슬라이드 1
|
|
- 소미 복
- 6 years ago
- Views:
Transcription
1 PENTASEC 2011 Penta Security Systems, Inc. October, 2011 김덕수,
2 Penta Security Systems - Products No. 1 Web Application Firewall Vendor in Korea (WAPPLES) No. 1 Database Encryption Solution Vendor in Korea (D Amo) Intelligent Web Application Firewall, WAPPLES Leading WAF product in Korea with 50%+ market share. Unique Logic Based Detection Engine Near 0 false positive detection and immunity to unknown attacks Security Compatibility Certification from National Intelligence Service Integrated DB Security, D Amo No.1 Database Encryption Software in Korea since 2004 with 650 customers of all sectors. Runs on Oracle(Enterprise/Standard), MS SQL Server, DB2, ALTIBASE, Tibero and MySQL Supports various security configurations through D Amo SG and D Amo SCP Realization of strong comprehensive DB Security PKI Security Solution, ISSAC The First PKI applied International standard technology in Korea. User authentication is provided through NPKI and GPKI systems Supports web session encryption and user authentication PKI Development Toolkit, SCP Cryptographic Module, CIS Cryptographic function and security service development tool. Supports embedded environment Be able to support from PC to 통합 Mainframe 애플리케이션보안솔루션로드맵 SSO & EAM Solution, ISign The First SSO solution in Korea. Single Sign On (SSO)solution for enterprise security since 2001 Extranet Access Management based on RBAC (Role Based Access Control)
3 Penta Security Systems - Products User Web Server DB Web Application Security Web-based Security Application Development Toolkit Data Encryption Transaction Protection Entity Authentication Single Sign On Web Application Security Web Application Firewall Prevent Web Attacks Privacy Protection DBMS Security Integrated DBMS Encryption Solution Data Encryption Access Control & Audit
4 IT System Architecture A P P L I C A T I O N S S Y S T E M S N E T W O R K S
5 Technologies in each layer E M A I L A P P L I C A T I O N S W E B - B A S E D A P P L I C A T I O N S H O S T - B A S E D A P P L I C A T I O N S C L I E N T S E R V E R A P P L I C A T I O N S N E T W O R K M A N A G E M E N T A P P L I C A T I O N S S E C U R I T Y A P P L I C A T I O N S A P P L I C A T I O N S E R V E R S O P E R A T I N G S Y S T E M S E R V E R S F I L E S E R V E R S W E B S E R V E R S N E T W O R K O P E R A T I N G SY S T E M S M I D D L E W A R E SY S T E M S A T M W A N R O U T E R S S W I T C H E S H U B S
6 Technologies in each layer E M A I L A P P L I C A T I O N S W E B - B A S E D A P P L I C A T I O N S H O S T - B A S E D A P P L I C A T I O N S C L I E N T S E R V E R A P P L I C A T I O N S N E T W O R K M A N A G E M E N T A P P L I C A T I O N S S E C U R I T Y A P P L I C A T I O N S A P P L I C A T I O N S E R V E R S O P E R A T I N G S Y S T E M S E R V E R S F I L E S E R V E R S W E B S E R V E R S N E T W O R K O P E R A T I N G SY S T E M S M I D D L E W A R E SY S T E M S A T M W A N R O U T E R S S W I T C H E S H U B S Business Application OS, DBMS L2, L3, L4 Switches
7 Secure IT System! A P P L I C A T I O N S S Y S T E M S N E T W O R K S Security Security Security
8 Application Security A P P L I C A T I O N S S Y S T E M S N E T W O R K S ISSAC = Integrated Security System based on Advanced Cryptography Security 는통합 (Integration) 을피할수없다! Integration 은 Security 의운명!
9 Application Security A P P L I C A T I O N S S Y S T E M S DBMS N E T W O R K S Security 는통합 (Integration) 을피할수없다! Integration 은 Security 의운명!
10 Application Security A P P L I C A T I O N S S Y S T E M S N E T W O R K S Network Connected to Web Servers Security 는통합 (Integration) 을피할수없다! Integration 은 Security 의운명!
11 Security Trio A P P L I C A T I O N S S Y S T E M S N E T W O R K S
12 DB 암호화방식 DB 암호화는크게 API, Plug-In, In-Place 세가지방식으로분류됩니다. API Plug-In In-Place Application 에서데이터암복호화수행 적용가능 DB 제한없음 암호화대상데이터와관렦된쿼리모두수정필요 접근제어, 감사기능부재 Application DBMS 에 Plug-In 형식으로암복호화모듈설치 Application 으로부터독립되어쿼리수정최소화 암호화컬럼에대한인덱스지원 암호화, 접근제어, 감사통합보안기능제공 DB 엔짂안에암복호화기능포함 이경우, 접근제어, 감사 기능을지원하기위해서는 별도패키지사용필요 OS 의디스크드라이버수준에서암호화하는제품도있음 보안통합관리의어려움및직관성이떨어짐 Database Database Encryption Agent Select Insert Database Engine Encryption Engine API Plug-In In-Place 완벽한데이터보호를위해서는암호화뿐만이아닌접귺제어, 감사를통한보안통합관리가필요
13 성능관점에서 DB 암호화 3 요소 설치정상운영성공적인구축 실시간처리 OLTP 초기암호화 배치 DW OLAP
14 DB 암호화 - API 방식 일종의암호모듈을제공하는방식 Application DBMS 암복호화 API 키관리 API 키관리 API 키관리서버 키관리구현 Application 과의 Integration 구현 Legacy 의경우, 초기암호화는누가?
15 DB 암호화 - Plug-In 방식 Application 을수정하지않는방식 Application DBMS 암복호화 API Interface Objects 키관리 API 키관리서버 패키지설치 운영방식컨설팅 초기데이터암호화지원
16 DB 암호화 - Plug-In 방식 Application 수정을하지않는가? Application DBMS 개발자 Code Queries 암복호화 API Interface Objects 키관리 API 키관리서버 Query 도 Application 의일부라고생각함 Limitation 이미 Full-scan 하는 Queries Interface Objects 의 Limitation
17 요즘의 DB 암호화제품 통합형으로제공 Application DBMS API 방식 암복호화 API 키관리 API DBMS용API 암복호화API Interface Objects 키관리API Plug-in 방식 키관리서버 고객의시스템홖경에맞는적용필요
18 D Amo Product Line-up API Plug-In In-Place Application Database Select Database Database Engine Encryption Agent Insert Encryption Engine API Plug-In In-Place 완벽한데이터보호를위해서는암호화뿐만이아닌접귺제어, 감사를통한보안통합관리가필요
19 D Amo Analyzer Searching for columns storing privacy information Searching for important encryption target column, ex. credit card number, social identification number, etc Searching for DB Objects involved in the query optimization after encryption Analyzing traffic characteristics on queries accessing encryption columns
20 D Amo Analyzer Analysis report on encryption before/after Performance expectation report Recommending optimized queries related to encryption columns
21 Application Security Application Security Is A Totally Different World Network Security Part of IT Networking Experts Product Focused 1000 s of Copies Signature Based Patch Management Application Security Part of Business Units Software Experts Custom Code Focused 1 Copy of Software No Signatures Prevent infinite variant attacks and unknown attacks Don t let anyone rely on network security techniques to gain application security
22 Traditional Network Firewalls, IDS/IPS, and Anti-Virus systems do NOT protect the Layer-7 Applications (OSI Network). Gartner
23 70% of ALL threats are at the Web application layer Gartner
24 93% of oganizations hacked in the past two years through In secure Web Applications Gartner
25 88% of companies spend more on coffee than Web app security Ponemom Institute
26 Why Web Application Firewall Web Application Security thought Solid but Vulnerable Hackers steal e-commerce customer credit card numbers Hackers breached company s network even though patches were up-to-date and defenses in place Patches were up-to-date and defenses were in place A coordinated and sophisticated group of hackers broke in and stole customer s credit card information.
