• Title/Summary/Keyword: 환경적 침해

Search Result 394, Processing Time 0.025 seconds

A Review of Studies on personal information (개인정보 연구동향과 과제)

  • Bang, Min Seok;Oh, Cheol H.
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.3-16
    • /
    • 2014
  • The personal information is now considered more valuable and important topic in this highly improved knowledge information society. In this research, 50 research papers and government reports between 2000 and 2013 are analysed to understand a trend of academic research of the personal information. To summarize of the result of the analysis, firstly, there are many discussions and emphases to governmental protections of the personal information, mainly in the qualitative and legal system level. Secondly, there are insufficient researches of the personal information, particularly in the academic field rather than government and national research institutes. Thirdly, there are not sufficient investigations to approach influential reasons and relations of cause and effect, though there are much enough researches on the actual and present conditions of the protection of the personal information. To develop the investigation of the personal information, it needs to be considered to research more about systematic approach to the issue of personal information, expansion of research area considering the changeable IT environment, diverse methodological experiment like a metrical way, reformation of investigation system, and improved information management in the private sector.

An Integrated Management Model of OS-RBAC and Separation Of Duty Policy (OS-RBAC과 임무분리 정책의 통합 관리 모델)

  • Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.167-175
    • /
    • 2010
  • Like most large organizations, there are business rules such as 'separation of duty' and 'delegation' which should be considered in access control. From a SOD point of view, previous SOD models built on the (Administrative) Role-Based Access Control model cannot present the best solution to security problems such as information integrity by the limited constituent units such as role hierarchy and role inheritance. Thus, we propose a new integrated management model of administration role-based access control model and SOD policy, which is called the OS-SoDAM. The OS-SoDAM defines the authority range in an organizational structure that is separated from role hierarchy and supports a decentralized security officer-level SOD policy in which a local security officer can freely perform SOD policies within a security officer's authority range without the security officer's intervention.

A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique (정적 분석 기반 기계학습 기법을 활용한 악성코드 식별 시스템 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.775-784
    • /
    • 2019
  • Malware infringement attacks are continuously increasing in various environments such as mobile, IOT, windows and mac due to the emergence of new and variant malware, and signature-based countermeasures have limitations in detection of malware. In addition, analytical performance is deteriorating due to obfuscation, packing, and anti-VM technique. In this paper, we propose a system that can detect malware based on machine learning by using similarity hashing-based pattern detection technique and static analysis after file classification according to packing. This enables more efficient detection because it utilizes both pattern-based detection, which is well-known malware detection, and machine learning-based detection technology, which is advantageous for detecting new and variant malware. The results of this study were obtained by detecting accuracy of 95.79% or more for benign sample files and malware sample files provided by the AI-based malware detection track of the Information Security R&D Data Challenge 2018 competition. In the future, it is expected that it will be possible to build a system that improves detection performance by applying a feature vector and a detection method to the characteristics of a packed file.

Calculation of the Duration of Sunshine Using a Three-Dimensional Spatial Information Open Platform (3차원 공간정보 오픈 플랫폼을 활용한 일조 시간 산정)

  • PARK, Ji-Hye;SUH, Yong-Cheol
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.3
    • /
    • pp.80-89
    • /
    • 2017
  • Due to urban growth and increasing population density, many large cities contain building forests. Moreover, due to increasing demands for pleasant residential environments, there is growing concern over the encroachment of sunshine. Although research on related laws and other related fields is emerging, there is a limit to the extent to which the public can easily determine the amount of sunshine per building without referral to specialized agencies. Therefore, in this study, the duration of sunshine per building object was calculated via a simulation of urban shaded area using a spatial information open platform application programming interface. The study area was the'L'apartment complex located in the new city, Haeundae, Busan, China. To perform the duration of sunshine simulation for three-dimensional urban spatial objects, the building height was extracted from pre-built three-dimensional spatial information data, and the position of the sun was determined from calculations of the altitude and azimuth of the sun. This study provides a more precise and easier method of judging whether sunshine is impeded from reaching buildings by quantitatively analyzing sunshine and classifying the total duration of sunshine and the continuous duration of sunshine on each object.

A Study on Automatic Classification Technique of Malware Packing Type (악성코드 패킹유형 자동분류 기술 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1119-1127
    • /
    • 2018
  • Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.

Safety Verification Techniques of Privacy Policy Using GPT (GPT를 활용한 개인정보 처리방침 안전성 검증 기법)

  • Hye-Yeon Shim;MinSeo Kweun;DaYoung Yoon;JiYoung Seo;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.207-216
    • /
    • 2024
  • As big data was built due to the 4th Industrial Revolution, personalized services increased rapidly. As a result, the amount of personal information collected from online services has increased, and concerns about users' personal information leakage and privacy infringement have increased. Online service providers provide privacy policies to address concerns about privacy infringement of users, but privacy policies are often misused due to the long and complex problem that it is difficult for users to directly identify risk items. Therefore, there is a need for a method that can automatically check whether the privacy policy is safe. However, the safety verification technique of the conventional blacklist and machine learning-based privacy policy has a problem that is difficult to expand or has low accessibility. In this paper, to solve the problem, we propose a safety verification technique for the privacy policy using the GPT-3.5 API, which is a generative artificial intelligence. Classification work can be performed evenin a new environment, and it shows the possibility that the general public without expertise can easily inspect the privacy policy. In the experiment, how accurately the blacklist-based privacy policy and the GPT-based privacy policy classify safe and unsafe sentences and the time spent on classification was measured. According to the experimental results, the proposed technique showed 10.34% higher accuracy on average than the conventional blacklist-based sentence safety verification technique.

