• Title/Summary/Keyword: Data Leakage Prevention

Search Result 80, Processing Time 0.022 seconds

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.

A Study on the Improvement of Safety of Measuring Instrument Structure and Performance by Expansion of Gas AMI (가스 AMI 보급 확대에 따른 계량기 구조 및 성능 안전성 향상 방안 연구)

  • Lee, Hyoung-Min;Kim, Min-Gi;Choi, Eun-Il
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.5
    • /
    • pp.10-15
    • /
    • 2022
  • Currently, some urban gas companies are conducting their own gas AMI meter verification projects, along with the demonstration of gas AMI (Advanced Metering Infrastructure) meters under the supervision of the government. There are many positive factors such as remote meter reading and ensuring user gas safety through AMI meter installation, but on the other hand, there are also many problems such as battery discharge, expensive price, and decreased reliability of remote meter data. This study sought various improvements in gas AMI meters along with prevention of serious civil disasters by preemptively eliminating structural safety problems and potential risks from gas leakage due to the expansion of gas AMI meters, and it is expected that this study will contribute to the government's policy to advance gas AMI.

A Study on the Electrical and Heat Generation Characteristics of an Induction Motor under Restrained Operation (유도전동기의 구속운전에 따른 전기 및 발열 특성 연구)

  • Jong-Chan Lee;Doo-Hyun Kim;Sung-Chul Kim
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.1
    • /
    • pp.25-33
    • /
    • 2023
  • In this study, we determined the failure rate and fire status of electric motors widely used in domestic and industrial devices and analyzed the associated fire risks by identifying the electrical and temperature characteristics of electric motors under the normal and restrained operation modes in industrial sites and laboratories. A 2.2kW motor used for driving a conveyor during the vulcanization process in a rubber product manufacturing plant was employed as the study object and was exposed to a high- temperature environment as this motor is widely used in industrial sites. The current amplitude was 4.45-4.50 A during normal operation and 38.2-41.5 A during restrained operation due to the pinching of products and semi-finished products (i.e., 8.5 times higher than that during normal operation). The leakage current amplitude was 0.33 mA during both operation modes. The temperature of the workplace in summer was 42.38℃, indicating a poor environment for the installed motor. In the laboratory, the current and temperature of the coil inside a 3.7kW motor were measured under the restrained operation mode as performing measurements of the coil inside the motor in industrial sites is challenging. The current amplitude during normal operation was 3.5 A, whereas that during restrained operation for 30 s was 51.7-58.6 A, which is 14.8-16.7 times higher than that of normal operation. Moreover, the temperature of the motor coil increased from 22.9℃ to 101℃. Based on the experimental data, we derived the temperature increase formula according to the restrained operation time by performing a regression analysis and verified the time at which the temperature exceeded the stipulated limit for the insulation grade. The findings presented in this paper can be utilized to establish fire-prevention measures and perform safety management of motors of the same type or with a similar capacity.

Novel Endoscopic Stent for Anastomotic Leaks after Total Gastrectomy Using an Anchoring Thread and Fully Covering Thick Membrane: Prevention of Embedding and Migration

  • Jung, Gum Mo;Lee, Seung Hyun;Myung, Dae Seong;Lee, Wan Sik;Joo, Young Eun;Jung, Mi Ran;Ryu, Seong Yeob;Park, Young Kyu;Cho, Sung Bum
    • Journal of Gastric Cancer
    • /
    • v.18 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • Purpose: The endoscopic management of a fully covered self-expandable metal stent (SEMS) has been suggested for the primary treatment of patients with anastomotic leaks after total gastrectomy. Embedded stents due to tissue ingrowth and migration are the main obstacles in endoscopic stent management. Materials and Methods: The effectiveness and safety of endoscopic management were evaluated for anastomotic leaks when using a benign fully covered SEMS with an anchoring thread and thick silicone covering the membrane to prevent stent embedding and migration. We retrospectively reviewed the data of 14 consecutive patients with gastric cancer and anastomotic leaks after total gastrectomy treated from January 2009 to December 2016. Results: The technical success rate of endoscopic stent replacement was 100%, and the rate of complete leaks closure was 85.7% (n=12). The mean size of leaks was 13.1 mm (range, 3-30 mm). The time interval from operation to stent replacement was 10.7 days (range, 3-35 days) and the interval from stent replacement to extraction was 32.3 days (range, 18-49 days). The complication rate was 14.1%, and included a single jejunal ulcer and delayed stricture at the site of leakage. No embedded stent or migration occurred. Two patients died due to progression of pneumonia and septic shock 2 weeks after stent replacement. Conclusions: A benign fully covered SEMS with an anchoring thread and thick membrane is an effective and safe stent in patients with anastomotic leaks after total gastrectomy. The novelty of this stent is that it provides complete prevention of stent migration and embedding, compared with conventional fully covered SEMS.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth (OAuth를 이용한 로그아웃 문제로 인한 취약점 방지 기법에 대한 연구)

