• Title/Summary/Keyword: 개인정보 유출위험

Search Result 150, Processing Time 0.028 seconds

A Study on Internal Information Leakage Detection System by User Grouping (사용자 그룹화를 통한 내부 정보 유출 탐지 시스템에 관한 연구)

  • Shin, Hee Jin;Seo, Min Ji;Kim, Myung Ho;Park, Jin Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.771-772
    • /
    • 2017
  • 내부 정보 유출 사고의 빈도가 높아지게 되면서 이러한 내부 정보 유출을 막기 위해 DLP(Data Loss Prevention), DRM(Digital Rights Management), DB 접근 통제 솔루션, 인터넷 접근 차단 솔루션과 같은 여러 가지 보안 솔루션을 적용하고 있으나, 내부 정보 유출을 시도하는 개인의 행동을 기반으로 개인을 탐지한다는 문제점을 가지고 있다. 본 논문에서는 개인이 아닌 조직으로 이루어진 내부 정보 유출의 행위를 탐지하고 대응하기 위해 보안로그를 위험 사용자들끼리 그룹화 하여 내부 정보 유출 여부를 판단하는 시스템을 제안한다.

A Statistical Methodology Study for Measuring Privacy Disclosure Riskin Open Data Environment (오픈 데이터 환경에서 개인정보 노출 위험 측정을 위한 통계적 방법론 연구)

  • Sieun Kim;Ieck-chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.323-333
    • /
    • 2024
  • Recently, Syntheic data has been in the spotlight as a technology that can protect personal information while maintaining the patterns and characteristics of actual data. Accordingly, technical and institutional research on synthetic data is actively being conducted, but it is difficult to actively use synthetic data due to the lack of clear standards and guidelines. This study is a preliminary study for quantifying the disclosure risk of synthetic data, and derives a privacy disclosure risk index through statistical methodology and suggests specific application measures to comply with the General Data Protection Regulation(GDPR). It is expected that the disclosure risk and the balance of data utility can be controlled through the privacy disclosure risk index of this study in an open data environment.

Security and Law for Medical Information (의료정보보호를 위한 법률과 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.677-680
    • /
    • 2013
  • The risk of leakage of personal information is growing with new services such as social networking and cloud services by the rapid development of information. In particular, the field of medical IT technology is required to solve problems arising from the aging society and sustainable economic development, and in accordance with the requirements to improve the quality of life, a new market for medical devices and healthcare services can be expected. However, most of the medical information system was computerized with the introduction of IT technology, and when they exchange and transfer of medical information between institutions, medical information leakage occurs and security risk is growing. In this paper we review and analyse the security of personal health information related to the major legal systems and technical and administrative protection.

  • PDF

Privacy Leakage Monitoring System Design for Privacy Protection (개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계)

  • Cho, Sung-Kyu;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.99-106
    • /
    • 2012
  • Numerous private corporations and public institutions are collecting personal information through the diverse methods for the purpose of sales, promotion and civil services, and using personal information for the profits of the organizations and services. However, due to immaturity of the technical, managerial measures and internal control for the collected personal information, the misuse, abuse and the leaks of personal information are emerged as major social issues, and the government also is promoting implementation of the act on the privacy protection by recognizing the importance of the personal information protection. This research describes on the measures to detect the anomaly by analyzing personal information treatment patterns managed by the organizations, and on the measures to coup with the leaks, misuse, and abuse of personal information. Particularly, this research is intended to suggest privacy leakage monitoring system design, which can be managed by making the elements related to personal information leaks to numeric core risk indexes to be measured objectively.

