• Title/Summary/Keyword: 정보보호투자

Search Result 232, Processing Time 0.025 seconds

Countermeasures and Mobile Terminal Threats to harm the Financial Market Soundness(focusing on the Financial Investment Companies) (금융시장 건전성을 해치는 모바일단말 위협에 대한 대응방안(금융투자회사를 중심으로))

  • Yoo, Kil-Sang;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.119-132
    • /
    • 2011
  • Mobile devices such as smart phones have brought big changes to be called as 'mobile big bang' against which we can't go. Mobile banking service and MTS(Mobile Trading System) are freely available at any time, anywhere and we are able to activate communications between financial company staffs out of the office and take care of business works even remotely by using mobile devices. Mobile devices are approaching as 'smart mobile innovation' to improve an enterprise productivity and competitiveness, but threats which engaged in unfair trading behaviors or unwholesome business works in finance companies are increasing and the customer's information can be leaked out by using the nonpublic official information and mobile devices. Therefore, we have to analyze the potential problems and take the necessary countermeasures with preemptive steps to protect the customer's information and improve the financial trading soundness and fairness. In this paper, we would like to suggest countermeasures and threats against using the financial company's mobile devices focusing on the financial investment companies by 'Capital Market and Financial Investment Business Act'.

Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing (클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안)

  • Kim, Shi-in;Kim, In-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.885-895
    • /
    • 2019
  • As seen in recent cases of hacking in financial services, attackers are attempting to hacking trustee with poor security management, rather than directly hacking a financial company. As a result, the consignor is strengthening the security check and control of the trustee, but small trustee has difficulties to invest in information security with the lack of computer facilities and the excessive cost of security equipment. In this paper I investigate the vulnerability of personal information processing life cycle standards in order to enhance the security of small consignee that receive personal information form the credit card company. To solve the vulnerability the company should use litigation management system constructed on cloud computing service and install VPN to secure confidentiality and intergrity in data transfer section. Also, to enhance the security of users, it is suggested to protect personal credit information by installing PC firewall and output security on user PC.

An Empirical Study on the Effects of Business Performance by Information Security Management System(ISMS) (정보보호 관리체계(ISMS)가 기업성과에 미치는 영향에 관한 실증적 연구)

  • Jang, Sang Soo;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.107-114
    • /
    • 2015
  • Since 2002, information security management system has been implemented (ISMS) certification scheme whilst providing telecommunications services to enhance the level of enterprise information security was ongoing and Prevent accidents and avoid spread of infringement, such as rapid response and there is a lot of it came true. However, this system is the protection of the country or the investment company, as part of the actual information on how management affects the performance came from or how measures are still lacking for. In this study, the companies have their own privacy ISMS certification measures the level of activity continued to improve information security performance measures and methodology are presented. The government is also based on the validity of the certification system to ensure the overall implementation of the ISMS itself is this a step increase effective information security system is to be certified in advance to prevent security incidents and to improve business performance to help.

Estimating Direct Costs of Enterprises by Personal Information Security Breaches (개인정보 유.노출 사고로 인한 기업의 손실비용 추정)

  • Yoo, Jin-Ho;Jie, Sang-Ho;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.63-75
    • /
    • 2009
  • Recently personal information security breaches by unauthorised access, mistakenly disclosure or stolen become more frequent and the scale of the economic loss of such incidents is growing. Assessing economic loss of personal information security breaches is needed for decision making of information security investment This paper presents a framework to analyze economic impact of personal information security breaches and develops formula for each element to empirically calculate the economic loss. We also compared annual economic loss of Korea with that of Japan to develop some implications.

환경정책 - 2014년 환경보건정책방향

  • Lee, Ho-Jeung
    • Bulletin of Korea Environmental Preservation Association
    • /
    • s.412
    • /
    • pp.5-7
    • /
    • 2014
  • 환경보건정책의 영역은 대기, 수질 등 환경매체에 배출된 오염물질이 수용체인 인간에 도달하여 건강피해를 야기하는 일련의 과정을 규명하여 예방 관리하는 폭넓은 범위를 차지하고 있다. 환경보건정책은 다른 매체별 환경정책에 비해 뒤늦게 출발하였지만 깨끗하고 안전한 환경을 보전하여 국민의 건강을 보호하기 위해서는 앞으로도 환경보건정책에 대한 지속적인 관심과 투자가 필요하다.

