MIS의 보안통제(응용통제)와 경영(일반)통제
닫기
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
해당 자료는 10페이지 까지만 미리보기를 제공합니다.
10페이지 이후부터 다운로드 후 확인할 수 있습니다.

소개글

MIS의 보안통제(응용통제)와 경영(일반)통제에 대한 보고서 자료입니다.

목차

1.소개의 글

2.MIS 보안 통제 개요

3.시스템 흐름통제

4.소프트웨어 통제

5.하드웨어 통제

6.컴퓨터 운영체제

7.데이터 보안통제

8.입력통제

9.프로세싱 통제

10.데이터베이스 통제

11.TPS(Transaction Processing System)

12.MIS(Management Information System)

13.DSS(Decision Support System)

14.ES(Expert System)

15.IRS

16. 보안 용어 사전

참고문헌

본문내용

nd L. Adleman, "A method for Obtaining
Digital Signature and Public key Cryptosystems", Communication of the
ACM, pp. 120-128, Feb. 1978.
Computer Data Authentication, FIPS PUB 113, National Institute of
Standards and Technology, May 30, 1985.
Digital Signature Standards, FIPS PUB 186, National Institute of
Standards and Technology, May 1994.
Meyer, C. H. and S. M. Matyas, Cryptography: A New Dimension in
Computer Data Security, New York, NY: John Wiley and Sons, 1982.
An Introduction to Computer Security: The NIST Handbook, National
Institute of Standards and Technology, June 20, 1994.
Cheswick, William and Seven Bellovin, Firewals and Internet Security,
Addison-Wesley Publishing Company, 1994.
Sherman, R., "Biometric Futures," Computers and Security, 11나,
pp.128-133, 1992.
Feldmeier, David C. and Philip R. Kam, "UNIX Password Security -
Ten Years Later," Crypto '89 Abstracts, Santa Barbara, CA, August
20-24, 1989.
Guideline for the Use of Advanced Authentication Technology, Draft
FIPS PUB XXX, National Institute of Standards and Technology.
Haykin, Martha E., and Robert B. J. Warner, Smart Card Technology:
New Methods for Computer Access Control, Spec. Pub. 500-157,
National Institute of Standards and Technology, September 1988.
Morris, R. and K. Thompson, "Password Security: A Case History,"
Communications of the ACM, Vol.22, No.11, November 1979,
pp.594-597.
Needham, R. M. and M. D. Schroeder, "Using Encryption for
Authentication in Large networks of Computers," Communications of
the ACM, Vol.21, No.12, December 1978, pp.993-999.
Password Usage, FIPS PUB 112, National Bureau of Standards, May
30, 1985.
vgl. Jescheck, Lehrbuch AT, S. 294
Maurach-G ssel-Zipf, Lehrbuch AT, S. 356 ff.
Wessels, AT, S. 87
홍기융 외, "An Access Control Service for Secure Message Handl
Proceeding of 6th International Joint Workshop on Computer
Communication (JWCC-6), Kitakyushu, Fukuoka, Japan, pp. 145-152,
1991.
J. Picciotto, "The Design of An Effective Auditing Subsystem",
Proceeding of IEEE Symposium on Security and Privacy, 1987.
Rober J. Ficher/Gion, "Introduction to Security", Butterwor
th- Heinemann, pp. 40-50, 292-333, 1992
http://infoweb.magi.com/~privcan//pubs/smcard.html
http://www.ittf.nist.gov/privacy.htmlhttp://infosec.kut.ac.kr/sangjin/class/compsec/note01_p6.pdf
http://cko.hannam.ac.kr/lecture/mis/chap13.ppt
http://my.dreamwiz.com/scmwoo/philky/third/c_15_46.htm http://my.dreamwiz.com/scmwoo/philky/third/c_17_48.htm
http://k.kumi.ac.kr/remote/internet/contents/ic-16.html
http://blog.naver.com/post/postView.jsp?blogId=feelcom1999&logNo=23222
http://blog.naver.com/post/postView.jsp?blogId=feelcom1999&logNo=23222
http://ecredit.dacom.co.kr/NEWECREDIT/isp/isp.htm
http://www.securesoft.co.kr/korean/product/product/secure_cert.html
http://www.securesoft.co.kr/korean/product/product/suho_idc.html
http://certcc.or.kr
주요 해킹 사례 http://pittgirl.hihome.com/jang/jang6.htm
http://kcjeong.cbu.ac.kr/working/mis/19.ppt#0
http://www.iitf.nist.gov/ipc/privacy.ht
  • 가격3,000
  • 페이지수36페이지
  • 등록일2006.07.17
  • 저작시기2006.1
  • 파일형식한글(hwp)
  • 자료번호#359289
본 자료는 최근 2주간 다운받은 회원이 없습니다.
청소해
다운로드 장바구니