• Title/Summary/Keyword: 修辭

Search Result 822, Processing Time 0.027 seconds

Analysis of the Possibility of Recovering Deleted Flight Records by DJI Drone Model (DJI 드론 모델별 삭제 비행기록 복구 가능성 분석)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.609-619
    • /
    • 2023
  • Recently, crimes using drones, one of the IoT industries have been continuously reported. In particular, drones are characterized by easy access and free movement, so they are used for various crimes such as transporting explosives, transporting drugs, and illegal recording. In order to analyze and investigate these criminal acts, drone forensic research is highly emphasized. Media data, PII, and flight records are digital forensic artifacts that can be acquired from drones, in particluar flight records are important artifacts since they can be used to trace drone activities. Therefore, in this paper, the characteristics of the deleted flight record files of DJI drones are presented and verified using the Phantom3, Phantom4 andMini2 models, two drones with differences in characteristics. Additionally, the recovery level is analyzed using the flight record file characteristics, and lastly, drones with the capacity to recover flight records for each drone model and drone models without it are classified.

Development of Competency Model for Police' Digital Forensic Examiner (경찰 디지털증거분석관 역량모델 개발)

  • Oh SoJung;Jeong JunSeon;Cho EunByul;Kim GiBum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.647-659
    • /
    • 2023
  • As digital evidence becomes more important in criminal investigations, disputes are increasing in court. As media diversifies and the scope of analysis expands, the level of expertise in digital forensics is also increasing. However, no competency model has been developed to define the capabilities of digital evidence examiners or to judge their expertise. There have been some studies that have derived the capabilities necessary for digital evidence examiner, but they are still insufficient. Therefore, in this study, 25 competency evaluation factors in a total of 9 competency groups were defined using methodologies such as expert FGI and Delphi survey. Specifically, it was defined as Digital Forensics Theory, Digital Evidence Collection&Management, Disk Forensics, Mobile Forensics, Video Forensics, infringement forensics, DB Forensics, Embedded(IoT) Forensics, and Cloud Forensics. The digital evidence examiner competency model is expected to be used in various fields such as recruitment, education and training, and performance evaluation in the future.

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Influencing Effects of Job Stress, Professional Autonomy, Reciprocity on the Job Embeddedness of Comprehensive Nursing Care Unit Nurses (간호·간병통합서비스 병동 간호사의 직무 스트레스, 전문직 자율성, 호혜성이 직무착근도에 미치는 영향요인)

  • Park, Seon Ok;Park, Wanju
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2023
  • Purpose: The purpose of this study was to identify the influencing effects of job stress, professional autonomy, and reciprocity on the job embeddedness among comprehensive nursing care unit nurses. Methods: The participants in this study were 147 nurses who have worked for over 6 months in Comprehensive Nursing Care Unit. Data were collected from January 3 to January 31, 2022 from six general hospitals with more than 300 beds in three cities in G, G and P. Results: As the results of hierarchical regression analysis, job embeddedness was lower when nurses had clinical experiences for 1 to under 5 years (β=-.49, p<.001), 5 to under 10 years (β=-.27, p=.035), 10 to under 20 years (β=-.54, p<.001) compared to those who had clinical experiences for more than 20 years. Also, job embeddedness was higher when there was greater balance within team caregiving of reciprocality (β=.27, p<.001) and intrinsic reward (β=.22, p=.003), and lower role conflict (β =-.27, p<.001). Conclusion: The results of the study showed that job embededness would increase if the role conflict of comprehensive nursing care unit nurses reduces, if there was a culture that the members can make cooperative relationship with other health care professionals and, if there was an appropriate intrinsic reward depending on their work experience.

Proposal on the Improvement of Psychological Support System for Cyber Sexual Crime Investigators Based on Their Mental Health Survey (사이버성폭력수사관 정신건강 실태조사에 근거한 심리지원제도 개선 방향에 관한 연구)

  • Bora Kim;Sujin Lim
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.43-67
    • /
    • 2022
  • One of the dark sides of the development of information and communication technology is the significant increase in cybercrime. In particular, investigators in charge of cyber sexual crime are repeatedly exposed to video data of illegal sexual violence; hence, they are at high risk of post-traumatic stress disorder (PTSD) and experiencing vicarious trauma. Notwithstanding, few studies have focused on these investigators' PTSD, and, to the best of our knowledge, no study has been conducted on the vicarious trauma of cyber sexual crime investigators. Therefore, this study identifies investigators' mental health status (trauma-related, especially) and examines their perception of the currently operating psychological support programs. Further, by reviewing the psychological support system of overseas institutions, we would suggest psychological support and policies necessary for domestic cyber sexual crime units to manage investigators' work stress and prevent mental illness under domestic circumstances.

