• Title/Summary/Keyword: Risk사전관리

Search Result 239, Processing Time 0.03 seconds

PRISM: A Preventive and Risk-reducing Integrated Security Management Model using Security Label (PRISM: 보안 레이블을 이용한 위험예방 통합보안관리 모델)

  • Kim, Dong-Soo;Kim, Tae-Kyung;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.815-824
    • /
    • 2003
  • Many organizations operate security systems and manage them using the intergrated secutity management (ISM) dechnology to secyre their network environment effectively. But current ISM is passive and behaves post-event manner. To reduce cost and resource for managing security and to remove possbility of succeeding in attacks by intruder, the perventive security management technology is required. In this paper, we propose PRISM model that performs preventative security management with evaluating the security level of host or network and the sensitivity level of information asset from potential risks before security incidents occur. The PRISM can give concrete and effective security management in managing the current complex networks.

Development and assessment of pre-release discharge technology for response to flood on deteriorated reservoirs dealing with abnormal weather events (이상기후대비 노후저수지 홍수 대응을 위한 사전방류 기술개발 및 평가)

  • Moon, Soojin;Jeong, Changsam;Choi, Byounghan;Kim, Seungwook;Jang, Daewon
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.11
    • /
    • pp.775-784
    • /
    • 2023
  • With the increasing trend of extreme rainfall that exceeds the design frequency of man-made structures due to extreme weather, it is necessary to review the safety of agricultural reservoirs designed in the past. However, there are no local government-managed reservoirs (13,685) that can be discharged in an emergency, except for reservoirs over a certain size under the jurisdiction of the Korea Rural Affairs Corporation. In this case, it is important to quickly deploy a mobile siphon to the site for preliminary discharge, and this study evaluated the applicability of a mobile siphon with a diameter of 200 mm, a minimum water level difference of 6 m, 420 (m2/h), and 10,000 (m2/day), which can perform both preliminary and emergency discharge functions, to the Yugum Reservoir in Gyeongju City. The test bed, Yugum Reservoir, is a facility that was completed in 1945 and has been in use for about 78 years. According to the hydrological stability analysis, the lowest height of the current dam crest section is 27.15 (EL.m), which is 0.29m lower than the reviewed flood level of 27.44 (EL.m), indicating that there is a possibility of lunar flow through the embankment, and the headroom is insufficient by 1.72 m, so it was reviewed as not securing hydrological safety. The water level-volume curve was arbitrarily derived because it was difficult to clearly establish the water level-flow relationship curve of the reservoir since the water level-flow measurement was not carried out regularly, and based on the derived curve, the algorithm for operating small and medium-sized old reservoirs was developed to consider the pre-discharge time, the amount of spillway discharge, and to predict the reservoir lunar flow time according to the flood volume by frequency, thereby securing evacuation time in advance and reducing the risk of collapse. Based on one row of 200 mm diameter mobile siphons, the optimal pre-discharge time to secure evacuation time (about 1 hour) while maintaining 80% of the upper limit water level (about 30,000 m2) during a 30-year flood was analyzed to be 12 hours earlier. If the pre-discharge technology utilizing siphons for small and medium-sized old reservoirs and the algorithm for reservoir operation are implemented in advance in case of abnormal weather and the decision-making of managers is supported, it is possible to secure the safety of residents in the risk area of reservoir collapse, resolve the anxiety of residents through the establishment of a support system for evacuating residents, and reduce risk factors by providing risk avoidance measures in the event of a reservoir risk situation.

