• Title/Summary/Keyword: 실험 정보보호

Search Result 952, Processing Time 0.027 seconds

디지털운행기록 장치 데이터 보안 원칙과 디지털 포렌식을 위한 데이터 식별 방안

  • TaeGuen Kim
    • Review of KIISC
    • /
    • v.33 no.4
    • /
    • pp.7-12
    • /
    • 2023
  • 디지털운행기록장치(DTG)는 차량의 운행정보를 기록하고 저장하는 장치로, 여객 및 화물자동차에 의무적으로 장착되어 여러 실시간 운행기록을 수집하고 관리할 수 있도록 하고 있다. 대부분 버스, 택시, 화물차 등에 사용되며, 상용 자동차의 운전자를 인증하고 과도한 운행으로 인한 사고를 줄이는 데 중요한 역할을 한다. 본 연구에서는 기존의 국내 디지털운행기록장치 관련 지침 및 표준 사양의 보안 기술 관련한 내용을 살펴보고 더 나아가 문헌조사를 통해 발견된 디지털운행기록장치 데이터 보호 관련 기본적 보안원칙을 소개한다. 더불어, 디지털 포렌식을 위한 데이터 식별 방법에 대한 실험적인 시도 사례의 결과를 함께 소개한다.

An Experimental Study on the Effects of Risk Cognition of Personal Information and Self-Expression Information on Conation of Privacy Protection (SNS의 개인정보와 자기표현정보의 중요도 인지가 정보보호 행동의지에 미치는 영향에 관한 실험연구)

  • Lim, Jung-Ho;Kwon, Sun-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.681-694
    • /
    • 2018
  • This paper studied the effects of risk cognition of personal information and self-expression information on conation of privacy protection. In the first study, 88 college students who volunteered for this research were surveyed about risk cognition of personal information and conation to protect it. In the second study, after an information-seeking expert collected and organized the self-expression information that 88 volunteers had expressed on SNS, and then showed the organized self-expression information to 88 volunteers, and then 88 volunteers were surveyed about risk cognition of self-expression information and conation to protect it. As results of the first data analysis, the risk cognition of personal information had the greatest influence on non-disclosure of personal information, followed by reduction of the disclosure scope and law institutionalization requirement. As results of the second data analysis, SNS users openly expressed their opinion or life-style, but when they realized that self-expression information can be accumulated and become sensitive information, they had conation to protect their self-expression information such as non-disclosure, reduction of disclosure scope, and law institutionalization requirement. The implication of this study is that we have overcome the limitations of existing researches that can not explain information protection behavior on SNS.

Cancelable Iris Templates Using Index-of-Max Hashing (Index-of-Max 해싱을 이용한 폐기가능한 홍채 템플릿)

  • Kim, Jina;Jeong, Jae Yeol;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.565-577
    • /
    • 2019
  • In recent years, biometric authentication has been used for various applications. Since biometric features are unchangeable and cannot be revoked unlike other personal information, there is increasing concern about leakage of biometric information. Recently, Jin et al. proposed a new cancelable biometric scheme, called "Index-of-Max" (IoM) to protect fingerprint template. The authors presented two realizations, namely, Gaussian random projection-based and uniformly random permutation-based hashing schemes. They also showed that their schemes can provide high accuracy, guarantee the security against recently presented privacy attacks, and satisfy some criteria of cancelable biometrics. However, the authors did not provide experimental results for other biometric features (e.g. finger-vein, iris). In this paper, we present the results of applying Jin et al.'s scheme to iris data. To do this, we propose a new method for processing iris data into a suitable form applicable to the Jin et al.'s scheme. Our experimental results show that it can guarantee favorable accuracy performance compared to the previous schemes. We also show that our scheme satisfies cancelable biometrics criteria and robustness to security and privacy attacks demonstrated in the Jin et al.'s work.

The Impact of Privacy Policy Layout on Users' Information Recognition (사용자 인지 제고를 위한 개인정보 보호정책 알림방식의 비교 연구)

  • Ko, Yumi;Choi, Jaewon;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.183-193
    • /
    • 2014
  • Korean personal data(information) protection law requires privacy policies post on every website. According to recent survey results, users' interests on these policies are low due to these policies' low readability and accessibility. This study proposes a layout that effectively conveys online privacy policy contents, and assesses its impact on information understandability, vividness, and recognition of users. Studies on privacy policies and layouts, media richness theory, social presence theory, and usability are used to develop the new layered approach. Using experiments, three major layouts are evaluated by randomly selected online users. Research results shows that information understandability, vividness, and recognition of privacy policies in the revised-layered approach are higher than those of in the text-only or table-based layouts. This study implies that employing visual guides like icons on privacy policy layouts may increase users' interest in those policies.

