• Title/Summary/Keyword: 비밀분류

Search Result 51, Processing Time 0.019 seconds

A Study on the System of Confidential Record Management of the USA (미국의 비밀기록관리제도에 관한 연구 -대통령의 행정명령(EO)을 중심으로-)

  • Kim, Geun Tae
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.159-206
    • /
    • 2019
  • This study aims to analyze the details of the executive order of the president of the United States, which have been developed in the country's administrative system to institutionalize the guarantee of the people's right to know the classified records, as well as to protecting national secrets. This study also aims to present any implications for the development of the classified record management system of Korea. To this end, the previously issued EO concerning the classified records management were reviewed in terms of its classification, safeguard, and declassification. The analysis results showed that the EO by the president established and prescribed the special access program for national secrets, the system to exempt and suspend the automatic declassification, and the sanctions for protecting national secrets. The EO also established and prescribed the appointment system for the person with the authority to classify record, automatic declassification program, and Mandatory declassification review system, as well as the procedures for historical researcher and certain former government personal to access the classified records with the purpose of guaranteeing people's right to know. As a result, this study identified implications for the development of Korea's classified record management system, as follows : First, it is necessary to restructure the current classified record management system, by changing the operations that is dependent on the director of the National Intelligence Service to the one that is dependent on the President. Second, it is necessary to legislate a separate special law for the classified record management system. Third, a standing supervisory body should be established for the integrated management and for the consistent and routine supervision of the classified record management. Fourth, it is necessary to establish procedures to further review the classification of classified record to correct the defects of the current classification system, which has been abused and mismanaged by the national agencies and organizations that produce classified record.

A Study on Management of the Secret Data in Defense Information System (Focusing on Defense Ammunition Information System) (국방정보체계의 비밀데이터 관리 방안 연구 (국방탄약정보체계를 중심으로))

  • Yeo, Seong-Cheol;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1285-1292
    • /
    • 2014
  • Ministry of National Defense made has set a standard regulations and detail to classify the revision of the military security and the plan to adjust or use those secrets. Moreover, the confidential management system with online secret process is operated by it. However, the study for management plan of stored secret data in these systems should be urgently required because the current regulation of military headquarter is different from present military situation so that it is not applicable up to now. This paper is focused on the Defense Ammunition Information Systems to find the proper way to deal with the secret data of the Defense Information Systems. The purpose is to describe the management plan for the secret data consistent with the current situation of the Military by study for the secret classification and case study. Therefore limitations are considered and solutions are finally suggested in this paper.

The Historical Understanding of the U. S. Secret Records Management (미국의 비밀기록관리체제에 대한 역사적 이해)

  • Lee, Kyong-Rae
    • The Korean Journal of Archival Studies
    • /
    • no.23
    • /
    • pp.257-297
    • /
    • 2010
  • The U. S. government has a long history to classify and manage governmental records which are created, collected, and preserved for itself. During the colonial period before the independence, the U. S. mostly practiced the maintenances of secret records and restrictions of access to the records following a long convention without any specific legal authority. Since establishment of the U. S. Constitution, the government had kept secret records on the basis of constitutional authority. However, the U. S. government began to take shape the secret records management system when it participated in the World War I, which required the system to reflect the needs in reality to manage drastic increases in important military and foreign relation documents. The World War II made the U. S. government strengthen its secret records management system, and its conception of secret records management system at that time has sustained until now. It can be said that the current secret records management system of the U. S. government continues to be managed by constitutional authorities and the executive orders which are opt to change. This article intends to review the secret records management system of the U. S. from the initial history of the U. S. to the Cold War. To understand its system of secret management, the paper investigates the U. S. secret records management history by dividing into three periods: the period of establishment of its tradition(the Colonial era~just before the WWI); the period of taking shape of its system (the WWI~the WWII); and the period of current conception of its system. The criteria of these divisions are created based on the differences of the laws relevant to the secret records and the application methods of secret management system in reality.

