• Title/Summary/Keyword: 비공개

Search Result 115, Processing Time 0.023 seconds

A System for National Intelligence Activity Based on All Kinds of OSINT(Open Source INTelligence) on the Internet (인터넷의 다원적 공개출처정보(OSINT)에 기반을 둔 국가정보활동 체계)

  • 조병철
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.41-55
    • /
    • 2003
  • Today the traditional national intelligence activities which are mainly based on classified informations are confronted with several problems. These are excessive collection cost, morality of intelligence activity, objectivity of intelligence, intelligence dead zone and timeliness of intelligence etc. On the other hand, circumstances of national intelligence activity are rapidly changed. Those are rapid growth of internet, transformation of classified information into open one and rapid growth of intelligence capabilities of private sector. To cope these problems and circumstances, we reevaluated OSINT(Open Source INTelligence) which is collected from all kinds of open source informations on the internet. First, we classified OSINT into four categories corresponding to the traditional classified collection methods i.e., IMINT, SIGINT, HUMINT and MASINT. And we evaluate the value of OSINT in comparison with classified collection methods. Finally a system for national intelligence activity based on all kinds of open source intelligence on the internet is proposed, described and compared with the system of traditional national intelligence activity.

  • PDF

비공개기업의 상장사 인수와 신규상장의 비교연구

  • Gang, Won
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.161-195
    • /
    • 2006
  • 비공개기업이 상장할 수 있는 방법은 신규상장(IPO)과 기존의 상장기업을 인수하여 소위 우회상장을 하는 방법이 있다. 전자는 제도에 의한 자본시장 진입인데 반해 후자는 시장거래에 의한 자본시장 진입이라는 점에서 후자가 시장원칙에 가깝다고 할 수 있다. 그럼에도 불구하고 상장사 인수는 부실기업이 자본시장에 진입하는 것을 차단할 수 있는 심사기능이 약하고, 시장진입 시 정보를 시장에 제공하는 정보기능이 약하다는 가정에 기초하여, 신규상장에 비해 비효율적이라는 주장이 제기될 수 있다. 따라서 상장사 인수가 신규상장에 비해 비효율적인 시장진입 방식인가에 대해서는 실증적인 고찰이 필요하다. 본 연구에서는 상장사 인수의 경우 상장사 기존주주의 부가 훼손되고, 신규상장에 비해 정보의 효율성도 떨어질 것이라는 가설을 세우고 실증분석을 해 보았다. 이를 위해 $2000{\sim}2005$년 6윌 기간에 비공개기업이 상장사 경영권을 인수한 사례를 가지고, 인수공시 전후의 비정상수익률을 측정하여 주주의 부에 미치는 영향을 측정하였다. 또한 인수공사일 종가를 시초가로 하는 향후의 장단기 초과수익률을 측정하여 이를 토대로 시장진입일 배포된 정보가 효율적이었는지를 알아보았다. 그리고 각각의 상장사 인수 사례에 대해 같은 시기, 같은 산업, 같은 시장에서 신규로 상장했던 종목을 모아 매칭샘플을 만들고 상장사 인수 샘플과 비교분석하였다. 그 결과 상장사 인수 시 상장사의 기존주주는 유의적인 자본이득을 향유함이 밝혀졌고, 정보의 효율성도 신규상장에 비해 유의적으로 낮다는 일관적인 증거를 찾지 못하였다. 다만 상장사 인수가 무자본 인수의 형태를 취할 때는 시장의 주의가 요망된다.

  • PDF

A SIP Extension Method for Closed Multiparty Conference with Guarantee of Security (비공개형 다자간 컨퍼런스의 보안성 확보를 위한 SIP 확장 기법)

  • 김현태;김형진;나인호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.331-337
    • /
    • 2004
  • Multiparty conference service based on SIP supported by VoIP network is gradually increased in use and the continuous development and standardization works on SIP are in the process of advancing. But SIP used in currently does not support identity discovery and distribution of each participant for multipath conference. In this paper, a SIP extension method for guaranteeing security from the multiparty conference based on SIP is proposed. We design a new SIP header and method for discovering and distributing a participant's identity in closed multiparty conference when the call initiation is established. And it can ensure that each participant is notified before a new participant joins.

Fair Private Block Encryption Protocol with Proactive Secret Sharing for Delegated Node of Public Blockchain (동등한 권한을 가진 대표노드를 위한 능동적 비밀 분산을 이용한 비공개 블록 암호화 기법)

  • Jung, Seung Wook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.177-186
    • /
    • 2020
  • In current public blockchain, any node can see every blocks, so that public blockchain provider transparent property. However, some application requires the confidential information to be stored in the block. Therefore, this paper proposes a multi-layer blockchain that have the public block layer and the private block for confidential information. This paper suggests the requirement for encryption of private block. Also, this paper shows the t-of-n threshold cryptosystem without dealer who is trusted third party. Moreover, the delegated node who has key information can be withdraw the delegated node group or a new delegated node can join in the delegated node group. Therefore, the paper proposes an efficient key information resharing scheme for withdraw and join. Finally proposed scheme satisfies the requirements for encryption and fairness.

Business Models for Access Control and Copyrights Expression of Software Source Code (소프트웨어 소스코드의 저작권 표현과 접근제한을 위한 비즈니스 모델)

  • Cha, Byung-Rae;Kim, Kyung-Jun;Lee, Dong-Seob;Kim, Chul-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1163-1166
    • /
    • 2008
  • 소프트웨어 소스코드는 크게 오픈 소스와 상업용 비공개 소스로 구분될 수 있다. 소스코드는 자동차 조립라인과 같이 소프트웨어를 무제한 생산이 가능한 지식집약적인 부가가치 산업이다. 본 논문에서는 오픈-소스 코드에는 디지털라이센스를 이용한 저작권을 표현하고, 비공개-소스 코드는 보안 컨테이너 역할을 수행하는 크립텍스 모델을 제안한다.

