• Title/Summary/Keyword: 정보 유출 예방

Search Result 167, Processing Time 0.023 seconds

User privacy protection model through enhancing the administrator role in the cloud environment (클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.79-84
    • /
    • 2018
  • Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.

On a Cleaning of COVID-19 Prevention Masks with Electrolytic Decomposition Water (전기분해수로 코로나방역용 마스크의 세정에 관한연구)

  • Tian, Zhixing;Bae, Myung-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.591-596
    • /
    • 2022
  • Various COVID-19 quarantine guidelines and measures are being taken by country at the WHO, but the number of confirmed cases has not decreased significantly. In order to prevent the inflow and outflow of COVID-19 through individual droplets, it is mandatory to wear a mask anytime, anywhere. However, as virus bacteria entering the mask amplify, it pollutes the mask and causes a disgusting smell. In this paper, a new method of preventing the spread of COVID-19 was proposed by sterilizing the mask with a dental gait spray introduced into the mask that has been used for a long time. Dental gargle water is usually produced by electrolysis of tap water, and the unstable ion water (HOCl) dissolved in water penetrates the cell barrier of various viruses and fails to act in its nucleus, causing water to self-purify. As a result of the experiment, when the mask used for a long time was washed with gargle water spray, the washed mask was dried after 10 minutes, and the smell of virus droplets or saliva almost disappeared. In particular, as a result of MOS testing the fit of the subjects who participated in the mask cleaning, it was excellent at 4.4 on average. Therefore, the mask was disposable, but if the spray was washed in the proposed method more than twice a day, the mask could be used in a comfortable state for more than a week.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

Characteristics of Biological Agent and relavent case study (생물무기 특성과 사례연구)

  • Park, Minwoo;Kim, Hwami;Choi, Yeonhwa;Kim, Jusim
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.442-454
    • /
    • 2017
  • Biological weapon is manipulated and produced from microorganisms such as bacteria, virus, rickettsia, fungi etc. It is classified as one of the Weapons of Mass Destruction (WMD) along with chemical weapon and radiological weapon. Biological weapon has a number of operational advantages over the other WMDs including ease of development and production, low cost and possibility of covert dissemination. In this study we analyze the history of biological weapon's development and the existing biological threats. Then, we predict the social impact of biological attack based on the physical properties of biological agent and infection mechanisms. By analyzing the recognition, dispersion pattern of agents, characteristics of the diseases in the biological weapon related historical events such as Sverdlovsk anthrax accident, 2001 anthrax attack, we found out some of the facts that biological attack would not likely to be recognized rapidly, produce large number of the exposed, increase number of paients who suffed from severe respiratory illness. It would lead the public health and medical service providers to be struggled with hugh burden. Base on the facts that we found from this case study, we suggested the main capabilities of public health required to respond to bioterrorism event efficiently. Syndromic surveillance and other reporting system need to be operated effeciently so that any suspicious event should be detected promptly. the pathogen which suspected to be used should be identified through laboratory diagnostic system. It is critical for the public health agency to define potentially exposed population under close cooperation with law enforcement agencies. Lastly, massive prophylaxis should be provided rapidly to the people at need by operating human and material resources effeciently. If those capacities of public health are consistantly fortified we would be able to deal with threat of bioterrorism successfully.

Status and Management Strategy of Pesticide Use in Golf Courses in Korea (우리나라 골프장의 농약사용 실태 및 관리방안)

