• Title/Summary/Keyword: 불법 침입

Search Result 127, Processing Time 0.02 seconds

Novel Anomaly Detection Method for Proactive Prevention from a Mobile E-finance Accident with User"s Input Pattern Analysis (모바일 디바이스에서의 전자금융사고 예방을 위한 사용자입력패턴분석 기반 이상증후 탐지 방법)

  • Seo, Ho-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.47-60
    • /
    • 2011
  • With the increase in the use of mobile banking service, mobile banking has become an attractive target to attackers. Even though many security measures are applied to the current mobile banking service, some threats such as physical theft or penetration to a mobile device from remote side are still remained as unsolved. With aiming to fill this void, we propose a novel approach to prevent e-financial incidents by analyzing mobile device user's input patterns. This approach helps us to distinguish between original user's usage and attacker's usage through analyzing personal input patterns such as input time-interval, finger pressure level on the touch screen. Our proposed method shows high accuracy, and is effective to prevent the e-finance incidents proactively.

Secure PIN Authentication Technique in Door-Lock Method to Prevent Illegal Intrusion into Private Areas (사적 영역에 불법 침입 방지를 위한 도어락 방식의 안전한 PIN 인증 기법)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.327-332
    • /
    • 2024
  • The spread of smart phones provides users with a variety of services, making their lives more convenient. In particular, financial transactions can be easily made online after user authentication using a smart phone. Users easily access the service by authenticating using a PIN, but this makes them vulnerable to social engineering attacks such as spying or recording. We aim to increase security against social engineering attacks by applying the authentication method including imaginary numbers when entering a password at the door lock to smart phones. Door locks perform PIN authentication within the terminal, but in smart phones, PIN authentication is handled by the server, so there is a problem in transmitting PIN information safely. Through the proposed technique, multiple PINs containing imaginary numbers are generated and transmitted as processed values such as hash values, thereby ensuring the stability of transmission and enabling safe user authentication through a technique that allows the PIN to be entered without exposure.

A Basic Study on the Evaluation Index of the Crime Prevention through Environmental Design of Wooden Cultural Buildings (목조 건축문화재의 범죄예방환경설계 평가지표에 대한 기초연구)

  • Kim, Choong-sik
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.4-29
    • /
    • 2015
  • To protect cultural heritages from damage and destruction, evaluating the crime prevention environments is considered extremely important. This study analyzed the crime patterns related to cultural heritages, classified the crime environments by their types, and deduced the elements of the CPTED(Crime Prevention Through Environment Design), aiming to present the indices for evaluating the crime prevention environments. The results of this study can be summarized as follows. First, the crimes related to cultural heritages that must be prevented were identified as the night time trespassing and arson. According to the results of the analysis of external environments based on crime actions, the crime prevention environments of cultural heritages were classified into 10 types. Second, the important evaluation principles of the cultural heritage CPTED were the access control, surveillance reinforcement and the surrounding environment. Third, the access control that cover the internal region, boundary, external region and surroundings were classified into 22 indices. The surveillance reinforcement covers natural, organized and mechanical surveillance with 21 indices. Fourth, the applicability of the CPTED evaluation index was presented according to the types of the cultural crime prevention environments. The results confirmed that the maximum 43 indices were applicable to the seowon(lecture hall), hyanggyo(Confucian school), and gwana(district government office), and the minimum 10 indices, to the ramparts. Finally, the 43 indices were applied to Donam Seowon to validate their applicability. The results confirmed that most of the indices were applicable with the partial supplements. The evaluation index presented in this study is likely to contribute to studies in the cultural heritage CPTED field and to the protection of cultural heritages. Furthermore, this study is considered significant because it unleashed continuous concerns on and developments of CPTED. However, as the field survey to validate the applicability of the indices was limited to only one type, it may require further objective verification such as through an expert's examination of the validity and applicability of the evaluation index. In addition, to accommodate the index in related policies and systems, more precise verifications of the indices by type are considered necessary.

Recent Trends of Vessel-Source Pollution (선박 기인 오염물의 처리동향 및 대책)

  • Park, Sang-Ho;Kim, In-Soo
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.11a
    • /
    • pp.97-104
    • /
    • 2006
  • Though stringent guidelines are in place to protect the harbor environment, pollution from ships, from the ports terminals. Discharge from the ballast tanks of ships, though illegal, does occur. Such vessels, arriving from distant ports of call, can introduce exotic species of plants and animals, causing disruption of the local food web. Discharges rich in nitrogen can generate the rapid growth of plankton, eventually leading to a condition known as red tide that is lethal to some coastal organisms. In addition to the harbor's negative effects on marine organisms, the diesel engines of the ships and the trucks that haul cargo to and from the ports release large volumes of diesel exhaust into the atmosphere. IMO(International Maritime Organization) is strongly proceeding with adoption of a new maritime environment convention and coming into effect for regulation enhancement about the pollutants which are happened in a ship recently. Study about the conventions that our country currently comes into effect, and there is during forwarding and correspondence must be performed effectively. In this paper, International convention on the control of harmful Anti-Fouling system on ship, Ballast water management, Prevention of air pollution from ships, treat a main pending problem in ocean related environmental regulation convention.

  • PDF

A Study on the Actuality of School Safety and the Development of Safety Manual (학교안전교육의 실태분석과 안전교육매뉴얼 개발에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.5 no.3 s.18
    • /
    • pp.83-88
    • /
    • 2005
  • It is necessary to hold the school safety manual because recently, the safety-related accidents occur frequently in schools. Accidents can occur inside of schools as well as out of schools, and they can be classified with human accidents, traffic accidents, fire accidents, and explosion accidents. Safety-related accidents occurring in the school are dangerous because nobody can predict them. Illegally infringing violence, targeting unspecified and a lot of people, informs the parents and persons concerned to education of danger. School safety manual, never precedented before, describes epoch-making educational methods for students' safety. It describes safety security such as refuging ways at an emergency, the way to recognize danger for elevated safety based on prevention education, the use and practice of checklist for related facilities, and the implements and facilities for school personnels and students. So, the school safety manual is an important guidance for safety education at the level of prevention from various accidents which occur inside the school as well as out of the school. It presents a variety of prompt response after an accident. At the same time, it checks facilities and dangerous factors in schools and facilities for safety, and analyzes special factors based on them. So it will present the status of safety management of existing facilities and implements, the installment of new facilities and implements, and the way to secure safety for use.

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.

A Case Study on the Threat of Small Drone and the Development of Counter-Drone System (소형드론 위협 사례와 대드론체계 발전방향)

  • Kang-Il Seo;Ki-Won Kim;Jong-Hoon Kim;Sang-Keun Cho;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.327-332
    • /
    • 2023
  • On December 26, 2022, North Korea's drone provocation resumed for the first time in eight years. The threat covered not only the Seoul metropolitan area but also the no-fly zone for the presidential office's security, and the South Korean military's response to it is not appropriate, which is a major controversy. In the midst of this, problems caused by the prohibition of small drones' flight and illegal intrusion into restricted areas are increasing in Korea, and the threat is becoming a reality, such as being used for terrorist attacks abroad. In this paper, the concept of "Counter-Drone" and related technologies were considered for these drone threats, and implications were derived through domestic and overseas small drone threats, and the direction of development of the Counter-Drone system was presented. North Korea's drone threat is expected to be more diversified, massified, and advanced, resulting in bolder attacks and provocations. Therefore, the South Korean military should push for early powering of the integrated control system and the conter drone system, joint and military cooperation in response to the threat of small drones, and the ability to carry out joint operations between South Korea and the U.S.