• Title/Summary/Keyword: 금융IT 융합

Search Result 200, Processing Time 0.025 seconds

Countermeasure for Anti-financial hacking (금융 hacking 방지 대응방안)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.1
    • /
    • pp.43-48
    • /
    • 2013
  • With the development of computer technology, and have diversified technical system attacks evolve more. Computer hardware and software has evolved more and more, performance is improved, but the basic principle of operation does not change much, it is a problem. In general, the application is placed in a running state, the program data is placed in memory. Remains in memory for efficiency of operation of the operating system, we analyze memory and memory hacking, these data will have access to data. Since a large damage occurs key, such as certificates personal information, encrypted flows out, measures should be provided by it. In this content, I want to discuss the issues and work around memory hacking.

  • PDF

User Authentication Method using EEG Signal in FIDO System (FIDO 시스템에서 EEG 신호를 이용한 사용자 인증 방법)

  • Kim, Yong-Ki;Chae, Cheol-Joo;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.465-471
    • /
    • 2018
  • Recently, biometric technology has begun to be used as a fusion of IT technology and financial system. Using this biometric technology, FIDO(Fast Identity Online) technology, Samsung and Apple started Samsung Pay and Apple Pay service. FIDO authentication technology replaces existing authentication methods such as passwords. Among the biometric technologies, fingerprint recognition technology is attracting attention because it can minimize the device and user rejection at a relatively low price. However, fingerprint information has a limited number of users and it can not be reused if fingerprint information is leaked by an external attacker. Therefore, in this paper, we propose a method to authenticate a user using EEG signal which is one of biometrics technologies. W propose a method to use EEG signal measurement value in FIDO system by using convenience channel by using short channel EEG device. And propose a method to utilize EEG signal when the user recognizes a specific entity by measuring the EEG signal before and after recognizing a specific entity.

Analysis on the Relation between Small and Medium Firm's Stability and Tax Avoidance (중소기업의 안정성과 조세회피와의 관계성 분석)

  • Kim, Seong-Min;Choi, Hae-Sul
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.1-8
    • /
    • 2013
  • This study examine the relation between small and medium firm's stability and tax avoidance. We use some financial data of small and medium IT firms in KOSDAQ during 2001 to 2009. Following previous research(Desai and Dhamapala 2006), we estimate corporate tax avoidance. And we use quick ratio and current ratio as a short-term stability and equity ratio as a long-term stability. Empirical results follows as. First, It was not significant statistically between short-term stability and corporate tax avoidance. Second, it was significant statistically between the long-term stability and corporate. As corporate tax avoidance increases, the long-term stability(equity ratio) was low. Our analysis provides the empirical evidence between long-term stability and tax avoidance. It offers implications of corporate tax avoidance to small and medium IT firms in KOSDAQ. But this results is difficult generalization because of sample limits.

  • PDF

Implementation of Pre-Post Process for Accuraty Improvement of OCR Recognition Engine Based on Deep-Learning Technology (딥러닝 기반 OCR 인식 엔진의 정확도 향상을 위한 전/후처리기 기술 구현)

  • Jang, Chang-Bok;Kim, Ki-Bong
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.163-170
    • /
    • 2022
  • With the advent of the 4th Industrial Revolution, solutions that apply AI technology are being actively developed. Since 2017, the introduction of business automation solutions using AI-based Robotic Process Automation (RPA) has begun in the financial sector and insurance companies, and recently, it is entering a time when it spreads past the stage of introducing RPA solutions. Among the business automation using these RPA solutions, it is very important how accurately textual information in the document is recognized for business automation using various documents. Such character recognition has recently increased its accuracy by introducing deep learning technology, but there is still no recognition model with perfect recognition accuracy. Therefore, in this paper, we checked how much accuracy is improved when pre- and post-processor technologies are applied to deep learning-based character recognition engines, and implemented RPA recognition engines and linkage technologies.

The countermeasure against recent cyber terrors (최근의 사이버테러에 대한 대응방안)

  • Jeong, Gi-Seog
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.89-96
    • /
    • 2012
  • Information society which came due to advance of Information Technology improved the social and economical productivity as well as the quality of national life. But behind the right function the adverse effect as cyber terror is serious and become a big issue. Recently, hackings on a big scale occur frequently. The personal information stored in Internet company is leaked and customers are badly damaged by paralysis of banking system. Also hacking attacks by North Korea occur frequently. It causes confusion in our society and a threat to national security. In this paper, the trend of domestic cyber terror is observed and the countermeasure against cyber terror is proposed.

Countermeasure of Mobile App tamper attack (모바일 앱 위·변조 공격 및 대응방안)

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.37-40
    • /
    • 2015
  • Recently range of use also being increase along with smart phone users growing. And keep pace with hacking technician is increasing inter alia tamper technician has issued. This technician infringe integrity on three element of security of data. In this case reliability has deteriorated, the app itself has increased danger, and it's value has reduced. This can affect like take information even though don't have any authority to information or hemorrhage at large in this country. In other words, I has been arranged tamper's definition to.