Review on Prior Evaluation for Terrorism Risk of High-rise Buildings (초고층건축물의 테러 위험도 사전평가에 관한 연구)

  • Seong, Bin;Lee, Yoon-Ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.293-316
    • /
    • 2013
  • Today's high-rise buildings are increasing concern about the safety and evacuation of people related to the fire and threat from outside. Terrorism breaking out in high-rise buildings, a symbol of the national economy results in a number of casualties, economic loss, social fear and damage to national status. That's why high-rise building has also emerged as a target of major terrorist attacks, compared to other types of buildings. We have 54 high-rise buildings in 15 regions over the country. The Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government have offered the guidelines to prevent terrorist attacks toward high-rise buildings. Since the 9/11 terrorist attacks, the U.S. Federal Emergency Management Agency (FEMA) has developed and taken advantage of the Risk Management Manual Series. According to this manual, pre-assessment is conducted for the prevention of terrorism and particularly in FEMA 455, risk of the surrounding areas, vulnerability, possibility from terrorist attacks are checked. After the check, experts classify the risk of terrorist attacks toward the high-rise buildings and according to the risk classification, architects, security experts and structure engineers can carry out terrorism prevention program for high-rise buildings. The U.K. NaCTSO has also offered the terrorism prevention guidelines. Therefore, the Ministry of Land, Infrastructure and Transport and Seoul Metropolitan Government should make more concrete guidelines for high-rise buildings such as what U.S. FEMA and U.K. NaCTSO implement, including prior evaluation technique for terrorism risk.

  • PDF

The research regarding an information system risk management process modeling (정보시스템 위험관리 프로세스 모델링에 관한 연구)

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.157-164
    • /
    • 2006
  • From the hazard which it prepares in the hazards increase which it follows in information demand augmentation of information technical development and the consumer from inside systematizing integrity and solubility of information technological resources. inside against a confidentiality. The control against information and a system and a data outside is demanded. From the dissertation which it sees demand function and the structure which do information technical risk management system development it will be able to manage the danger which it infiltrates with the root which is various overview in hazard necessity it investigated the inside and outside of the country instance in the center and it analyzed. And it plans the dangerous civil official integrated process model ultimately as against a hazards it will be able to prepare in the dictionary in order, it put the place objective which it induces.

  • PDF

A Decision Support Model for the Exchange Risk Management of Overseas Construction Projects (해외 건설 프로젝트의 환리스크 관리를 위한 의사결정 지원 모델)

  • An, Chi-Hoon;Yoo, Hyun-Seok;Kim, Young-Suk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.3
    • /
    • pp.109-121
    • /
    • 2012
  • Overseas construction project orders have shown steady increase since 2001, and it took 44.5% of the total construction project orders in 2010. Overseas construction project needs more complex risk management because it is affected by more various circumstance factors than the domestic construction is. Previous studies have centered on the internal risk factors to assist the decision-making, but there are few researches on the importance and techniques of foreign exchange risk management. Inadequate management of foreign exchange risk has been found to cause huge damages due to the lacking recognition on the importance of foreign exchange risk management. Therefore, current study designed a foreign exchange risk manage model to help efficient management and decision-making. This model was developed as a technique to meet the demand of the increasing overseas construction projects for the efficient management of foreign exchange risk, and the technique will lower the risk with more and more accurate outcome by accumulating the data of profit-and-loss.

An Study about The Priority Risk Factors for Enhancing the success Rate of The Public Sector Information Projects (공공분야 정보화 프로젝트 성공률을 높이기 위한 위험요인 우선순위에 관한 연구)

  • Lee, Hyun-Soo;Lee, Moon-Goo;Lee, Nam-Yong
    • 전자공학회논문지 IE
    • /
    • v.48 no.4
    • /
    • pp.69-77
    • /
    • 2011
  • Recently, the public sector information projects have bebn larger in size, sophisticated, and diversified, which make the performance management model be studied continuously. According to the research and understanding on this, there are discontents resulted from poor requirements managements, schedule delays, budget overruns, failure to achieve expected goals, although there are increase the scale of projects and the number of information systems than ever before. it makes the requirement for the plan to manage significant risk factors systematically. So in this study, we will understand the risks which have been recognized by professionals and managers in public sector projects for enhancing the success rate. And the surveys will be conducted for the risk factors in each fields by gathering the opinions of the hands on workers in public sector project support team such as S company, L company. Finally, the correlation index between the risks and the other project fields would be clear by this survey.