A Study on Newspaper Reporter's Information-Seeking Patterns (취재환경 변화에 따른 기자의 정보추구행태 연구)

  • Jang Seon-Hwa
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.3
    • /
    • pp.165-182
    • /
    • 2005
  • This study examines the changed information-gathering environment of these days has indeed changed the patterns of reporters in their information seeking efforts. For the study, two groups of reporters were surveyed. The first group consists of 9 senior-level reporters working for daily papers with 15 years or more of journalism career, the second group 11 junior reporters who have been in the industry for less than 10 years. The surveying of these reporters has indicated significant change in their patterns of information-seeking endeavor, the dominant trend changing from reporters' putting an emphasis on off-the record types of information through person-to-person contacts to their new focus on made-public information. The senior-level reporters, identify person-to-person contacts as most valuable sources for information and take meetings with their contacts as providing critical opportunities for information-gathering. On the other hand, this examination has found junior reporters to be spending more time in collecting made-public information and paying more attention to acquiring a higher level of professionalism and greater analytical abilities. In short, this study confirms the ever-rising importance of making available a wider range of information for reporters.

Chaincode-based File Integrity Verification Model (체인코드 기반의 파일 무결성 검증 모델)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.51-60
    • /
    • 2021
  • Recent advances in network and hardware technologies have led to active research and multiple network technologies that fuse blockchain technologies with security. We propose a system model that analyzes technologies using existing blockchain and verifies the integrity of files using private blockchain in a limited environment. The proposed model can be written as a chain code of Hyperleisure Fabric, a private blockchain platform, and verified for integrity of files through Hyperleisure Explorer, a private blockchain integrated management platform. The system performance of the proposed model was analyzed from a developer perspective and from a user perspective. As a result of the analysis, there are compatibility problems according to the version of various modules to run the blockchain platform, and only limited elements such as chain code status and groups can be checked.

A Study on the Inference of Detailed Protocol Structure in Protocol Reverse Engineering (상세한 프로토콜 구조를 추론하는 프로토콜 리버스 엔지니어링 방법에 대한 연구)

  • Chae, Byeong-Min;Moon, Ho-Won;Goo, Young-Hoon;Shim, Kyu-Seok;Lee, Min-Seob;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.42-51
    • /
    • 2019
  • Recently, the amount of internet traffic is increasing due to the increase in speed and capacity of the network environment, and protocol data is increasing due to mobile, IoT, application, and malicious behavior. Most of these private protocols are unknown in structure. For efficient network management and security, analysis of the structure of private protocols must be performed. Many protocol reverse engineering methodologies have been proposed for this purpose, but there are disadvantages to applying them. In this paper, we propose a methodology for inferring a detailed protocol structure based on network trace analysis by hierarchically combining CSP (Contiguous Sequential Pattern) and SP (Sequential Pattern) Algorithm. The proposed methodology is designed and implemented in a way that improves the preceeding study, A2PRE, We describe performance index for comparing methodologies and demonstrate the superiority of the proposed methodology through the example of HTTP, DNS protocol.

A Study on the Open Meeting System : Focused on the Central Administrative Organization Designated Meeting (회의공개제도 운영에 관한 연구 중앙행정기관 지정회의를 중심으로)

  • Choi, Jeong Min;Kim, You-seung
    • The Korean Journal of Archival Studies
    • /
    • no.55
    • /
    • pp.307-334
    • /
    • 2018
  • This study analyzes the status of the designated administrative meetings of the central administrative agencies, including the number of meetings, the presence of written minutes, and the form of minutes. The implications based on the analysis are as follows. First, there were meetings that were not held, and written meetings were held. The standards for determining the designated meetings should be established. Second, when only a written meeting was held, the minutes were not made because these were not written separately. A written meeting can be held, if it is necessary. However, there is still a need to keep a detailed record similar to minutes in such cases. Third, among the minute types, a written record of the points of the meeting is preferred. Even if the meeting is closed for proper reasons, making a transcript and a record in addition to writing the points must be settled. Finally, specific standards for the procedures and reasons why meetings and minutes should be closed should be established. It is necessary to change the paradigm from the viewpoint of production and management to the viewpoint of disclosure and sharing through the improvement of standards and procedures related to designated meetings and designated meeting minutes.

The Status of Personal Information Protection for Original Text Information Disclosure Service (원문정보공개 서비스에서의 개인정보 보호 실태)

  • Ahn, Hye-mi
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.2
    • /
    • pp.147-172
    • /
    • 2019
  • With the provision of the original text information disclosure service, the time spent on determining the disclosure of the original text information decreased, and the number of original text information disclosure significantly increased. In public institutions, the risk of the exposure of personal information also increased. In this study, the status of personal information protection in the original text information disclosure service was investigated. Moreover, the causes of the exposure of personal information were analyzed, and improvements were proposed. The survey presented the following results. First, 13% of the original text information collected contains personal information, which is the nondisclosure information. Second, among the original text information that includes personal information, the original text information, including the personal information of the public official, was the most important. In particular, many records about vacation and medical leaves were found. Third, there were many cases in which information about the individual of the representative was exposed in the agency that deals mainly with the contract work. Fourth, a large volume of personal information was not detected by filtering personal information. Upon analyzing the cause of the exposure of personal information, the following improvements are suggested. First, privacy guidelines should be redesigned. Second, the person in charge of the task of deciding whether or not to disclose original text information should be trained further. Third, the excessive disclosure of information based on the government's quantitative performance should be eased. Fourth, the filtering function of the personal information of the original text information disclosure system should be improved.