• Title/Summary/Keyword: 도청

Search Result 463, Processing Time 0.034 seconds

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

Survey on Eavesdropping in Recent Domestic Press (최근 국내 언론을 통해 본 도청 실태)

  • 박춘식
    • Review of KIISC
    • /
    • v.6 no.2
    • /
    • pp.87-92
    • /
    • 1996
  • 본 자료는 도청에 관한 국내 언론에 비친 내용들을 발췌하여 정리한 것이다. 본 자료를 통해서 알 수 있었던 것은 공산주의 몰락으로 인한 각국의 첩보나 정보 수집 대상국이 적국이 아니라 이익이 된다면 어떤 국가라도 대상으로 한다는 점이다 또한, 대상 정보도 경제 전쟁으로 불리울 만큼, 군사용만이 아니라 과학, 기술. 금융. 경제 등의 경제 관련 정보로 확대되었다는 점이다. 그리고 개인들의 사생활 정보도 도청에 의해 쉽게 침해되고 있으며 기업대 기업간 국가대 국가간 해당범위를 가리지 않고 도청이 행하여지고 있으며 도청 기술도 상상을 초월할 정도로 발전하고 있음을 알 수 있었다.

  • PDF

The danger and vulnerability of eavesdropping by using loud-speakers (스피커를 이용한 도청 위험에 대한 연구)

  • Lee, Seung Joon;Ha, Young Mok;Jo, Hyun Ju;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1157-1167
    • /
    • 2013
  • The development of electronic devices has recently led to many problems such as personal information rape and leakage of business information. Conventional loud-speakers have been generally used to output devices. It can be, however, operated as a micro-phone which was abused as a means for eavesdropping since the speaker and microphone have basically the equivalent structure. Most importantly, the general peoples are not aware of the approaching danger about using speaker as microphone. And, traditional eavesdropping detection equipment does not check the attack. In this paper, we demonstrate that there is a serious danger and vulnerability in using loud-speakers since they can be used as eavesdropping devices.

A Study of Eavesdropping and Vulnerability Attack of Administrative Agency VoIP Services (행정기관 VoIP 서비스에 대한 취약점 공격과 도청 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.447-450
    • /
    • 2011
  • 행정기관 VoIP 서비스는 현재 PSTN망과 인터넷망을 활용하여 기존 전화망보다 저렴한 가격에 음성통화를 할 수 있게 해주는 서비스로 확대되고 있다. 하지만 공공의 보안이 유지 되어야 할 행정기관 VoIP의 경우 보안취약성에 대한 문제들이 발생하고, 해커의 공격을 받을 가능성이 높다. 본 논문은 행정기관에서 유 무선 인터넷을 이용하여 VoIP 서비스 이용 시 발생할 수 있는 침해사고 유형을 분석하고 도청 공격을 실시하여 취약점을 분석한다. 행정기관용 Smart Phone으로 VoIP 취약점을 분석을 위하여 OmniPeek와 AirPcap 장비가 설치되어 있는 실험실 환경에서 도청 공격을 실시한 다. 도청 공격에 따르는 Packet을 분석하고, IP을 확인하여 공격에 의한 침해사고로 도청이 이루어짐을 시험으로 증명한다. 본 논문의 연구는 행정기관뿐 아니라 일반사용자의 Smart Phone과 VoIP 서비스 보안성 강화에 기초자료로 제공 될 것이다.

  • PDF

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

A Solution of Binary Jamming Message to Source-Wiretapping and Disadvantage of Sharing the Jamming Signal in Physical-Layer Security (물리 계층에서 보안 재밍 신호 공유의 한계점과 이진 재밍 메시지 도청의 해결책)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.63-67
    • /
    • 2014
  • A distributed zero-beamforming based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. In addition, the currently alternatives are very limited when the eavesdropper is located nearby a source for wiretapping. This letter presents a solution to this extreme case. Relay randomly generates and transmits a binary jamming message to both source and destination in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the use of exclusive-or for its information message and the decoded message. Consequently, the next transmission can avoid the eavesdropping.

Mathematical Analysis for Efficiency of Eavesdropping Attack Using Directional Antenna in mmWave Band (밀리미터파 대역에서 지향성 안테나 사용에 의한 도청공격 대응 효율성의 수학적 분석)

  • Kim, Meejoung;Kim, Jeong Nyeo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1074-1077
    • /
    • 2013
  • This paper analyzes the benefit of using directional antennas against eavesdropping attack in millimeter wave (mmWave)-based networks. All devices are equipped with a directional antenna or an omni-directional antenna in a single-hop communications. The probability of a device being detected by an eavesdropper is analyzed based on the exposure region of a device. The relative detection rate is introduced to represent the benefit of using directional antenna. Numerical results show that there exists an optimal number of devices that maximizes the detection probability and it varies according to the parameters such as antenna beamwidth. It shows that the use of directional antenna enables to protect the devices from the detection by an eavesdropper for almost the whole situation in mmWave band communication.

An Analysis of the Multiplier Effects of Gyeongsangbuk-Do Provincial Government Relocation on Daegyeong Economic Region (경북도청 이전이 대구경북광역경제권에 미치는 파급효과 분석)

  • Chun, Kyung Ku;Kim, Eun Kyung;Cho, Deokho
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.246-258
    • /
    • 2013
  • The relocation of the public institutions such as the provincial government attracts much attentions since it results in substantial regional economic impacts. In this context this paper analyzes the effects of relocation of Gyeongsangbuk-Do provincial government from Daegu city to Gyeongsangbuk-Do, which is scheduled for 2014, on Daegyeong economic region. Based on the interregional input-output model and I-O data which were provided by the Bank of Korea, this paper examines the multiplier effects of the relocation in terms of production, value added, and employment on Daegyeong economic region and other regions, except for the construction effects of the provincial capital. According to the analysis, the relocation is expected to reduce the production by 290million won, value added by 709million won, and employment by 571 persons in Daegyeong economic region. Also, the relocation turns out to decrease the production by 1,179million won and value added by 123million won of other regions. This paper discusses some policy implications of the analysis.

  • PDF

건설현장을 찾아서 - 철저한 안전관리로 신(新) 경북시대 열어갈 도청 건립 현장 운영의 기본 방침은 오직 '안전', 대우건설 경북도청 현장

  • Yeon, Seul-Gi
    • The Safety technology
    • /
    • no.184
    • /
    • pp.16-18
    • /
    • 2013
  • 민족 문화의 본산이자 산업근대화의 주역 경상북도가 또 한 번의 도약을 준비하고 있다. 기존 대구를 벗어나 선비정신으로 대변되는 우리나라 정신문화의 수도 '경북안동시'에 새로운 도청을 건설하고 있는 것이다. 이 사업이 완료되면 경북도는 그간 문제가 됐던 행정서비스 수요 공급주체 간의 행정구역 불일치 문제를 해결할 수 있게 되는 것은 물론 도정의 굳건한 지역 구심점을 구축하게 되어 약화됐던 도민의 긍지도 드높일 수 있게 된다. 실로 경북도가 우리나라 산업과 문화의 중심지로 발돋움하기 위한 발판이 마련되는 것이다. 이런 거대한 변화를 만들어내고 있는 주인공은 바로 '대우건설'이다. '대우건설 경북도청 현장'은 새로운 경북도청을 전국에서 손꼽히는 랜드마크로 만들겠다는 신념으로 시공에 임하고 있다. 빈틈없는 안전관리를 통해 경북의 변화를 이끌고 있는 이곳 현장을 찾아가 봤다.

  • PDF