• Title/Summary/Keyword: Enterprise Information System

Search Result 1,169, Processing Time 0.026 seconds

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

Smartphone Camera Control System in connection with Personnel Access Rights (인원 출입 권한과 연계한 스마트폰 카메라 제어 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.93-101
    • /
    • 2017
  • The purpose of this paper is to investigate the effect of the smart phone camera on the company's employees or employees of partner companies, we want to block things in advance. In this paper, we propose a smart phone camera control system which is connected with the personnel access right which enables to share the photographed image of the authorized user and the data shot only within the enterprise. To this end, we have developed the installation status of smart phone control program (MCS: Mobile Camera Control System) of employees, employees and visitors of company, and experimented and analyzed whether the smart phone control program installed in the authorized area. In addition, when visitors visited the company, the effect of prevention of photograph shooting through smart phone camera and the cost of seal sticker attached to the smart phone camera lens part were reduced.

Integration of Information Centers for the Elderly and Disabled Services (교통약자 서비스를 위한 정보센터 통합방안)

  • Nam, Doo-Hee;Han, Ho-Hyun;Ko, Jung-Min
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.69-75
    • /
    • 2010
  • Today, our country is experiencing serious graying without parallel. The government is executing various services and welfare policies to solve this problem using ubiquitous technology. But the old and disabled people are not good for using the u-service and system, because it is made for ordinary people. The purpose of this study is to solve the graying society-problem and improve the eldery as well as disabled's quality of life by integrating each information centers based on ESB(Enterprise Service Bus). The results of this study can be divided by system architecture and communication system for the eldery and disabled. The research development results of this study can be used to build the integrated information center for u-service of the old people and disabled. It will contribute to realizing the Ubiquitous-society by promotion of young people's quality of life as well as the eldery and disabled.

Study of Conversions Security Management System, Co-Relation Rule-Set scenario and architecture for incidence detection (융합보안관제환경을 위한 아키텍처 구축 및 활용 방안에 대한 연구)

  • Hwang, Donguk;Lee, Sanghun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.353-371
    • /
    • 2014
  • We already have seen many studies and articles about the methodology responding the security risks and threats. But we still have some controversial subjects to be settled. Now, we are living in the era that we should focus on how to use the security systems instead of how to make it. In this point of view, a company need to find out the answer for these questions, which security risks have to be handled in a corporate, which system is better for responding the security threats, and how we can build necessary security architecture in case of developing systems. In this article, we'd like to study on-site scenarios threatening the corporate assets, the limit on dealing with these threats, and how to consolidate the security events and information from enormous assets. Also, we'd like to search for the direction form the actual cases which have shown the desired effect from converging the assets and network informations.

A Study on the Factors Influencing the Competitiveness of Small and Medium Companies Applied with Smart Factory System (스마트공장 시스템 구축이 중소기업 경쟁력에 미치는 요인에 관한 연구)

  • Young-Hwan Choi;Sang Hyun Choi
    • Information Systems Review
    • /
    • v.19 no.2
    • /
    • pp.95-113
    • /
    • 2017
  • The advent of information communication technology or the Fourth Industrial Revolution facilitated the fusion of equipment and management systems, such as Manufacturing Execution System, Enterprise Resource Planning, and Product Lifecycle Management, in the successful implementation of smart factories. The government supports the early adoption of these systems in small and medium companies to enhance their global competitiveness in producing products that can be recognized in a dramatically changing manufacturing environment. This study introduces smart factories to improve company competitiveness and address influences from the government assistance, CEO leadership, external consultancy, and organizational participation. We analyzed 101 results received from the questionnaires circulated to small- and medium-sized manufacturing companies. Given a successful smart factory implementation, company competitiveness is the factor that mostly influences organizational participation, government assistance, external consultancy, and CEO leadership. This study suggests several perspectives to implement a smart factory, which is the most important aspect of company competitiveness.

Automatic Generation of DB Images for Testing Enterprise Systems (전사적 응용시스템 테스트를 위한 DB이미지 생성에 관한 연구)

  • Kwon, Oh-Seung;Hong, Sa-Neung
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.37-58
    • /
    • 2011
  • In general, testing DB applications is much more difficult than testing other types of software. The fact that the DB states as much as the input data influence and determine the procedures and results of program testing is one of the decisive reasons for the difficulties. In order to create and maintain proper DB states for testing, it not only takes a lot of time and efforts, but also requires extensive IT expertise and business knowledge. Despite the difficulties, there are not enough research and tools for the needed help. This article reports the result of research on automatic creation and maintenance of DB states for testing DB applications. As its core, this investigation develops an automation tool which collects relevant information from a variety of sources such as log, schema, tables and messages, combines collected information intelligently, and creates pre- and post-Images of database tables proper for application tests. The proposed procedures and tool are expected to be greatly helpful for overcoming inefficiencies and difficulties in not just unit and integration tests but including regression tests. Practically, the tool and procedures proposed in this research allows developers to improve their productivity by reducing time and effort required for creating and maintaining appropriate DB sates, and enhances the quality of DB applications since they are conducive to a wider variety of test cases and support regression tests. Academically, this research deepens our understanding and introduces new approach to testing enterprise systems by analyzing patterns of SQL usages and defining a grammar to express and process the patterns.

