• Title/Summary/Keyword: Chain of Custody

Search Result 14, Processing Time 0.029 seconds

A study on food safety approach for seafood Eco-label chain of custody : Focused on Requirement Analysis by AHP Method (수산물 Eco-label CoC에 대한 식품안전 접근방안 연구 : AHP 기법을 통한 요구사항 분석을 중심으로)

  • Seo, Jong-Seok;Seo, Young-Hwan;Yoon, Duk-Hyun;Seo, Won-Chul;Ock, Young-Seok
    • The Journal of Fisheries Business Administration
    • /
    • v.46 no.3
    • /
    • pp.51-61
    • /
    • 2015
  • The purpose of this study is to find food safety approach in the Eco-label Chain of Custody(CoC) which is only focused to traceability. Because, consumers want to be assured the certified seafood comes from sustainable fishery as well as hygienic. In order to this approach, we used Analytic Hierarchy Process(AHP) method as belows. We first understood the CoC criteria for using pair-wise comparison and analyzed and selected each Eco-label certifications and standards. Second, we carried out a survey to the targeted standard Marine Stewardship Council(MSC) CoC auditors all over the world and analyzed the priorities of food safety approach to 4 principles and 12 criteria belong the MSC CoC Standard. As the results, we found out that 'Management System' has the highest priority in the principles and 'Documentation' and 'Keeping Record' are the most important criteria for this approach. In addition, 'Training' and 'Identification' are also higher priority of criteria. So, we suggested food safety approach method for improvement of these criteria in conclusion based on discussion with specialist in this field.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-An;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.225-234
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics. system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-an;Shin, young-Tae;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.175-184
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics, system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

A Study on the GSCM Strategy and Business Performance - Focus on DOOLEE VISION Case - (GSCM전략과 사업성과에 관한 연구 -두리비전 사례를 중심으로-)

  • Kim, Chang-Bong
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.325-336
    • /
    • 2006
  • This paper examines the global supply chain management strategy and business performance of Doolee Vision Co. Ltd.. Based on the analysis of eighty-seven cases, the following results were found. First, it was found that just-in-time of GSCM strategy of firm have a positive influences on the business performance in transformation sector. Second, just-in-time of GSCM strategy of firm have a positive influences on the business performance in custody sector. Third, just-in-time of GSCM strategy of firm have a positive influences on the business performance in order response and support sector. Forth, just-in-time of GSCM strategy of firm have a positive influences on the business performance in customs sector. Fifth, just-in-time of GSCM strategy of firm have a positive influences on the business performance in customer service sector. However, several limitations, such as measurement for intra-industry homogeneity, measurement for flexibility of global supply chain management strategy, and measurement for business performance of global supply chain management, that make the preceding conclusions be considered preliminary.

  • PDF

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

- Technology and Tasks of Computer Forensics for Suppressing Computer Crime - (범죄 억제를 위한 컴퓨터 포렌식의 기술과 과제)

  • Lee Sang Rak;Shin Seung Ho;Park Sang Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.3
    • /
    • pp.327-337
    • /
    • 2004
  • The soaring increase in the number of Internet users combined with the constant computerization of business process has created new opportunities for computer criminals and terrorist. Fortunately, the computer security field is also progressing at a brisk rate. In particular, the field of computer forensics brings new ways of preserving and analyzing evidence related to computer crime. Computer forensics is a new emerging professions of the 21st century. It is the collection, preservation, analysis, and presentation of computer related evidence. For this reason, the various technology of computer forensics is regarded as a powerful tool for suppressing computer crime. Our aims is to introduce the overview of computer forensics technology. We also present the survey results of the state of the art of computer forensics in the domestics and of foreign country.

디지털증거 확보체계

  • Lee, Insoo
    • Review of KIISC
    • /
    • v.26 no.5
    • /
    • pp.37-43
    • /
    • 2016
  • 정보저장매체에 저장된 디지털정보로부터 범죄 단서를 찾고, 법정에 증거로 제출하기 위한 일련의 활동을 일컫는 디지털 포렌식의 개념과 기법이 국내 수사기관에 도입되어 활용된 지 10여년의 시간이 흘렀다. 그러나 디지털증거라는 새로운 개념의 탄생은 최근까지 정보의 압수대상 여부 논란 등 수사실무에서의 혼란을 초래하고 있다. 기존 증거와 구별되는 디지털정보의 특성으로 말미암아 증거로 활용함에 있어 필요한 별도의 절차적 기술적 조건이 요구되고 있으나, 과거 규정과 지침만으로는 디지털증거를 취급함에 있어 해석, 처리의 혼선을 가져 왔으며, 아직 명확하고 구체적인 실무 지침과 규정은 마련되지 못하고 있는 실정이다. 디지털증거 확보체계는 이러한 혼선을 최소화하기 위해 디지털증거의 증거능력 유지를 위해 필요한 최소한의 요건을 정의하고, 이를 바탕으로 법정 제출시까지 동일성, 무결성과 이를 증명하기 위한 보관연속성(Chain of Custody) 등을 유지 관리하기 위해 수사기관간에 구축하고 있는 인프라 시스템이다. 본 고에서는 수사기관간의 디지털정보, 디지털증거 처리, 유통, 취급에 있어 문제점을 살펴보고, 이를 보완 개선하기 위한 그간의 노력과 향후 발전방향에 대해 고찰해 보고자 한다.

