• 제목/요약/키워드: Breach

검색결과 428건 처리시간 0.022초

로지스틱 회귀분석을 이용한 핀테크 결제 서비스 수용 요인 분석 (An Analysis of Factors Affecting Fintech Payment Service Acceptance Using Logistic Regression)

  • 황신해;김정군
    • 한국시뮬레이션학회논문지
    • /
    • 제27권1호
    • /
    • pp.51-60
    • /
    • 2018
  • 본 연구는 혁신확산이론과 관련 선행연구를 기반으로 사용자의 핀테크 결제 서비스 사용 영향요인을 서비스와 사용자 측면으로 분류하여 파악하고 인과관계를 실증 검증하였다. 사용자 수용에 영향을 미치는 서비스 특성으로 복잡성, 혜택, 서비스 제공자 신뢰와 인지된 위험을 서비스 특성으로, 개인 혁신성과 보안사고 경험을 사용자 특성으로 분류하여 연구모형을 구성하였다. 이항 로지스틱 회귀분석 결과 인지된 위험과 사용의 복잡성, 보안사고 경험은 사용자의 핀테크 수용에 부정적인 영향을 미치며 개인혁신성은 긍정적인 영향을 미치는 것으로 나타났다. 추가로 인지된 위험이 핀테크 서비스 수용에 미치는 부정적인 영향을 강화하는 보안사고 경험의 조절효과 역시 유의미하게 나타났다.

Upward Flame Spread for Fire Risk Classification of High-Rise Buildings

  • McLaggan, Martyn S.;Gupta, Vinny;Hidalgo, Juan P.;Torero, Jose L.
    • 국제초고층학회논문집
    • /
    • 제10권4호
    • /
    • pp.299-310
    • /
    • 2021
  • External fire spread has the potential to breach vertical compartmentation and violate the fire safety strategy of a building. The traditional design solution to this has been the use of non-combustible materials and spandrel panels but recent audits show that combustible materials are widespread and included in highly complex systems. Furthermore, most jurisdictions no longer require detailing of spandrel panels under many different circumstances. These buildings require rapid investigation using rational scientific methods to be able to adequately classify the fire risk. In this work, we use an extensive experimental campaign of material-scale data to explore the critical parameters driving upward flame spread. Two criteria are outlined using two different approaches. The first evaluates the time to ignition and the time to burnout to assess the ability for a fire to spread, and can be easily determined using traditional means. The second evaluates the preheated flame length as the critical parameter driving flame spread. A wide range of cladding materials are ranked according to these criteria to show their potential propensity to flame spread. From this, designers can use conservative approaches to perform fire risk assessments for buildings with combustible materials or can be used to aid decision-making. Precise estimates of flame spread rates within complex façade systems are not achievable with the current level of knowledge and will require a substantial amount of work to make progress.

Companies Entering the Metabus Industry - Major Big Data Protection with Remote-based Hard Disk Memory Analysis Audit (AUDIT) System

  • Kang, Yoo seok;Kim, Soo dong;Seok, Hyeonseon;Lee, Jae cheol;Kwon, Tae young;Bae, Sang hyun;Yoon, Seong do;Jeong, Hyung won
    • 통합자연과학논문집
    • /
    • 제14권4호
    • /
    • pp.189-196
    • /
    • 2021
  • Recently, as a countermeasure for cyber breach attacks and confidential leak incidents on PC hard disk memory storage data of the metaverse industry, it is required when reviewing and developing a remote-based regular/real-time monitoring and analysis security system. The reason for this is that more than 90% of information security leaks occur on edge-end PCs, and tangible and intangible damage, such as an average of 1.20 billion won per metaverse industrial security secret leak (the most important facts and numerical statistics related to 2018 security, 10.2018. the same time as responding to the root of the occurrence of IT WORLD on the 16th, as it becomes the target of malicious code attacks that occur in areas such as the network system web due to interworking integration when building IT infrastructure, Deep-Access-based regular/real-time remote. The concept of memory analysis and audit system is key.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Hyperledger Fabric을 이용한 중첩형 무한 해시체인 기반의 클라이언트 인증기법 (Client Authentication Scheme based on Infinitely Overlapped Hashchains on Hyperledger Fabric)

  • 신동진;박창섭
    • 융합보안논문지
    • /
    • 제18권4호
    • /
    • pp.3-10
    • /
    • 2018
  • 복수의 온라인 상거래 및 SNS 서비스에 가입해서 로그인 할 때 마다 사용자의 입장에서는 중복된 회원가입 및 별도의 식별자 / 패스워드를 관리해야 한다. 특히, 사용자와 SNS 서버는 동일한 비밀정보를 공유하기 때문에 서버공격에 의한 개인정보 유출은 사용자의 프라이버시 침해 및 금전적 피해를 유발 시킬 수 있다. 본 논문에서는 사용자의 로그인 인증을 위해 사용자 인증정보를 블록체인에 저장하여 다수의 SNS 서버가 공유하는 방식을 고려한다. 해시체인 기반 OTP를 개선한 인증기법을 사용하기 위해 Hyperledger Fabric을 이용하여 블록체인 네트워크의 노드를 구성하고 사용자는 단 한 번의 등록으로 동일한 식별자와 OTP를 사용하여 서비스를 제공받을 수 있는 아키텍처를 제안한다.

