http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Advanced Model of Business Service Management with Security Approach
Feruza Sattarova Yusufovna,Nayoun Kim,Eun-suk Cho,Seok-soo Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Information is an essential resource for all businesses today and is the key to growth and success. However, we need to ensure that the information held on our IT systems is secure. The impact of a security breach may be far greater than we would expect. The loss of sensitive or critical information directly may not only affect our competitiveness and cash flow but also damage our reputation - something which may have taken us years to establish and which may be impossible to restore. In our paper we introduce a structure of Business Service Management (BSM) with security approach offering an advanced model of integrated secure BSM model.
Feruza Sattarova Yusufovna 사단법인 인문사회과학기술융합학회 2011 예술인문사회융합멀티미디어논문지 Vol.1 No.2
In any system, the network firewall is the main feature which will be protecting the system from getting attacked from any illegal intruders who will try to hack the system and steel the information from the network. These firewalls have been involving in the optimization that has to be done when any other tries to come through the other firewall and sharing the information will improve the network performance very well. Firewall will be mainly concentrating on intra firewall and also inter firewall optimization that will be helpful to improve the security of the network. Previously, there has been the use of cross-domain privacy preserving cooperative firewall policy optimization protocol. But there is no improvement that made a lot of difference in the native methods used. So we propose secure multi-party computation of union which will be improving the firewall optimization and also improving the security very well when compared to the all the previous methods.
Advanced Security Model of BSM with New Approach
Feruza Sattarova Yusufovna 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.2
Information is an essential resource for all businesses today and is the key to growth and success. However, we need to ensure that the information held on our IT systems is secure. The impact of a security breach may be far greater than we would expect. The loss of sensitive or critical information directly may not only affect our competitiveness and cash flow but also damage our reputation - something which may have taken us years to establish and which may be impossible to restore. In our paper we introduce a structure of Business Service Management (BSM) with security approach offering an advanced model of integrated secure BSM model.
Separated SCADA Environment as a Security Approach
Feruza Sattarova Yusufovna,Rosslin John Robles,Min-kyu Choi,Maricel O. Balitanas,Farkhod Alisherov Alisherovich,Nayoun Kim,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Supervisory Control and Data Acquisition (SCADA) systems are critical to the safe, reliable and efficient operation of many essential services that affect the daily lives of millions of people. These services include power generation plants, potable water systems, wastewater treatment facilities, oil and gas production and transportation/distribution networks. In today’s uncertain world, security stands beside profitability, productivity, performance and control as a key element for maintaining business activities in industrial facilities. Prevention of malicious attacks against business infrastructure has become as vital to ongoing success as has the widespread use of the computer systems which make such attacks so easy and so painful. The vulnerabilities and condition of security of SCADA networks are considered in this paper. Also approaches on how to best secure SCADA system are discussed.
Design of Integrated Secure Business Service Management
Feruza Sattarova Yusufovna,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
In this paper a structure of business service management integrated with security management is offered. Our integrated BSM model with security approach is the hierarchy of data management in any growing business. It creates a logical flow of data from its inception into the organization through the management levels. Thus, allowing for proactive business decisions to be made on a consistent basis. The end result is an increase in both corporate flexibility and profitability. It encompasses the process and use of Customer Data Management, Customer Relationship Management, Enterprise Resource Planning and Business Insurance all supported by a robust Service Desk.
An Effective Approach in Building an Intelligent Intrusion Detection System
Feruza Sattarova Yusufovna,Seong-eon Cho 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Intrusion detectionsystems have proved to be an effective instrument for protecting computer and network resources. In addition to preventive security mechanisms as authentication, encryption, or access control, they provide an automatic detection of security violations. Inour paper we propose a new model of Intrusion Detection System (IDS) which combines fuzzy logic with data mining with simplified structure.
Implementing Intrusion Detection System against Insider Attacks
Feruza Sattarova Yusufovna,Seong-eon Cho 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Insiders pose the top corporate security threat today. Recent reports indicate that insider breaches have risen from 80% to 86% of all incidents, with more than half occurring after employee termination. Not surprisingly, internal employees who are authorized to access company systems are most likely to be linked to fraud or a security breach?and of all employees, IT staff members have the most resources to do so.
Effective Estimation Software cost using Test Generations
Feruza Sattarova Yusufovna,Farkhod Alisherov 사단법인 인문사회과학기술융합학회 2011 예술인문사회융합멀티미디어논문지 Vol.1 No.1
In software engineering, we have many problems particularly with software cost estimation and the assessment of the evaluation model. Software cost estimation mainly depends on two factors which are the estimation consistency and estimation accuracy. These are very much important to the perfect development of the software without any drawbacks to it. In the past there have been many models and techniques that have failed to give the correct software estimation that really challenges the all factors of perfect software in this paper we use software requirement specification but we were not getting the accurate results that are helpful for developing of perfect software that is having perfect cost estimation. So we introduce the Automated Test-Data Generation Techniques method that gives us the desired results which will be helping us to know the software cost estimation very much accurately and also estimate consistently.
An Effective countermeasure against Insider Attacks within an Enterprise
페루자 산타로바 유스퍼브나(Feruza Sattarova Yusufovna),김나윤(Nayoun Kim),로즐린 존 노블레스(Rosslin John Robles),김태훈(Tai-hoon Kim) 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.1
Recent studies show that over half of all cyber threats come from within the enterprise. The insider represents the greatest threat to security because of their understanding of the organizations business and systems. And due to their knowledge and understanding of internal systems and controls, insider attacks are more likely to be successful. This article contains the research on related topic and offers a strategy to protect system from insider attacks. However, it is impossible to solve this problem entirely as the insider threat existed long before the existence of computers and databases. All we can do is reduce the risk.
Vulnerabilities in Control Systems, Critical Infrastructure Systems and SCADA
Rosslin John Robles,Min-kyu Choi,Maricel O. Balitanas,Feruza Sattarova Yusufovna,Farkhod Alisherov Alisherovich,Nayoun Kim,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Critical Infrastructure or CI are so crucial and play a vital role in the society. A damage or breakage of it will have a huge effect on humanity and economy. Supervisory Control and Data Acquisition Systems (SCADA) play a big role on Critical Infrastructure since most of these infrastructures are controlled by control systems like SCADA. In this paper, we discuss the vulnerabilities of a SCADA system, its effect to the society and the ways to prevent such vulnerabilities. We also researched on the background of the SCADA system and its comparability to the common computer system is discussed.