• Title/Summary/Keyword: CIST

Search Result 194, Processing Time 0.018 seconds

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

Malignant Gastrointestinal Stromal Tumor of Esophagus - A case report - (식도의 악성 위장관 간질종양 - 1례 보고 -)

  • Kang, Shin-Kwang;Won, Tae-Hee;Ku, Kwan-Woo;Yoon, Soo-Young;Yu, Jae-Hyun;Na, Myung-Hoon;Lim, Seung-Pyung;Lee, Young
    • Journal of Chest Surgery
    • /
    • v.36 no.2
    • /
    • pp.109-112
    • /
    • 2003
  • Stromal tumors of the gastrointestinal tract, especially of the esophagus, are rare. We had a case of malignant gastrointestinal stromal tumor(GIST) of the esophagus. A 46 years old woman was admitted for abnormal mass shadow in the chest radiograph. The mass was originated from the lower thoracic esophagus, and compressed the right lower pulmonary vein and the inferior vena cava. We removed the tumor externally without injuring of the esophageal mucosa via right posterolateral thoracotomy. The tumor was positive for CD 34 and CD 117, and diagnosed malignant CIST of the esophagus.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

The Establishment and Development of Wooden Coffin Tombs in the Jinhan and Byeonhan Confederacies: An Examination of the Wolseong-dong Type (진·변한 목관묘 문화의 성립과 전개 -월성동 유형의 검토와 함께)

  • Lee Donggwan
    • Bangmulgwan gwa yeongu (The National Museum of Korea Journal)
    • /
    • v.1
    • /
    • pp.150-173
    • /
    • 2024
  • The Gyeongsang region experienced an epoch-making social transformation approximately around the second to first century BCE, including the replacement of Bronze Age types of tombs (such as dolmens, stone cist tombs, and earthen tombs with flat capstones) with clusters of wooden coffin tombs and the emergence of wajil pottery (soft stoneware) and ironware. These shifts in the archaeological material evidence have been discussed in the context of the formation of the states that comprised the three Han confederacies and in relation to wooden coffin tombs built in later periods. This paper explicates the appearance of clustered wooden coffin tombs with accompanying ironware by categorizing them. In particular, it examines the emergence of wooden coffin tombs by creating the Wolseong-dong type, which differs from Tomb No. 5 in Joyang-dong and Tomb No. 1 in Daho-ri with their deep burial pits and large quantities of prestige goods and soft stoneware items. The Wolseong-dong type of tomb commonly features ironware, including flat-bladed iron axes, oblong cast iron axes, iron wire, iron chisels, and iron swords; a small slender, rectangular wooden coffin tomb with a shallow burial pit of less than sixty centimeters; and pottery of a type preceding soft stoneware, such as long-necked jars, triangular attached-rim pottery bowls and pots, and mounted vessels. There are also a few bronzeware items found in them, but no prestige goods. This study scrutinizes tombs in Tamni-ri in Uiseong, Hagu-ri in Gyeongju, and Hakjeongdong in Daegu by comparing them with the Wolseong-dong type, and it confirms that in Sinseodong in Daegu, Wolseong-dong type tombs and later Joyang-dong type tombs have separate spatial distributions within the site. This also indicates that the Wolseong-dong type is a valid categorization among wooden coffin tombs. Although the rise of the Wolseong-dong type tomb is associated with the migration of a group, I reserve judgement on whether its origins should be understood in the context of the iron culture in the southwestern region of South Korea that was sparked by King Jun's advance to the south or if they lie in the western region of North Korea. Either way, the Wolseong-dong type is thought to be the tombs of a group of people with lower hierarchical status than the occupants of the later Joyang-dong type.