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.

Effect of Bacteria in Soil on Microbiologically Influenced Corrosion Behavior of Underground X65 Pipeline (토양 속 박테리아가 지하매설 X65 배관의 미생물 부식 거동에 미치는 영향)

  • Choe, Byung Hak;Han, Sung Hee;Kim, Dae Hyun;Kim, Woosik;Kim, Cheolman;Choi, Kwang Su
    • Korean Journal of Materials Research
    • /
    • v.32 no.3
    • /
    • pp.168-179
    • /
    • 2022
  • Microbiologically Influenced Corrosion (MIC) occurring in underground buried pipes of API 5L X65 steel was investigated. MIC is a corrosion phenomenon caused by microorganisms in soil; it affects steel materials in wet atmosphere. The microstructure and mechanical properties resulting from MIC were analyzed by OM, SEM/EDS, and mapping. Corrosion of pipe cross section was composed of ① surface film, ② iron oxide, and ③ surface/internal microbial corrosive by-product similar to surface corrosion pattern. The surface film is an area where concentrations of C/O components are on average 65 %/16 %; the main components of Fe Oxide were measured and found to be 48Fe-42O. The MIC area is divided into surface and inner areas, where high concentrations of N of 6 %/5 % are detected, respectively, in addition to the C/O component. The high concentration of C/O components observed on pipe surfaces and cross sections is considered to be MIC due to the various bacteria present. It is assumed that this is related to the heat-shrinkable sheet, which is a corrosion-resistant coating layer that becomes the MIC by-product component. The MIC generated on the pipe surface and cross section is inferred to have a high concentration of N components. High concentrations of N components occur frequently on surface and inner regions; these regions were investigated and Na/Mg/Ca basic substances were found to have accumulated as well. Therefore, it is presumed that the corrosion of buried pipes is due to the MIC of the NRB (nitrate reducing bacteria) reaction in the soil.

Extracting Feature in the Crowd using MTCNN (MTCNN을 활용한 군중 속 특징 추출)

  • Park, jin Woo;Kim, Minju;Kim, Sihyun;Jang, Donghwan;Lee, Sung-jin;Moon, Sang-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.380-382
    • /
    • 2021
  • According to the National Police Agency, 161 out of 38,496 unsolved cases as of 2020. Most of the adult missing persons, the highest of the unsolved causes, are evaluated as simple runaway, which takes a long time to investigate. Even if search through CCTV, it can take a long time and the accuracy can be somewhat low because you have to check the faces of the characters one by one and find the characters only with the characteristics of the statements. This paper utilizes MTCNN to conduct research on character extraction in CCTV. We initiate simultaneous analysis of the features of faces learned with MTCNN and the clothes we are wearing, so that only the overlapping characters are extracted so that they can be identified to the related parties. For aim to learn more diverse feature detection to narrow down the features of missing persons in the future and increase their accuracy.

  • PDF

A Study on the Efficient Digital Evidence Processing in Case Transfer : Focused on Military and Police Case Studies and Expert Interviews (사건 이송 시 효율적인 디지털 증거 처리 절차에 관한 고찰 : 군·경 사례연구 및 전문가 인터뷰를 중심으로)

  • Young June Kim;Wan Ju Kim;Jae sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.121-130
    • /
    • 2022
  • Recently, as soldiers are allowed to use mobile phones, cases are frequently transferred from the police to the military due to criminal acts, and digital evidence is collected separately from the reliability of previous investigations, such as overlapping seizure and search procedures. In this study, through in-depth interviews with practitioners in charge of digital evidence in the military, police, and courts, problems related to digital evidence handling, such as infringement of evidence ability due to overlapping human factors and procedures, are derived and analyzed. The presented procedure verified the effectiveness of the procedure through case analysis, and is expected to contribute to the guarantee of the evidence capacity of digital evidence and the efficiency of handling cases.