Studies for the Audiences' Welfare Effects from the Real Time Retransmission of Terrestrial TV Channels through the PayTV Networks (유료방송 매체를 통한 지상파채널 재전송의 후생효과 연구)

  • Byun, Sang-Kyu
    • Korean journal of communication and information
    • /
    • v.48
    • /
    • pp.63-89
    • /
    • 2009
  • The contents provided by the terrestrial broadcasters have governed the market based on their excellent quality in Korea. In spite of the launching of various pay TV services focusing on multi-channel, it is not yet easy to find out the substitutionary pay TV channels for the terrestrial. Therefore, the real time retransmission of the terrestrial channels brings about the crucial effects on the pay TV's competency, especially on the new media as the invisible barrier. So it is frequently proposed to change the aim of the retransmission policy from the universal access to the promotion of media industries. The retransmission can be divided into two types as the must carry and retransmission consent. In Korean situation, keeping or reducing the must carry channel would be appropriate rather than expanding them. However, periodic investigation into the public effects of the must carry is necessary, instead of it. Moreover, the rational and fair monetary compensation for the commercial channels(MBC, SBS, KBS2) is arising as the bottle neck in the retransmission agreements between the broadcasters. The conjoint analysis was carried out to estimate the welfare growth from the retransmission, based on the stated preference from the audiences' point of view. For must carry channels, it was certified as the 'win-win' strategy for both sides and audiences. For the commercial channels, it is revealed to be beneficial to the audiences. Thereafter, the standards for the rational price were suggested to promote the retransmission. This can contribute for inspiring the dynamic vitality to the media industry by reinforcing the contents competencies and for establishing the long term growth strategies.

  • PDF

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

담배자판기, 신규설치 금지 및 철거 규제안 철회되다

  • 한국자동판매기공업협회
    • Vending industry
    • /
    • v.2 no.5 s.6
    • /
    • pp.56-62
    • /
    • 2002
  • 담배자판기의 신규설치를 금지하고 기존 설치된 자판기마저 전면철거하도록 하는 보건복지부의 초강력 규제안이 마침내 철회가 되게 되었다. 보건복지부는 올 들어 확대되는 금연정책에 편승, 기존 흡연 구역 내 담배자판기 신규설치를 금지하고, 기존 설치된 제품들마저 전면철거하는 규제를 담은 국민건강증진법 시행령 개정안을 지난 4월 공고하며 그 입법추진을 진행한 바 있다. 이 공고안은 그간 국무총리실 산하 규제개혁위원회 분과위원회에 상정되어 1,2차 심의를 진행해 오다 지난 9월 27일 본회의를 통해 '보건복지부의 흡연구역 내 담배자판기 신규설치 금지 및 기존 자판기 철거는 명백히 영업활동 자유 및 재산권 침해에 해당된다.'는 이유로 이를 철회토록 하는 결정을 진행했다. 이 결정을 담은 국민건강증진법 개정안은 조만간 법제처 심사 및 차관회의 등을 거쳐 최종 확정 되게 된다. 이같은 규제개혁위원회의 결정은 협회를 중심으로 한 산업의 적극적인 대응이 있었기에 가능했다. 성인인증장치 도입을 통해 청소년 흡연문제를 완전, 해결하겠다는 산업계의 적극적인 자율대책에도 불구하고 아예 담배자판기를 뿌리 채 뽑겠다는 보건복지부의 행정만능주의적인 발상은 도저히 수용하지 못할 부당한 처사라는 데 관련업계가 인식을 같이 했다. 따라서 이를 반대하는 산업계 입장을 분명히 하며 분명히 하며 적극적인 저지 대응을 최근까지 진행해 왔다. 협회에서는 1차적으로 보건복지부 건강증진과에 담배자판기 전면철거에 대한 산업계 반대 입장을 피력하는 소견서 제출하고 적극적인 산업계의 반대의지를 피력하는 작업을 진행했다. 또한 청소년보호위원회를 통해 청소년 흡연감소를 위한 성인인증 담배자판기 설치 활용방안 건의하며 담배자판기의 긍정적인 활용측면을 집중 부각시키기도 했다. 재정경제부를 통해서는 담배사업법 관련 담배자판기 설치기준에 대한 질의를 통해 현행 관련법 내에서의 설치기준을 명확히 하기도 했다. 이같은 대응에 있어서의 핵심 설득 논리는 담배자판기가 이제는 성인인증장치 부착을 통해 청소년 및 사회적 위해 요인을 극소화 할 수 있다는 점에 있었다. 과거와는 달리 담배자판기가 오히려 청소년의 담배 구입루트 차단이라는 긍정적 역할을 할 수 있는 시점에 있어 이를 전면규제하기보다는 합법적인 설치 환경을 확보하여 사회적으로 떳떳하게 존재가치를 평가받을 수 있게 해달라는게 산업계의 초지일관의 주장이었던 것. 협회는 이같은 주장이 결코 산업계의 이기만이 아니라 세계적인 추세라는 점, 또 담배자판기를 전면철거까지 하면서 과당규제를 할 명분이 부족하다는 점을 반대논리로 적극 내세웠다. 규제개혁위원회가 이번 공공 이용시설 중 흡연구역으로 지정된 장소 내에 담배자판기는 설치 금지 및 철거규제에 철회권고를 내리게 된 것은 이러한 산업계의 주장을 적극 수용함에 힘입은 바 크다. 규제개혁위원회는 이번 결정의 주된 이유로 우선 기설치된 자판기에 대한 철거는 재산권 침해로 위헌 소지가 있음을 들고 있다. 또한 흡연자를 위한 흡연구역내에서마저 자판기 설치를 금지하는 등의 규제는 과도하며 흡연자의 권익보호 역시도 필요함을 인정하고 있다. 따라서 전면적인 규제보다는 청소년 이용통제 가능한 흡연구역에 한하여 담배자판기를 설치토록한 현행규정의 실질적 관리를 강화하며, 전체적으로 흡연구역을 축소 제한하는 방향으로 추진함이 바람직하다는 의견을 제시했다. 규제개혁위원회의 이번 결정으로 흡연구역 내 담배자판기의 설치는 현행법의 적용을 받게 되며, 산업계의 자율대책대로 성인인증 장치를 부착한 담배자판기의 설치 확대가 크게 촉발될 수 있을 것으로 기대된다. 담배자판기가 적극적이고 능동적인 사회적 역할을 할 수 있을 때 자연 이를 반대할 수 있는 명분도 약해질 수 밖에 없다. 산업계는 보다 신뢰성 있게 청소년 이용을 차단할 수 있는 담배자판기 관련 기술 수준을 향상시켜야 할 것이며, 협회에서는 담배자판기의 공공성과 역할에 대한 지속적인 계몽 홍보를 통해 소비자 인식을 고양시켜 나갈 수 있게 해야 할 것이다. 비록 전면 규제 완화가 어렵고 힘든 길이기는 하지만 소비자에게 신뢰성을 부여하고 청소년의 담배 구입 루트 차단에 혁혁한 역할을 다할 수 있게 된다면 그 입지기반을 재평가 받을 수 있게 될 것이다. 담배자판기의 내일은 이제 암울함이 아닌 서서히 희망을 비치는 쪽으로 급선회되고 있다.

