• 제목/요약/키워드: BREACH

검색결과 427건 처리시간 0.027초

DNS 정보 검색 연동 기법을 이용한 침해 사고 예방 시스템 설계 (Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method)

  • 김광섭;박영길;노승환;김봉현
    • 한국정보통신학회논문지
    • /
    • 제16권9호
    • /
    • pp.1955-1962
    • /
    • 2012
  • 최근 정보보안의 흐름은 사용자 중심으로 변화가 되고 있다. 이는 사용자가 인터넷을 하는 동안 정상적 및 비정상적으로 유입되는 유해한 파일에 의한 보안사고가 대부분이라는 의미이다. 따라서 본 논문에서는 DNS에 대한 신뢰성을 향상시키고 DNS를 이용한 시스템 제어를 통해 침해사고를 사전에 예방할 수 있는 보안 시스템을 설계하고자 한다. 즉 사용자 중심의 정보보안 시스템으로 사용자 컴퓨터에 감염된 유해 파일이 임의로 사이트를 접속하는 행위에 대하여 차단할 수 있는 방법을 제안하고자 한다.

도시 가정의 생활사건 요인구조와 관련변인 (The Facotr Structure of Urban Family Life Events and Related Variables)

  • 임정빈
    • 대한가정학회지
    • /
    • 제31권4호
    • /
    • pp.115-132
    • /
    • 1993
  • This study was designed with the purpose to analyze the factor structure of family life events and to clear the influence of related variables on family life events. The frequence of experienced events and the degree of importance of events which were the constituent components of family life events was estimated by the 650 married woman in Kangju. The results were as follows: 1. 15 factors of family life events derived by factor analysis: F.1「Expenditure and economic loss」, F.2「Growth and change of children」, F.3「Change of family structure」, F.4「Family's change」, F.5「Change of life level」, F.6「Family's social problem」, F.7「Need of care」, F.8「Family's health」, F.9「Marital relationship」, F.10「Family's social damage」, F.11「Breach with acquaintance」, F.12「Financial difficulties」F.13「Husband's problem」, F.14「Housewives' social activity」, F.15「Kinship's support」. 2. There frequence of experienced family life events such as expenditure and economic loss and breach with acquaintance was highest. 3. The degree of importance about experienced family life events such as growth and change of children was highest. 4. Age, family life cycle have significantly differenced on the degree of importance and the frequence of experienced events. 5. Education's level, family size, income, housewives' employment and family structure have differently differenced on the degree of importance and the frequence of experienced events according event factor.

  • PDF

영국보험계약법 상 고지의무 문제와 2012년 소비자보험(고지.표시)법에 관한 연구 (Some Problems Disclosure on the Insurance Contract Law in UK and The Consumer Insurance(Disclosure & Representations), 2012)

  • 윤승국
    • 무역상무연구
    • /
    • 제61권
    • /
    • pp.139-163
    • /
    • 2014
  • Recently with making of 'The Consumer Insurance (Disclosure and Representations) Act 2012(hereunder CIA)', the UK revised the duty of disclosure especially with the consumer insurance contract. According to the CIA, if the misrepresentation was careless, the insurer may have the three options based upon what the insurer would have done had the consumer taken care to answer the question accurately; a compensatory remedy, avoidance of the insurance contract or, amendment of the contract. I realized that the establishment of CIA has been exposed to pro-actively relieve the breach of Warranty and Disclosure, Representations as far as required by the Global Insurance market. It was found that it is expected to bring significant changes in UK Insurance Act system of the 21st century, and prepares competition from neighboring countries. On the other hand, in the common law system, countries under MIA(1906) are trying to address the breach of warranty and Disclosure, Representations, except the UK cannot completely adhere with a positive attitude.