A Proposal for Improvement and Current Situation of Risk Management on Financial Information System (금융정보시스템 위험관리의 현황 및 개선을 위한 제언)

  • Kang, TaeHong;Rhew, SungYul
    • Information Systems Review
    • /
    • v.14 no.2
    • /
    • pp.103-115
    • /
    • 2012
  • Improvement of the capability to cope with risk based on prior preventive management is very important for efficient operation of financial information system. In order to do this, understanding, analysis, and countermeasures for the risk that happened already in the past is essential. In this study, the defect data which happened in the financial information system including account system, business system and data feeding system during 4 years and 5 months were categorized and analyzed by the domain, defect factors, period, day of the week, phases of software development, and defect cause. As a result, it was identified that the defect data had characteristics and trends along the phase of software development, day of the week, and the cause, also that building risk prediction model was necessary for the risk management of whole financial domain due to the relation of the information systems.

  • PDF

Plans for Reducing Risk through a Case Study of Risk Factors at a Construction Site -Focused on Earth work, Foundation Work, Reinforced Concrete Construction- (건설현장의 위험요소 사례연구를 통한 위험저감 방안의 고찰 -토공사, 기초공사, 철근콘크리트공사를 대상으로-)

  • Kim, Jin-Ho
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.4
    • /
    • pp.83-93
    • /
    • 2010
  • With construction projects continuously becoming more massive and complex, risk factors have been consistently increasing. To achieve a successful project, it is very important to identify and cope with such risk factors. Therefore, the purpose of this study is to suggest plans of reducing risk, not only for describing the drafting process for construction planning but also for systematically organizing constraints and risk factors in earth work, foundation work and reinforced concrete construction. To achieve these objectives, this study 1) analyzes previous theories about risk classification structure, 2) performs a case study of an actual project to embody the problems of safety management by analyzing the results of an interview with a construction engineer. In conclusion, the following factors were systematically organized: 1) characteristics of construction site (purpose, structure, floor, etc.); 2) the actual application conditions of the main construction methods; 3) the relationship between constraints and risk factors.

Developing Warning Map for Risk Monitoring on Personal Information Security (개인정보보호를 위한 리스크 모니터링: 경고맵)

  • Lee, Youngjai;Shin, Sangchul;Min, Geumyoung
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.33-40
    • /
    • 2008
  • Personal information security has been as risk ever since the development of information technology increased its internet use. As personal information security is compromised there will be a rise in personal privacy conflicts and this will become an important social issue. The following research is a presentation of the warning map for risk monitoring on personal information security. First, the personal information security process is identified then defined. Second, in order to achieve the personal information security's objective, a survey was taken and the data was collected. Third, factor in the Fishbone Diagram's analysis and figure out the key indicators that include metric and threshold. Last, develop the warning map which has the matrix table composed of the process and the risk. It displays the warning based on the threshold and the value of key indicators related to risks.

  • PDF

A Study for Enterprise Type Realtime Information Security Management System (기업의 상시 보안관리 체계 연구)

  • Noh, Shi-Yeong;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.617-636
    • /
    • 2017
  • Many businesses have adopted the standard security management structure such as ISO27001 and K-ISMS for strengthening business's security management structure to protect their core information assets and have acquired partial output from such effort. However, many risk factors such as recent advances in Information Technology and evolution of intrusion methods have increased exponentially requiring the businesses to response even more quickly with better accuracy. For such purpose, a study of 'Real Time Security Management Structure for Business' based on security management process optimization, defining a set of security index for managing core security area and calculation of risk indices for precognition of intrusion risk area has been made. Also, a survey on opinions of an expert panel has been conducted. The effectiveness of studied structure was analyzed using AHP method as well. Using this study, security personnels of a company can improve efficiency of the preemptive responsive and quicker measure from the current security management structure.