  • PDF

Assessment of Natural Environment - II. Based on the Plant Taxa of the Natural Parks and Ulleung island- (자연환경 평가 -II. 국내 자연공원과 울릉도의 식물군을 이용하여-)

  • 김철환;이희천
    • Korean Journal of Environmental Biology
    • /
    • v.19 no.1
    • /
    • pp.49-58
    • /
    • 2001
  • This study aims to compare and analyze the environment of natural parks and Ulleung island using the plant taxa classified by five degrees based on their distributional ranges. The scores differentially given based on the importance of each degree; taxa belonging to the fifth degree are given to 20 scores each, fourth 10, third 5, second 3.3, and first 2.5, respectively. The total assessed scores were ranked as Mt. Halla, Seorak, Jiri, Deokyu, Is. Ulleung, Mt. Sobaek, Odae, Palgong, Chink, Taebaek, Songni, Juwang, Gaya, Duryun, Gaeryong, Bukhan, Naebyeon, Worak, Naejang, Cheongryang, Naeyeon, Myeongii, Jokye, Mudeung, Wolchul, Geumo, Juheul, Biseul, Hwangmae, Jangan, Seonun, Moak, Seonam, Chilgap, and Gibaek, in order, respectively. It is suggested that the natural environments assessing more than 1,000 of total scores such as Mt. Halla and Mt. Deokyu are regarded as the most excellent ones, and those between 700 to 1,000 of total scores such as Is. Ulleung and Mt. Odae are regarded as relatively excellent ones. Natural parks scored between 500 to 700 such as Mt. Palgong and Mt. Gaya are regarded as good ones and parks scored between 300 to 500 such as Mt. Duryun and Mt. Mudeung are regarded as normal ones. The area assessed less than 300 of total scores such as Mt. Wolchul and Mt. Gibaek are regarded as the most inferior ones. The total scores of the national parks are generally higher than those of the provincial and county parks. In addition, Ulleung island has a total of 882.9 scores. Therefore, according to the IUCN the Ulleung island should be included in the criterion of the preservative model of natural ecosystem, suggested by Ministry of Environment. At the same time, Ulleung island should be included to the superior model of natural scenery resources by its uniqueness of topography, geography and natural environments. Ulleung island is assessed as having relatively excellent natural environments as compared with other national parks, suggesting that the island should be designated as a new national park.

  • PDF