• Title/Summary/Keyword: 금융IT 융합

Search Result 197, Processing Time 0.023 seconds

Research about the Financial Institution's Preparations for Electronic Financial Accidents under New e-Financial Transaction Act (새로운 전자금융거래법에서의 전자금융사고 대응 방안에 관한 연구)

  • Cho, Soung-In;Park, Tae-Hyoung;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.9-19
    • /
    • 2008
  • By e-Financial Transactions Act enacted in January 2007, the financial institutions are responsible for indemnifying user's damage to ensuring security of the electronic financial transactions and to protecting financial users when suffering from electronic financial accidents. However, when occurring unauthorized financial transactions or electronic financial accidents by user's moral hazard, it is difficult to determine where the accidents happened at and whether caused by the intention or gross negligence of users. To protecting financial parties and ensuring the security and reliability of electronic financial transactions, this paper attempts to propose the means, what enhance the notification process about financial transactions and to strengthen IT regulatory compliance by using area information about electronic financial transactions, to protect risk of the financial accidents.

  • PDF

A Study on improvement for a means of access to electronic financial service (전자금융서비스 접근매체 변화에 따른 법제도 개선방안)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.17-22
    • /
    • 2015
  • As financial deregulation policies implemented by the government, electronic financial service is improved but security concerns are increasing and ultimately weaken trust in the financial service. Electronic financial service becomes more and more dependant on the IT platform and the initiatives of access device is also gradually shift to that platform. As biometric sensor is mounted on the smartphone, structural change in the access device is coming. It must be a positive signs in terms of fintech development, in the other side, it can cause many problems such as weakness of regulation and ambiguity of principals of responsibility. So in this paper, by analysing this problem-the shift of service initiative-on the access device I'll propose the best way to the the legal amendments.

Development Method of Digital Content Finance-Focused on by Technical Value Evaluation (디지털 콘텐츠 금융 활성화 방안-기술가치 평가를 중심으로)

  • Lee, MyounJae;Khoe, Kyung-Il
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.111-117
    • /
    • 2015
  • Digital content industry is expected to grow due to the development of new devices and technologies, convergence between genres and technologies. However, Financial support system for the field of digital content has not been activated due to the digital content industry has the characteristics of a lot of initial investment costs and an uncertain profitability. This paper deals with the financial plan of activation of digital content businesses using technology evaluation. For this purpose, first, examine status of digital content businesses(status and sales financing, etc). Second, discuss development methods of digital contents finance based on the analysis of the digital content industry. This study is useful for deriving the development methods of digital contents finance using the technology valuation.

Countermeasure for Preventing a Secondary Damage of Information Leakage using Financial ISAC (금융 ISAC을 활용한 정보유출 2차피해 방지 방안)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.31-36
    • /
    • 2014
  • As security management center of financial area, financial ISAC monitors financial corporations and provides security services. Financial ISAC minimizes damage by responding quickly to external attack such as hacking, virus but it is poor at handling internal attack. For the efficient management and stable operation of information source, also to respond jointly to online hacking, the necessity of information sharing system increases day by day in and outside country. This paper proposes financial ISAC that can prevent a secondary damage of leakage information as well as providing security services. The proposed financial ISAC provides new password to financial corporation in which the same ID and password as leakage information are used and in case of financial information leakage it warns customers against phishing etc.

A Study on Implementation of Fraud Detection System (FDS) Applying BigData Platform (빅데이터 기술을 활용한 이상금융거래 탐지시스템 구축 연구)

  • Kang, Jae-Goo;Lee, Ji-Yean;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.4
    • /
    • pp.19-24
    • /
    • 2017
  • The growing number of electronic financial transactions (e-banking) has entailed the rapid increase in security threats such as extortion and falsification of financial transaction data. Against such background, rigid security and countermeasures to hedge against such problems have risen as urgent tasks. Thus, this study aims to implement an improved case model by applying the Fraud Detection System (hereinafter, FDS) in a financial corporation 'A' using big data technique (e.g. the function to collect/store various types of typical/atypical financial transaction event data in real time regarding the external intrusion, outflow of internal data, and fraud financial transactions). As a result, There was reduction effect in terms of previous scenario detection target by minimizing false alarm via advanced scenario analysis. And further suggest the future direction of the enhanced FDS.

