• Title/Summary/Keyword: Deleted Data

Search Result 219, Processing Time 0.026 seconds

The Recovery of the Deleted Certificate and the Detection of the Private-Key Encryption Password (삭제된 공인인증서의 복구 및 개인키 암호화 패스워드의 검출)

  • Choi, Youn-Sung;Lee, Young-Gyo;Lee, Yun-Ho;Park, Sang-Joon;Yang, Hyung-Kyu;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.41-55
    • /
    • 2007
  • The certificate is used to confirm and prove the user's identity in online finance and stocks business. A user's public key is stored in the certificate(for e.g., SignCert.der) and the private key, corresponding to public key, is stored in the private key file(for e.g., SignPri.key) after encryption using the password that he/she created for security. In this paper, we show that the certificate, deleted by the commercial certificate software, can be recovered without limitation using the commercial forensic tools. In addition, we explain the problem that the private key encryption password can be detected using the SignCert.der and the SignPri.key in off-line and propose the countermeasure about the problem.

Selective Recovery of the SSD TRIM Command in Digital Forensics (디지털 포렌식 관점에서 SSD TRIM 명령의 선별적 복구)

  • Hwang, Hyun Ho;Park, Dong Joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.307-314
    • /
    • 2015
  • Recently, market trends of auxiliary storage device HDD and SSD are interchangeable. In the future, the SSD is expected to be used more popular than HDD as an auxiliary storage device. The TRIM command technique has been proposed and used effectively due to the development of the SSD. The TRIM command techniques can be used to solve the problem of Freezing SSD that operating system cooperates with the SSD. The TRIM command techniques are performed in the idle time of the internal SSD that are actually deleted when a user deletes the data. However, in the point of view of computer forensics, the digital crime is increasing year by year due to lack of data recovery. Thus, this rate of arrest is insufficient. In this paper, I propose a solution that selectively manages data to delete based on advantage of the stability and the write speed of the TRIM command. Through experiments, It is verified by measuring the performance of the traditional method and selected method.

A Study on Improving the Legal System for the Expedited Preservation of Digital Evidence (디지털 증거의 긴급한 보전을 위한 법제 개선 연구)

  • Ro, Sohyong;Ji, Sungwoo
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.57-73
    • /
    • 2020
  • The proportion of digital evidence in criminal cases has increased, while at the same time, the spread of the Internet has made it easy to delete information that is stored in another place and thus, the Internet is being used to delete online criminal evidence. To respond quickly and effectively to cybercrime, 29 countries signed the Convention on Cybercrime in 2001 through the Council of Europe. Article 16 of the Convention relates to the expedited preservation of stored computer data and requires signatories to adopt legislative measures to enable its competent authorities to order expeditious preservation of specified computer data where there are grounds to believe that the data is particularly vulnerable to loss or modification. More than 60 countries have joined the Convention since 2001 and have made efforts to improve their legal system in line with it. The United States legislated 18 U.S.C. § 2703(f) to preserve electronic evidence pending the issuance of a court order. The German Code of Criminal Procedure §§ 94~95 allows prosecution authorities to seize evidence or issue production orders without court control in urgent circumstances. A custodian shall be obliged to surrender evidence upon a request that evidence be preserved, and non-compliance results in punishment. Japan legislated the Criminal Procedure Act § 197(3) and (4) to establish a legal base for requesting that electronic records that are stored by an ISP not be deleted. The Korean Criminal Procedure Act § 184 outlines procedures for the preservation of evidence but does not adequately address the expeditious preservation of digital evidence that may be vulnerable to deletion. This paper analyzes nine considerations, including request subjects, requirements, and cost reimbursement to establish directions to improve the legal system for the expedited preservation of digital evidence. A new method to preserve online digital evidence in urgent cases is necessary.

Video Data Management based on Time Constraint Multiple Access Technique in Video Proxy Server (비디오 프록시 서버에서의 시간 제약 다중 요청 기법 기반 동영상 데이터 관리)

  • Lee, Jun-Pyo;Cho, Chul-Young;Kwon, Cheol-Hee;Lee, Jong-Soon;Kim, Tae-Yeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.10
    • /
    • pp.113-120
    • /
    • 2010
  • Video proxy server which is located near clients can store the frequently requested video data in storage space in order to minimize initial latency and network traffic significantly. However, due to the limited storage space in video proxy server, an appropriate video selection method is needed to store the videos which are frequently requested by users. Thus, we present a time constraint multiple access technique to efficiently store the video in video proxy server. If the video is requested by user, it is temporarily stored during the predefined interval and then, delivered to the user. A video which is stored is deleted or moved into the storage space of video proxy server depending on the request condition. In addition, we propose a video deletion method in video proxy server for newly stored video data. The simulation results show that the proposed method performs better than other methods in terms of the block hit rate and the number of block deletion.

