• Title/Summary/Keyword: 침해자

Search Result 426, Processing Time 0.024 seconds

Pentesting-Based Proactive Cloud Infringement Incident Response Framework (모의해킹 기반 사전 예방적 클라우드 침해 사고 대응 프레임워크)

  • Hyeon No;Ji-won Ock;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.487-498
    • /
    • 2023
  • Security incidents using vulnerabilities in cloud services occur, but it is difficult to collect and analyze traces of incidents in cloud environments with complex and diverse service models. As a result, the importance of cloud forensics research has emerged, and infringement response scenarios must be designed from the perspective of cloud service users (CSUs) and cloud service providers (CSPs) based on representative security threat cases in the public cloud service model. This simulated hacking-based proactive cloud infringement response framework can be used to respond to the cloud service critical resource attack process from the viewpoint of vulnerability detection before cyberattacks occur on the cloud, and can also be expected for data acquisition. Therefore, in this paper, we propose a framework for preventive cloud infringement based on simulated hacking by analyzing and utilizing Cloudfox, a cloud penetration test tool.

Analysis of Privacy threats and Security mechanisms on Location-based Service (위치기반 서비스의 프라이버시 위협 요소 분석 및 보안 대책에 관한 연구)

  • Oh, Soo-Hyun;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2009
  • A location information used in LBS provides convenience to the user, but service provider can be exploited depending on how much risk you have. Location information can be exploited to track the location of the personal privacy of individuals because of the misuse of location information may violate the user can import a lot of damage. In this paper, we classify the life cycle of location information as collection, use, delivery, storage and destroy and analyze the factors the privacy is violated. Furthermore, we analyze information security mechanism is classified as operation mechanism and policy/management mechanism and propose a security solutions of all phase in life cycle.

  • PDF

Procedures of Coping with Each Type of Infringement using Live Forensic Technology (활성 포렌식 기술을 활용한 피해 유형별 침해사고 대응 절차 연구)

  • Yoon, Ju Hee;Kim, Mi Sun;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.69-78
    • /
    • 2016
  • As the development as the IT society accelerates, the frequency of terrorism from malignant codes and other cyber crimes is increasing. Malignant codes show various forms of attack according to the intentions of the attacker, and leaves behind digital evidences, not analog evidences when damages occur. Digital forensic, the procedure of collecting and analyzing digital evidence is one of the main factors that must be carried out when damages from malignant codes arise. However, there are the difficulties of not being able to preserve the integrity and authenticity in the procedure of coping witht infringements, which must be maintained in the digital forensic procedure. To complement such problems, this paper suggests the method of applying forensic by identifying the malignant code infringement incidents according to the type of damages.

Effects of Game-Based Self-Advocacy Script Intervention on Children with Disabilities (인권 침해와 관련한 게임 기반 스크립트 중재가 초등 장애아동의 자기옹호 언어 및 행동에 미치는 영향)

  • Yu, Seohyun;Kwon, Jungmin
    • Journal of Korea Game Society
    • /
    • v.15 no.3
    • /
    • pp.161-176
    • /
    • 2015
  • The purpose of this study was to examine the effects of a script intervention based on multimedia on the verbal and behavioral self-advocacy skill of elementary school students with disabilities. A multiple probe baseline design across subjects had been used with 4 students with intellectual disabilities. The results showed all participants showed significant increase of verbal and behavioral self-advocacy performance in asking for help, expressing one's opinions, and coping with violations, and the effects were maintained. The intervention was more effective for verbal self-advocacy than behavioral. Some suggestions for future study are discussed.

A Study on the Judicial Precedent regarding a Right to a View (조망권에 관한 판례연구)

  • Koo, Jae-Koon
    • Journal of Environmental Policy
    • /
    • v.7 no.3
    • /
    • pp.63-88
    • /
    • 2008
  • In this treatise I have advanced a theory to regulate legal problems rationally arising from a right to a view and I have checked some precedents dealing with the temporary injunction, compensation for damage and the demolition of a house(mainly apartment) owing to an infringement of a right to a view. Relating to an infringement of a right to a view, there are more lawsuits which are instituted together with an infringement of a right to enjoy sunshine than lawsuits related only to the right to a view. In the cases of an infringement of a right to a view connects with educational or religious environment, the court made it a decision that the construction is prohibited from constructing more than a certain-story building to protect a right to a view. Plaintiffs won a case their suit in the original judgement regarding a claim for damages owing to an infringement of a right to a view, but the Supreme Court reversed the decision of a lower court. The right to a sky view should not be infringed in case of a dwelling house which is not built for the purpose of business or a view.

