• Title/Summary/Keyword: technology asset

Search Result 432, Processing Time 0.026 seconds

A Study on the Design and Implementation of System for Predicting Attack Target Based on Attack Graph (공격 그래프 기반의 공격 대상 예측 시스템 설계 및 구현에 대한 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.79-92
    • /
    • 2020
  • As the number of systems increases and the network size increases, automated attack prediction systems are urgently needed to respond to cyber attacks. In this study, we developed four types of information gathering sensors for collecting asset and vulnerability information, and developed technology to automatically generate attack graphs and predict attack targets. To improve performance, the attack graph generation method is divided into the reachability calculation process and the vulnerability assignment process. It always keeps up to date by starting calculations whenever asset and vulnerability information changes. In order to improve the accuracy of the attack target prediction, the degree of asset risk and the degree of asset reference are reflected. We refer to CVSS(Common Vulnerability Scoring System) for asset risk, and Google's PageRank algorithm for asset reference. The results of attack target prediction is displayed on the web screen and CyCOP(Cyber Common Operation Picture) to help both analysts and decision makers.

Research on the limiting factors and countermeasures of the virtual asset industry (가상자산 산업의 한계요인과 대응방안 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2021
  • The purpose of this study is to provide an environment that can support the development of the virtual asset industry. The limiting factors and countermeasures currently possessed by the virtual asset industry were considered in terms of legal and institutional aspects, technical aspects, and market aspects.Small businesses classified as virtual asset operators have difficulty meeting the government's requirements.Accordingly, SMEs with insufficient funds and manpower are withdrawn from the market, creating an environment where only large-scale enterprises with capital power survive.It is difficult to develop desirable technologies and markets in the virtual asset technology industry. In addition, small and medium-sized companies may be expelled from the market, causing damage to current users. Therefore, in terms of legal and institutional aspects, there is a lack of an exact scope of virtual asset providers, and thus it is necessary to respond to the controversial elements of virtual asset providers. In terms of technology, it is necessary to cope with the slowdown of the P2P method, the difficulty in recovering errors, and the absence of operational experts. Therefore, technology standardization and stabilization are required, and efforts must be made to cultivate operational technical personnel who can support them.In terms of the market, it is necessary to prepare measures to protect users of virtual assets and to establish countermeasures for companies operating virtual assets against weak user protection, inadequate application of the AML method, and limitations of taxation. This study is expected to contribute to active utilization support or related policies in the virtual asset industry.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

A research framework for development of a LCCA based tunnel asset management system (LCCA기반 터널 자산관리 시스템 개발을 위한 연구개발 프레임웍 설계)

  • Lee, Seung Soo;Kim, Kwang Yeom;Kim, Dong-Gyou;Shin, Hyu-Soung;Seo, Jong Won
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.16 no.6
    • /
    • pp.615-625
    • /
    • 2014
  • As many parts of Korea are mountainous, many tunnels have been constructed to be in step with rapid economic development since 1970's. However, the interest on maintenance of tunnels is far less than the awareness of need for tunnels. As the tunnel maintenance system is the responsive maintenance system which responds to the problems found during the inspection, it will be very difficult to respond to each problem with the limited budget and manpower of the government agencies when the number of aged tunnels rapidly increase in the future. As such, this study presents the need for the LCCA (Life Cycle Cost Analysis) based tunnel asset management system to transform the tunnel maintenance to a preventive management system in a strategic and long-term viewpoint and proposes the framework for development direction. It observed the asset management implementation cases of social infrastructure in other countries and analyzed the need for asset management technique to manage the tunnels in Korea. Moreover, it applied the LCCA model, which is the economic and engineering quantitative decision making technique, for tunnel asset management to present the concrete direction for development of an asset management model and designed the R&D framework to systemize it.

Design of Product-Line Architecture based-on Common Architecture (공통 아키텍처 기반 제품계열 아키텍처 설계)

  • Oh, Young-Bae;Shin, Sung-Oog;Kim, Young-Gab;Baik, Doo-Kwon
    • Journal of Information Technology Services
    • /
    • v.5 no.2
    • /
    • pp.155-168
    • /
    • 2006
  • Software product line is a software product or a set of software system, which has common functions. We can develop a specific software product, which satisfies requirements of a particular market segment and a mission in a specific domain by reusing the core asset such as the developed software architecture through the software product line. Software development methodology based on the software product line can develop a software more easily and fast by reusing the developed software core asset. Developed countries of software technology select software product line as a core field of software production technology, and support technology development. In case of USA, CMU/SEI(Carnegie Mellon University/Software Engineering Institute) developed product-line framework 4.0 together with the industry and the Department of Defense. Europe is supporting the development of product line technology through ITEA(IT for European Advancement) program. However, industries in our country understand the necessity of software production technology based on product line concept for the purpose of increasing productivity, it is not sufficient to invest for this technology development. In this paper, we aim to construct the common architecture of software product line for production of the software product line.