27 Web Application Attack SQL Injection 웹페이지의로그인창에특정명령어를넣어 가입자들이입력한이름, 주민등록번호등을빼내는방법 초보적인방법으로평가된다 보안을염두에두고사이트를설계해야한다 출처 :
28 Web Application Attack
29 Conventional Approach Key : Positive Security Model 을구현하여 Application-layer Attack 을막는다! 기본아이디어 : 알려지지않은공격을막기위하여공격이아니라고정의된 Application 접속만을통과시키고그이외의접속은차단한다. White List Access Control 을구현하여 Positive Security Model 구현 Conventional Web Application Firewall (WAF) White & Black List Layered Architecture Black List Access Control 과 White List Access Control 를결합한형태로구현 Black List Access Control 은기존의알려짂공격방어를위한 Signature 홗용 White List Access Control 은싞뢰할수있는 Web Application 을등록하여 Positive Security 구현하기위해사용 Conventional WAF Architecture Positive Security Protection from unknown threats and vulnerabilities Negative Security Protection from known threats and vulnerabilities Signatures White List Access Control Black List Access Control Web Application Firewall Engine Pattern Matching Engine Pattern DB
30 White List & Black List Access Control White List Access Control 의특징 접속유형이등록된정보 (White List) 에포함되어있으면서비스를허용되고, 그이외의유형인경우에는모두차단하는방식 Web Application 에대한정확한 White List 가아닌경우, 웹서비스가차단될수있음 Web Application 변경에맞추어정확한 White List 가수집되도록관리되어야함 Web Application 을정확하고싞속하게반영하여 White List 를만들어내는것이관건 Black List Access Control 의특징 접속유형이등록된정보 (Black List) 에포함되어있으면공격으로판단하고차단하는방식 Black List Access Control 을구현하는대표적인방법은 Pattern Matching Engine 을이용하여 Pattern DB 에등록된 Pattern 들을검사하는방식 공격에대한 Black List 는 Pattern 형태로작성되며, 공격탐지를위한패턴을 Signature 라고부름 Pattern 은공격을정확하게탐지하도록정교하게작성하여등록하여야함 Pattern 은아래와같은 String 형식으로작성되어공격이아닌것에대해서도공격으로오탐하는경우가많음 Pattern 의 Regular Expression 의예 ) "[^\d]531\d[-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}
31 The 1 st Generation WAF WAF 의정확한탐지능력은관리자의능력에의해좌우 White List를위한정보를관리자가직접등록하여 Access Control 수행 계속변경되는 Web Application의특성상관리자의운영부담이가중 실질적으로 White List Access Control을사용하지못하고운영되는 WAF이많음 Black List 를위한패턴이 False Positive 를발생시키지않도록고도의최적화된패턴등록및관리필 요 관리자가직접패턴최적화를위한작업수행 숙력된기술자만이 WAF 운영가능 추가적인운영비용을투자하여젂문화된패턴정보를구매하여사용하기도함 1) Signature 에대한최적화및관리에대한컨설팅서비스가입 2) 제조사가제공한 Update Sever 에연결하여사용하기도함 운영비용증가 일반적인 Pattern Matching Engine 의경우 Pattern 의수가 3000~5000 개이상이되면성능에부하발생 1 st Generation Web Application Firewall White List Access Control Matching Engine Application List Learning Register App. Info. Black List Access Control Pattern Matching Engine Pattern DB Updating Signatures Register patterns Admin
32 The 2 nd Generation WAF White List 생성을위한자동화된모듈채용 White List 관리에대한관리자부담을줄이기위하여자동화모듈보강 Auto-Learning 이아닌 Auto-Mining 개념이기때문에실제적으로관리자의개입을통하여 White List 확정 White List의성격상자동생성될경우, 서비스운영에문제가발생할수있기때문 Daily Updated Web Application 의경우, Auto-Mining 데이터가정확하지않음 Application 변경사항을즉각적으로반영하지못하는경우발생 사용가능한 White List 생성을위해최소 2 주이상의 Auto-Mining 필요 Auto-Mining 된 White List 에대한관리자의수정작업필요 Black List 관리에대한기능은 1st Generation WAF 과큰차이가없음 1 st Generation WAF 의한계점을극복하지못함 2 nd Generation Web Application Firewall White List Access Control Mining App. Info. Automation Matching Engine Application List Learning Confirmation Black List Access Control Pattern Matching Engine Pattern DB Updating Signatures Register patterns Admin
33 WAPPLES Detection Rules WAPPLES COCEP Engine is composed of 26 detection rules and 1 function. Each rule analyzes and responds against various types of attacks. WAPPLES rules provide easy security policy set-up by just selecting detection level and countermeasure option. 1 Buffer Overflow 10 Invalid HTTP 19 Response Header Filtering 2 Cookie Poisoning 11 Invalid URI 20 SQL Injection 3 Cross Site Script 12 IP Filtering 21 Stealth Commanding 4 Directory Listing 13 Parameter Tampering 22 Suspicious Access 5 Error Handling 14 Privacy File Filtering 23 Unicode Directory Traversal 6 Extension Filtering 15 Privacy Input Filtering 24 URI Access Control 7 File Upload 16 Privacy Output Filtering 25 User Defined 8 Include Injection 17 Request Header Filtering 26 Web Site Defacement 9 Input Contents Filtering 18 Request Method Filtering 27 IP Block IP Block is the function that blocks IP connection by the condition user sets. For example, if a certain attack is detected for a given period, IP Block will be triggered for the source IP address.
34 Detection Engine s 3 mechanisms WAPPLES Detection Engine is using 3 evaluation mechanisms. Logical analytic engine means a detection engine to carry out an application layer interpretation and verification based on below 3 mechanisms. Evaluation based on Heuristic analysis Evaluation based on Semantic analysis Evaluation based on Pattern Matching WAPPLES 26 detection rules and 1 function(ip Block) can be classified as following. Evaluation based on Heuristic Analysis Evaluation based on Semantic Analysis Evaluation based on Pattern Matching Cross Site Scripting Include Injection Buffer Overflow Directory Listing Cookie Poisoning Invalid HTTP Error Handling IP Block Invalid URI Extension Filtering Parameter Tampering Parameter Tampering File Upload Suspicious Access Privacy File Filtering Input Content Filtering URI Access Control Privacy Input Filtering IP Filtering Privacy Output Filtering Request Header Filtering SQL Injection Stealth Commanding Request Method Filtering Response Header Filtering User Defined Pattern Web Site Defacement Unicode Directory Traversal
35 Rule Example : SQL Injection Example of how WAPPLES s SQL-parser works Assuming that SQL Injection String is (name= penta or name= security ) and keyword= pentasec WAPPLES s SQL-parser processes it as below to decide whether the string has an intention of attack or not. Parse() Expression() queryterm() and Emit Intersect ( Expression() ) Emit ( Emit ) queryterm() or queryterm() keyword = pentasec Emit equal condition SQL queryterm() If all the final results of each end-node are part of SQL command, then WAPPLES SQLparser recognizes the original string as a SQL command. Emit Union name = Penta name = securit y Emit equal condition SQL Emit equal condition SQL
36 Example of False-Positive and Misdetection (1/4) Misdetection Example of Signature based Engine In the case that WAF has below signatures, Example of SQL Injection Signature - Below part means substring-searching target. rgxp means a regular expression. - After finding a string of part, rgxp is applied. Signature part="or 'a' = 'a" Signature Name SQL Injection WHERE Statement Manipulation part="or 'a'= 'a" SQL Injection WHERE Statement Manipulation 1 part="or 'a'= 'a" SQL Injection WHERE Statement Manipulation 2 part="or 'a'='a" SQL Injection WHERE Statement Manipulation 3 part="or 'a' ='a" SQL Injection WHERE Statement Manipulation 4 part="or 'a'='a" SQL Injection WHERE Statement Manipulation 5 part="or 'a' ='a" SQL Injection WHERE Statement Manipulation 6 part="or a=a" SQL Injection WHERE Statement Override part="or 1=1" SQL Injection WHERE Statement Override 1 if SQL Injection source is modified from a = a to b = b, the regular expression cannot detect the modified SQL Injection attack.
37 Example of False-Positive and Misdetection (2/4) False-positive Example of Signature based Engine In the case that WAF has below signatures, Example of SQL Injection Signature Signature part="waitfor", rgxp="[^a-za-z]waitfor\s*delay" Signature Name SQL Injection - Waitfor part="having", rgxp="[^a-za-z]having[^\&]{0,20}=[^\&]{0,20}" SQL Injection - "having" statement injection attampt part="opendatasource", rgxp="select.*from.*opendatasource" SQL Injection - opendatasource if HTTP message includes string having a good time == like below, signature based WAF makes a false positive.
38 Example of False-Positive and Misdetection (3/4) Signature Sample related to Privacy(Credit Card Number) Filtering Ex) For a credit card number : Detected in spite of invalid card number False-Positive : Detected in spite of not credit card number False-Positive 4254_3614_8011_0015 : Credit card number, but not in pattern Misdetection Limitation Although Credit Card Number is invalid or even not Credit Card Number, the regular expression filters it. If Credit Card Number s format is changed, it can not detect at all. Signature Signature Name part="349", rgxp="[^\d]349\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction American [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{3}[^\d]{1}" Express part="422", rgxp="[^\d]422\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction Visa [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}" part="423", rgxp="[^\d]423\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction Visa [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}" part="424", rgxp="[^\d]424\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction Visa [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}" part="425", rgxp="[^\d]425\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction Visa [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{4}[^\d]{1}" part="299", rgxp="[^\d]299\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction Diner's Cl [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{2}[^\d]{1}" ub / Carte Blanche part="300", rgxp="[^\d]300\d[-\.\s\\\/=]?\d{4} Data Leakage: credit card number extraction Diner's Cl [-\.\s\\\/=]?\d{4}[-\.\s\\\/=]?\d{2}[^\d]{1}" ub / Carte Blanche
39 Example of False-Positive and Misdetection (4/4) Signature Sample of Buffer Overflow Attack Attempt If the Buffer Overflow Attack is modified like abcdabcd abcd, the regular expression cannot detect it. Signature is made to cope with some scanners and robots. So, it leads to many misdetection. Limitation It is very difficult to express an infinite number of cases as one pattern. To add many single patterns gives additional system load to web application firewall. Signature Signature Name part="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa Buffer Overflow Attack Attempt aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaa" part="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA Buffer Overflow Attack Attempt 1 AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAA" part="bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB Buffer Overflow Attack Attempt 2 BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB" part="cccccccccccccccccccccccccccccccccccccccccc CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Buffer Overflow Attack Attempt 3 CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCC" part="ddddddddddddddddddddddddddddddddddddd DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD Buffer Overflow Attack Attempt 4 DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" part="eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE Buffer Overflow Attack Attempt 5 EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE EEEEEEEEEEEEEEEEEEEEEEEEE"
40 Detection Engine s Advantages Advantages of evaluation mechanisms Heuristic Analysis enables proactive detection ability of unknown attacks by using multicriteria analysis and testing and verification processes. By adopting Heuristic Analysis WAPPLES minimizes false negatives. Semantic Analysis enables detection of modified attacks with a low possibility of false positives by using application layer parsers to verify protocol and syntax. WAPPLES Advantages Higher Security Extremely low possibility of false positive Accurate detection against modified attacks. Higher Performance No additional system load such as inputting new patterns. Generally, more than five thousand (5K) patterns lead to low system performance. No difference in performance in test and production environments. Ease of Use and Less Maintenance Extremely low management support by administrator and low operation cost Does not need signature update service
41 Cloud Computing Definition Cloud computing is Web-based processing, whereby shared resources, software, and information are provided to computers and other devices (such as smartphones) on demand over the Internet. (Wikipedia) 이기종단말 다양한서비스 표준화된통싞프로토콜 HTTP 단말에독립적인인터페이스 웹브라우저
42 Cloud Computing Cloud Computing Security Is A No. 1 Issue Cloud computing issues : Security There are lots of issues related to newly-rising cloud computing; Performance, Availability, Integration, and etc. Despite existence of many issues, security sector is the most high-lighted one. The challenges/issues ascribed to the cloud /ondemand model Security Performance 63.1% 74.6% Source: IDC Enterprise Panel, August 2008 Availability 63.1% Hard to integrate with in-house IT 61.1% Not enough ability to customize 55.8% 40% 50% 60% 70% 80%
43 Virtual WAPPLES Must-have for Trend Cloud Computing Security Web-based cloud computing All businesses(services) based on cloud computing are provided via web: whether it is form of IaaS, PaaS, SaaS Service that satisfies Essential characteristics of Cloud Computing is web(visual Model of NIST Working Definition) Web is the most appropriate and optimized interface to provide cloud computing service It s Web! Cloud Computing Security is Web Application Security Since cloud computing is web-based, its security issues share lots of commons with web application security.
44 WAPPLES for Cloud
45 WAPPLES for Cloud
46 WAPPLES for Cloud
47 Penta Security Systems - Products User Web Server DB Web Application Security Web-based Security Application Development Toolkit Data Encryption Transaction Protection Entity Authentication Single Sign On Web Application Security Web Application Firewall Prevent Web Attacks Privacy Protection DBMS Security Integrated DBMS Encryption Solution Data Encryption Access Control & Audit
48 Penta Security Systems - Products User Web Server DB Web Application Security Web-based Security Application Development Toolkit Data Encryption Transaction Protection Entity Authentication Single Sign On Web Application Security Web Application Firewall Security-as-a-Service Prevent Web Attacks Privacy Protection Cloud DBMS Security Integrated DBMS Encryption Solution Data Encryption Access Control & Audit
49 Thank you Korea(Headquarter) 20Fl. Hanjin Shipping Bldg., Yoido-Dong, Youngdeungpo-Gu, Seoul, Korea Tel: Fax: Japan(Branch) Ascend Akasaka Bldg., 3F Akasaka, Minato-ku, Tokyo Japan Tel: Fax: Copyright PentaSecurity Systems, Inc. All rights reserved
PowerPoint 프레젠테이션
공공기관 개인정보보호를 위한 DB 암호화 구축 전략 김 덕 수, dskim@pentasecurity.com 펜타시큐리티시스템 May, 2012 펜타시큐리티시스템 애플리케이션 보안 전문 기업 Security Trinity Package WAPPLES 웹 공격 방어를 위한 최고의 솔루션 웹방화벽 시장 점유율 1위 D Amo 데이터베이스 암호화 솔루션 시장 점유율
More informationIntra_DW_Ch4.PDF
The Intranet Data Warehouse Richard Tanler Ch4 : Online Analytic Processing: From Data To Information 2000. 4. 14 All rights reserved OLAP OLAP OLAP OLAP OLAP OLAP is a label, rather than a technology
More informationPortal_9iAS.ppt [읽기 전용]
Application Server iplatform Oracle9 A P P L I C A T I O N S E R V E R i Oracle9i Application Server e-business Portal Client Database Server e-business Portals B2C, B2B, B2E, WebsiteX B2Me GUI ID B2C
More informationDW 개요.PDF
Data Warehouse Hammersoftkorea BI Group / DW / 1960 1970 1980 1990 2000 Automating Informating Source : Kelly, The Data Warehousing : The Route to Mass Customization, 1996. -,, Data .,.., /. ...,.,,,.
More informationPowerPoint 프레젠테이션
Reasons for Poor Performance Programs 60% Design 20% System 2.5% Database 17.5% Source: ORACLE Performance Tuning 1 SMS TOOL DBA Monitoring TOOL Administration TOOL Performance Insight Backup SQL TUNING
More informationecorp-프로젝트제안서작성실무(양식3)
(BSC: Balanced ScoreCard) ( ) (Value Chain) (Firm Infrastructure) (Support Activities) (Human Resource Management) (Technology Development) (Primary Activities) (Procurement) (Inbound (Outbound (Marketing
More information<353020B9DAC3E1BDC42DC5ACB6F3BFECB5E520C4C4C7BBC6C3BFA1BCADC0C720BAB8BEC820B0EDB7C1BBE7C7D7BFA120B0FCC7D120BFACB1B82E687770>
한국산학기술학회논문지 Vol. 12, No. 3 pp. 1408-1416, 2011 클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구 박춘식 1* 1 서울여자대학교 정보보호학과 Study on Security Considerations in the Cloud Computing Choon-Sik Park 1* 1 Department of Information Security,
More informationOracle Apps Day_SEM
Senior Consultant Application Sales Consulting Oracle Korea - 1. S = (P + R) x E S= P= R= E= Source : Strategy Execution, By Daniel M. Beall 2001 1. Strategy Formulation Sound Flawed Missed Opportunity
More informationETL_project_best_practice1.ppt
ETL ETL Data,., Data Warehouse DataData Warehouse ETL tool/system: ETL, ETL Process Data Warehouse Platform Database, Access Method Data Source Data Operational Data Near Real-Time Data Modeling Refresh/Replication
More informationService-Oriented Architecture Copyright Tmax Soft 2005
Service-Oriented Architecture Copyright Tmax Soft 2005 Service-Oriented Architecture Copyright Tmax Soft 2005 Monolithic Architecture Reusable Services New Service Service Consumer Wrapped Service Composite
More informationFMX M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2
FMX FMX 20062 () wwwexellencom sales@exellencom () 1 FMX 1 11 5M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2 FMX FMX D E (one
More informationORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O
Orange for ORACLE V4.0 Installation Guide ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE...1 1....2 1.1...2 1.2...2 1.2.1...2 1.2.2 (Online Upgrade)...11 1.3 ORANGE CONFIGURATION ADMIN...12 1.3.1 Orange Configuration
More informationDIY 챗봇 - LangCon
without Chatbot Builder & Deep Learning bage79@gmail.com Chatbot Builder (=Dialogue Manager),. We need different chatbot builders for various chatbot services. Chatbot builders can t call some external
More information<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>
327 Journal of The Korea Institute of Information Security & Cryptology ISSN 1598-3986(Print) VOL.24, NO.2, Apr. 2014 ISSN 2288-2715(Online) http://dx.doi.org/10.13089/jkiisc.2014.24.2.327 개인정보 DB 암호화
More information0125_ 워크샵 발표자료_완성.key
WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a web server, which either is part of an Internet hosting service or is a network host
More informationPowerPoint 프레젠테이션
CRM Fair 2004 Spring Copyright 2004 DaumSoft All rights reserved. INDEX Copyright 2004 DaumSoft All rights reserved. Copyright 2004 DaumSoft All rights reserved. Copyright 2004 DaumSoft All rights reserved.
More informationSecurity Overview
May. 14, 2004 Background Security Issue & Management Scope of Security Security Incident Security Organization Security Level Security Investment Security Roadmap Security Process Security Architecture
More information` Companies need to play various roles as the network of supply chain gradually expands. Companies are required to form a supply chain with outsourcing or partnerships since a company can not
More informationVoice Portal using Oracle 9i AS Wireless
Voice Portal Platform using Oracle9iAS Wireless 20020829 Oracle Technology Day 1 Contents Introduction Voice Portal Voice Web Voice XML Voice Portal Platform using Oracle9iAS Wireless Voice Portal Video
More information001지식백서_4도
White Paper on Knowledge Service Industry Message Message Contents Contents Contents Contents Chapter 1 Part 1. Part 2. Part 3. Chapter
More information±èÇö¿í Ãâ·Â
Smartphone Technical Trends and Security Technologies The smartphone market is increasing very rapidly due to the customer needs and industry trends with wireless carriers, device manufacturers, OS venders,
More informationDomino Designer Portal Development tools Rational Application Developer WebSphere Portlet Factory Workplace Designer Workplace Forms Designer
Domino, Portal & Workplace WPLC FTSS Domino Designer Portal Development tools Rational Application Developer WebSphere Portlet Factory Workplace Designer Workplace Forms Designer ? Lotus Notes Clients
More information歯CRM개괄_허순영.PDF
CRM 2000. 8. KAIST CRM CRM CRM CRM :,, KAIST : 50%-60%, 20% 60%-80%. AMR Research 10.. CRM. 5. Harvard Business review 60%, 13%. Michaelson & Associates KAIST CRM? ( ),,, -,,, CRM needs,,, dynamically
More information歯I-3_무선통신기반차세대망-조동호.PDF
KAIST 00-03-03 / #1 1. NGN 2. NGN 3. NGN 4. 5. 00-03-03 / #2 1. NGN 00-03-03 / #3 1.1 NGN, packet,, IP 00-03-03 / #4 Now: separate networks for separate services Low transmission delay Consistent availability
More information06_ÀÌÀçÈÆ¿Ü0926
182 183 184 / 1) IT 2) 3) IT Video Cassette Recorder VCR Personal Video Recorder PVR VCR 4) 185 5) 6) 7) Cloud Computing 8) 186 VCR P P Torrent 9) avi wmv 10) VCR 187 VCR 11) 12) VCR 13) 14) 188 VTR %
More informationWeb Application Hosting in the AWS Cloud Contents 개요 가용성과 확장성이 높은 웹 호스팅은 복잡하고 비용이 많이 드는 사업이 될 수 있습니다. 전통적인 웹 확장 아키텍처는 높은 수준의 안정성을 보장하기 위해 복잡한 솔루션으로 구현
02 Web Application Hosting in the AWS Cloud www.wisen.co.kr Wisely Combine the Network platforms Web Application Hosting in the AWS Cloud Contents 개요 가용성과 확장성이 높은 웹 호스팅은 복잡하고 비용이 많이 드는 사업이 될 수 있습니다. 전통적인
More information미래 서비스를 위한 스마트 클라우드 모델 수동적으로 웹에 접속을 해야만 요구에 맞는 서비스를 받을 수 있었다. 수동적인 아닌 사용자의 상황에 필요한 정보를 지능적으로 파악 하여 그에 맞는 적합한 서비스 를 제공할 수 새로운 연구 개발이 요구 되고 있다. 이를 위하여,
BIZ STORY HOT TREND 2 미래 서비스를 위한 스마트 클라우드 모델 윤용익 숙명여자대학교 정보과학부 교수 HOT TREND 2 1. 서론 클라우드 컴퓨팅은 인터넷이 접속 가능한 공간이면 언제 어디서나 사용자에게 컴퓨팅 자원을 이용할 수 있 게 해주는 기술로써 클라우드 컴퓨팅 시대의 개막은 기 존의 하드웨어 또는 소프트웨어 중심에서 서비스 중심 의
More information04-다시_고속철도61~80p
Approach for Value Improvement to Increase High-speed Railway Speed An effective way to develop a highly competitive system is to create a new market place that can create new values. Creating tools and
More information김기남_ATDC2016_160620_[키노트].key
metatron Enterprise Big Data SKT Metatron/Big Data Big Data Big Data... metatron Ready to Enterprise Big Data Big Data Big Data Big Data?? Data Raw. CRM SCM MES TCO Data & Store & Processing Computational
More information슬라이드 1
[ CRM Fair 2004 ] CRM 1. CRM Trend 2. Customer Single View 3. Marketing Automation 4. ROI Management 5. Conclusion 1. CRM Trend 1. CRM Trend Operational CRM Analytical CRM Sales Mgt. &Prcs. Legacy System
More informationOutput file
240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 An Application for Calculation and Visualization of Narrative Relevance of Films Using Keyword Tags Choi Jin-Won (KAIST) Film making
More informationChap7.PDF
Chapter 7 The SUN Intranet Data Warehouse: Architecture and Tools All rights reserved 1 Intranet Data Warehouse : Distributed Networking Computing Peer-to-peer Peer-to-peer:,. C/S Microsoft ActiveX DCOM(Distributed
More information제목 레이아웃
웹해킹이라고무시하는것들보소 2017.07.10 RUBIYA805[AT]GMAIL[DOT]COM SQL Injection 끝나지않은위협 2017.07.10 RUBIYA805[AT]GMAIL[DOT]COM Who am I 정도원 aka rubiya Penetration tester Web application bughuter Pwned 20+ wargame @kr_rubiya
More informationOracle9i Real Application Clusters
Senior Sales Consultant Oracle Corporation Oracle9i Real Application Clusters Agenda? ? (interconnect) (clusterware) Oracle9i Real Application Clusters computing is a breakthrough technology. The ability
More information요 약 문 1. 제목 : 개인정보 오남용 유출 2차 피해 최소화 방안 2. 연구의 배경 개인정보란 살아 있는 개인에 관한 정보로서 개인을 알아볼 수 있는 정보로 해당 정보만으로는 특정 개인을 알아볼 수 없더라도 다른 정보와 쉽게 결합하여 알아볼 수 있는 것을 포함한다.