Digital Forensic Techniques using physical recovery method (물리적 복구 방법을 활용한 디지털 포렌식 기술)

  • Choi, Jae-Min;Shin, Dae-Min;Lee, Sang-Jin;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.146-149
    • /
    • 2007
  • 2000년대에 접어들어 컴퓨터가 보급화 되면서, 컴퓨터를 도구로 하는 범죄가 폭발적으로 증가하기 시작하였다. 컴퓨터 시스템에 접근하여 중요 정보를 빼돌리거나, 범죄의 목적이 되는 해킹과 같은 정보보호 침해사고가 크게 증가하였으며, 컴퓨터를 이용한 정상적인 서비스를 방해하는 형태의 디지털 범죄들이 다수 발생하기 시작하였다. 따라서 범죄 수사 과정에서 전자 매체에 대한 분석이 필수 불가결한 요소로 등장하고 있으며, 이를 분석하려는 디지털 포렌식 연구가 활발히 진행되고 있다. 특히 전자 매체에 기록되는 디지털 정보는 보관이 편리하지만 삭제와 복제가 용이하므로 디지털 증거는 매우 세심하게 다루어야 하며, 수사관에 의한 의도적인 훼손이 없었음을 증명할 수 있는 절차와 제도가 필요하다. 국내에서는 적법한 수사 절차와 무결성을 보장하기 위하여 '절차 연속성(chain-of-custody)'을 제공하는 수사 가이드라인을 제작하였으며, 체계적인 수사를 수행 하고 있다.[4] 이와 더불어 포렌식 수사 과정에서 물리적인 접근을 통해 디지털 저장 매체에 대한 복구할 수 있는 방법이 존재하며, 이에 대한 구체적인 방안을 논한다.[1]

  • PDF

Main Revisions and Some Recommendations of the Incoterms(R) 2010 (인코텀즈 2010의 주요 개정내용과 적용상의 유의점)

  • Choi, Myung-Kook
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.49
    • /
    • pp.3-41
    • /
    • 2011
  • In this article, the author have studied on main revisions and some recommendations of the Incoterms(R) 2010. Main revisions are as belows. 1. Two new Incoterms rules -DAT and DAP- have replaced the Incoterms 2000 rules DAF, DES, DEQ and DDU. 2. New classification of the Incoterms(R) 2010 are adopted. First class is Rules for any mode or modes of transport(EXW, FCA, CPT, CIP, DAT, DAP and DDP belong to this class.) and second class is rules for sea and inland waterway transport(FAS, FOB, CFR and CIF belong to this class.). 3. Incoterms(R) 2010 rules formally recognizes that they are available for application to both international and domestic sale contracts. 4. The Guidance Notes and Introduction are not part of the actual Incoterms(R) 2010 rules. 5. Under the FOB, CFR and CIF, all mention of the ship's rail as the point of delivery has been omitted in preference for the goods being delivered when they are "on board" the vessel. 6. Incoterms(R) 2010 rules include the obligation to 'procure goods shipped' as an alternative to the obligation to ship goods in the relevant Incoterms rules. 7. Incoterms(R) 2010 rules give electronic means of communication the same effect as paper communication. 8. Incoterms(R) 2010 rules have allocated obligations between the buyer and seller to obtain or to render assistance in obtaining security-related clearances. such as chain-of custody information. Some recommendations are as belows. 1. The parties must incorporate the Incoterms(R) 2010 rules into their contract of sale. 2. The parties must choose the appropriate Incoterms(R) 2010 rules. 3. Specify the place or port as precisely as possible in their contract of sale. 4. Remember that Incoterms(R) 2010 rules do not give the parties a complete contract of sale. 5. Incoterms(R) 2010 rules do not prohibit alteration of Incoterms rule, but there are dangers in so doings. In order to avoid any unwelcome surprises, the parties would need to make the intended effect of such alterations extremely clear in their contract.

  • PDF

A Study on the Procedure, Method of Search and Seizure for HIS (Hospital Information System) (의료정보시스템의 압수수색 절차와 방법에 대한 연구)

  • Kim, Taehoon;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.83-96
    • /
    • 2018
  • Electronic medical records in the hospital information system are the important evidence related to the crime and are subject to search and seizure. In the case of a large general hospital, it is possible to search for seizures through cooperation of the staff, but it is impossible in small hospitals. The investigation agency copies the database of electronic medical records and then selects relevant content. This approach has an issue of excessive search and seizure. In this paper, we propose field selection procedures and methods for electronic medical records while ensuring integrity, reproducibility, and chain of custody. Currently, it is necessary to study the procedures and methods of search and seizure of medical information system so that it can respond to next changing cloud hospital information system.