  • PDF

패션산업의 법적 보호와 소송 동향 -한국과 미국의 사례를 중심으로- (Legal Protection and Lawsuit Trends in the Fashion Industry -An Analysis of Cases in Korea and the U.S.-)

  • 이지선;전재훈
    • 한국의류학회지
    • /
    • 제44권6호
    • /
    • pp.1120-1138
    • /
    • 2020
  • This study focused on the increasing fashion industry disputes that have resulted from the development of technology and industry. This study examines the improvement of domestic law, along with U.S. precedents that represents a larger fashion market and more legislative cases than Korea. Analyzing previous studies in Korea and the U.S. for theoretical background, it has uncovered limitations that apply to fashion design-related cases, rather than entire lawsuits involving various fashion industries. This study divided litigation into lawsuits involving products, human resources, and other lawsuits (such as incidents such as breach of contract, and portrait rights). Therefore, most lawsuits are related to products because of false socio-cultural perceptions about design imitation in the fashion industry. Lawsuits related to human resources are expected to arise due to the expansion of the Korean fashion industry and the expansion of overseas markets. Finally, new and unexpected conflicts will arise as the environment and social structure diversify. The importance of this study is that real case analysis can help reduce disputes because it can resolve legal instability due to the ambiguity of the interpretation of current law and suggest implications for dispute resolution.

해상보험계약에서 최대선의원칙에 따른 고지의무에 관한 연구: 2015년 영국보험법과 관련하여 (The Duty of Disclosure under the doctrine of Utmost Good Faith in Marine Insurance Contract: In connection with the UK Insurance Act in 2015)

  • 김재우
    • 무역학회지
    • /
    • 제44권3호
    • /
    • pp.137-154
    • /
    • 2019
  • This study analyzes the major provisions of the UK Insurance Act 2015 and Marine Insurance Act 1906 on the duty of disclosure under the doctrine of utmost good faith. Marine insurance contracts are based on "utmost good faith" and one aspect of this is that MIA 1906 imposes a duty on prospective policy holders to disclose all material facts. In the Insurance Act 2015 of the United Kingdom, the contents of the precedent were enacted such that we have borrowed the legal principles of common law until now. The insurer is required to more actively communicate with the insurer rather than passively underwriting and asking questions of the insured. The Act details the insured's constructive knowledge of the material circumstance by reviewing the current case law and introduces a new system for the insurer's proportionate remedy against the insured's breach of the duty of fair presentation of risk. This is a default regime, which may be altered by agreement between the parties.

피의자 개인의 암호이용 통제정책에 대한 연구 (A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person)

  • 백승조;임종인
    • 정보보호학회논문지
    • /
    • 제20권6호
    • /
    • pp.271-288
    • /
    • 2010
  • 본 논문은 범죄에 사용될 수 있는 암호의 이중사용의 특성 때문에 발생 가능한 수사권 약화라는 암호의 역기능과 키복구 시스템과 복호화명령제도와 같은 피의자 개인의 암호이용에 대한 통제정책에 대해 살펴본다. 또한 피의자로서의 개인의 암호이용에 대한 통제 정책에서 발생가능한 수사권과 프라이버시권 등 다양한 개인의 헌법적 권리들에 대한 침해 위험을 상판L고, 각 정책을 과잉규제금지원칙을 적용하여 구체적으로 분석해본다. 마지막으로 국민의 권리와 수사권 확보를 보장하는 균형 잡힌 국내암호통제정책 수립을 위해 고려해야 할 요소들과 대안적인 정책방향을 제시한다.

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • 유통과학연구
    • /
    • 제20권7호
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

저수지 댐 붕괴 지점에 따른 침수 양상 비교 (Comparison of Flooding Patterns according to the Location of the Collapse of Dam body)

  • 류단쉰;이길하
    • 한국환경과학회지
    • /
    • 제31권6호
    • /
    • pp.461-470
    • /
    • 2022
  • When an agricultural soil dam collapses, the extent of inundation and the rate of diffusion vary depending on where the collapse occurs in the dam body. In this study, a dam collapse scenario was established and a two-dimensional numerical model FLO-2D was used to closely examine the inundation pattern of the downstream residential area according to the dam collapse point. The results were presented as a flood risk map showing the changes and patterns of the extent of inundation spread. The flood level and the time to reach the maximum water level vary depending on the point of collapse, and the inundation of the downstream area proceeds rapidly in the order of the midpoint, left point, and right point collapse. In the left collapse point, the submergence appeared about 0.5 hour slower than the middle point, and the right collapse point appeared about 1 hour slower than the middle point. Since the relative damage pattern is different depending on the dam collapse point, insurance and disaster countermeasures will have to be established differently.