• Title/Summary/Keyword: Computer Crime

Search Result 213, Processing Time 0.023 seconds

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

Theoretical Implication on Establishing the National Countermeasure System against Cyber Crime - Focusing on a Pattern of Cyber Terror - (사이버범죄에 대한 국가적 대응체계 구축의 이론적 함의 -사이버테러형 범죄를 중심으로-)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.165-171
    • /
    • 2009
  • From the late 20th century, rapidly progressing information communication technology and spreading Internet all over the world cause many reverse functions when there is a conversion into the new information society. One of them is cyber terrorism as cyber crime. Cyber terrorism gradually has had a serious problem in the national security as well as the domestic aspects. Therefore, this study looked into the present condition of cyber terrorism, discussed its prospect, and sought the efficient national countermeasure methods against cyber terrorism by comparing other countries' countermeasure systems currently.

A Study on Generation Methodology of Crime Prediction Probability Map by using the Markov Chains and Object Interpretation Keys (마코프 체인과 객체 판독키를 적용한 범죄 예측 확률지도 생성 기법 연구)

  • Noe, Chan-Sook;Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.107-116
    • /
    • 2012
  • In this paper we propose a method that can generate the risk probability map in the form of raster shape by using Markov Chain methodology applied to the object interpretation keys and quantified risk indexes. These object interpretation keys, which are primarily characteristics that can be identified by the naked eye, are set based on the objects that comprise the spatial information of a certain urban area. Each key is divided into a cell, and then is weighted by its own risk index. These keys in turn are used to generate the unified risk probability map using various levels of crime prediction probability maps. The risk probability map may vary over time and means of applying different sets of object interpretation keys. Therefore, this method can be used to prevent crimes by providing the ways of setting up the best possible police patrol beat as well as the optimal arrangement of surveillance equipments.

Research on international examples on prevention of juvenile delinquency

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.151-157
    • /
    • 2020
  • The first thing we can consider to prevent juvenile delinquency is to punish those criminals. However, this is not always the proper solution. In consideration to the feature of juvenile period when they lack in proper judgment it is better to provide education than punishment so that they are not branded as criminals in our society. Also, by returning to the society, they can obtain social techniques and obtain the opportunity of making contribution to the society, which is also good for their career development. Combining international examples on juvenile delinquency prevention, there is a need to comprehensively evaluate level of probation and risk exposure of juvenile based on placement matrix of comprehensive strategy program in the US. Also, control solution by juvenile crime development phase should be made. In terms of control treatment based on crime phase, crime history should be considered when applying control. For the subject of preventing juvenile crime, it shouldn't be legal organizations like before but shall be home, school, local society, and legal organization together.

Research on solution for protecting victim privacy of crime deposit with depository

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.209-216
    • /
    • 2020
  • As depository system for negotiation or reimbursement to the victim in criminal case is reflected to consideration for diminishing punishment and hence, it is very important in the process. According to the current law, one needs to fill out victim's personal information such as name, address, and ID number for processing depository. However, if the victim is sexual violence victim, all the personal information is covered up becoming anonymous. Therefore, it becomes difficult for the accused person to get necessary information. Such covering up action is to prevent further second damage that may be caused such as threatening for the negotiation whereas victim has no willingness to forgive the accused. However, even if the accused person regrets his/her crime and make reimbursement to the victim, as they have no personal information on the victim it becomes impossible for them to make the depository. If we apply ESCROW system here it will allow victims to avoid any direct contact with the accused person as well as preventing any privacy disclosure. Also, for the accuse person, they can show how much they regret by making depository within their capability.

A study on the efficient extraction method of SNS data related to crime risk factor (범죄발생 위험요소와 연관된 SNS 데이터의 효율적 추출 방법에 관한 연구)

  • Lee, Jong-Hoon;Song, Ki-Sung;Kang, Jin-A;Hwang, Jung-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.255-263
    • /
    • 2015
  • In this paper, we suggest a plan to take advantage of the SNS data to proactively identify the information on crime risk factor and to prevent crime. Recently, SNS(Social Network Service) data have been used to build a proactive prevention system in a variety of fields. However, when users are collecting SNS data with simple keyword, the result is contain a large amount of unrelated data. It may possibly accuracy decreases and lead to confusion in the data analysis. So we present a method that can be efficiently extracted by improving the search accuracy through text mining analysis of SNS data.

