• 제목/요약/키워드: Data leakage protection

검색결과 113건 처리시간 0.023초

중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구 (A Study on Empirical Model for the Prevention and Protection of Technology Leakage through SME Profiling Analysis)

  • 유인진;박도형
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제27권1호
    • /
    • pp.171-191
    • /
    • 2018
  • Purpose Corporate technology leakage is not only monetary loss, but also has a negative impact on the corporate image and further deteriorates sustainable growth. In particular, since SMEs are highly dependent on core technologies compared to large corporations, loss of technology leakage threatens corporate survival. Therefore, it is important for SMEs to "prevent and protect technology leakage". With the recent development of data analysis technology and the opening of public data, it has become possible to discover and proactively detect companies with a high probability of technology leakage based on actual company data. In this study, we try to construct profiles of enterprises with and without technology leakage experience through profiling analysis using data mining techniques. Furthermore, based on this, we propose a classification model that distinguishes companies that are likely to leak technology. Design/methodology/approach This study tries to develop the empirical model for prevention and protection of technology leakage through profiling method which analyzes each SME from the viewpoint of individual. Based on the previous research, we tried to classify many characteristics of SMEs into six categories and to identify the factors influencing the technology leakage of SMEs from the enterprise point of view. Specifically, we divided the 29 SME characteristics into the following six categories: 'firm characteristics', 'organizational characteristics', 'technical characteristics', 'relational characteristics', 'financial characteristics', and 'enterprise core competencies'. Each characteristic was extracted from the questionnaire data of 'Survey of Small and Medium Enterprises Technology' carried out annually by the Government of the Republic of Korea. Since the number of SMEs with experience of technology leakage in questionnaire data was significantly smaller than the other, we made a 1: 1 correspondence with each sample through mixed sampling. We conducted profiling of companies with and without technology leakage experience using decision-tree technique for research data, and derived meaningful variables that can distinguish the two. Then, empirical model for prevention and protection of technology leakage was developed through discriminant analysis and logistic regression analysis. Findings Profiling analysis shows that technology novelty, enterprise technology group, number of intellectual property registrations, product life cycle, technology development infrastructure level(absence of dedicated organization), enterprise core competency(design) and enterprise core competency(process design) help us find SME's technology leakage. We developed the two empirical model for prevention and protection of technology leakage in SMEs using discriminant analysis and logistic regression analysis, and each hit ratio is 65%(discriminant analysis) and 67%(logistic regression analysis).

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

중소기업 기술보호 개선방안에 대한 연구 (A Study on Improvement Plans for Technology Protection of SMEs in Korea)

  • 이장훈;신완선;박현주
    • 산업경영시스템학회지
    • /
    • 제37권2호
    • /
    • pp.77-84
    • /
    • 2014
  • The purpose of this research is to identify and develop technology protection plans for small and medium-sized enterprises (SMEs) by analyzing past technology leakage patterns which were experienced by SMEs. We identified factors which affect the technology leakage, and analyzed patterns of the influences using a data mining algorithms. A decision tree analysis showed several significant factors which lead to technology leakage, so we conclude that preemptive actions must be put in place for prevention. We expect that this research will contribute to determining the priority of activities necessary to prevent technology leakage accidents in Korean SMEs. We expect that this research will help SMEs to determine the priority of preemptive actions necessary to prevent technology leakage accidents within their respective companies.

