• Title/Summary/Keyword: Environment Management System

Search Result 7,191, Processing Time 0.039 seconds

Developing a Framework for the Implementation of Evidence Collection System: Focusing on the Evaluation of Information Security Management in South Korea

  • Choi, Myeonggil;Kang, Sungmin;Park, Eunju
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.13-25
    • /
    • 2019
  • Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the '6. Information System Security' of 'information security management actual condition evaluation index'. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

Advanced Construction Management through an Integrated Information Control Environment (통합 건설관리 환경과 일관된 정보처리 체계의 구현)

  • Moon Sung-Woo;Kim Yong-Beom;Kim Young-Do
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.137-142
    • /
    • 2003
  • Construction CALS has been introduced with an aim to improve the effectiveness of construction management in the public sector. The objective of this paper is to provide an approach to implementing an integrated construction management environment. The environment described in this paper provides a methods for the owner and the contractor as well as designers and engineers to interact in a sing control scheme. This interaction represents the collaboration between the contractual parties for sharing construction information. XML technology has been applied as a basic technology for delivering data in the system. The XML-based forms are loaded on the system, whose data are stored in the central database right after review and approval. In future the integrated construction management environment can be further developed to the extend that the contractor's information system is directly interface with the owner's.

  • PDF

A Bridge Monitoring System on Web-GIS Linking with UFID and BMS

  • Pyeon, Mu-Wook;Koo, Jee-Hee;Nam, Sang-Gwan;Park, Jae-Sun
    • Spatial Information Research
    • /
    • v.14 no.4 s.39
    • /
    • pp.421-431
    • /
    • 2006
  • Nowadays, the importance of safety monitoring for facilities is increasing. Therefore, the introduction of ubiquitous technology to replace the existing manually-operated methods is required. In this study, a web-based GIS system that provides monitoring information of bridges in real-time for the application of a bridge management system through the use of ubiquitous technology is constructed. Particular attention is given to the effective interconnection of bridge monitoring information and bridge management system and, through a ubiquitous environment, how to connect this with the UFID and the GIS-based bridge management system (BMS) operated by the Ministry of Construction and Transportation. In addition, data expression methods are also suggested that state the detailed locations and attributes of structures in bridge management by using GIS.

  • PDF

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안 관리시스템의 침입탐지 몇 대응을 위한 보안 정책 모델)

  • 손우용;송정길
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.81-87
    • /
    • 2004
  • Very various intrusion by development of systems that is based on network is spread. To detect and respond this intrusion, security solutions such as firewall or IDS are bringing and management of security system that load these becomes more harder. Moreover, because environment of systems that require security is various, hard to manage establishing suitable security policy Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF

An Intelligent Exhibition Rule Management System using PMML

  • Moon, Hyun Sil;Cho, Yoon Ho;Kim, Jae Kyeong
    • Asia pacific journal of information systems
    • /
    • v.25 no.1
    • /
    • pp.83-97
    • /
    • 2015
  • Recently, the exhibition industry has developed rapidly with the development of information technologies. Most exhibitors in an exhibition plan and deploy many events that may provide advantages to visitors as a method of effective promotion. The growth and propagation of wireless technologies is a powerful marketing tool for exhibitors. However, exhibitors still rely on domain experts who are costly and time consuming because of the manual knowledge input procedure. Moreover, it is prone to biases and errors and not suitable for managing fast-growing and tremendous amounts of data that far exceed a human's ability to comprehend. To overcome these problems, data mining technology may be a great alternative, but it needs to be fit to each exhibition. This study uses data mining technology with the Predictive Model Markup Language (PMML) to suggest a system that supports intelligent services and that improves stakeholder satisfaction. This system provides advantages to the exhibitor, show organizer, and system designer, and is first enhanced by integrating data mining technologies through the knowledge of exhibition experts. Second, using the PMML, the system can automate the process of applying data mining models to solve real-time processing problems in the exhibition environment.