  • PDF

A Study on Policy Alternatives to the Development of Urban Regeneration Project Using AHP Analysis (AHP분석을 이용한 도시재생사업의 발전에 대한 정책적 대안에 관한 연구)

  • Chung, Sam-Seok
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.6_3
    • /
    • pp.1303-1313
    • /
    • 2022
  • Modern cities need to revitalize the downtown area, which is declining due to population decline, economic recession, and deterioration of the residential environment, economically, socially, and physically by introducing and creating new functions. In addition, the hollowing out of the existing city center is getting worse due to the development of the outskirts of the city. Therefore, the discussion for the development of urban regeneration is the core task of modern cities. This study analyzed based on a basic understanding of urban regeneration projects, and through this, the problems of domestic urban regeneration projects were derived. In addition, the problem factors and major improvement plans of the urban regeneration project were analyzed from the expert's point of view using the AHP analysis technique. Based on this, the purpose is to present policy alternatives for the future development of urban regeneration projects. The problems derived to present the policy alternatives and improvement directions of the urban regeneration project were classified into problems related to goal achievement, problems related to the business itself, and problems related to project results. It was subdivided into sub-categories. This study analyzed the problem factors and major improvements from the expert's point of view by using the AHP analysis technique for the problems of the urban regeneration project. Based on the AHP analysis results and experts' opinions, five policy alternatives for the development of urban regeneration projects were presented.

Digital Healthcare Attack Scenario based on DeFi Security Vulnerability (DeFi 보안 취약점 기반 디지털 헬스케어 공격 시나리오)

  • Sang-Hyeon Park;Yu-Rae Song;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.208-209
    • /
    • 2023
  • IT(Information Technology) 기술이 고도화됨에 따라 금융 분야에서는 스마트 컨트랙트에 기반하여 자산을 거래할 수 있는 DeFi(Decentralized Finance)가 발전하고 있다. 또한, 다양한 IoT(Internet of Things) 기기들로 구성된 융합환경이 상호 연결되며 IoBE(Internet of Blended Environment)가 조성되고 있다. IoBE의 구성요소 중 의료융합환경인 디지털 헬스케어는 스마트 의료 기기를 통해 진료서비스를 제공한다. 최근에는 디지털 헬스케어 내 자산 거래 수단으로 DeFi를 활용하기 위한 연구가 진행되고 있다. 그러나, 디지털 헬스케어 서비스에 DeFi가 활용될 수 있음에 따라 DeFi 내 보안 위협이 전파될 수 있다. 전파된 보안 위협은 DeFi에서의 디지털 화폐 탈취뿐만 아니라, 디지털 헬스케어 내민감 정보 탈취, 서비스 거부 공격 등 복합 위협으로 이어질 수 있다. 따라서, 본 논문에서는 DeFi의 취약점을 분석하고 이를 기반으로 디지털 헬스케어에서 발생 가능한 공격 시나리오를 도출한다.

Concern and Prediction for Future Information Security expected by IT Executives (IT 실무자들이 전망하는 미래 정보보안의 우려와 예측)

  • Kim, Tae-Yang
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.117-122
    • /
    • 2018
  • In this paper, we review the security issues reported by the organizations every year and analyze the similarities and differences with the concerns that the practitioners engaged in the IT environment are concerned about the necessary security matters. Interviews and questionnaires were collected for practitioners working in various IT work environments such as government agencies, financial companies, general companies, airlines, etc. to gather their opinions on the concerns of future information security. We analyzed the collected opinions and derived key keywords. The results should be compared with the security issue keywords or statistical data reported by the security companies or related organizations in the first half and the second half of each year to find common security trends and to analyze the differences and supplement them I checked whether there was any danger. We will comprehensively analyze key security issues reported by security companies and information security related organizations and future security concerns predicted by IT practitioners to prepare for the security threats of the current era of the fourth industrial revolution.

A Study on the Prediction Method of Voice Phishing Damage Using Big Data and FDS (빅데이터와 FDS를 활용한 보이스피싱 피해 예측 방법 연구)

  • Lee, Seoungyong;Lee, Julak
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.185-203
    • /
    • 2020
  • While overall crime has been on the decline since 2009, voice phishing has rather been on the rise. The government and academia have presented various measures and conducted research to eradicate it, but it is not enough to catch up with evolving voice phishing. In the study, researchers focused on catching criminals and preventing damage from voice phishing, which is difficult to recover from. In particular, a voice phishing prediction method using the Fraud Detection System (FDS), which is being used to detect financial fraud, was studied based on the fact that the victim engaged in financial transaction activities (such as account transfers). As a result, it was conceptually derived to combine big data such as call details, messenger details, abnormal accounts, voice phishing type and 112 report related to voice phishing in machine learning-based Fraud Detection System(FDS). In this study, the research focused mainly on government measures and literature research on the use of big data. However, limitations in data collection and security concerns in FDS have not provided a specific model. However, it is meaningful that the concept of voice phishing responses that converge FDS with the types of data needed for machine learning was presented for the first time in the absence of prior research. Based on this research, it is hoped that 'Voice Phishing Damage Prediction System' will be developed to prevent damage from voice phishing.