• Title/Summary/Keyword: 비밀해제

Search Result 16, Processing Time 0.025 seconds

A Study on the System of Confidential Record Management of the USA (미국의 비밀기록관리제도에 관한 연구 -대통령의 행정명령(EO)을 중심으로-)

  • Kim, Geun Tae
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.159-206
    • /
    • 2019
  • This study aims to analyze the details of the executive order of the president of the United States, which have been developed in the country's administrative system to institutionalize the guarantee of the people's right to know the classified records, as well as to protecting national secrets. This study also aims to present any implications for the development of the classified record management system of Korea. To this end, the previously issued EO concerning the classified records management were reviewed in terms of its classification, safeguard, and declassification. The analysis results showed that the EO by the president established and prescribed the special access program for national secrets, the system to exempt and suspend the automatic declassification, and the sanctions for protecting national secrets. The EO also established and prescribed the appointment system for the person with the authority to classify record, automatic declassification program, and Mandatory declassification review system, as well as the procedures for historical researcher and certain former government personal to access the classified records with the purpose of guaranteeing people's right to know. As a result, this study identified implications for the development of Korea's classified record management system, as follows : First, it is necessary to restructure the current classified record management system, by changing the operations that is dependent on the director of the National Intelligence Service to the one that is dependent on the President. Second, it is necessary to legislate a separate special law for the classified record management system. Third, a standing supervisory body should be established for the integrated management and for the consistent and routine supervision of the classified record management. Fourth, it is necessary to establish procedures to further review the classification of classified record to correct the defects of the current classification system, which has been abused and mismanaged by the national agencies and organizations that produce classified record.

Compilation of the Foreign Relations of the United States Series and the Archival Issues (미국 국무부의 외교사료집 편찬과 기록학적 쟁점)

  • Lee, Sangmin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.1
    • /
    • pp.159-179
    • /
    • 2013
  • This study traces the evolution of the compilation of foreign relations of the United States series and analyzes its archival issues from its historical development. The study examines the purposes of publishing the compilations of the diplomatic documents, an issue of making a balance between secrecy for national security and accountability of diplomacy, neutrality in compiling historical materials, and methods and principles of the compilation. To analyze these records issues, the study examines the contents and contexts of the compilation, historical evolution of the compilation, and the political and records issues of the compilation in the U.S. political history. The declassification issue for the historical compilation was also examined because the issue was a major obstacle to the timely publication of FRUS.

A Study on the State of Classified Records Management in Korea (우리나라의 비밀기록 관리현황에 관한 연구)

  • Seo, Won-Kyoung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.6 no.1
    • /
    • pp.93-112
    • /
    • 2006
  • As information disclosure is actively requested, loopholes of the government's Records Management System have exposed. Important documents of government have been disposed, lost, and closed to the public by the reason that they are 'classified'. This study starts from the recognition of these problems. Researches on classified records are necessary to reveal the historical truth. The purpose of this study is to examine the organization of Records Management System and the management of classified documents of the government institutions. Through the analysis of actual condition of classified records management, it is found that the classified records management is poorly implemented in Korea. This study especially deals with the classified records management system in special records management institutions such as legislative, judiciary, and military agencies. Though this study deals with a specific part of government, it may contribute to improvement of classified records management in government as a whole.

Research Trends on Password Recovery of Encrypted Files (암호화된 파일의 비밀번호 복구 연구 동향)

  • Se-Young Yoon;Hyun-Ji Kim;Hwa-Jeong Seo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.218-221
    • /
    • 2024
  • IT 기술과 매체의 발전으로 자료의 디지털화가 진행되면서 디지털 증거는 현대의 범죄 수사에서 중요한 부분을 차지하고 있다. 이러한 디지털 증거들이 암호화되어 있는 일이 빈번하게 발생함에 따라, 수사관은 수사 과정에서 직접 암호화를 해제해야 하는 어려움을 겪고 있다. 해당 문제에 대응하기 위해 암호화된 파일의 비밀번호를 복구하는 연구가 활발히 진행되어 왔으며, 암호 연산을 빠르게 처리할 수 있는 프로세서를 활용하여 복구 속도를 향상시키는 방안 또한 연구되고 있다. 본 논문에서는 현재 사용되고 있는 비밀번호 복구 도구들을 분석하고, 높은 사용률을 보이는 문서들의 비밀번호를 복구하는 기존 연구들과 함께 향후 연구의 방향성을 살펴본다.

A Study on Management of the Secret Data in Defense Information System (Focusing on Defense Ammunition Information System) (국방정보체계의 비밀데이터 관리 방안 연구 (국방탄약정보체계를 중심으로))

  • Yeo, Seong-Cheol;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1285-1292
    • /
    • 2014
  • Ministry of National Defense made has set a standard regulations and detail to classify the revision of the military security and the plan to adjust or use those secrets. Moreover, the confidential management system with online secret process is operated by it. However, the study for management plan of stored secret data in these systems should be urgently required because the current regulation of military headquarter is different from present military situation so that it is not applicable up to now. This paper is focused on the Defense Ammunition Information Systems to find the proper way to deal with the secret data of the Defense Information Systems. The purpose is to describe the management plan for the secret data consistent with the current situation of the Military by study for the secret classification and case study. Therefore limitations are considered and solutions are finally suggested in this paper.

