• Title/Summary/Keyword: Crime Prevention Technology

Search Result 84, Processing Time 0.02 seconds

Signal and Telegram Security Messenger Digital Forensic Analysis study in Android Environment (안드로이드 환경에서 Signal과 Telegram 보안 메신저 디지털 포렌식분석 연구)

  • Jae-Min Kwon;Won-Hyung Park;Youn-sung Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.13-20
    • /
    • 2023
  • This study conducted a digital forensic analysis of Signal and Telegram, two secure messengers widely used in the Android environment. As mobile messengers currently play an important role in daily life, data management and security within these apps have become very important issues. Signal and Telegram, among others, are secure messengers that are highly reliable among users, and they safely protect users' personal information based on encryption technology. However, much research is still needed on how to analyze these encrypted data. In order to solve these problems, in this study, an in-depth analysis was conducted on the message encryption of Signal and Telegram and the database structure and encryption method in Android devices. In the case of Signal, we were able to successfully decrypt encrypted messages that are difficult to access from the outside due to complex algorithms and confirm the contents. In addition, the database structure of the two messenger apps was analyzed in detail and the information was organized into a folder structure and file format that could be used at any time. It is expected that more accurate and detailed digital forensic analysis will be possible in the future by applying more advanced technology and methodology based on the analyzed information. It is expected that this research will help increase understanding of secure messengers such as Signal and Telegram, which will open up possibilities for use in various aspects such as personal information protection and crime prevention.

Comprehensive Measures the Elimination of Violence in Schools validated - Centered on the fundamental countermeasures - (학교폭력 근절 종합대책에 대한 유효성 검증 - 근본대책을 중심으로 -)

  • Jung, Sung Sook
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.187-196
    • /
    • 2013
  • Recently, school violence has come to the fore as a social phenomenon. "Comprehensive countermeasures for eradication of school violence" as a policy safety are created by Safety Administration bureau and Ministry of Education, Science and Technology under the chairmanship of the Office of Prime Minister on Feb,2012. This policy is supposed to be test-operated for a year from March, 2012. but voices of concern about effectiveness have been brought up by some critics greatly. So 172 teachers in high school in Seoul were surveyed in order to examine the effectiveness of "Comprehensive countermeasures for eradication of school violence" with a questionnaire composed of 5 point Likert-type. Among the fundamental measures, there were a total of 12 countermeasures about 'Practices for personality education' (with the exception of unrelated one question). 'Expanding opportunities of various art education and Supporting reading activities' of them ranked highest on average. Then, 'Reflecting results of special feature related to character develops to the Selection of Admission officers and Self-directed learning was the next. And among the three countermeasures about 'Reinforcement of roles of the family and society', 'Pan governmental conducting annual campaign related to broadcast, press, civic group to combat school violence was highest. Finally, among the 7 countermeasures about 'Countermeasure about harmful factors of games and internet addiction', 'Reinforcement of preventive discipline about game and internet addiction' was highest and 'Development and Promotion of various educational contents for preventive discipline about game and internet addiction' was the next.

Efficient Multi-spot Monitoring System Using PTZ Camera and Wireless Sensor Network (PTZ 카메라와 무선 센서 네트워크를 이용한 효율적인 다중 지역 절전형 모니터링 시스템)

  • Seo, Dong-kyu;Son, Cheol-su;Yang, Su-yeong;Cho, Byung-lok;Kim, Won-jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.581-584
    • /
    • 2009
  • Recently, the cameras which used for observation are installed in children protection area and local crime prevention area in order to protect life and property and by its work being recognized and are installed more. Normal cameras have cost problem to observe multiple area and detail, because they can observe only one place. PTZ camera can observe multiple area by moving focus by schedule or remote control, but it can't automatically move the focus of it to the place where event occurred, because it can't recognize the place. In this study, we can monitor multiple area effectively, by installing a wireless sensor node equipped with temperature, lighting, gas and human detection sensor to each area, to monitor many place low-price and actively and to move the focus of PTZ camera to preset position, and send recorded video to the user, when the various sensor data received from wireless sensors in observation area are to be determined abnormal by analyzing. In addition, at night we can record a scene using infrared, but to reduce power consumption of lighting system which are installed to improve resolution, it supplies power to the lighting system when event occurred. So we were able to implement low power green monitoring system.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF