• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.024 seconds

Designing SMS Phishing Profiling Model (스미싱 범죄 프로파일링 모델 설계)

  • Jeong, Youngho;Lee, Kukheon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.293-302
    • /
    • 2015
  • With the attack information collected during SMS phishing investigation, this paper will propose SMS phishing profiling model applying criminal profiling. Law enforcement agencies have used signature analysis by apk file hash and analysis of C&C IP address inserted in the malware. However, recently law enforcement agencies are facing the challenges such as signature diversification or code obfuscation. In order to overcome these problems, this paper examined 169 criminal cases and found out that 89% of serial number in cert.rsa and 80% of permission file was reused in different cases. Therefore, the proposed SMS phishing profiling model is mainly based on signature serial number and permission file hash. In addition, this model complements the conventional file hash clustering method and uses code similarity verification to ensure reliability.

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

An Alternative for the Enrichment of Information Literacy Instruction as a General Education (교양교육으로서 정보활용능력 교육 위상 강화 방안)

  • Han, Mahn-Soung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.4
    • /
    • pp.51-70
    • /
    • 2014
  • The major aim of this study is to discuss the possibility whether the merging of Information Literacy and rhetoric will be able to have essential elements for being a general education subject in universities. The characteristic of rhetorical information literacy (RIL) is organized as follows. Situated literacy using heuristic method, process oriented literacy attaching importance to research, and literacy relevant to ubiquitous environment. So, it is argued that rhetorical information literate citizenry is essential for a modern democratic society. As the information literacy instruction program can be various, for example, technology oriented instruction is needed to be compared. For the practical execution of the RILI program, 'asking situated questions to discover problem', 'selecting and writing review of meta study books', and 'writing visiting report of library', and 'instruction of information ethics for democratic citizens' have been proposed.

Voice Phishing Occurrence and Counterplan (보이스피싱 발생 및 대응방안)

  • Cho, Ho-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.176-182
    • /
    • 2012
  • Voice Phishing finds out personal information illegally using electrification and it is confidence game that withdraw deposit on the basis of this. It appeared by new social problem as damage instances increase rapidly. Target of the damage is invading indiscriminately to good civilian and is crime that commit by foreigners such as a most Chinese, Formosan. Voice Phishing can be crime type of new form in terms of criminal practice is achieved in the foreign countries. Therefore, this study wishes to analyze present occurrence actual conditions and example, and search effective confrontation plan regarding Voice Phishing. Voice Phishing criminal offense is growing as crime is not eradicated in spite of continuous public relations and control, and technique is diversified and specializes preferably. Hereafter, confrontation plan about problem may have to be readied in banking communication investigation to eradicate Voice Phishing. Also, polices control activity may have to be reinforce through quick investigation's practice and development of investigation technique, and relevant government ministry and international mutual assistance cooperation such as the Interpol should be reinforced because is shown international crime personality.

Police Networks for Criminal Intelligence Functions: Based on Informal Social Network Analysis (경찰 범죄정보 수집 활동의 관계망 분석: 비공식적 사회연결망 분석을 중심으로)

  • Choi, Yeong Jin;Yang, Chang Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.448-459
    • /
    • 2020
  • Recently, the necessities of gathering, producing, and sharing criminal information are critically important as intelligence functions of police agencies to improving public safety and national security. However, the inadequacies and barriers within which police agencies have in regard to intelligence functions impede criminal information gathering, intelligence producing within their agency, and intelligence sharing with other agencies. In this study, we analyzed informal networks constructed from a survey dataset of information and intelligence sharing among officers in police agencies. The results revealed the different structural properties of intelligence networks between police agencies. We did find that officers with high indegree and outdegree in a network played critical role on the dynamics and degree of intelligence gathering and assessment responsibilities. Finally, we could find evidence that the potential role of intermediary triggered relational dynamics for developing and sharing critical information among all police agencies.

Why is Science Reporting Easy to Lead to Failure ?: ANT Analysis of Reporting on ETRI Scientist Hyun-Tak Kim (과학 보도는 왜 실패하기 쉬운가: ETRI 김현탁 박사팀 보도에 대한 ANT 분석)

  • Lee, Choong-Hwan
    • Journal of Science and Technology Studies
    • /
    • v.12 no.1
    • /
    • pp.145-183
    • /
    • 2012
  • Science reporting is easier to lead to failure than other news reporting because it needs higher professionalism. According to Actor-Network Theory(ANT), not only research results(artifacts) of scientists but also science articles are hybrid networks. Namely, they are connected by human actors(scientist, reporter, etc.) and nonhuman actors(press releases etc.). When the process of science reporting is examined on the view of ANT, it is the process that scientists' results translate the media via press releases as intermediaries and expand their network to the public. This study aims at making an ANT analysis of how research results of Electronics and Telecommunications Research Institute(ETRI) scientist Hyun-Tak Kim were reported by lots of media, focusing on the rhetoric of ETRI's press release. It can reveal the reason for the science reporting's failure and hint at the better science journalism.