  • PDF

유비쿼터스 기술의 군 활용방안 연구

  • 이윤희
    • Review of KIISC
    • /
    • v.14 no.1
    • /
    • pp.46-55
    • /
    • 2004
  • 21세기에는 정보기술의 혁명적 발전과 함께 전쟁양상이 파격적으로 변화될 것으로 예측되며, 전력체계의 특성이 근본적으로 변화됨과 더불어 전쟁 패러다임이 획기적으로 변하고 있다. 특히, 정보과학기술을 이용한 정밀감시, 통제, 타격 복합체계의 구축이 군사력 발전의 근간이 되고 있으며, 앞으로 디지털, 인터넷, 생명공학, 나노기술 등을 복합적으로 활용하는 것이 전력체계의 중심 축이 될 것이다. 특히 전쟁 수행 방식 및 수단의 변혁과 군사패러다임의 보편적 변화추세에 능동적으로 대비하기 위하여 유선과 무선 그리고 근거리 무선 사이에 이음매 없는 통신망이 실현됨으로써 누구든지 어디서나 네트워크로부터 자신이 필요한 정보를 얻을 수 있는 유비쿼터스 컴퓨팅을 민간분야에 활용하여 스마트 흠과 물류에 적용한 사례를 살펴보았다. 유비쿼터스 컴퓨팅과 네트워크 기술은 21세기 변화될 형태의 전쟁을 수행하기 위해 국방 분야 적용이 필수적이며, 이를 통해 전술적인 감지$.$추적 능력의 차대 및 고도화된 전술 정보의 실시간 교환$.$공유, 전술부대의 커뮤니티 파워증대 효과를 가져 올 수 있다. 따라서 유비쿼터스 국방(u-Defense) 시대로 가기 위해 개발하여 적용 가능한 핵심 분야인 내장형 모바일 ad-hoc 네트워크 프로토콜, 무선 센서 네트워크, RFID(Radio Frequency Identification)를 활용한 유비쿼터스 군수지원 등을 제시하였다. 이러한 유비쿼터스 국방을 위하여 우선 비용 측면과 민간분야에 비해 훨씬 강화된 정보 보호 및 무기체계간 상호인증 환경을 고려해야 하며, 국방 정보화에 전력증강차원의 과감한 투자가 요구된다. 또한, 저 비용 고효율의 군사력을 구축해야할 것이며, 첨단 정보체계 건설을 주도할 수 있는 정보 인력을 양성하여, 장기적으로 종합적인 발전계획을 수립하고 국방 정보 체계를 효율적으로 구축하면 군 전력향상에 획기적으로 기여할 수 있을 것이다.

Account Management for the Design of DIT(Digital Investment Trust) system (DIT(Digital Investment Trust) 시스템 설계를 위한 계좌관리)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.951-954
    • /
    • 2002
  • 본 논문에서 제안하는 DIT(Digital Investment Trust) 시스템은 전자상거래 결재 방법으로 이용되는 디지털 캐쉬 시스템을 확장한 개념으로서, 소액지불뿐만 아니라, 계좌 생성 및 계좌 이체를 할 수 있으며, 투자 신탁의 개념을 도입한 인터넷 기반의 은행업무 프로젝트이다. DIT 시스템에선 계좌 생성과 계좌 이체에 암호화 알고리즘인 ADES를 이용하여 고객의 정보를 암호화시켰으며, RSA 알고리즘을 이용하여 전자서명을 하여 고객의 정보와 자산을 제 3자로부터 보호하였다.

  • PDF

Curriculum Development for Smart Factory Information Security Awareness Training (스마트공장 정보보호 인식교육을 위한 커리큘럼 개발)

  • Jeon, In-seok;Yi, Byung-gueon;Kim, Dong-won;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1335-1348
    • /
    • 2016
  • Smart factory of Manufacturing sector is rapidly spreading, globally. In case of domestic, it is on going based on KOSF. It is neither lack of invest nor security of information due to it has been spread from manufacturing sector. Hence, that's very difficult to efficiency prevent from new type of intimidation and security accident happened sometimes from this situation. According to research information security condition with recognized new menace, there is a most efficient way is provide education of information security without any extra budget to safely spread smart factory. Thus, this study of research has developed security awareness training curriculum from international standard, requirement of the industry, and curriculum of educational institution based on NCS (National Competency Standard). It is be very helpful to spread smart factory safely due to expert group has been test of validity.

Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model (DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석)

  • Sun, Jong-wook;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.853-862
    • /
    • 2021
  • Today, disturbance and paralysis of information and communication infrastructure by electronic infringement of national infrastructure is emerging as a threat. Accordingly, the government regularly implements the vulnerability analysis and evaluation system of major information and communication infrastructure to protect the information system and control system of major infrastructure, and invests increased human and material resources every year to efficiently operate it. However, despite the government's efforts, as infringement accidents and attempts targeting national infrastructure continue to occur, the government's resource input to prepare the information protection foundation has little effect on the information protection activity result calculation, making the evaluation system not efficient. The question arises that it is not. Therefore, in this study, we use the DEA model to review the efficient operation of the vulnerability analysis and evaluation system for major information and communications infrastructure, and suggest improvement measures to enhance the level of information protection based on the analyzed results.

Lock-up Expiration and VC Investments: Impact on Stock Prices (의무보유 종료와 VC투자가 주가에 미치는 영향)

  • Lee, Jinsuk;Hong, Min-Goo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.6
    • /
    • pp.133-145
    • /
    • 2023
  • This paper examines whether investors have adapted to the venture capital(VC) investment style. VC firms invest in privately held companies and generate returns by selling them after the lock-up period expires. We analyze the impact on stock prices before and after the lock-up period expiration, and compare the Cumulative Abnormal Return(CAR) between the past period(2015-2017) and the recent period(2020-2022) to investigate the effect of the second venture boom. The main findings are as follows. First, unlike in the past, stock price returns around the lock-up period expiration have been lower than the KOSDAQ index in recent years. Second, the impact on stock prices is significant for both 1-month and 12-month lock-up periods. Specifically, it is confirmed that stocks held by venture capital and professional investors with a 1-month lock-up period respond in advance to their information after the second venture boom. Finally, we find that there is a difference in CAR depending on whether or not the company received VC investment after the second venture boom. Based on our findings, we suggest that VC firms need to revise their exit strategies to improve performance. This includes finding ways to reduce information asymmetry and fees, as well as developing strategies to mitigate market volatility. Additionally, the current lock-up period for VCs should be reconsidered as it may increase the risk of stock price decline. We recommend that the government revise the scope and duration of lock-up periods to protect investors after IPO.

  • PDF