성이 강조되고 있지만, 대부분의 형상관리시스템이 응응 소프트웨어를 중심으로 구성되어 설정파일의 특징을 반영한 활동에 한계를 갖고 있다. 또한 품질보증 목적으로 수행하는 형상감사 활동도 응용 소프트웨어를 대상으로 품질중심 감사 활동이 이루어지면서, 등록된 개별 소프트웨어 별로 변경통제와 버전관리가 이루어져 설정 파일이 포함되는 경우 버전 무결성 차원의 문제를 적발하지 못하는 문제가 있다. 이 논문에서는 추가적으로 필요한 감사활동 요구기능을 정의하고, 동일한 원본에서 배포된 설정파일들이 서로 버전이 다르게 관리 될 수 있는 문제를 감사(Audit)를 통해 탐지할 수 있는 버전 무결성 감사 프레임워크를 제시한다. 제안하는 프레임워크는 기존 형상관리 개념과 액티비티, 프로세스를 기반으로 감사기능을 보완한다. 이를 통해 기존 감사활동에 버전 무결성 검증을 수행하는 형상감사 기능이 포함되며, 이는 설정파일의 버전 차이에 의해 사전/사후 발생될 장애, 오동작 등의 문제 해결에 활용된다. 이 논문에서 제안 프레임워크의 검증을 위하여 웹 시스템 기반 자바환경으로 구현하였고, 현장 적용한 부분을 평가 함으로써 검증하였다.

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

Real-Time File Integrity Checker for Intrusion Recovery and Response System (침입 복구 및 대응 시스템을 위한 실시간 파일 무결성 검사)

  • Jeun Sanghoon;Hur Jinyoung;Choi Jongsun;Choi Jaeyoung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.279-287
    • /
    • 2005
  • File integrity checking is the most reliable method to examine integrity and stability of system resources. It is required to examine the whole data whenever auditing system's integrity, and its process and result depends on administrator's experience and ability. Therefore the existing method is not appropriate to intrusion response and recovery systems, which require a fast response time. Moreover file integrity checking is able to collect information about the damaged resources, without information about the person who generated the action, which would be very useful for intrusion isolation. In this paper, we propose rtIntegrit, which combines system call auditing functions, it is called Syswatcher, with file integrity checking. The rtlntegrit can detect many activities on files or file system in real-time by combining with Syswatcher. The Syswatcher audit file I/O relative system call that is specified on configuration. And it can be easily cooperated with intrusion response and recovery systems since it generates assessment data in the standard IDMEF format.

A Study of the Back-tracking Techniques against Hacker's Mobile Station on WiBro (WiBro에서 공격 이동단말에 대한 역추적기법 연구)

  • Park, Dea-Woo;Lim, Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.185-194
    • /
    • 2007
  • WiBro has become intentionally standardize as IEEE 802.16e. This WiBro service has been started by a portable internet at home as well as abroad. In this paper, an offender hacker do not direct attack on system on system that It marched an attack directly in damage system because a place oneself in mobile station of portable internet WiBro and avoid to attack hacker's system. At this time, a mobile make use of network inspection policy for back-tracking based on log data. Used network log audit, and presented TCP/IP bases at log bases as used algorithm, the SWT technique that used Thumbprint Algorithm. Timing based Algorithm, TCP Sequence number. Study of this paper applies algorithm to have been progressed more that have a speed to be fast so that is physical logical complexity of configuration of present Internet network supplements a large disadvantage, and confirm an effective back-tracking system. result of research of this paper contribute to realize a back-tracking technique in ubiquitous in WiBro internet network.

  • PDF

A Study on the Self-Prevention Plan System (자체방제계획서 검토기준 마련 연구)

  • Kim, Sungbum;Noh, Hyeran;Lee, Jinseon;Kim, Jungmin;Ahn, Seungyoung;Seok, Kwangseol
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.1
    • /
    • pp.50-55
    • /
    • 2013
  • Self-Prevention Plan Review Report and Review Standards Process Safety Management(PSM), Safety Management System(SMS), including the contents of the safety management system audit standards, notices and guidelines on the screening form and were analyzed. Were expected through the interview and screening personnel in the screening process to identify problems prior research so that it can be reflected in the. Also divided into methods such as document review and on-site implementation status of the review written Emergency Preparedness Plan depending on the item proposed. Toxic Chemicals Control Act(TCCA) Self-Prevention Plan Review Regulations. However, the substantial approval process, and do not enable the system performance lacked Self-Prevention Plan Review. Review half configuration to enhance the professionalism and efficiency of the work of this research was performed.