A Study on the Database security research classified according to Database decryption key storage location (Database 복호화 키 저장 위치에 따른 Database 보안성 연구)

  • Lee, Chang Won;Choi, Hyung Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.376-379
    • /
    • 2020
  • 메신저 애플리케이션은 사용자의 채팅 로그나 전화번호와 같은 개인 정보를 데이터베이스에 저장하며, 비밀번호 관리 애플리케이션은 사용자의 비밀번호 정보를 데이터베이스에 저장한다. 따라서 사용자의 개인 정보들이 들어 있는 데이터베이스를 안전하게 보호하는 것은 매우 중요하다. 본 논문에서는 암호화된 데이터베이스를 복호화하기 위한 키를 저장하는 위치에 따라 애플리케이션을 분류하고, 각 경우 보안성이 어떻게 달라지는지에 관한 연구를 수행했다.

Analysis of the Effect of Number of Preprocessing Filters on the Performance of CNN-Based Steganalysis (전처리 필터의 수가 CNN 기반 스테그아날리시스의 성능에 미치는 영향 분석)

  • Kang, Sanghoon;Park, Hanhoon;Park, Jong-Il;Kim, Sanhae
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.249-251
    • /
    • 2019
  • 본 논문에서는 CNN 기반 스테그아날리스 방법을 이용하여 입력 영상에 비밀 메시지가 삽입되었는지를 판별하고, 비밀 메시지가 삽입되었을 경우 WOW 와 UNIWARD 방법 중에 어떤 방법으로 삽입되었는지를 분류하고자 한다. 이를 위해 입력 영상으로부터 특징 정보를 추출하기 위해 사용되는 전처리(prepropcessing) 필터의 수가 분류 성능에 미치는 영향에 대해 분석한다. SRM 필터를 사용한 실험에서 필터의 수를 단순히 증가시키는 것은 성능 향상이 도움이 되지 않으며, 효과적인 필터를 선별해서 사용하는 것이 보다 우수한 성능을 가짐을 확인하였다.

  • PDF

Experimental Verification of the Versatility of SPAM-based Image Steganalysis (SPAM 기반 영상 스테그아날리시스의 범용성에 대한 실험적 검증)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.526-535
    • /
    • 2018
  • Many steganography algorithms have been studied, and steganalysis for detecting stego images which steganography is applied to has also been studied in parallel. Especially, in the case of the image steganalysis, the features such as ALE, SPAM, and SRMQ are extracted from the statistical characteristics of the image, and stego images are classified by learning the classifier using various machine learning algorithms. However, these studies did not consider the effect of image size, aspect ratio, or message-embedding rate, and thus the features might not function normally for images with conditions different from those used in the their studies. In this paper, we analyze the classification rate of the SPAM-based image stegnalysis against variety image sizes aspect ratios and message-embedding rates and verify its versatility.

생태학적 관점에서 조명해 보는 신비로운 사슴의 세계와 사슴뿔의 비밀

  • Hwang, Bo-Yeon
    • Korean Deer Journal
    • /
    • v.12 no.2 s.65
    • /
    • pp.48-55
    • /
    • 2006
  • 사슴은 전 세계적으로 다양한 서식지에서 살고 있는 동물이다. 사슴은 남극대륙을 제외한 전 대륙에 걸쳐 살고 있는 동물로 도시 근처의 평지에서 관찰되기도 하고, 넓은 초원과 산악 지역에서 살기도 한다. 사슴이라고 불리는 동물은 전 세계적으로 약 100여 종류가 있다. 하지만 정확한 분류에 의하면 사슴에 속한 무리는 17속 53종으로 분류하기도 한다. 소목(Artiodactyle) 사슴과(Cervidae)에 속하는 사슴 종류는 발톱 대신 휘어진 발굽을 가지고 있어 "유제류"라고 하며, 소, 양, 염소와 같이 먹이를 삼킨 뒤 일시적으로 보관하는 되새김위가 있어 "반추동물"이라고도 부른다. 사슴은 매우 온순한 성격을 가진 동물이다. 이런 이유 때문에 사람들 중 일부는 애완동물로 키우기도 하고, 고기와 사슴뿔을 얻기 위해 많은 농가에서 사육되기도 한다.

