• Title/Summary/Keyword: 개인정보침해

Search Result 617, Processing Time 0.029 seconds

Damage and Defense of Online game private servers. (온라인 게임의 사설서버 피해와 방어)

  • Bae, Jung-Il;Oh, Sang-Seok;Min, Sung-Gi
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.1456-1459
    • /
    • 2012
  • 사설서버는 개발사의 동의 없이 게임 서버를 제작 및 운영 하여 게임에 대한 저작권 침해와 서비스의 권리 없이 영리나 비영리 목적으로 단체 또는 개인이 온라인 게임을 즐길 수 있도록 서비스 하는 행위 또는 서버 자체를 뜻한다. 본 논문에서는 이러한 사설서버에 대한 기술적인 대응 방법인 사설서버 방어코드에 대해서 제안 한다. 본 연구는 사설서버로 인한 게임 개발사의 피해와 사설서버에 대한 방어 방법, 그리고 실제 온라인 게임에 사설서버 방어 기술을 도입한 후 사설서버 방어의 효과에 대해서 조사를 한다.

Damage and Defense of Online game private servers. (온라인 게임의 사설서버 피해와 방어)

  • Bae, Jung-Il;Oh, Sang-Seok;Min, Sung-Gi
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.917-920
    • /
    • 2013
  • 사설서버는 개발사의 동의 없이 게임 서버를 제작 및 운영 하여 게임에 대한 저작권 침해와 서비스의 권리 없이 영리나 비영리 목적으로 단체 또는 개인이 온라인 게임을 즐길 수 있도록 서비스 하는 행위 또는 서버 자체를 뜻한다. 본 논문에서는 이러한 사설서버에 대한 기술적인 대응 방법인 사설서버 방어코드에 대해서 제안 한다. 본 연구는 사설서버로 인한 게임 개발사의 피해와 사설서버에 대한 방어 방법, 그리고 실제 온라인 게임에 사설서버 방어 기술을 도입한 후 사설서버 방어의 효과에 대해서 조사를 한다.

YOLO-based Video Non-identification Tool Development (YOLO기반 영상 비식별화 도구 개발)

  • Shin, Hyeong-Hwan;Park, Sung-Wan;Park, Sang-Hyun;Oh, Chi-Min;Kim, Seungwon
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.875-877
    • /
    • 2021
  • 영상 매체의 발달과 영상 미디어의 쉬운 공유는 많은 이점을 가지고 왔다. 하지만 영상이 인터넷 상에서 쉽게 공유되면서 개인이 원치 않는 모습 및 정보가 자신도 모르게 공개되는 초상권 문제나 사생활 침해 문제가 발생하고 있다. 이를 막기 위해 영상의 인물을 비식별화 하고 있지만 수작업으로 진행되는 영상의 비식별화는 많은 시간과 비용이 들어간다. 이에 본 논문에서는 자동으로 영상의 인물을 탐지, 추적하여 비식별화 영상처리를 진행할 수 있는 YOLO 기반 비식별화 시스템을 제안한다.

Analyze Diagnostic Data from Samsung Android Smartphones (삼성 안드로이드 스마트폰의 진단데이터 분석)

  • Hyungchul Cho;Junki Kim;Jungheum Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.479-491
    • /
    • 2024
  • Android manufacturers collect diagnostic data to improve the quality of service to users around the world. The content and frequency of diagnostic data collected by these Android manufacturers is unknown. We analyze the diagnostic data collection behavior of Samsung smartphones, which has the largest share of the Android market among smartphone manufacturers, to explain which diagnostic data is communicated to the server via network packets, how the system app that collects the diagnostic data works, and whether the diagnostic data violates user privacy.