Information Protection of Digital Color Image using Wavelet Transform (웨이브릿 변환을 이용한 디지털 칼라 영상의 정보 보호)

  • 박정빈;황재문;정성환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 1998.04a
    • /
    • pp.187-192
    • /
    • 1998
  • 본 논문은 웨이브릿 변환을 이용하여 디지털 칼라 영상 정보를 보호하기 위한 워터마크(watermark) 방법에 대하여 연구하였다. 본 연구에서는 위치와 주파수 정보를 가지는 웨이브릿을 이용하여 칼라 영상 각 채널에 대하여 인간의 시각에 덜 민감한 고주파 영역에 워터마크를 삽입하였다. 이는 불법적인 공격에 강한 워터마크를 구현 할 수가 있다. 실제 실험에서 128$\times$128 칼라 영상의 각 채널을 웨이브릿 변환한 후 Seal 영상(watermark 영상)를 삽입하였다. 실험 결과, 제안한 방법은 잡음 등에 견고함을 보였다.

  • PDF

KASP-Integrated Learning Model for the Information Security Education in Elementary Education (초등 정보보호 교육을 위한 KASP-통합수업 모형)

  • Park, Sung-Soon;Han, Seon-Kwan
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.2
    • /
    • pp.157-164
    • /
    • 2010
  • This study proposed the information security integrated learning model-based KASP. By analyzing the teaching materials regarding information security in the regular curriculum, and by investigating preliminary studies, the information security contents were examined in terms of knowledge, attitudes, skills and ways to practice(KASP). And, the KASP-information security learning model integrating knowledge, attitudes, and ways to practice was developed, and the teaching plan and learning material hand-out were accordingly made out. Moreover, the developed model was tested in an experimental group, and common information security learning content centered on ethics in the comparison group in order to compare the results of two groups. As the test result analysis, it was verified that the developed KASP-information security integrated learning model was effective to help the students learn the knowledge, attitudes, skills and ways to practice.

  • PDF

Vulnerability Analysis and Demonstration of a GPS Spoofing Attack in Drone Environment: Based on Product G (드론 환경에서의 GPS 스푸핑 취약점 분석 및 실증: G 제품을 대상으로)

  • Sejun Hong;Suwan Ko;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.215-216
    • /
    • 2023
  • 군사 목적으로 사용되던 드론이 일반 사용자를 위한 범용 드론으로 활용 분야가 확장됨에 따라, 국방 및 운송, 물류, 농업과 같은 다양한 분야에서 활용되는 실정이며, 이와 관련된 산업의 발전에 기여하고 있다. 그러나 급격한 발전으로 인하여, 드론의 안전성은 고려하지 못한 한계점이 존재하였고, 이는 드론에서의 다양한 보안위협으로 나타났다. 본 논문에서는 4차 산업 혁명 시대의 핵심 기술인 드론의 안전성을 향상시키기 위한 목적으로, 드론의 신규 취약점을 발굴하고 실증하였다. 실험을 위하여, 최근 출시된 G 제품을 대상으로, 드론에서 발생 가능한 다양한 취약점 중 하나인 GPS 스푸핑 공격을 시도하였으며, 실험 결과, GPS 좌표를 변조함으로써, 비행이 가능한 구역에서 비행 금지 구역으로 인식하도록 좌표를 조작하였으며, 비행 금지 구역으로 인식한 드론은 준비된 동작에 따라, 강제로 착륙시키거나 다른 장소로 이동시키는 것이 가능하다. 본 논문의 결과는 드론의 안전성을 향상시키기 위한 참고 자료로 활용될 것으로 사료된다.

  • PDF

양자 얽힘과 양자 텔레포테이션

  • 이해웅
    • Review of KIISC
    • /
    • v.14 no.3
    • /
    • pp.19-27
    • /
    • 2004
  • 양자 텔레포테이션은 다가오는 양자정보시대에 메시지를 전달하는 기본 수단으로서 그 중요성이 부각되고 있다. 본 글에서는 양자 텔레포테이션을 수행하기 위해 꼭 필요한 읽힘의 개념을 소개하고 이를 기반으로 양자 텔레포테이션의 기본 원리를 설명하며 또 실험적으로 구현하는 방법을 살펴봄으로써, 양자물리의 기본 원리에 입각하여 양자 텔레포데이션의 현상에 대한 철저한 이해를 도모하고자 한다.

Revisiting Permutation Transformation Scheme for Cancelable Face Recognition (취소 가능한 얼굴 인식을 지원하는 치환 변환 기법에 대한 고찰)

  • Kim, Koon-Soon;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.37-46
    • /
    • 2006
  • It is known to be hard to apply cryptographic one-way functions to the recognition system using bio-information directly. As one of the solutions about that problem there is a permutation transformation scheme. However, they did not show my algorithmic behavior or any performance analysis of the transformation by experiment. In this paper, by showing the recognition ratio of the transformed scheme by experiment, we prove that that scheme is sound. Also, we adopt their transformation to LDA(Linear Discriminant Analysis) to show the experimental results. In the negative side, we introduce a new type of attack against the permutation transformation schemes. finally, we briefly mention a generalization of the permutation transformation for countermeasure of the attack at the end of this paper.

Information Protection against The Hacker's Attack of Ubiquitous Home Networks (해커의 유비쿼터스 홈 네트워크 공격에 대한 정보보호 기술)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.145-154
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at this paper, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS. DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding against the Hacker's attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF