목차
1.소개의 글
2.MIS 보안 통제 개요
3.시스템 흐름통제
4.소프트웨어 통제
5.하드웨어 통제
6.컴퓨터 운영체제
7.데이터 보안통제
8.입력통제
9.프로세싱 통제
10.데이터베이스 통제
11.TPS(Transaction Processing System)
12.MIS(Management Information System)
13.DSS(Decision Support System)
14.ES(Expert System)
15.IRS
16. 보안 용어 사전
참고문헌
2.MIS 보안 통제 개요
3.시스템 흐름통제
4.소프트웨어 통제
5.하드웨어 통제
6.컴퓨터 운영체제
7.데이터 보안통제
8.입력통제
9.프로세싱 통제
10.데이터베이스 통제
11.TPS(Transaction Processing System)
12.MIS(Management Information System)
13.DSS(Decision Support System)
14.ES(Expert System)
15.IRS
16. 보안 용어 사전
참고문헌
본문내용
nd L. Adleman, "A method for Obtaining
Digital Signature and Public key Cryptosystems", Communication of the
ACM, pp. 120-128, Feb. 1978.
Computer Data Authentication, FIPS PUB 113, National Institute of
Standards and Technology, May 30, 1985.
Digital Signature Standards, FIPS PUB 186, National Institute of
Standards and Technology, May 1994.
Meyer, C. H. and S. M. Matyas, Cryptography: A New Dimension in
Computer Data Security, New York, NY: John Wiley and Sons, 1982.
An Introduction to Computer Security: The NIST Handbook, National
Institute of Standards and Technology, June 20, 1994.
Cheswick, William and Seven Bellovin, Firewals and Internet Security,
Addison-Wesley Publishing Company, 1994.
Sherman, R., "Biometric Futures," Computers and Security, 11나,
pp.128-133, 1992.
Feldmeier, David C. and Philip R. Kam, "UNIX Password Security -
Ten Years Later," Crypto '89 Abstracts, Santa Barbara, CA, August
20-24, 1989.
Guideline for the Use of Advanced Authentication Technology, Draft
FIPS PUB XXX, National Institute of Standards and Technology.
Haykin, Martha E., and Robert B. J. Warner, Smart Card Technology:
New Methods for Computer Access Control, Spec. Pub. 500-157,
National Institute of Standards and Technology, September 1988.
Morris, R. and K. Thompson, "Password Security: A Case History,"
Communications of the ACM, Vol.22, No.11, November 1979,
pp.594-597.
Needham, R. M. and M. D. Schroeder, "Using Encryption for
Authentication in Large networks of Computers," Communications of
the ACM, Vol.21, No.12, December 1978, pp.993-999.
Password Usage, FIPS PUB 112, National Bureau of Standards, May
30, 1985.
vgl. Jescheck, Lehrbuch AT, S. 294
Maurach-G ssel-Zipf, Lehrbuch AT, S. 356 ff.
Wessels, AT, S. 87
홍기융 외, "An Access Control Service for Secure Message Handl
Proceeding of 6th International Joint Workshop on Computer
Communication (JWCC-6), Kitakyushu, Fukuoka, Japan, pp. 145-152,
1991.
J. Picciotto, "The Design of An Effective Auditing Subsystem",
Proceeding of IEEE Symposium on Security and Privacy, 1987.
Rober J. Ficher/Gion, "Introduction to Security", Butterwor
th- Heinemann, pp. 40-50, 292-333, 1992
http://infoweb.magi.com/~privcan//pubs/smcard.html
http://www.ittf.nist.gov/privacy.htmlhttp://infosec.kut.ac.kr/sangjin/class/compsec/note01_p6.pdf
http://cko.hannam.ac.kr/lecture/mis/chap13.ppt
http://my.dreamwiz.com/scmwoo/philky/third/c_15_46.htm http://my.dreamwiz.com/scmwoo/philky/third/c_17_48.htm
http://k.kumi.ac.kr/remote/internet/contents/ic-16.html
http://blog.naver.com/post/postView.jsp?blogId=feelcom1999&logNo=23222
http://blog.naver.com/post/postView.jsp?blogId=feelcom1999&logNo=23222
http://ecredit.dacom.co.kr/NEWECREDIT/isp/isp.htm
http://www.securesoft.co.kr/korean/product/product/secure_cert.html
http://www.securesoft.co.kr/korean/product/product/suho_idc.html
http://certcc.or.kr
주요 해킹 사례 http://pittgirl.hihome.com/jang/jang6.htm
http://kcjeong.cbu.ac.kr/working/mis/19.ppt#0
http://www.iitf.nist.gov/ipc/privacy.ht
Digital Signature and Public key Cryptosystems", Communication of the
ACM, pp. 120-128, Feb. 1978.
Computer Data Authentication, FIPS PUB 113, National Institute of
Standards and Technology, May 30, 1985.