개인정보 오남용 유출 2차 피해 최소화 방안 최종보고서 수행기관 : 숭실대학교 산학협력단 2015. 10. 요 약 문 1. 제목 : 개인정보 오남용 유출 2차 피해 최소화 방안 2. 연구의 배경 개인정보란 살아 있는 개인에 관한 정보로서 개인을 알아볼 수 있는 정보로 해당 정보만으로는 특정 개인을 알아볼 수 없더라도 다른 정보와 쉽게 결합하여 알아볼 수 있는
More informationUDP Flooding Attack 공격과 방어
황 교 국 (fullc0de@gmail.com) SK Infosec Co., Inc MSS Biz. Security Center Table of Contents 1. 소개...3 2. 공격 관련 Protocols Overview...3 2.1. UDP Protocol...3 2.2. ICMP Protocol...4 3. UDP Flood Test Environment...5
More information슬라이드 제목 없음
(Electronic Commerce/Electronic Business) ( ) ,, Bio Bio 1 2 3 Money Money ( ) ( ) 4025 39 21 25 20 13 15 13 15 17 12 11 10 1 23 1 26 ( ) 1 2 2 6 (1 3 ) 1 14:00 20:00 1 2 1 1 5-6 4 e t / Life Cycle (e-commerce)
More informationMicrosoft PowerPoint - ch03ysk2012.ppt [호환 모드]
전자회로 Ch3 iode Models and Circuits 김영석 충북대학교전자정보대학 2012.3.1 Email: kimys@cbu.ac.kr k Ch3-1 Ch3 iode Models and Circuits 3.1 Ideal iode 3.2 PN Junction as a iode 3.4 Large Signal and Small-Signal Operation
More informationInterstage5 SOAP서비스 설정 가이드
Interstage 5 Application Server ( Solaris ) SOAP Service Internet Sample Test SOAP Server Application SOAP Client Application CORBA/SOAP Server Gateway CORBA/SOAP Gateway Client INTERSTAGE SOAP Service
More information#Ȳ¿ë¼®
http://www.kbc.go.kr/ A B yk u δ = 2u k 1 = yk u = 0. 659 2nu k = 1 k k 1 n yk k Abstract Web Repertoire and Concentration Rate : Analysing Web Traffic Data Yong - Suk Hwang (Research
More information네트워크 안정성을 지켜줄 최고의 기술과 성능 TrusGuard는 국내 최초의 통합보안솔루션으로서 지난 5년간 약 4천여 고객 사이트에 구축 운영되면서 기술의 안정성과 성능면에서 철저한 시장 검증을 거쳤습니다. 또한 TrusGuard는 단독 기능 또는 복합 기능 구동 시
네트워크 보안도 안철수연구소입니다 통합 보안의 No.1 파트너, AhnLab TrusGuard 네트워크 환경을 수호하는 최고의 통합 보안 시스템 고성능 방화벽ㆍVPN Security 기술과 고품질 Integrated Security 기술의 강력한 결합 네트워크 안정성을 지켜줄 최고의 기술과 성능 TrusGuard는 국내 최초의 통합보안솔루션으로서 지난 5년간
More informationModel Investor MANDO Portal Site People Customer BIS Supplier C R M PLM ERP MES HRIS S C M KMS Web -Based
e- Business Web Site 2002. 04.26 Model Investor MANDO Portal Site People Customer BIS Supplier C R M PLM ERP MES HRIS S C M KMS Web -Based Approach High E-Business Functionality Web Web --based based KMS/BIS
More informationMS-SQL SERVER 대비 기능
Business! ORACLE MS - SQL ORACLE MS - SQL Clustering A-Z A-F G-L M-R S-Z T-Z Microsoft EE : Works for benchmarks only CREATE VIEW Customers AS SELECT * FROM Server1.TableOwner.Customers_33 UNION ALL SELECT
More information歯이시홍).PDF
cwseo@netsgo.com Si-Hong Lee duckling@sktelecom.com SK Telecom Platform - 1 - 1. Digital AMPS CDMA (IS-95 A/B) CDMA (cdma2000-1x) IMT-2000 (IS-95 C) ( ) ( ) ( ) ( ) - 2 - 2. QoS Market QoS Coverage C/D
More information<303833315FC1A4BAB8B9FDC7D02031362D325FC3D6C1BEBABB2E687770>
개인정보보호법의 보호원칙에 대한 벌칙조항 연구 A Legal Study of Punishments in Terms of Principles of Private Informaion Protection Law 전동진(Jeon, Dong-Jin)*19) 정진홍(Jeong, Jin-Hong)**20) 목 차 Ⅰ. 들어가는 말 Ⅱ. OECD 개인정보 보호원칙과의 비교
More informationISO17025.PDF
ISO/IEC 17025 1999-12-15 1 2 3 4 41 42 43 44, 45 / 46 47 48 49 / 410 411 412 413 414 5 51 52 53 54 / 55 56 57 58 / 59 / 510 A( ) ISO/IEC 17025 ISO 9001:1994 ISO 9002:1994 B( ) 1 11 /, / 12 / 1, 2, 3/ (
More informationMicrosoft PowerPoint - XP Style
Business Strategy for the Internet! David & Danny s Column 유무선 통합 포탈은 없다 David Kim, Danny Park 2002-02-28 It allows users to access personalized contents and customized digital services through different
More informationuntitled
3 IBM WebSphere User Conference ESB (e-mail : ljm@kr.ibm.com) Infrastructure Solution, IGS 2005. 9.13 ESB 를통한어플리케이션통합구축 2 IT 40%. IT,,.,, (Real Time Enterprise), End to End Access Processes bounded by
More information본문01
Ⅱ 논술 지도의 방법과 실제 2. 읽기에서 논술까지 의 개발 배경 읽기에서 논술까지 자료집 개발의 본래 목적은 초 중 고교 학교 평가에서 서술형 평가 비중이 2005 학년도 30%, 2006학년도 40%, 2007학년도 50%로 확대 되고, 2008학년도부터 대학 입시에서 논술 비중이 커지면서 논술 교육은 학교가 책임진다. 는 풍토 조성으로 공교육의 신뢰성과
More information°í¼®ÁÖ Ãâ·Â
Performance Optimization of SCTP in Wireless Internet Environments The existing works on Stream Control Transmission Protocol (SCTP) was focused on the fixed network environment. However, the number of
More information歯목차45호.PDF
CRM CRM (CRM : Customer Relationship Management ). CRM,,.,,.. IMF.,.,. (CRM: Customer Relationship Management, CRM )., CRM,.,., 57 45 (2001 )., CRM...,, CRM, CRM.. CRM 1., CRM,. CRM,.,.,. (Volume),,,,,,,,,,
More informationPowerPoint 프레젠테이션
CRM Data Quality Management 2003 2003. 11. 11 (SK ) hskim226@skcorp.com Why Quality Management? Prologue,,. Water Source Management 2 Low Quality Water 1) : High Quality Water 2) : ( ) Water Quality Management
More information00내지1번2번
www.keit.re.kr 2011. 11 Technology Level Evaluation ABSTRACT The Technology Level Evaluation assesses the current level of industrial technological development in Korea and identifies areas that are underdeveloped
More informationuntitled
PowerBuilder 連 Microsoft SQL Server database PB10.0 PB9.0 若 Microsoft SQL Server 料 database Profile MSS 料 (Microsoft SQL Server database interface) 行了 PB10.0 了 Sybase 不 Microsoft 料 了 SQL Server 料 PB10.0
More informationBackup Exec
(sjin.kim@veritas.com) www.veritas veritas.co..co.kr ? 24 X 7 X 365 Global Data Access.. 100% Storage Used Terabytes 9 8 7 6 5 4 3 2 1 0 2000 2001 2002 2003 IDC (TB) 93%. 199693,000 TB 2000831,000 TB.
More information15_3oracle
Principal Consultant Corporate Management Team ( Oracle HRMS ) Agenda 1. Oracle Overview 2. HR Transformation 3. Oracle HRMS Initiatives 4. Oracle HRMS Model 5. Oracle HRMS System 6. Business Benefit 7.
More informationPCServerMgmt7
Web Windows NT/2000 Server DP&NM Lab 1 Contents 2 Windows NT Service Provider Management Application Web UI 3 . PC,, Client/Server Network 4 (1),,, PC Mainframe PC Backbone Server TCP/IP DCS PLC Network
More informationF1-1(수정).ppt
, thcho@kisaorkr IPAK (Information Protection Assessment Kit) IAM (INFOSEC Assessment Methodology) 4 VAF (Vulnerability Assessment Framework) 5 OCTAVE (Operationally Critical Threat, Asset, and Vulnerability
More information1217 WebTrafMon II
(1/28) (2/28) (10 Mbps ) Video, Audio. (3/28) 10 ~ 15 ( : telnet, ftp ),, (4/28) UDP/TCP (5/28) centralized environment packet header information analysis network traffic data, capture presentation network
More informationPage 2 of 6 Here are the rules for conjugating Whether (or not) and If when using a Descriptive Verb. The only difference here from Action Verbs is wh
Page 1 of 6 Learn Korean Ep. 13: Whether (or not) and If Let s go over how to say Whether and If. An example in English would be I don t know whether he ll be there, or I don t know if he ll be there.
