• Title/Summary/Keyword: 보안회사

Search Result 230, Processing Time 0.02 seconds

Study on Problem and Improvement of Legal and Policy Framework for Smartphone Electronic Finance Transaction - Focused on Electronic Financial Transaction Act - (스마트폰 전자금융거래 보호를 위한 법제적 문제점 분석 - 전자금융거래법(안)을 중심으로 -)

  • Choi, Seung-Hyeon;Kim, Kang-Seok;Seol, Hee-Kyung;Yang, Dae-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.67-81
    • /
    • 2010
  • As wide propagation of smartphones, e-commerce with smartphones increases rapidly. Such as transfer or stock trade systems. It has prospect that most of financial companies going to offer e-commerce systems via smartphones. And e-commerce via smartphones will be increased, hence the nature of smartphone that can be used whenever, wherever. However, legislation of e-commerce in Korea does not reflect these characteristics of smartphones, because it has set standards in regular PC. So that this study is security threat and feature of smartphones considering that the current legal system will use Certificate constraints, ensuring the safety of e-commerce and install security programs for protection of users, e-commerce responsible for the accident analysis has focused on the issues presented for this improvement.

A Study on the Liability of Information Protection for the Third Party Supply of Personal Information/Focus on Fintech Companies Using OPEN APIs (개인정보의 제3자 제공시 정보보호 관련 법상 책임에 관한 연구/OPEN API 이용 핀테크 기업을 중심으로)

  • Kim, Jo-eun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.21-38
    • /
    • 2017
  • It is actively opening the market to fintech companies through open platforms, such as financial institutions and public institutions. In this thesis, we will look at the conceptual differences between the "provision of third-party information" and "entrustment" of information protection related laws, such as the Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Data Protection Etc (Network Utilization Protection Act). In addition, the legal obligation to provide information regarding the legal rights of information is considered to be relevant, whereas the legal obligation of the private information provided by the company is excessively mitigated, whereas the legal obligation of the company to provide information is excessively mitigated. In addition, I suggest self-diagnosis checklist to help fintech companies improve their privacy levels. It was found that the level of information protection was relatively insufficient compared to the consignees based on the results of a survey conducted for 31 fintech companies. Aggressive use of the checklist is suggested to raise the level of information protection for those companies.

A Study on the Policy Proposal and Model B2B2C for Safe Open Banking (안전한 오픈뱅킹 구축을 위한 정책 및 B2B2C 모델에 관한 연구)

  • Choi, Dae-Hyun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1271-1283
    • /
    • 2019
  • The fourth industrial revolution and digital transformation are also bringing major changes to the financial ecosystem in Korea. Already, global financial firms overseas are opening their financial markets and exploring new financial businesses by seeking ways to co-prosperity with fintech firms. However, it is also true that the domestic financial environment has failed to respond to the changes due to its monopolistic and closed structure. In response, the government began pushing for the introduction of open banking in December 2019 with the aim of fully opening the financial settlement system. However, unlike the existing simple financial transaction structure, open banking still has an unresolved part due to the unclear relationship of responsibilities between interested parties in the event of financial accidents due to the complex linkage structure of transactions such as financial firms, fintech firms and customers. This study analyzed the security threat of open banking in depth. By doing so, the government and financial firms want to present policy proposals that need to be improved to enhance the safety of open banking in korea and protect financial consumers, as well as new financial models that have improved the vulnerable parts of existing models.

Design of a Safety Distance Securing System using Infrared cameras (적외선 카메라를 이용한 안전거리 확보 시스템 설계)

  • Seo, Sang-Hyun;Jung, Dong-Hun;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.329-332
    • /
    • 2015
  • 야간에 자동차를 운행할 때 검정색 차량 같은 어두운 색상의 자동차는 운전자가 인지를 못하는 경우가 많고 안개가 짙게 낀 상황도 운전자의 시야가 좁아져 교통사고율이 급격하게 증가한다. 도로교통공단의 자료에 의하면 최근 5년(2009~2013) 동안 가해자의 안전거리 미확보로 인한 교통사고는 매년 감소하는 것으로 나타나지만, 안전운전 의무 불이행 다음으로 두 번째로 높은 사고 건수를 기록하고 있다. 이는 아직도 운전자의 시인성 저하에 대한 방안이 부족하기 때문이다. 시인성 저하를 위한 대책으로 BMW, AUDI, Benz 회사에서 적외선 카메라를 이용한 나이트 비젼이 있으나 거리감지기능이 없어 디스플레이를 계속 주시하면서 운행하여야 하므로 시야가 좁아져 다른 위험이 발생할 수 있다. 현재 시중에 제공되고 있는 적외선 나이트 비젼 카메라를 이용하였을 때 일반 시야보다 약 4배 정도의 거리를 인식할 수 있었고, 이러한 나이트 비젼의 장점을 활용하여 전면 차량과의 안전거리를 확보하는 시스템을 제안한다. 본 논문에서는 제시하는 시스템은 시인성이 떨어지는 환경을 가정하여 설계하였고 나이트 비젼 카메라를 이용해 디스플레이로 출력하여 육안으로 구분할 수 없는 물체도 인지할 수 있어 헤드라이트를 켜고 운행할 때보다 안전한 운행을 할 수 있을 것으로 보인다. 하지만 디스플레이를 지속적으로 주시하며 운행할 경우 거리 감각이 떨어져 근접해 오는 물체와의 충돌 사고를 막기 힘들 것으로 보인다. 따라서 이러한 단점을 보안하기 위해 영상 데이터를 활용하여 앞 차량의 유무를 파악하고 차량이 있을 때 안전거리를 디스플레이에 표시함으로 앞 차량과의 거리를 유지하여 사고를 예방하여 안전 운행이 가능하도록 설계하였다.