  • Kim, Jinouk;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.5-14
    • /
    • 2017
  • Many web services which use OAuth Protocol offer users to log in using their personal profile information given by resource servers. This method reduces the inconvenience of the users to register for new membership. However, at the time a user finishes using OAuth client web service, even if he logs out of the client web service, the resource server remained in the login state may cause the problem of leaking personal information. In this paper, we propose a solution to mitigate the threat by providing an additional security behavior check: when a user requests to log out of the Web Client service, he or she can make decision whether or not to log out of the resource server via confirmation notification regarding the state of the resource server. By utilizing the proposed method, users who log in through the OAuth Protocol in the public PC environment like department stores, libraries, printing companies, etc. can prevent the leakage of personal information issues that may arise from forgetting to check the other OAuth related services. To verify our study, we implement a Client Web Service that uses OAuth 2.0 protocol and integrate it with our security behavior check. The result shows that with this additional function, users will have a better security when dealing with resource authorization in OAuth 2.0 implementation.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

Disaster Risk Assessment using QRE Assessment Tool in Disaster Cases in Seoul Metropolitan (서울시 재난 사례 QRE 평가도구를 활용한 재난 위험도 평가)

  • Kim, Yong Moon;Lee, Tae Shik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.1
    • /
    • pp.11-21
    • /
    • 2019
  • This study assessed the risk of disaster by using QRE(Quick Risk Estimation - UNISDR Roll Model City of Basic Evaluation Tool) tools for three natural disasters and sixteen social disasters managed by the Seoul Metropolitan Government. The criteria for selecting 19 disaster types in Seoul are limited to disasters that occur frequently in the past and cause a lot of damage to people and property if they occur. We also considered disasters that are likely to occur in the future. According to the results of the QRE tools for disaster type in Seoul, the most dangerous type of disaster among the Seoul city disasters was "suicide accident" and "deterioration of air quality". Suicide risk is high and it is not easy to take measures against the economic and psychological problems of suicide. This corresponds to the Risk ratings(Likelihood ranking score & Severity rating) "M6". In contrast, disaster types with low risk during the disaster managed by the city of Seoul were analyzed as flooding, water leakage, and water pollution accidents. In the case of floods, there is a high likelihood of disaster such as localized heavy rains and typhoons. However, the city of Seoul has established a comprehensive plan to reduce floods and water every five years. This aspect is considered to be appropriate for disaster prevention preparedness and relatively low disaster risk was analyzed. This corresponds to the disaster Risk ratings(Likelihood ranking score & Severity rating) "VL1". Finally, the QRE tool provides the city's leaders and disaster managers with a quick reference to the risk of a disaster so that decisions can be made faster. In addition, the risk assessment using the QRE tool has helped many aspects such as systematic evaluation of resilience against the city's safety risks, basic data on future investment plans, and disaster response.

A study on Establishment and Management of the CCTV in Operating Room (수술실 CCTV 설치 및 운영에 대한 고찰)

  • Kim, Minji
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.109-132
    • /
    • 2019
  • Recently, medical accidents related to surgical procedures have increased. In addition, the media reported that some of these accidents were involved in health crimes. Patient-advocate groups have called for mandatory establishment and management of CCTV in operating rooms. There is a lot of discussion among the interested parties, so it is necessary to review the relevant laws and regulations. The purpose of this study is to identify the characteristics of CCTV in operating rooms and to review legislations related to establishment and management of the CCTV in operating rooms. Medical institutions use CCTV for management of facilities and patient safety and install it in operating rooms optionally. The Constitution guarantees the privacy and the privacy of correspondence of every citizen, but it can be limited by the law for public welfare. Currently, however, there is no existing law about establishment and management of the CCTV in operating rooms and it can be defect of legal system. Under the current legislations, it is likely that the Self-determination can be violated due to the characteristic of healthcare provider when CCTV is mandatorily installed in operating room. In addition, the regulations on access and leakage of confidential information known by operator are insufficient. So that, the safety of the visual data might be threatened. Furthermore, unless the period and the place of storage of the visual data are clearly defined, it is highly unlikely to meet the original purpose of patient safety and prevention of medical accidents. This study is meaningful as there is few previous study on this topic although the need for legal review about this is growing and several bills are being proposed. It is expected that the results of this study can be utilized as basic data for enactment or amendment of the laws and regulations about establishment and management of CCTV in operating rooms.