More information정보기술응용학회 발표
, hsh@bhknuackr, trademark21@koreacom 1370, +82-53-950-5440 - 476 - :,, VOC,, CBML - Abstract -,, VOC VOC VOC - 477 - - 478 - Cost- Center [2] VOC VOC, ( ) VOC - 479 - IT [7] Knowledge / Information Management
More informationDBPIA-NURIMEDIA
무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법 901 무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법 (A Effective Sinkhole Attack Detection Mechanism for LQI based Routing in WSN) 최병구 조응준 (Byung
More information歯부장
00-10-31 1 (1030) 2/26 (end-to-end) Infrastructure,, AMR. e-business e-business Domain e-business B2B Domain / R&D, B2B B2E B2C e-business IT Framework e-business Platform Clearance/Security * e-business
More informationthesis
( Design and Implementation of a Generalized Management Information Repository Service for Network and System Management ) ssp@nile nile.postech.ac..ac.kr DPE Lab. 1997 12 16 GMIRS GMIRS GMIRS prototype
More informationThe Self-Managing Database : Automatic Health Monitoring and Alerting
The Self-Managing Database : Automatic Health Monitoring and Alerting Agenda Oracle 10g Enterpirse Manager Oracle 10g 3 rd Party PL/SQL API Summary (Self-Managing Database) ? 6% 6% 12% 55% 6% Source: IOUG
More information슬라이드 1
PKI Kerberos SAML & Shibboleth OpenID Cardspace & ID 2 < > (= ) password, OTP, bio, smartcard, pki CardSpace, ID What you have.., 2 factor, strong authentication 4 (SSO) Kerberos, OpenID 5 Shared authentication
More informationSW¹é¼Ł-³¯°³Æ÷ÇÔÇ¥Áö2013
SOFTWARE ENGINEERING WHITE BOOK : KOREA 2013 SOFTWARE ENGINEERING WHITE BOOK : KOREA 2013 SOFTWARE ENGINEERING WHITE BOOK : KOREA 2013 SOFTWARE ENGINEERING WHITE BOOK : KOREA 2013 SOFTWARE ENGINEERING
More informationistay
` istay Enhanced the guest experience A Smart Hotel Solution What is istay Guest (Proof of Presence). istay Guest (Proof of Presence). QR.. No App, No Login istay. POP(Proof Of Presence) istay /.. 5% /
More information슬라이드 제목 없음
(JTC1/SC6) sjkoh@knu.ac.kr JTC1 JTC1/SC6/WG7 ECTP/RMCP/MMC (JTC1/SC6) 2/48 JTC1 ISO/IEC JTC1 Joint Technical Committee 1 ( ) ISO/TC 97 ( ) IEC/TC 83 ( ) Information Technology (IT) http://www.jtc1.org
More information강의지침서 작성 양식
정보화사회와 법 강의지침서 1. 교과목 정보 교과목명 학점 이론 시간 실습 학점(등급제, P/NP) 비고 (예:팀티칭) 국문 정보화사회와 법 영문 Information Society and Law 3 3 등급제 구분 대학 및 기관 학부(과) 전공 성명 작성 책임교수 법학전문대학원 법학과 최우용 2. 교과목 개요 구분 교과목 개요 국문 - 정보의 디지털화와 PC,
More information3. 클라우드 컴퓨팅 상호 운용성 기반의 서비스 평가 방법론 개발.hwp
보안공학연구논문지 Journal of Security Engineering Vol.11, No.4 (2014), pp.299-312 http://dx.doi.org/10.14257/jse.2014.08.03 클라우드 컴퓨팅 상호 운용성 기반의 서비스 평가 방법론 개발 이강찬 1), 이승윤 2), 양희동 3), 박철우 4) Development of Service
More information퍼스널 토이의 조형적 특성에 관한 고찰
문화상품으로서의 게임 캐릭터 개발 브랜드화 전략 연구 -용쟁화투 사례 분석- Studies of game character development and strategies of making brand name as a cultural item 이 승 환 동양대학교 Contents 논문요약 Abstract 1. 서론 1-1. 연구배경 및 목적 한 온라인 커뮤니티를
More informationsolution map_....
SOLUTION BROCHURE RELIABLE STORAGE SOLUTIONS ETERNUS FOR RELIABILITY AND AVAILABILITY PROTECT YOUR DATA AND SUPPORT BUSINESS FLEXIBILITY WITH FUJITSU STORAGE SOLUTIONS kr.fujitsu.com INDEX 1. Storage System
More informationCD-RW_Advanced.PDF
HP CD-Writer Program User Guide - - Ver. 2.0 HP CD-RW Adaptec Easy CD Creator Copier, Direct CD. HP CD-RW,. Easy CD Creator 3.5C, Direct CD 3.0., HP. HP CD-RW TEAM ( 02-3270-0803 ) < > 1. CD...3 CD...5
More information1. 회사소개 및 연혁 - 회사소개 회사소개 회사연혁 대표이사: 한종열 관계사 설립일 : 03. 11. 05 자본금 : 11.5억원 인 원 : 18명 에스오넷 미도리야전기코리 아 미도리야전기(일본) 2008 2007 Cisco Premier Partner 취득 Cisco Physical Security ATP 취득(진행) 서울시 강남구 도심방범CCTV관제센터
More informationdbms_snu.PDF
DBMS : Past, Present, and the Future hjk@oopsla.snu.ac.kr 1 Table of Contents 2 DBMS? 3 DBMS Architecture naive users naive users programmers application casual users casual users administrator database
More informationOutput file
connect educational content with entertainment content and that production of various contents inducing educational motivation is important. Key words: edutainment, virtual world, fostering simulation
More information1.장인석-ITIL 소개.ppt
HP 2005 6 IT ITIL Framework IT IT Framework Synchronized Business and IT Business Information technology Delivers: Simplicity, Agility, Value IT Complexity Cost Scale IT Technology IT Infrastructure IT
More information<332EC0E5B3B2B0E62E687770>
한국패션디자인학회지 제12권 4호 Journal of the Korean Society of Fashion Design Vol. 12 No. 4 (2012) pp.29-43 모바일 패션도구로서 어플리케이션의 활용 실태 장 남 경 한세대학교 디자인학부 섬유패션디자인전공 조교수 요 약 본 연구는 스마트폰의 패션관련 어플리케이션의 현황을 조사하고 유형과 특징을 분석하여,
More informationAPOGEE Insight_KR_Base_3P11
Technical Specification Sheet Document No. 149-332P25 September, 2010 Insight 3.11 Base Workstation 그림 1. Insight Base 메인메뉴 Insight Base Insight Insight Base, Insight Base Insight Base Insight Windows
More informationexample code are examined in this stage The low pressure pressurizer reactor trip module of the Plant Protection System was programmed as subject for
