• Title/Summary/Keyword: Data Leakage Prevention

Search Result 80, Processing Time 0.035 seconds

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario (단일 정보유출 시나리오를 이용한 개별 보안솔루션 로그 분석 방법)

  • Park, Jang-Su;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.65-72
    • /
    • 2015
  • According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies' technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company's assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario's logs, and applying a monitoring system to each scenario.

Acidic Pelvic Drainage as a Predictive Factor For Anastomotic Leakage after Surgery for Patients with Rectal Cancer

  • Yang, Liu;Huang, Xin-En;Xu, Lin;Zhou, Xin;Zhou, Jian-Nong;Yu, Dong-Sheng;Li, Dong-Zheng;Guan, Xin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.9
    • /
    • pp.5441-5447
    • /
    • 2013
  • Purpose: To demonstrate the value of sequential determinations of pelvic drainage in the identification of increased risk of anastomotic leakage (AL) after anterior resection for rectal cancer with a double stapling technique. Patients and Methods: Between January 2004 and December 2011, data for the daily postoperative pH of pelvic drainage fluid in 753 consecutive patients with rectal cancer who initially underwent anterior resection with a double stapling technique were reviewed. All patients experienced a total mesorectal excision. Patients with anastomotic leakage (Group AL, n=57) were compared to patients without leakage (Group nAL, n=696). Patients with perioperatively abdominopelvic implants that were likely to affect pH value (determined at $25^{\circ}C$) other than leakage were excluded. Mean postoperative values were compared. Results: Anastomotic leakage was noted in 57 (7.6%) of 753 patients with rectal cancer. The diagnosis of AL was made between the $6^{th}$ and $12^{th}$ postoperative day (POD; mean $8^{th}$ POD). There was no significance of the daily average values of pH on POD1 & 2 in group AL while a significantly sharp declining mean pH value reached its diagnostic point of AL (p<0.001) on POD3. A cut-off value of 6.978 on the $3^{rd}$ POD maximized the sensitivity (98.7.0%) and specificity (94.7%) in assessing the risk of leakage. Conclusion: According to these results, an early and persistent declining of pH value of pelvic drainage fluid after rectal surgery with anastomosis, is a marker of AL. A cut-off value of 6.798 determined at $25^{\circ}C$ on POD3 maximizes sensitivity and specificity.

Technical Application and Analysis for Reduction of Water Loss in Water Distribution Systems (상수도 관망의 유수율 제고 기술의 적용 및 분석)

  • Kim, Ju-Hwan;Lee, Doo-Jin;Bae, Cheol-Ho;Woo, Hyung-Min
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.260-266
    • /
    • 2009
  • Non-revenue water reduction(NRW) technologies are implemented to evaluate and manage leakages scientifically in water distribution systems under local governments. A development of quantitative leakage indicator by measuring minimum night flow, pressure control policy by installation of PRV(pressure reducing valve) and the establishment of leakage prevention schemes by residual life modeling of deteriorated water pipes are reviewed and studied. Estimation models of allowable leakage are developed by measuring and analyzing minimum night flow at residential and commercial area in Nonsan city, which is suggested from UK water industry and can improve an existing leakage indicator for the evaluation of non-revenue water. Also, pressure control method is applied and analyzed to Uti distribution area in Sacheon city in the operation aspect. As results, $466\;m^3/day$ of leakage can be reduced and it is expected that 113million won of annual cost can be saved. In the part of corrosion velocity and residual life assessment, non-linear prediction models of residual thickness are proposed by assessment of corrosion velocity based on exposure years, soil and water quality etc., since the deteriorated water pipe play a major role to increase leakage. It is expected that collection data and analyzing results can be applied effectively and positively to reduce non-revenue water by accumulating surveying data and verifying the results in the business field of water distribution systems under local governments.

  • PDF

A USB DLP Scheme for Preventing Loss of Internal Confidential Files (내부 기밀파일 유출 방지를 위한 USB DLP 기법)

  • Shin, Gyu Jin;Jung, Gu Hyun;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2333-2340
    • /
    • 2017
  • Recently industry is suffering severe losses of important internal information, and most of the leaks result from the insiders. Thus, various technological counter measures are being studied in order to protect private organization information. In this paper, among various internal information leakage path protection mechanisms, we propose a technique for preventing files which are defined as confidential from being copied or moved through USB. The implemented confidential file loss prevention system is composed of both signature insert manager and confidential file detect manager. The signature insert manager allows a system administrator to insert a special pattern specifying a classified confidential file, while the confidential file detect manager protects confidential file leakage when a user attempts to move or copy a confidential file to the USB memory. This results would be contributed to reducing the damage caused by leakage of confidential files outside of the company via USB.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Prohibiting internal data leakage to mass storage device in mobile device (모바일 단말에서 외부 저장 매체로의 불법 데이터 유출 방지 기법)

  • Chung, Bo-Heung;Kim, Jung-Nyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.125-133
    • /
    • 2011
  • According to proliferation of mobile devices, security threats have been continuously increased such as illegal or unintentional file transmission of important data to an external mass-storage device. Therefore, we propose a protection method to prohibit an illegal outflow to this device and implement this method. This method extracts signatures from random locations of important file and uses them to detect and block illegal file transmission. To get signatures, a target file is divided by extracting window size and more than one signatures are extracted in this area. To effective signature sampling, various extraction ways such as full, binomial distribution-based and dynamic sampling are implemented and evaluated. The proposed method has some advantages. The one is that an attacker cannot easily predict the signature and its extraction location. The other is that it doesn't need to modify original data to protect it. With the help of these advantages, we can say that this method can increase efficiency of easy-to-use and it is a proper way leakage prevention in a mobile device.

A Case Study on Deformation Conditions and Reinforcement Method of Cavity behind the Lining of Domestic Old Tunnel (국내 재래식 터널의 변상현황과 배면공동 보강 사례연구)

  • Kim, Young-Muk;Lim, Kwang-Su;Ma, Sang-Joon
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2005.03a
    • /
    • pp.1343-1350
    • /
    • 2005
  • In this study, the whole deformation conditions of domestic old tunnels and reinforcement methods for deformation tunnels were investigated and analysed, and the present conditions, occurrence cause and reinforcement methods of cavity behind the tunnel lining were investigated and analysed comprehensively. The deformation causes of domestic old tunnels could be classified in three kinds : change of earth pressure operating tunnel ground, material problem of concrete lining, mistake of design and construction. As a result of analysis, the tunnel deformation was occurred by not specific cause but various cause As a result of investigation for 455 domestic tunnel data, more than 70% of the tunnel deformation was related to leakage and the other deformation cause also accompanied leakage mostly. An applied reinforcement method was related to leakage and flood prevention measures, but application of reinforcement method for boundary area between tunnel and ground and tunnel periphery which influence on the tunnel stability was still defective. The cavity of domestic old tunnel occupied about 16% of the total tunnel length and about 68% of cavity was located in the crown of tunnel, and besides, the occurrence cause of cavity was analysed to design, construction and management cause. The filling method for cavity using filling material was comprehensively appling to cavity behind tunnel lining.

  • PDF

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis (로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석)

  • Hong, Jun Suk;Park, Won Hyung;Kim, Yanghoon;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

Development of Simulation Tool to Support Privacy-Preserving Data Collection (프라이버시 보존 데이터 수집을 지원하기 위한 시뮬레이션 툴 개발)

  • Kim, Dae-Ho;Kim, Jong Wook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1671-1676
    • /
    • 2017
  • In theses days, data has been explosively generated in diverse industrial areas. Accordingly, many industries want to collect and analyze these data to improve their products or services. However, collecting user data can lead to significant personal information leakage. Local differential privacy (LDP) proposed by Google is the state-of-the-art approach that is used to protect individual privacy in the process of data collection. LDP guarantees that the privacy of the user is protected by perturbing the original data at the user's side, but a data collector is still able to obtain population statistics from collected user data. However, the prevention of leakage of personal information through such data perturbation mechanism may cause the significant reduction in the data utilization. Therefore, the degree of data perturbation in LDP should be set properly depending on the data collection and analysis purposes. Thus, in this paper, we develop the simulation tool which aims to help the data collector to properly chose the degree of data perturbation in LDP by providing her/him visualized simulated results with various parameter configurations.