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로 (Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework)

  • 장익진;최병구
    • 한국전자거래학회지
    • /
    • 제19권3호
    • /
    • pp.65-89
    • /
    • 2014
  • 개인정보 유출에 미치는 영향요인 및 유출의 결과와 관련된 다양한 연구가 진행되어 왔음에도 불구하고, 인터넷 사용자에 따라 개인정보 유출 예방행동에 어떠한 차이가 있는지에 대한 연구는 거의 이루어지지 않고 있다. 본 연구는 위험지각태도(risk perception attitude: RPA) 프레임웍을 기반으로 인터넷 사용자의 개인정보 유출 예방행동이 어떻게 달라지는가를 파악하고자 하였다. 보다 구체적으로 개인정보 유출에 대한 지각된 위험과 이의 예방을 위한 효능감을 기준으로 인터넷 사용자를 4가지 유형으로 분류할 수 있으며 각 그룹이 개인정보 보호동기, 정보탐색, 유출 예방행동에 있어 어떠한 차이가 있는지를 파악하고자 하였다. 276명의 인터넷 사용자로부터 수집된 자료를 분석한 결과 인터넷 사용자는 즉각대응(responsive), 회피(avoidance), 상황주도(proactive), 무관심(indifference)의 4가지 그룹으로 분류 가능하며 각 그룹 간 보호동기, 정보탐색, 예방활동에 있어 차이가 있음을 규명하였다. 본 연구는 개인정보 유출 예방전략 및 정책수립을 위한 가이드라인을 제시하였다는 점에서 그 의의가 있다.

로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석 (Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis)

  • 홍준석;박원형;김양훈;국광호
    • 한국전자거래학회지
    • /
    • 제20권3호
    • /
    • pp.1-10
    • /
    • 2015
  • 본 연구는 중소기업청에서 실시한 2013년 중소기업 기술보호 역량 및 수준조사를 바탕으로 중소기업의 기술유출 경험유무와 기술보호 요인을 분석하여 정부지원을 통한 기술유출방지 효과를 극대화 할 수 있는 핵심 요인을 도출하고자 한다. 중소기업 기술보호 역량 및 수준조사 대상 1,561개 기업 중 대기업 43개를 제외한 1,518개 중소기업 중 기술유출 중소기업 155개와 미유출 중소기업 1,363개 중소기업에 대해 기술보호 요인을 로지스틱 회귀분석 하였다. 기술유출 관련 요인을 분석한 결과, 출입자 통제 시스템 운영, 보안감사 실시여부, 임직원 부재 시 보안활동, 중요자료 보호대책 마련이 핵심요인으로 도출되었으며, 이들 사항에 대해 정부차원에서 집중적인 지원이 이루어진다면 기술보호 효과가 극대화 될 수 있을 것으로 사료된다.

국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구 (Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management)

  • 이성중;이영재
    • Journal of Information Technology Applications and Management
    • /
    • 제16권4호
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

내부정보유출방지를 위한 DLP시스템 연구 (A Study on DLP System for Preventing Internal Information Leakage)

  • 유승재
    • 융합보안논문지
    • /
    • 제18권5_1호
    • /
    • pp.121-126
    • /
    • 2018
  • 현대의 정보통신 기술과 네트워크 기술이 발달은 기업의 운영환경을 스마트하게 변화시켰으며, 그 가운데서 수많은 데이터들이 생성되고 저장되고 사용되고 있다. 기업경영의 에너지원이 되는 중요한 정보는 경제적인 이윤과 가치를 생성하고 또한 강력한 영향력의 근거로 활용된다. 따라서 주요정보는 그 가용성과 편의성을 확보해야 함과 동시에 기밀성과 무결성을 담보해야 하는 것이며 이것이 바로 정보보호의 기본목표가 된다고 할 수 있다. 그러나 대부분의 기업들은 중요한 내부정보가 유출되어 심각한 피해를 야기하는 사고가 증가하고 있다. 이에 본 연구에서는 내부정보유출을 방지하고 안정적인 데이터보안 및 정보보호관리 구축을 위한 DLP(Data Loss Prevention) 기술과 솔루션에 대해 살펴본다.

  • PDF

H/W 정보의 인증을 통한 내부정보유출 방지 기법 (A Authentication technique of Internal Information Hacking Protection based on H/W Information)

  • 양선옥;최낙귀;박재표;최형일
    • 디지털산업정보학회논문지
    • /
    • 제5권1호
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.