• Title/Summary/Keyword: 범죄위험

Search Result 227, Processing Time 0.026 seconds

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Threat Situation Determination System Through AWS-Based Behavior and Object Recognition (AWS 기반 행위와 객체 인식을 통한 위협 상황 판단 시스템)

  • Ye-Young Kim;Su-Hyun Jeong;So-Hyun Park;Young-Ho Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.189-198
    • /
    • 2023
  • As crimes frequently occur on the street, the spread of CCTV is increasing. However, due to the shortcomings of passively operated CCTV, the need for intelligent CCTV is attracting attention. Due to the heavy system of such intelligent CCTV, high-performance devices are required, which has a problem in that it is expensive to replace the general CCTV. To solve this problem, an intelligent CCTV system that recognizes low-quality images and operates even on devices with low performance is required. Therefore, this paper proposes a Saying CCTV system that can detect threats in real time by using the AWS cloud platform to lighten the system and convert images into text. Based on the data extracted using YOLO v4 and OpenPose, it is implemented to determine the risk object, threat behavior, and threat situation, and calculate the risk using machine learning. Through this, the system can be operated anytime and anywhere as long as the network is connected, and the system can be used even with devices with minimal performance for video shooting and image upload. Furthermore, it is possible to quickly prevent crime by automating meaningful statistics on crime by analyzing the video and using the data stored as text.

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.

Study on The development of Danger Indicator for Prevention of Construction Equipment Accidents - Based on construction equipment accidents of A company - (건설장비 사고예방을 위한 위험지수 개발에 관한 연구 - A사 건설장비 사고사례 중심으로 -)

  • Kim, Byungyong;Ho, Jongkwan
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.4 no.1
    • /
    • pp.9-15
    • /
    • 2021
  • Recently, buildings have become larger, more complex, and various construction methods have been tried. As a result, the use of construction equipment continues to increase, as well as safety accidents. According to the Ministry of Employment and Labor's report on industrial accidents, the rate of deaths caused by construction equipment among construction accidents has been increasing steadily since 2009. In the safety field of other industries such as crime and traffic, research has been continuously conducted to develop quantitative indicators due to demands for development of evaluation indicators or risk index development. On the other hand, construction equipment has been studied to analyze disaster cases and come up with improvement measures, but there is no research related to risk index. Therefore, the research will develop a quantitative index that can determine the risk level of construction equipment in the field based on the accident case and verify the possibility of use in the field.

A Study on Improvements in the Method of Local Risk Assessment for Natural Disasters (자연재해 지역위험성평가 방법 개선방안 연구)

  • Choi, Sung Jo;Kang, Hwi Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.2
    • /
    • pp.1-12
    • /
    • 2022
  • Based on major safety-related statistics of cities, provinces, counties, and districts across the country, social disasters manage regional safety index ratings in six areas(traffic accidents, fires, crime, life safety, suicide, and infectious diseases), and natural disasters operate a management system. The current application of the regional safety assessment of natural disasters is very insufficient to evaluate the local risk of natural disasters up to the Eup, Myeon, and Dong level, and it is marked too engineering and difficult for the general public to use. The purpose of this study is to present Korea's natural disaster local risk assessment as an improvement model that extends to the sub-unit of Eup, Myeon, and Dong, using the local risk assessment model mixed with natural and social disasters.

CHARACTERISTICS OF DETAINED DELINQUENT ADOLESCENTS AND VARIABLES RELATED TO THE REPEATED CRIME DURING 6 MONTHS AFTER RELEASE (구속된 비행 청소년들의 특성 및 석방 후 6개월간 재범여부와 관련된 변인)

  • Kim, Won-Sik;Koh, Seung-Hee;Koo, Yong-Jin;Kim, Hong-Chang;Suh, Dong-Hyuck;Chung, Sun-Ju
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.10 no.2
    • /
    • pp.201-211
    • /
    • 1999
  • Objectives:This study investigated the characteristics of detained delinquent adolescents and variables related to the repeated crime during 6 months after release. Methods:The socio-demographic and crime-related characteristics of 73 detained adolescents were evaluated by semi-structured interviews and police records, and the psychological characteristics of them measured by the MMPI. We also compared the characteristics between subjects with and without repeated crime during 6 months after release. Results:1) Most of detained adolescents had families with low socioeconomic status(77%) and broken families(48%). Sixty-six percent of them were dropped out of school. The most frequent crime pattern was theft(49%), and with accomplice(77%). Seventy-five percent of total subjects had the records of previous conviction. Of the previous convictions, seventy-eight percent was same with the present crimes. 2) Subjects with repeated crime during 6 months after release were younger and had higher T-score on Pa scale of MMPI than the subjects without repeated crime. More adolescents with repeated crime had broken families than those without repeated crime. They also showed the crime-related characteristics of higher percent of theft among crime patterns, higher incidence of previous conviction, younger age of the first crime, and shorter crime-free duration from the last to present crime. Conclusion:These results of present study suggest that the development and the persistence of adolescent delinquency would be resulted from interaction of factors of individual, family, school, and community. By the comparison between subjects with and without repeated crime, it was found that familial dysfunction, younger age at first crime, presence of previous conviction might be the risk factors for repeated delinquency. To prevent repeated crime of delinquent adolescents more effectively, early therapeutic intervention and the development of programs to help adaptation in school and community would be essential.