A Roaming Key Management System against Private Key Hijacking (개인키 불법 유출 방지 및 로밍을 위한 로밍 키 관리 시스템)

  • 이평수;이민수;송오영;박세현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.102-105
    • /
    • 2002
  • 본 논문에서는 현재 국내·외에서 개발되고 있고 이미 상용화가 되어 있는 PKI 기반인증 시스템에서 개인키의 로밍을 구현하고 특정 개인 컴퓨터에 개인키가 보관 되어있을 경우 발생할 수 있는 개인키의 불법 유출의 위험을 방지 할 수 있는 Roaming Key Management System의 개발 및 방안 연구를 목적으로 한다. RKMS 는 사용자의 인증서와 개인키를 개인 컴퓨터에 보관하지 않고 신뢰 할 수 있는 키서버에 저장함으로써 개인키 불법 유출을 막을 수 있고 개인키 로밍을 가능하게 한다. RKMS는 현재 발생되어 지고 앞으로 발생될 것으로 예상되어지는 인증서 및 개인키 해킹의 대안의 방법으로 사용되어 질 수 있다. 이를 이용하여 PKI 기반 인증 시스템의 향상된 안정성과 편리성을 구현하고 개인키 누출을 방지할 수 있다.

  • PDF

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.

An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks (신뢰도와 위험도로부터 합성된 지표에 기반을 둔 온라인 소셜 네트워크를 위한 접근 제어 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.15-26
    • /
    • 2010
  • Social Networks such as 'Facebook' and 'Myspace' are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.

Understanding the Factors that influence Website Retention and Privacy Unconcern After the Disclosure of Privacy Information (개인정보 유출 사고 후 웹 사이트 가입 지속 및 프라이버시 무관심에 영향을 미치는 요인에 관한 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.107-119
    • /
    • 2013
  • The purpose of this study is to find an answer why internet users are unconcern about their privacy information. We found that perceived privacy risk and website usability have a significant effect on privacy unconcern. That is, individuals who have experiences privacy incidents are more likely to be unconcern about their privacy information. Accordingly, organizations who supply services on the web have to pay more attention to these individuals to increase a privacy concern. Implications and Conclusions are discussed.

A Study on Reforming the National Personal Identification Number System : The Unconnected Random Personal Identification Number System (국가 개인식별번호체계 개선에 관한 연구 : 독립적 난수기반 개인식별번호체계로 전환)

  • Han, Mun-Jung;Jang, GyeHyun;Hong, Seokhie;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.721-737
    • /
    • 2014
  • The Resident Registration Number(RRN) system has been effectively acted as a national identification system since it was enforced. On the other hand, there are some problems such as leakages of personal informations including RRNs on a large scale and each RRN makes a pair with each person in all areas of the society. Nevertheless leakages of them might cause a big damage, there is no radical countermeasure for they are never changed in actual fact. In Republic of Korea, a RRN acts as a primary key of a database, so it has to be protected by severing the connectivity between leaked RRNs and the other personal data. In this paper, the Unconnected Random Personal Identification Number system is proposed for preventing damage of data spills by removing a dependency which the RRN has. Furthermore, this paper suggests the solutions against some potential issues in the system.

A study on Priority Control Target(high-risk) Selection for Monitoring of Internal Data Leakage Prevention (내부정보유출방지 모니터링을 위한 중점관리 대상(고위험군) 선정에 관한 연구)

  • Park, Jang-Su;Kim, Su-Hyun;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.492-494
    • /
    • 2014
  • 정보유출사고가 증가됨에 따라, 기업 및 기관 내 주요정보(개인정보 및 핵심기술)가 유출되어 큰 피해가 발생하고 있다. 이러한 정보유출 사고 중 대부분이 내부자에 의한 고의 또는 실수로 발생하는 경우가 대부분이다. 이를 방지하기 위해 다양한 보안 솔루션을 도입하여 운영하고 있지만 내부자에 의한 정보유출사고는 본인이 소유하고 있는 권한을 이용하여 불법적인 정보유출을 시도하는 것으로, 이러한 위험행동을 탐지하는 것은 쉽지 않다. 이를 해결하기 위해 기업 및 기관에서는 기 구축된 다양한 보안 솔루션을 통합하여 모니터링 할 수 있는 '내부정보유출방지 모니터링시스템'을 구축하고 있으며, 내부정보유출방지 모니터링을 위한 연구도 지속적으로 진행되고 있다. 따라서 본 논문에서는 중점관리 대상(고위험군) 선정을 통해 효율적인 내부정보유출방지 모니터링을 수행할 수 있도록 연구하고자 한다.