• Title/Summary/Keyword: 사이버 범죄 예방

Search Result 52, Processing Time 0.027 seconds

Expand public interest of Private Security activities (민간경비 활동의 공익성 확대 논의)

  • Gong, Bae Wan;Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.3-10
    • /
    • 2014
  • Private security organizations are complementary to the national safety of life and property of individuals as a social role to play in maintaining peace and order. Pursuit of profit is to the public practice according to the logic of capitalist markets and customers seeking to protect the lives and property. However, the legal and institutional constraints of private security is being requirements inhibited by the development. Crime prevention as a private security role that the private companies, which will pursue the public interest. After all, the expansion of the private security crime is results in an increase in unit. The current level of private security in the 1970s remain, and the constraints is being under goodwill and expertise outside of the training system on the market. Variety of crimes, including cyber crime increases and considering the reality of the constraints on private security requirements are able to improve or supplement shall be realistic. In particular, the legal, regulatory and institutional factors must be improved, with goodwill, and for the creation of new industrial policy as a complement to the public interest should be also provided. The private security law interests through integration of private security guards should be guaranteed, and the term of the theorem, sales activities, ensuring the training of professional staff with professional qualifications system is to be settled. As a private security guard industry growth and development can be based on this composition.

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.

A Study on the Improvement of Personal Information Protection in Small and Medium-sized Medical Institutions (중소형 의료기관의 개인정보 보안실태 및 개선방안)

  • Shin, Min ji;Lee, Chang Moo;Cho, Sung Phil
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2019
  • Rapid developments of IT technology has been creating new security threats. There have been more attacks to get patients' sensitive personal information, targeting medical institutions that are relatively insufficient to prevent and defend against such attacks. Although the government has required senior general hospitals to get the ISMS certification since 2016, such a requirement has been burdensome for small and medium-sized medical institutions. Therefore, this study was designed to draw measures to identify and improve the privacy status of the medical institution by dividing it into management, physical and cyber areas for small and medium-sized medical institutions. The results of this study showed that the government should provide financial support and managerial supervision for the improvement of personal information protection of small and medium-sized medical institutions. They also suggested that the government should also provide medical security specialists, continuous medical security education, disaster planning, reduction of medical information management regulations not suitable for small and medium sized institutions.

A Study of Realtime Malware URL Detection & Prevention in Mobile Environment (모바일 환경에서 실시간 악성코드 URL 탐지 및 차단 연구)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.37-42
    • /
    • 2015
  • In this paper, we propose malware database in mobile memory for realtime malware URL detection and we support realtime malware URL detection engine, that is control the web service for more secure mobile service. Recently, mobile malware is on the rise and to be new threat on mobile environment. In particular the mobile characteristics, the damage of malware is more important, because it leads to monetary damages for the user. There are many researches in cybercriminals prevention and malware detection, but it is still insufficient. Additionally we propose the method for prevention Smishing within SMS, MMS. In the near future, mobile venders must build the secure mobile environment with fundamental measures based on our research.

A Study on the Actual Situation of Domestic Violence and the Problems of Victims of Domestic Violence and Preventive Measures (가정폭력의 실태 및 피해 가정 문제와 예방대책에 관한 연구)

  • Bae, Na Rae
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.187-193
    • /
    • 2022
  • Domestic violence in our society is where the abuser and the abuser live in the same space. Problems are left unresolved in families where abuse is reproducing. Domestic violence can be viewed as a crime that violates and tramples human rights. They rely solely on family support networks for solutions to domestic violence. The physical, emotional, and psychological pain and wounds that victims of domestic violence must endure are too deep. In order to help victims of domestic violence, case management services that can provide long-term and attentive help in the neighborhood or community are needed. For this, prevention and treatment of domestic violence should be considered together. And the interest and professional role of the community must follow.

Factors Affecting Information Security Practice of Elementary School Students (초등학생들의 정보보호실천에 영향을 미치는 요인)

  • Choi, Seung-Jae;Kim, Hyeong-Yeol;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.449-461
    • /
    • 2016
  • If students are not aware of the information security, they easily let others know their information or they use others' information with no sense of guilt. The information security education is necessary to protect and prevent students from cyber crime. However, South Korea's information curriculum has no specific information security education course and it has led a school or teacher to teach contents of information ethics superficially. The purpose of this paper is to find the factors affecting the information security practice of the elementary school students. For an empirical analysis, questionnaire survey was conducted and the Partial Least Square(PLS) was used to analyze the research model. The analysis results show that the information ethics awareness and the information security awareness have a positive impact on the information security practice. The results of this study are expected to help choose the specific information security curriculum required for the information security practice of elementary school students.

Instructional Design of Self-directed Information Communication Ethics Education based on the UCC Dramatization Learning (UCC 활용 극화학습 기반 자기주도적 정보통신윤리교육 수업 설계)

  • Kim, Hyun-Bae;Mun, Jeong-Hee
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.4
    • /
    • pp.561-570
    • /
    • 2010
  • In recent years, we can see attempts to take advantage of UCC in a way of the education. But in the precedent studies there are not many guidance plans to help teachers apply UCC in the classroom. The purpose of this paper is to suggest a guidance plan to help teachers apply UCC in the classroom and to analyze the effect of educational using UCC Dramatization learning model on the expanding of students' self-directed learning ability in the information communication ethics education. For this, first, a teacher executes preliminary inspection about self-directed learning ability second, students study about "how to prevent them from cyber crime" using UCC Dramatization learning model. Third a teacher executes post inspection about self-directed learning ability and measures the degree of improvement on self-directed learning ability. The final step is to extract the implications from the analysis of the experiments.

  • PDF

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

A Case Study of Recent New Terrorism and Potential Patterns in South Korea (최근 국외 뉴테러리즘의 사례분석과 국내 발생가능 유형에 대한 연구)

  • Jeon, Yong-Jae;Lee, Chang-Bae;Lee, Seung-Hyun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.11-33
    • /
    • 2017
  • Terrorism has existed in the entire human history and has become a significant topic in criminology while prior studies has focused on North Korea as the perpetrator, and this prevents an in-depth discussion of the international trends of terrorism. As soft targets are the main target of new terrorism and because we never ignore the significance of the consequences, there are needs for more studies on the topic. This study conducted a case study of major terrorism attacks and surveyed professionals in the field via an AHP analysis in order to find the characteristics of terrorism and its potential patterns in South Korea. As a result, we found that North Korea or the left-wing may utilize homemade bomb, motor vehicle or drone for the purpose of attacking multi-use facilities in South Korea. For policy implications, we insist developing a better CPTED approach on those facilities, improving professionalism of cyber-watchdog via more training and education, stricter control on drone permit, and operation of counseling centers for preventing radicalization.

  • PDF