Vulnerability Analysis of Drones Using Wi-Fi (와이파이를 이용하는 드론의 취약점 분석)

  • Jung, In-Su;Hong, Deuk-Jo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.219-222
    • /
    • 2017
  • 드론 기술이 발전하면서 물품 배달에 드론이 이용되는 등 드론은 우리 생활 전반에 자리 잡으려 하고 있다. 하지만 대부분의 드론이 기본적인 사용자 인증 과정도 없이 보안에 매우 취약한 상태이다. 본 논문에서는 드론의 취약점을 증명하기 위해 Parrot사의 AR. Drone을 대상으로 Wi-Fi 연결을 통한 인증해제, telnet을 통한 명령 수행, ftp 서버를 통한 파일 변조 공격을 적용해 보고, 이러한 취약점에 대해 무선 AP의 비밀번호를 복잡하게 설정하는 방법, 무선 침입 방지 시스템을 사용하는 방법, NAP 또는 NAC 솔루션을 구축하는 방법과 같은 적절한 대응 방안을 논의한다.

  • PDF

A study on Construction of Crime Prevention System using Computer Interface (컴퓨터 인터페이스를 이용한 방법시스템 구축에 관한 연구)

  • Oh, Seong-Jin;Lee, Young-Dae;Kim, Kee-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2781-2783
    • /
    • 2000
  • 방범에 사용되는 여러 종류의 센서를 컴퓨터를 이용하여 사용할 수 있는 방안을 연구하고 기술적인 문제를 파악하여 해결하고, Protocol을 정하여 방범 시스템 프로그램을 작성하고 컴퓨터 상에서 효율적인 방범이 이루어질 수 있도록 했다. 본 연구의 보안 시스템의 동작 순서는 다음과 같다. 사용자는 외출할 때 출입문 근처에 설치되어 있는 키패드를 이용하마 방범시스템을 작동시킨다. 침입자가 있으면 여러 장소에 설치된 센서가 감지되어 이 신호를 인터페이스를 통해 컴퓨터로 보낸다. 컴퓨터는 신호가 감지된 위치, 감지 시간을 기록하고 USB 포트에 연결된 CCD 카메라를 통하여 영상을 저장하고. 보안 책임자의 전화기로 침입자가 있다는 사실을 통보해 주도록 설계된 시스템이다. 방범시스템의 해제는 키패드를 이용하여 비밀번호를 입력하여 저장되어 있는 번호와 동일할 경우에만 해제가 될 수 있도록 구성하였다.

  • PDF

Remotely Controllable Smart Door Lock (원격 제어가 가능한 스마트 도어락)

  • Choi, Duk-Kyu;Lee, Sang-Bin;Park, Jin-Sol;Kwon, Yong-Min;Kim, Jun-Bin;Kwon, Min-Ji;Jang, Jae-Min;Jeong, woo-won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.261-262
    • /
    • 2020
  • 현대에 흔히 쓰이는 도어락은 안전과 보안등의 목적과 편리함을 목적에 두고 있다. 실제로 그전에 쓰던 열쇠보다 더 편리하고 분실염려도 없고 복제키 등으로 인한 사건, 사고로 인한 범죄율이 줄어들었다. 도어락은 사용자가 손으로 직접 비밀번호를 입력하여 잠금을 해제하는 방식이고 이 과정에서 도어락에 지문이나 표시가 남으며 비밀번호가 주위에 쉽게 노출될 수 있다. 본 논문은 위의 문제를 해결하기 위해 아두이노로 라즈베리파이와 앱을 무선 통신하여 '원격 제어가 가능한 스마트 도어락'을 고안했다. 아두이노 와이파이 모듈을 통해 스마트폰으로 도어락을 원격으로 제어할 수 있으며 라즈베리파이 카메라 모듈과 초음파 센서를 통해 도어락에 접근하는 사람을 감지하고 확인할 수 있다. 이 기능으로 범죄를 예방할 수 있으며 자녀들의 귀가 여부도 확인할 수 있고 문을 열어줘야 할 상황에 비밀번호 노출없이 문을 열어줄 수 있다.

  • PDF

The Proposal and Implementation of New Private Parcel Locker with Automatic Transmission Function of Short Message Service by Smartphone Application (스마트폰 어플리케이션에 의해 단문 메시지 서비스의 자동 발송 기능을 가진 새로운 무인 택배함 제안 및 구현)

  • Seo, Jong-Beom;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.101-108
    • /
    • 2017
  • In existing public parcel locker, if there is not an empty storage box, it is not used. In existing private parcel locker, because it is a lock-based locker, there is strong weak point in security. To prevent these drawbacks, the proposed private parcel locker has a menu-driven remote control application which is operated on smartphone. The lock release and the security number change by the security number which is stored in the Electrically erasable read-only memory, are possible. As a result, the proposed method has better advantages than the existing methods in terms of unnecessariness of empty storage box check and security by the security number accumulation function and the automatic SMS transmission representing parcel locker operation result.

Unlocking Shared Bike System by Exploiting an Application Log (애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법)

  • Cho, Junwan;Lee, Jeeun;Kim, Kwangjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2019
  • Recently, there has been a growing market for shared mobility businesses that share 'transport' such as cars and bikes, and many operators offer a variety of services. However, if the fare can not be charged normally because of security vulnerability, the operator can not continue the business. So there should be no security loopholes. However, there is a lack of awareness and research on shared mobility security. In this paper, we analyzed security vulnerabilities exposed in application log of shared bike service in Korea. We could easily obtain the password of the bike lock and the encryption key of the AES-128 algorithm through the log, and confirmed the data generation process for unlocking using software reverse engineering. It is shown that the service can be used without charge with a success rate of 100%. This implies that the importance of security in shared mobility business and new security measures are needed.