A Thought on the Right to Be Forgotten Articulated in the European Commission's Proposal for General Data Protection Regulation (유럽연합(EU) 정보보호법(General Data Protection Regulation)개정안상의 잊혀질 권리와 현행 우리 법의 규율 체계 및 앞으로의 입법방향에 관한 소고)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.87-92
    • /
    • 2012
  • In the early 2012, European Union proposed new legal framework, including the right to be forgotten, for the protection of personal data. The new Proposal articulates kind of sweeping new privacy right and there has been debates on its potential threat to free speech in the digital age. While the situation is similar in Korea, I want to introduce the right to be forgotten in the Proposal. Then, I will analyze current legal system in Korea regarding the new privacy right and suggest some guidelines in searching direction for the coming legislation with respect to the right to be forgotten. The right to be forgotten should not have been promulgated without considering fully its effect on the free speech, especially in the society where the voice toward direct democracy or movement toward participation of the citizen, mainly through cyber space or Social Network Services, has risen much higher in Korea. Especially, the new right seems not to cover the control of data subject on a third party where the third party expressing his opinion by posting himself other's personal data on his blog or others.

A Study on Effective Countermeasures against E-mail Propagation of Intelligent Malware (지능형 악성코드의 이메일 전파에 대한 효과적인 대응 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.189-194
    • /
    • 2020
  • Most cyber breaches are caused by APT attacks using malware. Hackers use the email system as a medium to penetrate the target. It uses e-mail as a method to access internally, destroys databases using long-term collected vulnerabilities, and illegally acquires personal information through system operation and ransomware. As such, the e-mail system is the most friendly and convenient, but at the same time operates in a blind spot of security. As a result, personal information leakage accidents can cause great damage to the company and society as a whole. This study intends to suggest an effective methodology to securely manage the APT attack by strengthening the security configuration of the e-mail system operating in the enterprise.

A Study on The Utilization and Secure Plan of Security in Social Media (소셜 미디어 이용 현황과 보안대책에 관한 연구)

  • Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.1-7
    • /
    • 2010
  • One of celebrities using Social media caught public's eye and interest in Korea. Thereby the number of the user has grown rapidly and by last year it had reached to about 770 million. But at the same time, it has brought us social issues such as invasion of privacy, spreading of malicious code, and stealing of ID. To solve these problems, first the government need to establish adequate law and policy. Second, Service provider should remove vulnerability in the security system and filter illegal information. Third, individual user should put more effort to protect their own privacy. This paper will suggest a solution of using the Social media more sound and secure.

Countermeasure of Mobile App tamper attack (모바일 앱 위·변조 공격 및 대응방안)

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.37-40
    • /
    • 2015
  • Recently range of use also being increase along with smart phone users growing. And keep pace with hacking technician is increasing inter alia tamper technician has issued. This technician infringe integrity on three element of security of data. In this case reliability has deteriorated, the app itself has increased danger, and it's value has reduced. This can affect like take information even though don't have any authority to information or hemorrhage at large in this country. In other words, I has been arranged tamper's definition to.

  • PDF

Analysis of Corporate Awareness for the Regulation of Recommendation Service based on Profiling (프로파일링 기반 추천서비스 규제에 대한 기업의 인식도 분석)

  • In-Kuk Song
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.149-155
    • /
    • 2023
  • Profiling-based recommendation services provide the convenience of easily accessing specialized content for individuals on the user side and provide an important profit model on the corporate side. Despite the utility of these recommendation services, the issues such as personal information infringement and restrictions on consumer options are emerging, and certain regulatory movements for profiling recommendation services are actively underway. Under the circumstance, there are concerns that the introduction of regulations without a close review of regulatory effectiveness and side effects will weaken the competitiveness of domestic companies in the global market. This study systematically analyzed how companies providing profiling-based recommendation services perceive the corresponding regulations.

Argument on the right to be forgotten and the freedom of expression-focused on the reforming the press arbitration system (잊혀질 권리와 표현의 자유를 둘러싼 논의 - 언론중재제도의 개선과 관련하여)

  • Hong, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.1-11
    • /
    • 2014
  • With the drastic development of technology for almost eternally saving digital information, cases for giving sufferings to a person who deserves to enjoy privacy have increased. So I study the right to be forgotten focusing on the collision between that right and freedom of expression. I also study the concept of the right to be forgotten and its legal basis for the protection of that right. That right can be protected mainly by the self-decision making right under the Article 10, and secondly the privacy right under the Article 17 of the Constitutional Law. The Press Arbitration Law can be applied to protect the right to be forgotten, but that Law needs the revision of time-limit clause for complain, protection clause for the right to ask to delete factual past article, and the clause of staleness doctrine for the consent of giving personal information.