A Design of a Scream Detecting Engine for Surveillance Systems (보안 시스템을 위한 비명 검출 엔진 설계)

  • Seo, Ji-Hun;Lee, Hye-In;Lee, Seok-Pil
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1559-1563
    • /
    • 2014
  • Recently, the prevention of crime using CCTV draws special in accordance with the higher crime incidence rate. Therefore security systems like a CCTV with audio capability are developing for giving an instant alarm. This paper proposes a scream detecting engine from various ambient noises in real environment for surveillance systems. The proposed engine detects scream signals among the various ambient noises using the features extracted in time/frequency domain. The experimental result shows the performance of our engine is very promising in comparison with the traditional engines using the model based features like LPC, LPCC and MFCC. The proposed method has a low computational complexity by using FFT and cross correlation coefficients instead of extracting complex features like LPC, LPCC and MFCC. Therefore the proposed engine can be efficient for audio-based surveillance systems with low SNRs in real field.

A Study on the Control of Inflow from Juvenile Delinquency Groups to Organized Crime Groups (성인 범죄집단의 청소년 비행집단 구성원에 대한 포섭억제 방안에 관한 연구)

  • Oh, Hyung-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.63-68
    • /
    • 2008
  • 성인 조직범죄집단은 조직유지와 활발한 조직활동을 위해 청소년 비행집단의 구성원을 포섭하려한다. 그리고 청소년 비행집단의 구성원은 다양한 이유로 인하여 조직범죄집단에 유입된다. 이는 당해 비행청소년은 물론 그 주변의 청소년들에게도 악영향을 미친다. 이러한 양 집단 간의 연계를 통한 유입현상을 통제하기 위하여 우선 청소년을 대상으로 비행행위에 대한 예방목적의 프로그램 활용은 물론 보다 효과적인 제도의 운용을 위한 구체적 논의가 필요하다. 이에 대해 청소년들이 활동하고 서로를 접하는 공간인 학교와 지역사회에서의 통제는 필수적이며 이러한 이유로 경찰과의 협력을 통한 예방활동에 주목할 필요가 있다.

  • PDF

Criminal Justice Policy against Terrorism in China

  • Xuan, Song-He
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2016
  • China is defending the terrorist crime through the Anti-Terror Law and anti-terrorism criminal legislation. China's Anti-Terror Law and the Criminal Code Amendment (9), which were promulgated in 2015, provide legal grounds for preventing and hurting ever-growing terrorist crimes. In particular, China's amendment to the Criminal Code (9) is designed to rigorously enforce the legal framework for terrorist crimes, protect prejudicial rights that might be violated by serious terrorist crimes, and protect the penalties for terrorist crimes. However, China's anti-terrorism legislation still has drawbacks such as lack of systematicity, limited regulatory boundaries, and lack of rigorous penalties for the establishment of anti-terrorism legislation. To counter this, China's anti-terrorism legislation must strictly regulate the legal system of terrorist crimes, secure penalties, and prescribe anti-terrorism laws as professional chapters.

A Proposal for Crime Prevention Through Environmental Design for Making Safe Residential Environment - Focusing on Alleys in the Residential Area of Busan - (안전한 주거환경 조성을 위한 범죄예방 환경디자인 제안 - 부산시 주거지역 골목길 사례를 중심으로 -)

  • Kang, Seung-Yeong;An, Su-Mi;Son, Kwang-Ho
    • Korean Institute of Interior Design Journal
    • /
    • v.23 no.6
    • /
    • pp.150-159
    • /
    • 2014
  • Recently, violent crimes against the socially disadvantaged have become more frequent and became serious social issues. In addition, compared to the past, the crime methods have become more diverse and intricate, which results in larger damages. For those reasons, the public are increasingly concerned about crimes and it is detrimental to the quality of life in general. Currently, safety in alleys and other residential spaces is protected only by mechanical and managerial functions such as CCTV and police patrol. Safe environment from crimes can be achieved only if there are environmental and spatial plans such as CPTED (Crime Prevention through Environmental Design) principles. The purpose of this study is to propose a direction for spatial planning that can prevent crimes through environmental elements, by researching the spatial planning and current status of alleys and residential spaces from the viewpoint of CPTED. To do so, first, a review checklist was created based on five principles of CPTED and field surveys were conducted on the northern districts of Busan with high crime rates. Second, the problems were analyzed through the field surveys and checklist was classified based on five principles of CPTED to propose improvements for each item. Also, a computer graphic simulation was used to suggest a design proposal. We expect that the application of the basic environmental design principles and guidelines for CPTED will have the effect of creating crime-free and safe spaces in alleys and residential environment.