2003 Development of the Software Generation Method using Model Driven Software Engineering Tool,,,,, Hoon-Seon Chang, Jae-Cheon Jung, Jae-Hack Kim Hee-Hwan Han, Do-Yeon Kim, Young-Woo Chang Wang Sik, Moon
More information김경재 안현철 지능정보연구제 17 권제 4 호 2011 년 12 월
지능정보연구제 17 권제 4 호 2011 년 12 월 (pp.241~254) Support vector machines(svm),, CRM. SVM,,., SVM,,.,,. SVM, SVM. SVM.. * 2009() (NRF-2009-327- B00212). 지능정보연구제 17 권제 4 호 2011 년 12 월 김경재 안현철 지능정보연구제 17 권제 4 호
More information비식별화 기술 활용 안내서-최종수정.indd
빅데이터 활용을 위한 빅데이터 담당자들이 실무에 활용 할 수 있도록 비식별화 기술과 활용방법, 실무 사례 및 예제, 분야별 참고 법령 및 활용 Q&A 등 안내 개인정보 비식별화 기술 활용 안내서 Ver 1.0 작성 및 문의 미래창조과학부 : 양현철 사무관 / 김자영 주무관 한국정보화진흥원 : 김진철 수석 / 김배현 수석 / 신신애 부장 문의 : cckim@nia.or.kr
More informationMstage.PDF
Wap Push June, 2001 Contents About Mstage What is the Wap Push? SMS vs. Push Wap push Operation Wap push Architecture Wap push Wap push Wap push Example Company Outline : (Mstage co., Ltd.) : : 1999.5
More informationSK IoT IoT SK IoT onem2m OIC IoT onem2m LG IoT SK IoT KAIST NCSoft Yo Studio tidev kr 5 SK IoT DMB SK IoT A M LG SDS 6 OS API 7 ios API API BaaS Backend as a Service IoT IoT ThingPlug SK IoT SK M2M M2M
More informationBusiness Agility () Dynamic ebusiness, RTE (Real-Time Enterprise) IT Web Services c c WE-SDS (Web Services Enabled SDS) SDS SDS Service-riented Architecture Web Services ( ) ( ) ( ) / c IT / Service- Service-
More information슬라이드 1
CJ 2007 CONTENTS 2006 CJ IR Presentation Overview 4 Non-performing Asset Company Profile Vision & Mission 4 4 - & 4-4 - & 4 - - - - ROE / EPS - - DreamWorks Animation Net Asset Value (NAV) Disclaimer IR
More informationPowerPoint 프레젠테이션
2003 CRM (Table of Contents). CRM. 2003. 2003 CRM. CRM . CRM CRM,,, Modeling Revenue Legacy System C. V. C. C V.. = V Calling Behavior. Behavior al Value Profitability Customer Value Function Churn scoring
More information6자료집최종(6.8))
Chapter 1 05 Chapter 2 51 Chapter 3 99 Chapter 4 151 Chapter 1 Chapter 6 7 Chapter 8 9 Chapter 10 11 Chapter 12 13 Chapter 14 15 Chapter 16 17 Chapter 18 Chapter 19 Chapter 20 21 Chapter 22 23 Chapter
More information11¹Ú´ö±Ô
A Review on Promotion of Storytelling Local Cultures - 265 - 2-266 - 3-267 - 4-268 - 5-269 - 6 7-270 - 7-271 - 8-272 - 9-273 - 10-274 - 11-275 - 12-276 - 13-277 - 14-278 - 15-279 - 16 7-280 - 17-281 -
More informationJournal of Educational Innovation Research 2018, Vol. 28, No. 4, pp DOI: * A S
Journal of Educational Innovation Research 2018, Vol. 28, No. 4, pp.461-487 DOI: http://dx.doi.org/10.21024/pnuedi.28.4.201812.461 * - 2008 2018 - A Study on the Change of Issues with Adolescent Problem
More information06_±è¼öö_0323
166 167 1) 2) 3) 4) source code 5) object code PC copy IP Internet Protocol 6) 7) 168 8) 9)10) 11) 12)13) / / 14) 169 PC publisher End User distributor RPG Role-Playing Game 15) FPS First Person Shooter
More information학습영역의 Taxonomy에 기초한 CD-ROM Title의 효과분석
,, Even the short history of the Web system, the techniques related to the Web system have b een developed rapidly. Yet, the quality of the Webbased application software has not improved. For this reason,
More information09권오설_ok.hwp
(JBE Vol. 19, No. 5, September 2014) (Regular Paper) 19 5, 2014 9 (JBE Vol. 19, No. 5, September 2014) http://dx.doi.org/10.5909/jbe.2014.19.5.656 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) a) Reduction
More information03.Agile.key
CSE4006 Software Engineering Agile Development Scott Uk-Jin Lee Division of Computer Science, College of Computing Hanyang University ERICA Campus 1 st Semester 2018 Background of Agile SW Development
More informationDocsPin_Korean.pages
Unity Localize Script Service, Page 1 Unity Localize Script Service Introduction Application Game. Unity. Google Drive Unity.. Application Game. -? ( ) -? -?.. 준비사항 Google Drive. Google Drive.,.. - Google
More informationMicrosoft PowerPoint - Smart CRM v4.0_TM 소개_20160320.pptx
(보험TM) 소개서 2015.12 대표전화 : 070 ) 7405 1700 팩스 : 02 ) 6012 1784 홈 페이지 : http://www.itfact.co.kr 목 차 01. Framework 02. Application 03. 회사 소개 01. Framework 1) Architecture Server Framework Client Framework
More informationCRM Fair 2004
easycrm Workbench ( ) 2004.04.02 I. CRM 1. CRM 2. CRM 3. II. easybi(business Intelligence) Framework 1. 2. - easydataflow Workbench - easycampaign Workbench - easypivot Reporter. 1. CRM 1.?! 1.. a. & b.
More information디지털포렌식학회 논문양식
ISSN : 1976-5304 http://www.kdfs.or.kr Virtual Online Game(VOG) 환경에서의 디지털 증거수집 방법 연구 이 흥 복, 정 관 모, 김 선 영 * 대전지방경찰청 Evidence Collection Process According to the Way VOG Configuration Heung-Bok Lee, Kwan-Mo
More information목 차 요약문 I Ⅰ. 연구개요 1 Ⅱ. 특허검색 DB 및시스템조사 5
2014 특허청정책연구결과보고서 발간등록번호 11-1430000-001369-01 ISBN 978-89-6199-792-8-13500 ᅦ 특허검색고도화를위한 검색시스템및검색기법연구 A Study on the Retrieval Systems and Techniques for Enhancing Patent Search 목 차 요약문 I Ⅰ. 연구개요 1 Ⅱ. 특허검색
More information