  • PDF

Design and Implementation of Digital Door Lock by IoT (사물인터넷을 이용한 디지털 도어락, DDiT의 설계 및 구현)

  • Seo, Dae Gyu;Ko, Han Shin;Noh, Yong Deok
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.215-222
    • /
    • 2015
  • In this paper, the Digital DoorLock by Internet of Things (DDiT) is introduced. In order to implement DDiT, an integrated micro-controller platform, Arduino is used to control an existing digital doorlock and an android type smart phone is adopted as a mobile platform. One of the advantages of DDiT is that it can be added to an existing digital doorlock and a smart phone application is used as a digital key. Owing to the smart phone application, several other types of applications could also be made. Therefore, DDiT could be used effectively and conveniently in ordinary homes as well as in high security applications such as in hotels, institutes, and companies.

A Study on Improving Cyber Liability Insurance for Electronic Financial Incident in Easy Payment System (간편결제 서비스에서 전자금융사고 시 국내 사이버 배상책임보험의 한계 및 개선방안에 대한 연구)

  • Lee, Han-Jun;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2016
  • A convergence of finance and information technology brought a remarkable development in Fin-Tech industry. On the other hand, currently existing laws seemed inappropriate to address the liability of financial institutions, Fin-tech enterprises and consumers in case of financial accidents due to its ambiguity. The minimum insurance obligation by financial institutions specified under the Electronic Financial Transaction Act 2006 is not keeping with current reality, considering transaction volume, frequency of incidents, and security investments. This paper aims to lay stress on the need of cyber liability insurance by understanding the domestic financial incidents and management, and the limit of existing insurance policy.

A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity (금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과)

  • Lee, Jeong-Ha;Lee, Sang-Yong Tom
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level) (전자금융기반시설 정보보호 수준강화 방안 (정보보호 관리수준 분석을 통한))

  • Park, Keun-dug;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1605-1618
    • /
    • 2016
  • In recent years, security incidents - such as personal information leakage, homepage hacking, DDoS and etc. - targeting finance companies(banks, securities companies, credit card companies, insurance companies and etc.) have increased steadily. In this paper, we analyze problems of information security management level in the existing electronic financial infrastructure from perspective of compliance and information security certification system and propose improvements to enable sustainable high level of information security activities under a comprehensive management system for the financial sector characteristics using ISMS, SECU-STAR and CNIVAM system.

동경전력 대대적인 절전캠페인 실시!!

  • 대한전기협회
    • JOURNAL OF ELECTRICAL WORLD
    • /
    • s.315
    • /
    • pp.57-65
    • /
    • 2003
  • 일본 최대 전력회사인 도쿄(동경)전력(주)는 후쿠시마 제1원자력발전소 제1호기의 격납용기 보수사실 은폐와 보수기록 허위작성 등의 협의로 2002년 10월 원자력안전$\cdot$보안원으로부터 1년간의 발전정지처분을 받았으며, 이에 대한 책임으로 도쿄전력의 회장(황목호), 사장(남직재) 등 경영간부들이 사직하였다. 또한 원자력발전소의 잦은 고장으로 인하여 국민들로부터 신뢰를 잃고 있다. 이에 모든 원자력발전소에 대하여 철저한 점검계획을 작성$\cdot$실시하는 등 신뢰회복에 심혈을 기울이고 있다. 한편, 도쿄전력은 기저부하를 담당하고 있던 원자력발전소 17기 중 12기가 발전정지 됨으로써 전력공급에 어려움을 겪고 있으며, 특히 금년 3월 이후에는 공급예비율이 $0\%$에 이를 것으로 전망되는 등 전력수급에 비상이 걸렸다. 이르 극복하기 위해 화력발전소의 O/H일정 조정, 부하조절 시행, 대국민 절전 홍보를 대대적으로 실시하고 있다. 이와같이 도쿄전력에서 절전캠페인을 실시하는 것은 1973년 오일쇼크 이래 처음 있는 일이다. 우리 나라도 전력소비 및 LNG 소비의 급증으로 에너지 수급에 많은 어려움을 겪고 있다. 특히 최근에는 미국$\cdot$이라크 전쟁위기감이 고조되면서 국제 유가가 급등하고 있어 ''에너지절약 강화대책 시행'' 등 에너지위기 극복을 위해 전국민적인 노력을 기울이고 있다. 이에 일본에서 벌어지고 있는 절전캠페인을 참고하여 우리 나라의 에너지위기 극복에 조금이나마 도움이 되었으면 하는 바램으로, 그중 일부 ''전력기기별 절전내용''을 소개한다.

  • PDF

A Study of Cheater Detection in FPS Game by using User Log Analysis (사용자 로그 분석을 통한 FPS 게임에서의 치팅 사용자 탐지 연구: 인공 신경망 알고리즘을 중심으로)

  • Park, Jung Kyu;Han, Mee Lan;Kim, Huy Kang
    • Journal of Korea Game Society
    • /
    • v.15 no.3
    • /
    • pp.177-188
    • /
    • 2015
  • In-game cheating by the use of unauthorized software programs has always been a big problem that they can damage in First Person Shooting games, although companies operate a variety of client security solutions in order to prevent games from the cheating attempts. This paper proposes a method for detecting cheaters in FPS games by using game log analysis in a server-side. To accomplish this, we did a comparative analysis of characteristics between cheaters and general users focused on commonly loaded logs in the game. We proposed a cheating detection model by using artificial neural network algorithm. In addition, we did the performance evaluation of the proposed model by using the real dataset used in business.