A Study on the Intellectual property rights for the protection of financial instruments (금융상품의 보호를 위한 지식재산권 연구)

  • You, Hyun-Woo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.1-9
    • /
    • 2017
  • Financial instruments are economic and intangible assets that bring financial company tremendous economic returns when it is a success. Also, It is necessary to protect this because it is a product of effort made by a lot of human resources and materials. However, legal and institutional devices for financial instruments are insufficient currently and 'copying practices' are rampant throughout the industry in korea. This ultimately inhibits the utility and welfare of consumers, but also adversely affects the competitiveness of the financial industry. In order to finance innovation that new financial products and services have appeared, it is necessary to grant the appropriate rights, such as intellectual property rights of financial instruments. And, there is a need for measures to protect it. Thus, this study proposed new way protecting the financial instruments through Intellectual property right. It is the introduction of similar protection system to financial instruments, such as mechanisms that protect database producers in copyright law.

A Study on the Countermeasure Technology for Fin-Tech Optimized Financial Security (금융 보안에 최적화된 Fin-Tech 대응기술 연구)

  • Kim, Seokhoon;Kwak, Ha-Min
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.25-30
    • /
    • 2015
  • Recently, interest in Fin-Tech, a compound word of finance and technology, has been increased. However, Fin-Tech that is a mixture of finance and IT is exposed in terms of security. In this paper, we propose a method to solve the security-related problem that occurs in the financial sector where the Fin-Tech is used. Proposed method found out different problems of services which are provided by companies through a variety of financial sectors and described a method to facilitate the security service. In particular, proposed method presents a service plan to secure safety and to minimize the damage. Also, proposed method set an objective to stabilize financial services based on analyzed result after analyzing the problems of existing FinTech security services.

  • PDF

Countermeasure and Security Vulnerability of Fintech Services (핀테크 서비스의 보안 취약점과 대응방안)

  • Park, Jeong-Guk;Kim, In-Jae
    • Korea Information Processing Society Review
    • /
    • v.22 no.5
    • /
    • pp.36-45
    • /
    • 2015
  • 금융과 IT의 융합을 의미하는 핀테크(Fintech) 열풍이 전세계적으로 뜨겁게 불고 있다. 핀테크를 통해 신기술들이 금융 산업 전반에 융합되면서 새로운 형태의 금융서비스가 등장하고 기존의 금융 시스템들이 가져왔던 문제점들을 개선하는데 기여할 것으로 보인다. 하지만 핀테크 산업 활성화를 위한 지속적 규제 완화와 이용자 편의성을 위한 각종 절차의 간소화 그리고 채널 서비스 기술간의 융복합이 일어나는 환경에서 제공되는 핀테크 서비스의 안전성에 대해 우려가 있다. 핀테크 시대에 정보보안은 성장의 인프라이며 금융상품을 선택하는 중요한 기준이 될 것이므로 보안리스크의 정량화와 단계별 통제 방안을 수립하고 사용자 인증, 결제정보 보안, API(Application Programming Interface) 보안 등 필요한 보안요소를 사업모델에 맞게 적용함으로써 편리성과 보안성을 함께 확보할 수 있어야 한다. 본 연구에서는 정보보안 관점에서 핀테크의 서비스의 특징과 보안 취약점을 분석하고 관련 위험을 줄이기 위한 대응방안을 모색해 보았다.

Effective measures for the regulation and supervision of encryption of unique identification information of financial companies (금융회사의 고유식별정보 암호화 규제·감독에 대한 실효성 확보 방안)

  • Lee, Seung Yun;Kim, In Seok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.3-9
    • /
    • 2018
  • The purpose of this study is to propose effective countermeasures against the regulation and supervision of unique identification information for financial institutions and present the present problems and future directions. In financial institutions, it is investigated that DB system of many personal information processing systems is in order to comply with the law, and additional measures such as encryption are required for data files containing unique identification information in many other application systems. In this paper, the conclusions of institutional, administrative, and technological feasibility are presented.

  • PDF

A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing (빅데이터 기반의 융합 보이스피싱을 이용한사회공학적 공격 기법과 대응방안)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.1
    • /
    • pp.85-91
    • /
    • 2015
  • Recently government has distributed precautionary measure and response procedures for smishing(SMS phishing), pharming, phishing, memory hacking and intensified Electronic Financial Transaction Act because of the sharp increase of electronic bank frauds. However, the methods of electronic bank frauds also developed and changed accordingly so much it becomes hard to cope with them. In contrast to earlier voice phishing targeted randomizing object, these new methods find out the personal information of targets and analyze them in detail making a big data base. And they are progressed into new kind of electronic bank frauds using those analyzed informations for voice phishing. This study analyze the attack method of voice phishing blended with the Big Data of personal informations and suggests response procedures for electronic bank frauds increasingly developed. Using the method to save meaningless data in a memory, attackers cannot deduct accurate information and try voice phishing properly even though they obtain personal information based on the Big Data. This study analyze newly developed social technologic attacks and suggests response procedures for them.