Asset Selling Problem With Beta Distributed Price Offers (재산매도 결졍문제 : 호가가 배타 분포를 따를 때)

  • Chae, Kung C.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.14 no.1
    • /
    • pp.59-71
    • /
    • 1989
  • This practical paper puts existing optimal stopping rules for various asset selling situations into a coherent perspective, using simple non-measure theoretical terms. It also provides analytical or numerical solutions when the price offers are beta distributed.

  • PDF

WIRELESS SENSOR NETWORK BASED BRIDGE MANAGEMENT SYSTEM FOR INFRASTRUCTURE ASSET MANAGEMENT

  • Jung-Yeol Kim;Myung-Jin Chae;Giu Lee;Jae-Woo Park;Moon-Young Cho
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1324-1327
    • /
    • 2009
  • Social infrastructure is the basis of public welfare and should be recognized and managed as important assets. Bridge is one of the most important infrastructures to be managed systematically because the impact of the failure is critical. It is essential to monitor the performance of bridges in order to manage them as an asset. But current analytical methods such as predictive modeling and structural analysis are very complicated and difficult to use in practice. To apply these methods, structural and material condition data collection should be performed in each element of bridge. But it is difficult to collect these detailed data in large numbers and various kinds of bridges. Therefore, it is necessary to collect data of major measurement items and predict the life of bridges roughly with advanced information technologies. When certain measurement items reach predefined limits in the monitoring bridges, precise performance measurement will be done by detailed site measurement. This paper describes the selection of major measurement items that can represent the tendency of bridge life and introduces automated bridge data collection test-bed using wireless sensor network technology. The following will be major parts of this paper: 1) Examining the features of conventional bridge management system and data collection method 2) Mileage concept as a bridge life indicator and measuring method of the indicator 3) Test-bed of automated and real-time based bridge life indicator monitoring system using wireless sensor network

  • PDF

TWO APPROACHES FOR STOCHASTIC INTEREST RATE OPTION MODEL

  • Hyun, Jung-Soon;Kim, Young-Hee
    • Journal of the Korean Mathematical Society
    • /
    • v.43 no.4
    • /
    • pp.845-858
    • /
    • 2006
  • We present two approaches of the stochastic interest rate European option pricing model. One is a bond numeraire approach which is applicable to a nonzero value asset. In this approach, we assume log-normality of returns of the asset normalized by a bond whose maturity is the same as the expiration date of an option instead that of an asset itself. Another one is the expectation hypothesis approach for value zero asset which has futures-style margining. Bond numeraire approach allows us to calculate volatilities implied in options even though stochastic interest rate is considered.

Design and Prototype Implementation of Museum Asset Management System Using Mobile RFID Devices (모바일 RFID 장치를 이용한 박물관 관리 시스템 설계 및 구현)

  • Kim, Young-Il;Cheong, Tae-Su
    • Proceedings of the CALSEC Conference
    • /
    • 2005.11a
    • /
    • pp.78-84
    • /
    • 2005
  • As the research activities related to 'Ubiquitous Computing' whose concept was introduced by Mark Weiser are growing, RFID(Radio Frequency Identification) technology has recently gained attention as a technology to advance the ubiquitous computing and a lot of related researches are also in progress. Research works done so far are mainly linked to the situation that the research outputs apply to meet the requirements for asset tracking and data sharing with partners over supply chain by using fixed RFID readers. However, it is essential that users have access to real-time information about the tagged objects and services whenever and wherever they want in the era of ubiquitous computing, so mobile devices-including PDA, smart phone, cellular phone, etc - which are equipped with an RFID reader can be regarded as an essential terminal for users living in ubiquitous computing environment. As far as the application with mobile devices are concerned, there are many considerations due to their limited capabilities of data processing, battery consumption and so on. In this paper, we review the generic RFID network model and introduce the revised RFID network model in consideration of incorporation with mobile devices equipped with an RFID reader. Also, we derive the requirements for software embedded within an RFID- enabled mobile terminal and then discuss essential components for implementation. Moreover, we develop the applications for asset management at museum by using mobile RFID network model.

  • PDF

The proposal for improvement of cultural heritage industry (문화유산산업의 발전에 대한 제언)

  • Kim, Sea Woo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.99-104
    • /
    • 2018
  • This research focus on suggesting productive proposal for Culture heritage industry improvement plan. we survey various other countries' policy for culture heritage industry development. It is important to collect ideas from other countries' cases then expand and adapt to our country's industry. Detailed proposal for Cultural heritage is suggested, Such as, young Cultural helper to increase the cultural activity participation. Three factors are stated, first cultural man power creation, digitalizing cultural asset data, and cultural asset story making.