  • PDF

국제물품매매계약에서 매도인의 서류제공 의무에 따른 실무상 유의점 - 선하증권을 중심으로 - (A Study on Practical Suggestion about Seller' Documents in International Sales contract of Goods - Focused on Bill of Lading -)

  • 윤동희;김재성;박세훈
    • 무역상무연구
    • /
    • 제47권
    • /
    • pp.49-78
    • /
    • 2010
  • The seller has to deliver goods and hand over documents as required by the contract. It is very important that ownership of goods shall be transferred by the documents from the seller to the buyer. Where terms of payments is made under documentary payment such as negotiable order Bill of lading or any transport documents for symbolic delivery of goods shall be more important between the parties concerned. The buyer may withdraw or cancel the contract where the buyer accept the foul Bill of Lading and demand damages where the buyer accept the other documents which are not in accordance with requirements by the buyer. Withdraw or cancel of contract can be made where discrepancy of documents comes into fundamental breach of contract. In conclusion transport documents by the seller will be used to determine appropriation of transport document to the contract. Therefore the seller has to deliver the proper shipping documents to the buyer. Where the breach of the seller's obligations to deliver documents the buyer has the right of requiring performance, contract avoided, claiming damage to recover the contract under CISG. The significance of transport documents has been focused in this study and careful examination of documents shall be needed to prevent any dispute or differences between the parties.

  • PDF

국제물품매매계약에서 위험이전에 관한 법리 (The Rules of Law on Passing of Risk in Contracts for the International Sale of Goods)

  • 홍성규
    • 무역상무연구
    • /
    • 제64권
    • /
    • pp.3-37
    • /
    • 2014
  • The purpose of this paper is to examine thoroughly on passing of risk in contracts for the international sale of goods. Articles 66~70 of the CISG contain provisions on passing of risk. Article 66 states the main effect of passing risk to the buyer. Article 67~69 determine the decisive point in time which the risk passes from the seller to the buyer and article 70 attempts to explain the relation between passing of risk and fundamental breach of contract by the seller. As in the case corresponding Incoterms rules, the main issue to be resolved is which party should bear the economic consequences in the event that the goods are accidentally lost, damages or destroyed. Many cases also apply CISG articles 66~70 to contracts in which parties not agree on the use of trade terms such as CIF, CFR, FOB and FCA in Incoterms[R] 2010 Rule that provide for when the risk passes. In order to minimize disputes that may arise under contract, when drawing up a contracts for the international sale of goods, the specifics of agreement should be clearly stipulated. Consequently, the parties of contracts for the international sale of goods should take adequate measures, and it is required to prepare the contracts clearly as the specific terms to prevent and resolve contractual disputes on passing of risk.

  • PDF

중·노년층의 온라인 개인정보보호 행동에 영향을 미치는 요인에 관한 연구; 한국과 중국 인터넷 사용자를 중심으로 (A Study on the Factors of Online Information Security Behavior Failure: Focused on the Elderly)

  • 전양;박민정;채상미
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제29권1호
    • /
    • pp.51-74
    • /
    • 2020
  • Purpose Since the number of personal information breach incidents increased, many people have perceived the importance of personal information protection, in the recent. Especially, the number of personal information breach targeting middle-aged and elderly people rapidly increases. Therefore, the purpose of this study is to identify the factors which influence to fail of online information security behaviors among the elderly. Design/methodology/approach This study made a research model by adopting the factors deducted from the protection motivation theory. To analyze the research model, we conducted an online survey targeted on the elderly and middle ages users who have nations of Korean and Chinese respectively. Findings According to the empirical analysis result, we identified that only perceived severity and perceived vulnerability affected information security awareness. On contrast, it was also discovered that perceived barriers, self-efficacy, and response efficacy did not affect information security awareness. Additionally, the awareness of information security also did not affect information security behaviors. Middle-aged and elderly people with personal information protection education did more information security behaviors than people those who no education experiences. Korean middle-aged and elderly people with education significantly did more information protection behaviors than the people without the education.