  • PDF

A Study on Management and Utilization of Non-disclosure Records (비공개 기록의 관리와 활용에 관한 연구)

  • Ahn, Ji-Hyun
    • The Korean Journal of Archival Studies
    • /
    • no.13
    • /
    • pp.135-178
    • /
    • 2006
  • The response of public organizations on information offerings has affirmed that the arrangement of the management of records is an important project to be implemented ahead of the enforcement of the information disclosure system. In particular, the absence or non-disclosure of information of public organizations on records containing significant information and abuse of the secret disposition of information has demonstrated that it is imperative to improve radically the management of secret or non-disclosed records as well as overall changes of awareness. This study reviewed the reality of the current non-disclosure and management of confidential records based on the awareness on such records and proposed improvement measures. The study on non-disclosed and confidential records has been discussed from legal and administrative perspectives so that the main focus has been on the institutional aspect. Yet, there is a limitation on such discussions in that there cannot be fundamental access to issues of non-disclosed and confidential records. That is because the management of information classified as non-disclosed and confidential can be improved fundamentally when all processes from the production of the records to their management are carried out reasonably. Accordingly, since our record management system is divided into three phases of the disposition division, record center, and archives and takes a management record by being applied to the flow of the life cycle of records, we have reviewed overall issues from the production of non-disclosed and confidential records to the utilization of the records pursuant to these steps and offered directions for improvement.

Steganalysis of Content-Adaptive Steganography using Markov Features for DCT Coefficients (DCT 계수의 마코프 특징을 이용한 내용 적응적 스테가노그래피의 스테그분석)

  • Park, Tae Hee;Han, Jong Goo;Eom, Il Kyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.8
    • /
    • pp.97-105
    • /
    • 2015
  • Content-adaptive steganography methods embed secret messages in hard-to-model regions of covers such as complicated texture or noisy area. Content-adaptive steganalysis methods often need high dimensional features to capture more subtle relationships of local dependencies among adjacent pixels. However, these methods require many computational complexity and depend on the location of hidden message and the exploited distortion metrics. In this paper, we propose an improved steganalysis method for content-adaptive steganography to enhance detection rate with small number features. We first show that the features form the difference between DCT coefficients are useful for analyzing the content-adaptive steganography methods, and present feature extraction mehtod using first-order Markov probability for the the difference between DCT coefficients. The extracted features are used as input of ensemble classifier. Experimental results show that the proposed method outperforms previous schemes in terms of detection rates and accuracy in spite of a small number features in various content-adaptive stego images.

패스워드 매니저의 보안성 분석

  • Kim, Soolin;Kim, Hyoungshick
    • Review of KIISC
    • /
    • v.28 no.1
    • /
    • pp.36-42
    • /
    • 2018
  • 사용자는 비밀번호를 외워야하는 불편함을 줄이고 로그인 과정을 편리하게 이용하기 위해 패스워드 매니저를 사용한다. 패스워드 매니저는 크게 브라우저 기반의 패스워드 매니저와 웹 기반의 패스워드 매니저로 나눌 수 있다. 브라우저 기반의 패스워드 매니저의 경우 로컬에 사용자의 계정 정보와 암호화 키를 저장하기 때문에, 비밀번호 복구 프로그램을 사용하거나 간단한 코드를 이용하여 사용자의 계정 정보를 평문 형태로 추출할 수 있다. 로컬에 저장하는 브라우저 기반의 패스워드 매니저와 달리 웹 기반 패스워드 매니저는 웹을 기반으로 실행된다. 웹 기반 패스워드 매니저는 암호화 키를 웹 서버에 저장하기 때문에, 로컬 기반의 패스워드 매니저에 비해 키 노출 우려가 적다. 하지만 웹 기반이기 때문에 공격자가 웹 취약점을 이용하면 사용자의 정보가 누출될 위험성이 있다. 본 논문에서는 사용자의 편의성을 개선하고자 사용되는 패스워드 매니저를 브라우저에서 사용되는 브라우저 기반 패스워드 매니저와 웹에서 사용되는 웹 기반 패스워드 매니저로 분류하고 각 패스워드 매니저가 사용자의 계정 정보를 저장 및 관리하는 방법을 분석하고, 해당 패스워드 매니저들에서 발생 가능한 취약점에 대해 조사하였다.