Determination of Defined Daily Dose of Medicines using Nominal Group Technique and Analysis of Antibiotics Use in National Insurance Claim Data: Focused on Antibiotics without DDD of WHO (수정 델파이 기법을 이용한 의약품의 DDD(일일상용량) 결정과 항생제 사용량 분석: WHO 일일상용량이 없는 항생제를 중심으로)

  • Kim, Dong-Sook;Kim, Nam-Soon;Lee, Suk-Hyang
    • Korean Journal of Clinical Pharmacy
    • /
    • v.17 no.1
    • /
    • pp.19-32
    • /
    • 2007
  • Objectives : It is necessary to monitor consumption of drugs in order to enhance promote appropriate use of drugs. Defined Daily Dose(DDD) of World Health Organization(WHO) has been used for evaluating the amount of medicine use. However, DDD of some drugs must be determined for drugs in Korea which are not listed by WHO. Our formulary follows ourself classification and DDD of some drugs must be determined since they exist only in Korea. This study was aimed to determine DDD value using RAND Appropriateness Methods and evaluate the amount of antibiotics use using DDD value. Methods : J01 antibiotics of WHO anatomical therapeutic chemical(ATC) classification were extracted from drug formulary. Antibiotics list without DDD was identified to determine their DDD with comprehensive review of references and recommendation of experts. defined. Review of reference was executed. of Expert panels were comprised of clinical pharmacist and clinical doctors. Modified Delphi Method was applied by survey and consensus meeting. Amount of antibiotic use was calculated by DDD/1000 inhabitants/day in the national level using health insurance claim data. Results : The result of 1 round, DDD values of 28 ingredients were determined from the first round of consensus meeting. With 2nd round meeting, 3 ingredients were deleted and DDD of 17 ingredients were decided. Analysis of antibiotic use in health insurance claim data showed 22.97 DDD/1000 inhabitants/day in 2003 year. Conclusion : This study can contribute to the establishment of DDD assignment and thus quantifying drug uses.

  • PDF

A New Dictionary Mechanism for Efficient Fault Diagnosis (효율적인 고장진단을 위한 딕셔너리 구조 개발)

  • Kim Sang-Wook;Kim Yong-Joon;Chun Sung-Hoon;Kang Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.4 s.346
    • /
    • pp.49-55
    • /
    • 2006
  • In this paper, a fault dictionary for fault locations is considered. The foremost problem in fault diagnosis is the size of the data. As circuits are large, the data for fault diagnosis increase to the point where they are impossible to be stored. The increased information makes it impossible to store the dictionary into storage media. In order to generate the dictionary, j.e. pass-fail dictionary some dictionaries store a portion of the information. The deleted data makes it difficult to diagnose fault models except single stuck-at fault. This paper proposes a new dictionary format. A new format makes a dictionary small size without deleting any informations.

The Situational, Clinical and Psychosocial Factors Related to Treatment-Seeking Behavior Among Those with Acute Myocardial Infarction (심근경색증 환자의 상황적, 임상적 요인 및 사회심리적 요인과 치료추구행위에 관한 연구)

  • Kim, Cho Ja;Kim, Gi Yon;Jang, Yeon Soo
    • Korean Journal of Adult Nursing
    • /
    • v.12 no.3
    • /
    • pp.323-333
    • /
    • 2000
  • The purpose of this study was to determine the impact of situational, clinical and psychsoical factors on treatment-seeking behavior among those with acute myocardial infarction(AMI). This study used a retrospective, descriptive design. The sample consisted of 72 patients aged over 30 and who were diagnosed with an acute myocardial infarction at two large university-affiliated medical centers from July 1, 1998 to March 30, 2000. But of 72, patients 5 who were an outlier in treatment-seeking time were deleted. Data were collected by using questionnaires, which included demographic data, situational, clinical and psychosocial data. Also patient interviews and chart review were used to obtain information related to treatment-seeking time. The results of this study were summarized as follows ; 1. Mean time from the onset of AMI symptoms to arrival at the hospital was $12.09{\pm}11.44$ hours; 2. Treatment-seeking time was not significantly different by age, gender, or education; 3. Most(44 or 65.78%) patients were at home when they began having AMI symptoms. The remaining patients were either in a public area, workplace or in a car. Patients at home delayed longer than those who had their first symptoms elsewhere, but not significantly different. Also, most patients were with another person when they began to experience AMI symptoms: a spouse(25 or 37.3%), other family member(31 or 46.3%); the remaining 11 were alone. There were no significant differences in treatment-seeking time based on whether alone or with others. Most patients(46 or 68.7%) used an ambulance rather than taking private transportation, and patients who used an ambulance were delayed longer than those who used private transportation, but there were no significant differences; 4. Time to treatment-seeking was not significantly different by blood pressure, heart rate on admission and the peak CK-MB, CPK and Cholesterol level, Killips class; 5. There were no significant statistical differences in treament-seeking times by anxiety level, mood status or control ability.