AMI 공격 시나리오에 기반한 스마트그리드 보안피해비용 산정 사례 (A Case Study of the Impact of a Cybersecurity Breach on a Smart Grid Based on an AMI Attack Scenario)

  • 전효정;김태성
    • 정보보호학회논문지
    • /
    • 제26권3호
    • /
    • pp.809-820
    • /
    • 2016
  • 스마트그리드는 사물인터넷의 핵심 응용서비스이고, 그 중 가장 핵심적인 구성요소인 AMI((Advanced Metering Infrastructure)는 전기사업자와 소비자의 접점에 위치하고 있으며, 스마트 미터는 소비자의 전기사용을 기록하고 사업자에게 전달하는 역할을 한다. 본 논문에서는 스마트그리드에서 소비자와 직접 맞닿아 있는 스마트 미터를 중심으로 AMI에 대한 NESCOR에서 제시하고 있는 사이버공격 및 피해 시나리오를 기반으로 피해비용을 산정한다. 본 연구의 결과는 정책입안자나 전기사업자가 스마트그리드 관련 투자의사결정을 하는데 참고가 될 수 있을 것이다.

Blast analysis of concrete arch structures for FRP retrofitting design

  • Nam, Jin-Won;Kim, Ho-Jin;Yi, Na-Hyun;Kim, In-Soon;Kim, Jang-Ho Jay;Choi, Hyung-Jin
    • Computers and Concrete
    • /
    • 제6권4호
    • /
    • pp.305-318
    • /
    • 2009
  • Fiber Reinforced Polymer (FRP) is widely used for retrofitting concrete structures for various purposes. Especially, for the retrofitting of concrete structures subjected to blast loads, FRP is proven to be a very effective retrofitting material. However, a systematic design procedure to implement FRP for concrete structure retrofitting against blast loads does not exist currently. In addition, in case of concrete structures with inarticulate geometrical boundary conditions such as arch structures, an effective analysis technique is needed to obtain reliable results based on minimal analytical assumptions. Therefore, in this study, a systematic and efficient blast analysis procedure for FRP retrofitting design of concrete arch structure is suggested. The procedure is composed of three sequential parts of preliminary analysis, breach and debris analysis, and retrofit-material analysis. Based on the suggested procedure, blast analyses are carried out by using explicit code, LS-DYNA. The study results are discussed in detail.

IoT 단말기에서 증거추출 포렌식 연구 (Extract of evidence on the IoT Device)

  • 송진영;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 추계학술대회
    • /
    • pp.343-345
    • /
    • 2017
  • IoT 기술의 발달로 IoT와 연계된 단말기가 활용되고 있다. 하지만 IoT가 사회 전반에 활용되면서 보안사고가 발생하고 있다. IoT 보안 사고는 개인의 위험과 사회의 혼란으로 연결될 수 있다. 본 연구에서는 IoT 스마트워치 단말기에서 보안 침해사고가 발생한 증거를 추출한다. IoT 보안 침해사고 환경을 분석하고 원본성과 무결성을 확보하기 위한 Hashing 함수를 추출한다. 그리고 IoT 스마트워치 단말기에서 Forensic 증거를 추출하여 원본성과 무결성을 검증하고 Forensic 보고서를 작성하여 법적 증거자료로 채택되도록 연구한다.

  • PDF

행렬 기반 랜덤화를 적용한 프라이버시 보호 기술의 안전성 및 정확성 분석 (An Analysis of Privacy and Accuracy for Privacy-Preserving Techniques by Matrix-based Randomization)

  • 강주성;안아론;홍도원
    • 정보보호학회논문지
    • /
    • 제18권4호
    • /
    • pp.53-68
    • /
    • 2008
  • 실용적인 프라이버시 보호 기술 중의 하나인 행렬 기반 랜덤화 기법에 대하여 세밀한 분석을 실시한다. 최적의 변환 행렬을 찾기 위한 프라이버시 손상 관점의 요구조건 및 정확성 측도로 제안된 행렬의 조건수 개념과 연관된 파라미터들간의 관계를 이론적으로 규명한다. 행렬 기반의 대표적 알고리즘인 랜덤 대치 기법의 효율적인 구현을 위하여 데이터 재구축 과정에서 필요한 역행렬을 간단히 구하는 공식을 제시하고, 행렬의 노름에 따른 변환 행렬의 조건수와 변환된 분포의 기댓값 및 분산을 계산함으로써 표준오차와 파라미터들 간의 관계식을 도출한다. 또한, 랜덤 대치 기법을 구현하여 다양한 시뮬레이션을 실시함으로써 이론적으로 얻은 결과를 실험적으로 검증한다.