A Concept Study on Improving Command Post Vehicles for Operating Battle Management System (전장관리체계 운용을 위한 전투지휘용 차량의 성능개량 개념)

  • Park, Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.16-22
    • /
    • 2008
  • So far, Korean command post vehicles(CPs) have used voice-only radio communication among the mechanized troop units such MBTs and IFVs, etc. But digital data communication technology should be introduced to improve mission success capabilities and accommodate integrated combat capabilities through increasing SA(situation Awareness), or spatiotemporal synchronization of military operation in battle field environment. Therefore, conventional CPs, which have been operated without digital network, urgently needs to mount a battle management system which furnish with tactical information network, considering that korean new MBTs or new IFVs will be fielded soon. This study suggests some performance enhancement method which might be applicable to CPs which have a role of connecting Battalion unit to Brigade C4I system.

Informatization Evaluation System Model for Colleges (전문대학 정보화수준 평가시스템 연구)

  • Kim Yong-Shik
    • Management & Information Systems Review
    • /
    • v.12
    • /
    • pp.37-52
    • /
    • 2003
  • An informatization evaluation is becoming a major issue among vocational colleges, as the 21th century begins. This century is characterized as Knowledge and Information era. Thus it is popular for administrative organizations to use Information Technologies as major tool to innovate themselves. The main objective of this study is develop evaluation indexes on applications of information technologies for vocational colleges because they must operate their education services by using management principles. Four major indexes were recommended to evaluate their information environment of educational service as follows. 1. Strategic Information System 2. Environmental Factors of Information System 3. Informational Resources 4. Utilization of Information Technologies Each index has 4 variables to identify the level of informatization and every variable is consisted of several questions. Such an evaluation system will be applied for vocational colleges to know their own situation of IT application and to develop managerial strategies by using IT. This system also will be useful to compare you with your potential competitors and to find appropriate polices of IT application by measuring the indexes at different points of time.

  • PDF

Architecture Study for SDDC BAS (SDDC BAS의 아키텍처에 관한 연구)

  • Kim, Jeong-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.646-651
    • /
    • 2015
  • In this paper, we analyze the architecture of a typical building automation systems and control points in the network architecture, interoperability, and performance aspects. We proposed a new virtualization-based point-to-point automatic control system that is connected to a high speed wired system. Cloud computing based automation system enables the user based environment control, and may perform a building energy management performance through the improvement of the building automation system efficiently In addition, the virtualization system makes it possible to perform the management of the group building load management operators efficiently.

Studying a Balance Scored Card-driven System Dynamics Model for Enhancing Hospital Key Performances (중소 의료기관 경영성과 제고를 위한 실증적 사례연구 : 균형성과표와 시스템다이나믹스를 중심으로)

  • Chung, Hee-Tae;Park, Hwa-Gyoo
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.25-40
    • /
    • 2011
  • Small and Medium sized hospitals are exposed to severe managerial environments recently. Around 8.0% of the hospitals are bankrupted every year. The adverse managerial environment does not only come from external factors such as patients' preference for larger hospitals, regulations on the medical charges; more serious problems come from the way the medium and small sized hospitals deal with those exogenous changes including lack of management skills, lack of change management skills, lack of managerial decision support systems, etc. This paper aims to support managers to make decisions regarding the exogenous changes. This paper can be interpreted as an attempt of a merge of the two techniques; BSC and system dynamics. Starting with a BSC system, the development of a system dynamics model can take advantages of the BSC information.

The Design of Integrated Intrusion Detection System in Large Networks (대규모 네트워크를 위한 통합 침입탐지시스템 설계)

  • 정연서
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.953-956
    • /
    • 2002
  • The threat to the network is increasing due to explosive increasing use of the Internet. Current IDS(Intrusion Detection System) detects intrusion and does individual response in small area network. It is important that construction of infra to do response in all system environment through sharing information between different network domains. This paper provides a policy-based IDS management architecture enabling management of intrusion detection systems. The IIDS(Integrated Intrusion Detection System) is composed of IDAs(Intrusion Detection Agents). We describe requirements in design and the elements of function.

  • PDF