• 제목/요약/키워드: Security Practice

검색결과 377건 처리시간 0.025초

국제 표준간 형상관리 공정의 활동 및 관계 분석 (Analyzing the Practice and Relationship of the onfiguration Management among International Standards)

  • 황선명;김혜미;김태훈;노병규
    • 융합보안논문지
    • /
    • 제3권1호
    • /
    • pp.85-94
    • /
    • 2003
  • 소프트웨어 형상관리 공정은 형상항목의 정확성과 완전성을 보장하고 형상을 관리하는 공정으로 본 논문에서는 형상관리 공정에 대한 구체적인 활동들에 대하여 ISO/IEC 12207과 ISO/IEC 15846을 비교한다. 또한 최근 소프트웨어 프로세스 심사모델로서 널리 알려진 ISO/IEC 15504와 CMM 및 CMMI에서의 형상관리 공정에 대한 활동 비교 및 분석을 통하여 성숙수준을 예측할 수 있는 절차와 메트릭스를 제시하여 정량적인 측정이 가능하도록 한다.

  • PDF

COMPARISON OF NUMERICAL SCHEMES ON MULTI-DIMENSIONAL BLACK-SCHOLES EQUATIONS

  • Jo, Joonglee;Kim, Yongsik
    • 대한수학회보
    • /
    • 제50권6호
    • /
    • pp.2035-2051
    • /
    • 2013
  • In this paper, we study numerical schemes for solving multi-dimensional option pricing problem. We compare the direct solving method and the Operator Splitting Method(OSM) by using finite difference approximations. By varying parameters of the Black-Scholes equations for the maximum on the call option problem, we observed that there is no significant difference between the two methods on the convergence criterion except a huge difference in computation cost. Therefore, the two methods are compatible in practice and one can improve the time efficiency by combining the OSM with parallel computation technique. We show numerical examples including the Equity-Linked Security(ELS) pricing based on either two assets or three assets by using the OSM with the Monte-Carlo Simulation as the benchmark.

정보시스템 위험분석 평가도구 (Evaluation Tool for Analyzing Method of the Information System)

  • 김강;조경식
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.773-777
    • /
    • 2007
  • 네트워크를 기반으로 하는 시스템들의 발전으로 인하여 매우 다양한 침입이 확산되고 있다. 따라서, 침입자들로부터 위험을 줄이기 위해 평가도구에 관한 연구가 활발하다. 본 논문에서는 위험평가시 동일한 가중치를 적용한 평가와 조직의 특성에 따라 보안요소의 가중치를 가변적으로 적용한 평가를 할 수 있도록 하였으며 각 조직이 자체적으로 보안 점검을 할 수 있도록 설계함으로서 관리 측면에서 취약점을 쉽게 찾을 수 있도록 지원하며, 수행해야 할 권고를 제시한다.

  • PDF

하드디스크의 물리적 고장 복구 방법론 (Physical Defect Recovery Methodology of Hard Disk)

  • 김용호;유재형;김귀남
    • 융합보안논문지
    • /
    • 제8권1호
    • /
    • pp.129-141
    • /
    • 2008
  • 본 논문에서는 하드디스크를 제조사들의 노하우와 수리업체에서 얻은 수많은 경험을 통해 얻어지는 기술을 하드디스크의 종류별 호환 모델과 복구를 위한 증상에 따른 조치 및 수리 방법에 대해서 분석하고자 한다. 하지만, 논문에 있는 데로 똑같이 시도하더라도 숙련도가 미숙한 사용자라면 성공할 가능성이 많지 않다. 좀 더 신중히 고장 하드디스크를 진단하고 다루어야 할것이며, 충분한 연습 후 실행에 옮겨야 할 것이다. 분석은 증상별 육안검사, 소리, 빈도수 별로 시도 되었으며, 이 결과는 귀중한 증거물의 데이터를 복원하는데 귀중한 자료가 될 수 있다.

  • PDF

Maritime Navigation System: Technological Solutions to Ensure The Safety Of Maritime Navigation

  • Burmaka, Igor;Vorokhobin, Igor;Chimshir, Valentin;Burmaka, Oleksiy;Smyrnova, Iryna;Danylenko, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.141-150
    • /
    • 2021
  • The article assesses the level of navigation safety, in theoretical terms, defines the complexity of managing navigational risks in practice. The issues of assessing the navigational safety have been studied due to the importance and relevance of the issue in question, however, due to the great complexity of the problem under consideration, the article considers and indicates the directions for the development of the solution of the given direction, where, first of all, it became necessary to analyze the issue of assessing the levels of navigation risks when navigating vessels of various types in difficult navigation conditions.