  • PDF

Exploiting Friend's Username to De-anonymize Users across Heterogeneous Social Networking Sites (이종 소셜 네트워크 상에서 친구계정의 이름을 이용한 사용자 식별 기법)

  • Kim, Dongkyu;Park, Seog
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1110-1116
    • /
    • 2014
  • Nowadays, social networking sites (SNSs), such as Twitter, LinkedIn, and Tumblr, are coming into the forefront, due to the growth in the number of users. While users voluntarily provide their information in SNSs, privacy leakages resulting from the use of SNSs is becoming a problem owing to the evolution of large data processing techniques and the raising awareness of privacy. In order to solve this problem, the studies on protecting privacy on SNSs, based on graph and machine learning, have been conducted. However, examples of privacy leakages resulting from the advent of a new SNS are consistently being uncovered. In this paper, we propose a technique enabling a user to detect privacy leakages beforehand in the case where the service provider or third-party application developer threatens the SNS user's privacy maliciously.

How Smart Workers Cope With Techno-Invasion Stress in Work Domain (스마트워크 사용자의 업무 영역에서 기술침해 스트레스 대응방안에 관한 연구)

  • Kim, Yong-Young
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.261-272
    • /
    • 2021
  • With diffusion of Smart Work, a problem has been raised that Smart Work makes the boundary between work and nonwork blur, and may cause technostress. In order to find out whether Smart work copes with techno-invasion stress in work domain, we need to understand the precedence factors influencing on job satisfaction and the role of boundary management strategy which Smart Workers actively choose. This paper developed a research model containing a causal relationship among four factors, nonwork-to-work interference, job autonomy, job commitment, and job satisfaction, and the moderation effect of boundary management strategy. The findings show that overall hypotheses were accepted based on the pooled data, but three hypotheses test on job satisfaction by boundary management strategy type differed. These results suggest that in accordance with the boundary management strategy of Smart Work users, different change management need to be prepared.

무선 LAN 정보보호 기술 표준화 동향

  • 김신효;강유성;정병호;조현숙;정교일
    • Review of KIISC
    • /
    • v.12 no.4
    • /
    • pp.56-66
    • /
    • 2002
  • 최근 무선에서의 보안 결함이 밝혀지고, 무선 환경에서의 개인 프라이버시 침해 문제가 사회적인 현안으로 등장하였다. 본 고에서는 무선 기반 공중망의 보안성 강화를 위하여 국제 표준화기구에서 논의하고 있는 무선 LAN 정보보호 기술과 키관리 기술 및 가입자 인증 기술 동향과 향후 전망에 대해서 분석해 보고자 한다.

A Study on New Identity Escrow Scheme (새로운 신원 위탁 방식에 관한 연구)

  • 황보성;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.82-85
    • /
    • 2000
  • 인터넷 환경의 발달에 의해서 사용자의 편리성은 증가하였지만, 사용자의 프라이버시가 노출되는 위험 또한 증가하였다. 그 중에서 사용자의 신원이 인증 절차에서 서비스 제공자에게 노출됨으로 사용자 프라이버시 침해 문제가 발생할 수있는데 , 본 논문에서는 인증 절차시 사용자의 익명성을 제공하고 유사시 제 3의 기관과 협력해서 익명성을 제거할 수 있는 새로운 신원위탁방식을 제안한다.

  • PDF

쉽게배우는특허Q&A-저작권법

  • Kim, Seok-Hyeon
    • The Optical Journal
    • /
    • s.97
    • /
    • pp.97-97
    • /
    • 2005
  • 지난호에 이어 이번호에도 저작권법에 관한 내용을 게재한다. 최근 저작권 단체들이 결집하여 저작권 침해 행위를 강력히 단속하려는 움직임이 일고 있다. 특히 저작권자의 경제적 이익을 심각하게 위협하는 온라인 상에서의 위법 행위가 단속의 주요 대상이 될 것으로 예상되는 바, 저작권에 관한 몇 가지 상식을 알아두도록 하자.

  • PDF