  • PDF

The Interactive Effects of Motivation and Contingent Rewards on Employee Creativity (조직구성원의 외재적, 내재적 동기와 창의성의 관계: 조건적 보상의 조절효과)

  • Hwang, Soyeon;Jung, Heajung
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.7
    • /
    • pp.71-82
    • /
    • 2018
  • Purpose - This study examined the effects of intrinsic and extrinsic motivation on employee creativity. Past research has consistently shown that intrinsic motivation is positively related to creativity. Yet conflicting results have been reported about the relationship between extrinsic motivation and creativity. To explore the reason why extrinsic motivation can either help or hurt creativity, we examined the role of contingent rewards as a moderator and tested whether either tangible or intangible rewards contingent upon creative performance significantly impact the relationship between extrinsic motivation and creativity. Research design, data, and methodology - Survey data was collected from employees working for diverse organizations in Korea through online research firm. Only employees who reported their job or organization provided opportunities to use their creativity were allowed to continue the survey. Out of 305 initial responses collected, those with too much missing data were deleted, which finally left 278 responses for statistical analyses. To examine the validity of the measurements, confirmatory factor analysis was first conducted. Next, to test the hypothesized relationships, multiple hierarchical regression analyses were conducted. Results - As hypothesized, both intrinsic and extrinsic motivation had positive effects on creativity. It was shown that contingent rewards did not influence the positive relationship between intrinsic motivation and creativity, but did significantly moderate the relationship between extrinsic motivation and creativity in a way that tangible rewards strengthened the relationship while intangible rewards mitigated the same relationship. Conclusions - This research enhances our understanding on the relationship between motivation type, rewards, and creativity. Intrinsically motivated employees showed a high level of creativity regardless of whether rewards were expected or not. In contrast, extrinsically motivated employees showed more or less creative behavior depending on whether they were expected to have tangible or intangible rewards. As extrinsic motivation is typically associated with tangible rewards such as pay, promotion, etc., tangible rewards were seen to be more effective in promoting creative performance from extrinsically motivated employees than intangible rewards. Our findings make a significant theoretical contribution to reconcile prior inconsistent findings. Furthermore, they provide useful insights for managers and organizations into developing effective strategies for facilitating employee creativity.

Derivation and verification of influence function on parameter δ proposed by Ghosh and Kim (Ghosh와 Kim 모수 δ의 영향함수 유도 및 확인)

  • Kim, Minjeong;Kim, Honggie
    • The Korean Journal of Applied Statistics
    • /
    • v.30 no.4
    • /
    • pp.529-538
    • /
    • 2017
  • The Ghosh and Kim zero-altered distribution model is used to analyze count data that have too many or too few zeros. The dispersion type parameter ${\delta}$ in the zero-altered distribution model consists of mean, variance and zero probability and has two forms depending on the relation between ${\mu}$ and ${\sigma}^2$. We derived the influence function on ${\delta}$ when ${\sigma}^2{\geq}{\mu}$. To show the validity of the influence function, we used the Census data on the number of births of married women in Korea to compare the estimated changes in ${\delta}$ using this function with those obtained using the direct deletion method. The result proved that the obtained influence function is very accurate in estimating changes in ${\delta}$ when an observation is deleted.

The Development of a Computer-Assisted HACCP Program for the Microbiological Quality Assurance in Hospital Foodservice Operations (병원급식의 미생물적 품질보증을 위한 HACCP 전산프로그램의 개발)

  • Kwak, Tong-Kyung;Ryu, Kyung;Choi, Seong-Kyung
    • Journal of the Korean Society of Food Culture
    • /
    • v.11 no.1
    • /
    • pp.107-121
    • /
    • 1996
  • This study was carried out to develop the computer-assisted Hazard Analysis and Critical Control Point (HACCP) program for a systematic approach to the identification, assessment and control of hazards for foodservice manager to assure the microbiological quality of food in hospital foodservice operations. Sanitation practices were surveyed and analyzed in the dietetic department of 4 hospitals. Among them, one 762-bed general hospital was selected as standard model to develop computer-assisted HACCP program. All data base files and processing programs were created by using Foxpro package for easy access of HACCP concept. HACCP program was developed based on the methods suggested by NACMCF, IAMFES and Bryan. This program consisted of two parts: the pre-stage for HACCP study and the implementation stage of the HACCP system. 1. Pre-stage for HACCP study includes the selection of menu item, the development of the HACCP recipe, the construction of a product flow diagram, and printing the HACCP recipe and a product flow diagram. A menu item for HACCP study can be selected from the menu item lists classified by cooking methods. HACCP recipe includes ingredients, their amount and cooking procedure. A flow diagram is constructed based on the HACCP recipe. The HACCP recipe and a product flow diagram are printed out. 2. Implementation of HACCP study includes the identification of microbiological hazards, the determination of critical control points, the establishment of control methods of each hazard, and the complementation of data base file. Potentially hazardous ingredients are determined and microbiological hazards are identified in each phase of the product flow. Critical control points (CCPs) are identified by applying CCP decision trees for ingredients and each process stage. After hazards and CCPs are identified, criteria, monitoring system, corrective action plan, record-keeping system and verification methods are established. When the HACCP study is complemented, HACCP study result forms are printed out. HACCP data base file can be either added, corrected or deleted.

  • PDF