download0 view936
twitter facebook

공공누리This item is licensed Korea Open Government License

Title
EA 기반 정보자원관리체제 구축
Alternative Title
Construction of Information Resource Management System based on EA
Author(s)
박찬진정택영오충식이승복조성남안성수김한국한문희최병선김현철송원근안병율황효정이찬욱
Alternative Author(s)
Park, Chan-Jin; Jeong, Taek-Yeong; O, Chung-Sik; Lee, Seung-Bok; Jo, Seong-Nam; An, Seong-Su; Kim, Han-Guk; Han, Mun-Hui; Choe, Byeong-Seon; Kim, Hyeon-Cheol; Song, Won-Geun; An, Byeong-Yul; Hwang, Hyo-Jeong; Lee, Chan-Uk
Publisher
한국과학기술정보연구원
Korea Institute of Science and Technology Information
Publication Year
2010-12
Description
funder : 교육과학기술부
agency : 기초기술연구회
Abstract
본 연구는 정보화사업 관리 방안 수립 및 IT정보자원관리시스템을 구축함으로써 EA 기반의 IT자원 전주기(Life Cycle) 관리를 통한 IT 투자 예산을 절감과 IT 거버넌스(Governance)를 통한 전략경영(Strategic Management)을 지원하며, 기관 미션, 비전에 따른 전략, 정책의 유기적인 연관성을 확립한 성과중심의 책임경영체제를 보다 효율적으로 운영 할 수 있도록 지원하는 전략경영 정보화 체제구축, 그리고 정보자원에 대한 정보보안 관리체제 수립ㆍ운영으로 안전한 국가 과학기술정보서비스 인프라를 구축하기 위해 다음과 같이 수행하였음.
1. EA 기반의 정보자원 관리·활용 효율화
- 슈퍼컴퓨팅 부문의 EA확대구축을 통한 EA확대 활용 기반 마련
- 정보화용역사업 관리, IT자원관리, EAMS의 상호연계 환경 구축을 통한 EAMS 기능 고도화
- EA기반의 IT자원관리 체계가 가능하도록 EAMS와 통합된 구조의 IT자원관리시스템 구축
- 정책/제도/지침 및 스마트소싱에 대한 추진 방안을 수립하여 EA 기반의 거버넌스 체계 확립
2. 전략경영정보 관리?활용
- 책임경영을 지원하는 전략경영정보화 구현
- KISTI 실시간 서비스 안내 체제 구축
- 대표홈페이지 웹접근성 개선
3. 원내 정보보안 관리체제 안정화
- 정보보안 관리 수준 향상을 통한 대내?외적인 기관 신뢰도 향상 및 위상 제고
- 정보보안 인프라 구축 및 운영 관리를 통한 물리적, 기술적, 관리적 정보보안 환경 구축
- 주기적인 보안교육, 사이버 보안 진단의 날 시행 등을 통한 보안의식 제고와 침해사고 대응 및 사고처리 지원 등 체계적인 지원 체계 구축
- 사이버사고 발생 시 효과적인 대응을 위한 절차 및 지원체제 명문화
- 정보보안지침 개정과 개인정보보호 방침 개정 및 지침 마련을 통한 제도적 지원 체계 강화
- 보안서버, 개인정보 필터, I-PIN 도입 및 운영을 통한 개인정보보호체제 안정화 및 역량 강화

A. Efficient Management & Utilization of IT Resource based on EA
○ Establish the foundation for EA expansion
- Do a reexamination during reference models established to one phase so as to meet a technical reference model by KISTI environment, and you reflect the present situation, and you establish a business architecture of the KISTI supercomputing headquarters, an applied architecture, data architecture, a technical architecture, a security architecture, and 2010 supports education for anger current of an informatization service business ordered at KISTI.
○ IT resources management system construction-based EA
- Analyze the present situation of KISTI IT resources, and you present a plan for integrated management system construction, and IT resources management system-based EA establishes a system of EAMS and integrated structure so that it is possible, and you establish a conversion direction toward a study resource management system.
○ Advancement functional EAMS
- An advanced section functional EAMS implements a system to read the existing product which you were established, and you implement a personal history management function regarding an informatization service business in a system, and you were written through informatization service businesses.
○ IT Governance embodiment
- Supplement an IT management system, and you establish an informatization investment result management forwarding direction for embodiment of an IT management system established in one phase of IT management system section
B. Efficient use and control of strategic management information
○ Enhancement of KISTI Strategic Management System
- Complement and readjustment: outcome of research, service, management
- Expansion: outcome of service(information analysis, information resource), outcome of management
- Redesign and implementation of Management Contract
- Redesign and implementation of Real time monitoring service
C. Stabilization of Information Security Management System in KISTI
○ Stabilization of information security management system
- Stabilization and enriching substance of internal information security system by establishing cyber-security control center
- Reinforcement of credibility and safety of network
- Preventive activities to deal with Distributed Denial of Service (DDoS) attack
- Blocking of indiscreet outflow of internal knowledge information by establishing data outflow prevention system
- Implementation of security training to enhance security consciousness of its employees
- Stipulation of procedures and supporting system to effectively deal with cyber-accidents
- Reinforcement of security of the home page
○ Stabilization of personal information protection system
- Stabilization of institutional system for person information protection
- Reinforcement of preventive activities related to personal information protection
○ Assessment of information security and personal information protection by the external agency
- Assessment of information security by the external agency
- Assessment of personal information protection by the external agency
- Participation in information security exercise across governmental organizations
Keyword
Information System; Reference Model; Meta Model; Architecture; IT Governance; SmartSourcing; Strategic Management System; Real-Time Monitoring of Service; Web Accessibility; Information Resource; Monitoring; Information Security
Files in This Item:
There are no files associated with this item.
Appears in Collections:
7. KISTI 연구성과 > 연구보고서 > 2010
URI
https://repository.kisti.re.kr/handle/10580/10990
http://www.ndsl.kr/ndsl/search/detail/report/reportSearchResultDetail.do?cn=TRKO201100007944
Fulltext
 http://www.ndsl.kr/ndsl/commons/util/ndslOriginalView.do?dbt=TRKO&cn=TRKO201100007944
Export
RIS (EndNote)
XLS (Excel)
XML

Browse