On the Application of Public Search Measures to Detect and Obtain Information

  • Kozytska, Olena;Tsilmak, Olena;Protsenko, Olena;Yankovyi, Mykola;Lysenko, Аndrii;Shulzhenko, Assol
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.109-112
    • /
    • 2021
  • The article considers the state of legislation that regulates the use of public methods of obtaining information by authorized state bodies. The correlation of public investigative (search) actions with operative-search measures as concepts denoting the application of public methods of obtaining information has been studied. In addition, it argues the need for more detailed delineation and legislative regulation of public investigative (search) actions and operational and investigative measures at the legislative and departmental levels. The purpose of the article is to analyze certain provisions of the Law of Ukraine "On operational and investigative activities" to identify inconsistencies in the content of the text of the law in order to correct and prevent ambiguity in the theory and practice of law enforcement.

인증된 양자 키 분배 프로토콜 (Authenticated quantum key distribution protocol)

  • 이화연;홍창호;이덕진;양형진;임종인
    • 정보보호학회논문지
    • /
    • 제14권2호
    • /
    • pp.49-55
    • /
    • 2004
  • 본 논문에서는 Greenberger-Home-Zeilinger(GHZ) 상태론 이용하여 키 분배와 인증을 동시에 수행할 수 있는 인증된 양자 키 분배 프로토콜을 제안한다. 이 프로토콜에서 공유되는 키는 정직한 중재자에게는 노출되지 않으며 완전한 안전성이 보장된다. 제안된 양자 키 분배 프로토콜은 기존의 양자 키 분배 프로토콜이 지니는 안전성을 그대로 확보하면서 기존의 정보를 이용하여 상대방에 대한 신뢰를 추가로 제공한다는 장점을 가지며, 실험적으로도 기본적인 양자 연산만을 이용하기 때문에 쉽게 구현될 수 있을 것이다.

Experience of Theory and Practice of the Process of Implementing Information Technologies in the Educational Environment

  • Melnyk, Yaroslav;Drapak, Halyna;Sverdlyk, Zoriana;Tsilyna, Maryna;Varenko, Volodymyr;Boichuk, Nelia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.75-79
    • /
    • 2021
  • The article covered theoretical aspects use of information and communication technologies in teaching. Information and communication technologies are technologies that allow you to search, process and assimilate information from various sources, including the Internet. This is the presentation of information in electronic form, its processing and storage, the use of the computer, a variety of programs. The use of information and communication technologies in the work of a student gives an increase in motivation for learning; increased cognitive interest; evaluate their learning activities, identify the problems of their own educational activities; the formation of cognitive independence of students.

Features of the Use of Computer Telecommunications In Education: Development Prospects

  • Honcharuk, Vitalii;Sherman, Mykhailo;Tumasov, Serhii;Shevchuk, Oleksii;Yeremenko, Liliia;Zaporozhchenko, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.213-217
    • /
    • 2022
  • In the article, in connection with the goal and the hypothesis put forward, the following tasks were formulated: Based on the analysis of literature and existing pedagogical experience, the possibilities, features and pedagogical conditions for the use of educational telecommunication projects were specified. The selection of topics and content of educational telecommunication projects for use has been carried out. Research methods: theoretical analysis of psychological, pedagogical and methodological literature, projects of educational standards in computer science and information technology, study of the state of the problem in teaching practice, questioning.

Telecommunication Technologies As The Basis Of Distance Education

  • Нritchenko, Tetiana;Dekarchuk, Serhii;Byedakova, Sofiia;Shkrobot, Svitlana;Denysiuk, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.248-256
    • /
    • 2021
  • The article discusses the evolution of the development of distance learning in world practice; investigated the essence and modern content of the concepts of "distance learning" and "distance education"; studied the principles of distance learning in the educational process; analyze the use of distance learning in higher educational institutions of Ukraine; substantiated the effectiveness of introducing distance learning into the higher education system; formed new management approaches in the distance learning system; proposals for the organization and improvement of distance learning at the university were developed on the basis of the analysis.