Service Identification of Component-Based System for Service-Oriented Architecture (서비스 지향 아키텍처를 위한 컴포넌트기반 시스템의 서비스 식별)

  • Lee, Hyeon-Joo;Choi, Byoung-Ju;Lee, Jung-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.70-80
    • /
    • 2008
  • Today, businesses have to respond with flexibility and speed to ever-changing customer demand and market opportunities. Service-oriented architecture (SOA) is the best methodology for minimizing the complexity and the cost of enterprise-level infrastructure and for maximizing the productivity and the flexibility of an enterprise. Most of the enterprise-level SOA delivery strategies deal with the top-down approach, which organization has to define the business processes, to model business services, and to find the required services or to develop new services. However, a lot of peoples want to maximally reuse legacy component-based systems as well as to deliver SOA into their organizations. In this paper, we propose a bottom-up approach for identifying business services with proper granularity. It can improve the reusability and maintenance of services by considering not data I/O of components of legacy applications but GUI event patterns. Our proposed method is applied to MIS with 129 GUIs and 13 components. As a result, the valiance of the coupling value of components is increased five times and three business services are distinctly exposed. It also provides a 49% improvement in reducing the relationship problems between services over a service identification method using only partitioning information of components.

A Study on Influence of Corporate Factor and ITO Range Factor on Outsourcing Performance -Moderating Effect of Supplier Suitability

  • YI, Seon-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.111-117
    • /
    • 2017
  • This study analyzes the relative importance of the introducing factors for the critical success factors in the implementation stage of the lifecycle of ERP system using Delphi technique and Analytic Hierarchy Process(AHP). In the 1st layer of the hierarchy, technical factor is evaluated as the most important factor among organizational, technical, and supplier factors. In the 2nd layer, choosing a proper ERP package is evaluated as the most important factor within 15 factors followed by process-oriented approach, technical suitability, minimized customization, integration and association of system with trading parter, association with legacy systems, and support and involvement of top management. As a result of this analysis enterprise should choose an ERP package that is suitable to its business environment, and make the best use of(take full advantage of) best practice that ERP package provides to optimize the existing business procedure or process(to approach the existing business procedure or process). This study also shows the range of customization of the features provided by the ERP package should be minimized.

Project stage Modeling to Implement the Enterprise Resource Planning System (ERP시스템 구축을 위한 프로젝트별 모델개발에 관한 연구)

  • Kim, Kyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.1
    • /
    • pp.130-138
    • /
    • 2001
  • Combining a qualified group of people and following through the appropriate phases in the necessary order is crucial to project success. Companies face a wide range of issues and obstacles during implementation that can remain until they start using the system. Benchmarking Partners categorizes these problems into three groups: people issues, process issues, and technology issues Companies should try to implement ERP software as quickly as possible. in fact most companies now use a technique commonly referred to as a rapid implementation methodology. This paper outlines the challenges companies can anticipate during implementation and identifies and describes the six common steps of an ERP project. the paper also discusses new approaches, known as rapid ERP methodologies that are designed to help companies hasten the implementation of such systems.

  • PDF

A study on Design & Implementation of Supply Chain Management adopting Object-Oriented design methodology for auto-part manufacture company (객체지향 UML을 활용한 자동차부품제조업체의 공급사슬관리망 설계.구현 연구)

  • Na, Sang-Gyun;Lee, Jun-Su;You, Tai-Woo;Jeong, Byung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.73-84
    • /
    • 2007
  • This paper was concerned about design and implementation of supply chain management for auto-part company by adopting a UML(Unified Modeling Language). The part of SCM and e-business have interested by larger company, researcher and academic professor. There has been known about a little implementing SCM and it's initiatives for SME(small-medium sized enterprise). We, in this paper, dealt with design and implementing the SCM on supply chain auto part SMEs. The UML is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems. It simplifies the complex process of software design, making a blueprint for the SCM implementation. In this paper, we also adopt some methods for the systematic system analysis, design, and implementation by applying UML to a SCM system.