  • PDF

A Study on Analysis of Requirements in the Smart Societal Security Wireless Network (스마트 사회안전무선통신망 요구사항 분석에 관한 연구)

  • Choi, Jae-Myeong;Woo, Byung-Hoon;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.518-523
    • /
    • 2014
  • The development of Societal and Scientific technologies have increased risk of dysfunction caused by new technologies such as nuclear power, information technology. Also, urbanization and population density is increasing risk to high-rise building fires, traffic accidents, crime and etc. Implementation of wireless communication network on the societal security is very necessary for prevention, preparation and response against these risks. It always consists maintenance, management and the network must be maintained in an emergency. In this paper, we studied the societal security wireless communication network for prevention, preparation and response against complex disasters, and analyzed requirements(essential function, add-ons) for implementation network in the societal security wireless network.

A Method of Comparing Risk Similarities Based on Multimodal Data (멀티모달 데이터 기반 위험 발생 유사성 비교 방법)

  • Kwon, Eun-Jung;Shin, WonJae;Lee, Yong-Tae;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.510-512
    • /
    • 2019
  • Recently, there have been growing requirements in the public safety sector to ensure safety through detection of hazardous situations or preemptive predictions. It is noteworthy that various sensor data can be analyzed and utilized as a result of mobile device's dissemination, and many advantages can be used in terms of safety and security. An effective modeling technique is needed to combine sensor data generated by smart-phones and wearable devices to analyze users' moving patterns and behavioral patterns, and to ensure public safety by fusing location-based crime risk data provided.

  • PDF

Statistical Analysis of Recidivism Data Using Frailty Effect (프레일티를 이용한 재범 자료의 연구)

  • Kim, Yang-Jin
    • The Korean Journal of Applied Statistics
    • /
    • v.23 no.4
    • /
    • pp.715-724
    • /
    • 2010
  • Recurrent event data occurs when a subject experience the event of interest several times and has been found in biomedical studies, sociology and engineering. Several diverse approaches have been applied to analyze the recurrent events (Cook and Lawless, 2007). In this study, we analyzed the YTOP(Young Traffic Offenders Program) dataset which consists of 192 drivers with conviction dates by speeding violation and traffic rule violation. We consider a subject-specific effect, frailty, to reflect the individual's driving behavior and extend to time-varying frailty effect. Another feature of this study is about the redefinition of risk set. During the study, subject may be under suspension and this period is regarded as non-risk period. Thus the risk variables are reformatted according to suspension and termination time.

미래 지식정보사회의 정보보호 전략 프레임워크

  • Hwang, Jung-Yeon
    • Information and Communications Magazine
    • /
    • v.26 no.1
    • /
    • pp.31-37
    • /
    • 2009
  • 우리나라는 세계 최고 수준의 IT 인프라를 기반으로 네트워크 및 서비스 융합, RFID 등 u-IT 서비스 확산 등을 통해 유비쿼터스 사회로 빠르게 진입하고 있다. 향후 디지털 융합이 가속화됨에 따라 시간과 공간의 제약 없이 원하는 정보의 획득 활용이 증가하고, u-Health, u-learning 등 IT가 타산업과 융합되면서 높은 부가가치를 창출할 것으로 전망 된다. 그러나 정보화의 급속한 진전에 따른 사회 전반의 편의성과 효율성이 향상하였으나, 해킹 바이러스, 개인정보 유출사고, 스팸 등 역기능으로 인한 피해도 확산되고 있다. 최근에는 네트워크 방어체계를 무력화시키는 지능화된 해킹, 대량의 고객정보 유출, 사회공학 기법을 활용한 피싱 등 이용자의 자산과 프라이버시를 침해하는 사이버범죄 증가 등으로 이용자자산과 권리 보호관점에서의 정보보호의 중요성이 부각되고 있다. 향후 시간과 장소에 상관없이 지식정보를 활용하여 편리하고 쾌적한 생활을 누리게 하는 지식정보사회는 예측 불가능한 위험이 곳곳에 산재한 정보위험사회로의 진입을 의미 할 수도 있다. 그러므로 미래사회에서 예상되는 위협을 예측하여 효과적으로 사전에 예방할 수 있는 체계를 마련하는 것은 안전하고 신뢰할 수 있는 지식정보사회를 향유하기 위한 전제조건으로 작용한다. 이에 본고에서는 미래 지식정보사회에 대비한 정보보호 전략으로 안전한 u-사회 청사진 설계 및 환경조성 선도와 국제화, 사이버위협 예방 및 대응체계의 입체적 조화와 융합, 정보보호 기술 제품 산업간 선순환 촉진과 성장 등 3대 전략을 설정하고 실행방안을 제시한다.