  • Kim, Dongjin;Yoon, Jeongki;Yoo, Jiyoung;Kim, Su-Jung;Yang, Jae E.
    • Journal of Applied Biological Chemistry
    • /
    • v.57 no.3
    • /
    • pp.267-277
    • /
    • 2014
  • Objective of this paper is to assess the available data on the pesticide uses and regulations in the golf courses, and provide the nationwide systematic management options. Numbers of golf courses in Korea are rapidly increasing from 2000s and reached at 421 sites by the end of 2011. Accordingly pesticide usage has been increased with years in direct proportion to the increasing number of golf courses. Amounts of pesticide applied in 2011 were 118,669 kg as of an active ingredient and were in the orders of fungicides (54.9%) > insecticides (24.4%) > herbicides (13.3%) > growth regulators (0.1%). Average pesticide usages in 2011 were 280.9 kg per golf course and $5.4kg\;ha^{-1}$. Frequencies of the residual pesticide detections in green and turf were higher than those in fairway and soil, respectively. Residue of highly toxic pesticides was not detected in golf courses. Ministry of Environment in 2010 has developed the 'golf course pesticide monitoring and management system' which is the advanced online registry for kind and amount of pesticides applied in each golf course. This system is intended for monitoring of the pesticide uses and residual levels and protecting the environmental pollution from pesticides in the golf course. In 2009, management of pesticides in the golf courses became the task of Ministry of Environment, being merged from many federal agency and ministries. The protocol for the site-specific best management practices, on which to base results from the risk assessment, should be set for pesticides in the golf to minimize the environmental impacts.

An Examination into the Illegal Trade of Cultural Properties (문화재(文化財)의 국제적 불법 거래(不法 去來)에 관한 고찰)

  • Cho, Boo-Keun
    • Korean Journal of Heritage: History & Science
    • /
    • v.37
    • /
    • pp.371-405
    • /
    • 2004
  • International circulation of cultural assets involves numerous countries thereby making an approach based on international law essential to resolving this problem. Since the end of the $2^{nd}$ World War, as the value of cultural assets evolved from material value to moral and ethical values, with emphasis on establishing national identities, newly independent nations and former colonial states took issue with ownership of cultural assets which led to the need for international cooperation and statutory provisions for the return of cultural assets. UNESCO's 1954 "Convention for the Protection of Cultural Property in the Event of Armed Conflict" as preparatory measures for the protection of cultural assets, the 1970 "Convention on the Means of Prohibiting and Preventing the Illicit Import and Transfer of Ownership of Cultural Property" to regulate transfer of cultural assets, and the 1995 "Unidroit Convention on Stolen or Illegally Exported Cultural Objects" which required the return of illegally acquired cultural property are examples of international agreements established on illegal transfers of cultural assets. In addition, the UN agency UNESCO established the Division of Cultural Heritage to oversee cultural assets related matters, and the UN since its 1973 resolution 3187, has continued to demonstrate interest in protection of cultural assets. The resolution 3187 affirms the return of cultural assets to the country of origin, advises on preventing illegal transfers of works of art and cultural assets, advises cataloguing cultural assets within the respective countries and, conclusively, recommends becoming a member of UNESCO, composing a forum for international cooperation. Differences in defining cultural assets pose a limitation on international agreements. While the 1954 Convention states that cultural assets are not limited to movable property and includes immovable property, the 1970 Convention's objective of 'Prohibiting and preventing the illicit import, export and transfer of ownership of cultural property' effectively limits the subject to tangible movable cultural property. The 1995 Convention also has tangible movable cultural property as its subject. On this point, the two conventions demonstrate distinction from the 1954 Convention and the 1972 Convention that focuses on immovable cultural property and natural property. The disparity in defining cultural property is due to the object and purpose of the convention and does not reflect an inherent divergence. In the case of Korea, beginning with the 1866 French invasion, 36 years of Japanese colonial rule, military rule and period of economic development caused outflow of numerous cultural assets to foreign countries. Of course, it is neither possible nor necessary to have all of these cultural properties returned, but among those that have significant value in establishing cultural and historical identity or those that have been taken symbolically as a demonstration of occupational rule can cause issues in their return. In these cases, the 1954 Convention and the ratification of the first legislation must be actively considered. In the return of cultural property, if the illicit acquisition is the core issue, it is a simple matter of following the international accords, while if it rises to the level of diplomatic discussions, it will become a political issue. In that case, the country requesting the return must convince the counterpart country. Realizing a response to the earnest need for preventing illicit trading of cultural assets will require extensive national and civic societal efforts in the East Asian area to overcome its current deficiencies. The most effective way to prevent illicit trading of cultural property is rapid circulation of information between Interpol member countries, which will require development of an internet based communication system as well as more effective deployment of legislation to prevent trading of illicitly acquired cultural property, subscription to international conventions and cataloguing collections.