  • PDF

A Study on the Arabic numeral reading rules in Modern Korean (현대 한국어에서 아라비안 숫자의 읽기 규칙 연구)

  • Jung, Young-Im;Kim, Jeong-Se;Kim, Sang-Hoon;Lee, Young-Jik;Yoon, Ae-Sun
    • Annual Conference on Human and Language Technology
    • /
    • 2002.10e
    • /
    • pp.16-23
    • /
    • 2002
  • 본 논문에서는 아라비안 숫자를 포함한 텍스트를 음성으로 합성하기 위하여, 숫자 형태와 분류사 그리고 숫자가 나오는 문맥에 따라 숫자를 자동으로 문자화할 수 있는 전처리 규칙을 설정하는데 목적을 둔다. 먼저 선행연구를 통해 숫자를 포함한 수사 및 수사표현의 읽기 규칙의 적용 범위 및 한계점을 살펴보고, 음성 합성을 위한 아라비안 숫자의 문자화 규칙을 설정하고자 한다. 현대 한국어에서 아라비안 숫자를 읽는 방식은 크게 고유어 방식과 한자어 방식이 있으며 단(單)단위에서는 영어가 사용되기도 한다. 또한 한자어 방식에서도 단위를 붙여 읽는 경우와 모든 수를 단 단위로 읽는 경우가 있으므로, 아라비안 숫자의 문자화를 단순한 규칙을 설정하여 자동화하기에는 중의성이 높다. 본 연구에서는 (1) 숫자 전 전치어(pre-numeral), (2) 기호를 포함한 숫자열의 표현 형식과 크기, (3) 단위 표현, (4) 숫자 후치어(post-numeral), (5) 분류사(classifier) (6) 분류사 후치어(post-classifier), (7) 수사표현 앞뒤 문맥에 따라, 아라비안 숫자표현이 문자화되는 방식을 살펴보았다. 분석 대상 말뭉치는 C 신문의 2000년 1월부터 2000년 4월까지 전체 기사 1,400건에서 숫자가 포함된 숫자표현 약 63,000개론 구성하였다. 패턴화된 구조 및 중의성이 없는 구조를 12가지로 밝히고 중의성이 있는 구조의 유형을 밝혔으며 분류사 후치어와의 결합 관계, 좌우 문맥정보를 통해 중의성 해결의 단서를 제시하고자 하였다.

  • PDF

A Study on procedure of Criminal Cases related to the Security (안보형사법제도의 바람직한 개선방향 제시 - 안보사례분석을 중심으로 -)

  • Joo, Seong-Bhin
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.231-257
    • /
    • 2015
  • Today, the international community make every effort to suppress security crimes, to provide numerous institutional strategies and to prevent security crimes such as the terrorism and spy. Particularly, developed countries in the field of security are strengthening related legislation under new-security conditions. Things work a little differently about security crimes because the nation's benefit and protection of the law is the basis of individual benefit and protection of the law under investigation procedure of the security crimes. Therefore they have policy that permits major investigative agency under the arrest and detention procedure(e.g. security and communication monitoring ${\ldots}$). Criminal procedure's improvement and reinforcement are very important for events related security. But, The investigation procedure between criminal offense and security crimes makes no odds in the Korea. Continuance of such a national mood will accuse of not responding appropriately in preparation for new-security conditions recently. To revise with international best security legislation, We should institute a proper registration system in Korea's situation. This study have been discussing how to improve related legislation under new-security conditions through the cases analysis of the arrest and detention procedure in Korea.

  • PDF

Social Issues Arising from the Establishment of a National DNA Database (신원확인 유전자정보은행 설립을 둘러싼 쟁점 연구)

  • Kim Byoung-Soo
    • Journal of Science and Technology Studies
    • /
    • v.3 no.2 s.6
    • /
    • pp.83-104
    • /
    • 2003
  • The use of DNA in identification is growing. The criminal DNA databases are in operation in some countries including the UK, Austria, Germany, and US. The militaries and law enforcement agencies in these countries have used the DNA profile. In Korea, DNA identification has been used in determining paternity and in criminal cases since the middle 1990's, and in recent years law enforcement agencies are promoting a national DNA database for identification. The DNA database threatens our civil liberties because of its potential to be used as an instrument of surveillance. Expanding the database puts increasing numbers of people on a 'list of suspects'. Nevertheless, there is little social concern about using DNA database for identification. This paper reviews social issues related to the establishment of DNA database and investigates the features of DNA profile and DNA Database establishment project promoted law enforcement agencies.

  • PDF

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.