Digital Signature Standards, FIPS PUB 186, National Institute of
Standards and Technology, May 1994.
Meyer, C. H. and S. M. Matyas, Cryptography: A New Dimension in
Computer Data Security, New York, NY: John Wiley and Sons, 1982.
An Introduction to Computer Security: The NIST Handbook, National
Institute of Standards and Technology, June 20, 1994.
Cheswick, William and Seven Bellovin, Firewals and Internet Security,
Addison-Wesley Publishing Company, 1994.
Sherman, R., "Biometric Futures," Computers and Security, 11나,
pp.128-133, 1992.
Feldmeier, David C. and Philip R. Kam, "UNIX Password Security -
Ten Years Later," Crypto '89 Abstracts, Santa Barbara, CA, August
20-24, 1989.
Guideline for the Use of Advanced Authentication Technology, Draft
FIPS PUB XXX, National Institute of Standards and Technology.
Haykin, Martha E., and Robert B. J. Warner, Smart Card Technology:
New Methods for Computer Access Control, Spec. Pub. 500-157,
National Institute of Standards and Technology, September 1988.
Morris, R. and K. Thompson, "Password Security: A Case History,"
Communications of the ACM, Vol.22, No.11, November 1979,
pp.594-597.
Needham, R. M. and M. D. Schroeder, "Using Encryption for
Authentication in Large networks of Computers," Communications of
the ACM, Vol.21, No.12, December 1978, pp.993-999.
Password Usage, FIPS PUB 112, National Bureau of Standards, May
30, 1985.
vgl. Jescheck, Lehrbuch AT, S. 294
Maurach-G ssel-Zipf, Lehrbuch AT, S. 356 ff.
Wessels, AT, S. 87
홍기융 외, "An Access Control Service for Secure Message Handl
Proceeding of 6th International Joint Workshop on Computer
Communication (JWCC-6), Kitakyushu, Fukuoka, Japan, pp. 145-152,
1991.
J. Picciotto, "The Design of An Effective Auditing Subsystem",
Proceeding of IEEE Symposium on Security and Privacy, 1987.
Rober J. Ficher/Gion, "Introduction to Security", Butterwor
th- Heinemann, pp. 40-50, 292-333, 1992
http://infoweb.magi.com/~privcan//pubs/smcard.html
http://www.ittf.nist.gov/privacy.htmlhttp://infosec.kut.ac.kr/sangjin/class/compsec/note01_p6.pdf
http://cko.hannam.ac.kr/lecture/mis/chap13.ppt
http://my.dreamwiz.com/scmwoo/philky/third/c_15_46.htm http://my.dreamwiz.com/scmwoo/philky/third/c_17_48.htm
http://k.kumi.ac.kr/remote/internet/contents/ic-16.html
http://blog.naver.com/post/postView.jsp?blogId=feelcom1999&logNo=23222
http://blog.naver.com/post/postView.jsp?blogId=feelcom1999&logNo=23222
http://ecredit.dacom.co.kr/NEWECREDIT/isp/isp.htm
http://www.securesoft.co.kr/korean/product/product/secure_cert.html
http://www.securesoft.co.kr/korean/product/product/suho_idc.html
http://certcc.or.kr
주요 해킹 사례 http://pittgirl.hihome.com/jang/jang6.htm
http://kcjeong.cbu.ac.kr/working/mis/19.ppt#0
http://www.iitf.nist.gov/ipc/privacy.ht
추천자료
- 학교경영계획, 학교경영기법(목표관리,기획예산,영기준,총체적질경영,조직개발기법,과업평가)
- 경영주체와 경영자
- 현대경영에서의 윤리경영의 중요성과 그 사례들
- 기술경영 성과의 측정) 기술경영의 성과척도와 결과의 측정
- 경영의 개념과 구성요소 및 경영자의 기능, 역할, 유형
- [국제][국제마케팅][국제경영][국제비교][국제경쟁력][기업국제화][국제광고][국제노동][국제...
- [인재][인재 파견][인재 경영][인재 양성][인재 제도][인재 창의성 교육][파견][경영][양성][...
- [규격][의류제품치수규격][위생용품규격][안전보건경영시스템규격]의류제품치수규격, 위생용...
- [공기업][기업][민영화][요금정책][연봉제][경영평가][요금][연봉][경영]공기업의 의미, 공기...
- [관리회계][회계][경영관리][경영][재무제표][인터넷프로그램]관리회계의 의의, 관리회계의 ...
- 국제경영 (전략경영, 전략기획, 디지털 경제환경)
- [기업][기업 혁명][기업 혁신][기업 지속가능경영][기업 생존][기업 유지][기업 위기][기업 ...
- [기업 형태][기업][기업 경영형태][기업 구조형태][기업 해외진출형태][기업 창업형태][경영...
- 급식경영학 최근 4차 산업혁명의 기술변화가 외식(급식포함)산업에 주는 영향을 기술하시오 ...
소개글