• Title/Summary/Keyword: Data Loss/Leakage Prevention

Search Result 16, Processing Time 0.019 seconds

The Safety Design of Corrosive Chemical Handling Process based on Reliability Database (신뢰도 데이터베이스 기반 부식성 화학물질 취급공정의 안전설계)

  • Chu, Chang Yeop;Baek, Jong Bae
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.5
    • /
    • pp.141-149
    • /
    • 2018
  • In a PCB factory, there is a corrosive chemical substance supply system that can causes major leakage accidents. These accidents can give rise to shut down the factory and do residents damage that cause enormous loss of properties. To mitigate these risks, it is necessary to provide a chemical disaster prevention system. Moreover, after considering the situation and environment of the production site, it is of great importance to build an optimal chemical accident prevention system by reflecting risk reduction measures from the point of process design and by assessing quantitative risk based on reliability data. However, because there was no established database of the reliability about facilities and equipment that can be used in the domestic, the business site and consulting organization had being used the reliability data such as USA CCPS(Center for Chemical Process Safety). In these days, Korean institutes are studying on reliability data utilization method of quantitative risk assessment for preventing chemical accidents and domestic utilization algorithms and storage bed of reliability data. This study presents samples of reliability database about the chemical substance supply system that constructed from the history data such as failure, maintenance for 10 years at a PCB factory. Also, this work proposes the safety design criteria for supply facilities of corrosive chemical substance by assessing quantitative risk on the basis of the reliability data.

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

Blockchain applied Military Electronic Secret Document Management Scheme (focused on C4i) (블록체인을 적용한 군(軍) 전자적 비밀관리 개선방안 (전장관리정보체계 중심으로))

  • Hong Yoon;Yeong Gyun Cha;Jong Beom Park
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.181-187
    • /
    • 2023
  • Recently, military operations have been aimed at winning using various information, analysis, weapons, and operation systems. These systems should consist of integrated composition and the function of analyzing and sharing data. Accordingly, military C4I collects and analyzes a lot of data and produces and shares secrets to perform effective operations. However, C4I cannot operate in electronic form from secret production to disposal. And as it is managed based on the output, problems such as difficulty in management and loss/leakage arise. Therefore, in this paper, we propose an ESDMB(Electronic Secret Document Management whit Bloockchain) plan based on blockchain technology to manage all secrets in electronic document format and provide integrity and denial prevention. In particular, the blockchain-based proposal method will be suitable as a protection measure against manipulation and leakage, from secret production to destruction.

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

Development of IoT-based Safety Management Method through an Analysis of Risk Factors for Industrial Valves (산업용 밸브의 위험요소 분석을 통한 IoT 기반 안전관리 방안 개발)

  • Kim, Jung-Hoon;Kim, Young-Gu
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.5
    • /
    • pp.35-43
    • /
    • 2019
  • The safety of industrial valves, which are the core parts of plant facilities, are managed by manpower and there are difficulties because of side area for inspection and limited accessibility due to the nature of facilities. The industrial valves used in plant facilities cause problems such as interrupted production; a loss of life due to leak or explosion of poisonous material and flammable gases, and difficulty in locating accident positions in the event of leakage or failure. Therefore, safety management and control systems based on IoT technology are needed. This study is about the development of risk factor prediction technique among the safety management of industrial valves through IoT- based wireless communication and the development of actuator control system. We have developed IoT-based industrial valve safety management techniques to prevent accidents caused by main risk factors by conducting an analysis of the structural characteristics of valves and an analysis of the causes of main risk factors through review of failure data and literature and an analysis of accident scenarios.