• Title/Summary/Keyword: Industrial Secret Leakage

Search Result 7, Processing Time 0.023 seconds

A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident (산업기밀 유출사고 사례분석을 통한 유형별 대응방안 연구)

  • Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.39-45
    • /
    • 2015
  • Industrial secrets that companies own recently protected by various act related industrial security such as Trade Secret Act, Act on Prevention of Divulgence and Protection of Industrial Technology, etc. However, despite such protection infringement and leakage accidents of industrial secrets is increasing every year. According to a survey conducted by KAITS(Korean Association for Industrial Technology Security) annual average of estimated damage by industrial secrets leakage is estimated to be "50 trillion won." This is equivalent to the amount of annual revenue of small businesses more than 4,700 units. Following this, industrial secrets leakage causes serious damages to competitiveness of nation and companies and economic. However investment and effort to the industrial secrets leakage crime is lack of level compared to the scale of damage. Actually, most companies except some major companies are lack of response action about industrial secrets leakage because of shortage of separate organization, workforce, budget for industrial secrets leakage security. This paper aims to understand the overall flow of the industrial secrets leakage crime through various taxonomy such as cause of occurrence and leakage pathway and grasp the condition of damage from industrial secrets leakage through analyzation of internal and external industrial secrets leakage crime. This is expected to be the basis for related research.

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

Study on the Establishment of the Act on the Prevention and Protection of Technology Leakage ('기술유출방지 및 보호지원에 관한 법률'제정에 관한 연구)

  • Noh, Jae-Chul;Ko, Zoon-ki
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.487-497
    • /
    • 2017
  • South Korea needs reorganization of dispute resolution system due to the frequent occurrence of a case that trade secret or technique are leaked. First, the distributed various laws are established and enforced by enacting and enforcing individual laws. Therefore, the redundancy problems, the collision of individual laws, the decline in diversity, integrity, and connectivity are issues. An independent legal system is needed by Act on the Prevention and Protection of Technology Leakage. Thereby, The support system of technological protection that is sprayed in government departments such as the Small and Medium Business Administration, the Ministry of Trade, Industry and Energy, the Patent Office, the Fair Trade Commission, the Trade Committee, the National Police Agency, and the Spy Agency integrates and unifies institutionally, and it is necessary to advance a policy with functional division. Second, the Patent Tribunal, the Invention Promotion Act, the Industrial Property Right Dispute Mediation Committee by the patent law, the Industrial Technical Dispute Mediation Committee on the Industrial Technology Outflow Prevention and Protection Law and the Medium and Small Firm Dispute Mediation and Arbitration Committee on Small Business Technology Protection Support Law are installed. However, since it established the integrated law on the Act on the Prevention and Protection of Technology Leakage, it is desirable to set the merged operation of establishment on the Technical Dispute Mediation Committee under the Small and Medium Business Administration or the Ministry of Trade, Industry and Energy.

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Anonymity Certification Technique of a Smart Card base for Personal Information Protection (개인정보보호를 위한 스마트카드 기반의 익명 인증 기법)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6071-6080
    • /
    • 2012
  • Regarding the official authentication method which is a strong encrypt method for financial transactions, there has recently been a concern for the problem of storage. As a solution for such problems, this study provides the anonymous authentication method based on the smart card used for such a purpose by utilizing the pseudo ID replacing the user's personal data. Such an anonymous authentication method makes it possible to prevent any inside leakage, intermediary attack, limited re-transmission attack, service-denying attack, directional safety attack and secret inspector attack in regard to the user's personal data. As a result, there would be no concern for the leakage of any personal data. In comparative analysis, after executing the comparison and analysis process through the experiment for the authentication process by using the previously-used smart card, the new one has shown about 10% a high level of efficiency for the encrypt and decrypt process together with excellent features in terms of flexibility in regard to the user's anonymity and tracking ability.

A Study on Punitive Damages System in Technology Protection Related Laws: Focusing on Patent Act, TSPA, ITPA, FTSA, MBCA (기술보호 관련 법률에서의 징벌적 손해배상제도에 대한 고찰: 특허법, 영업비밀보호법, 산업기술보호법, 하도급법, 상생협력법을 중심으로)

  • Cho, Yongsun
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.19-41
    • /
    • 2020
  • In Korea, punitive damages were introduced in the 2011 Fair Transactions in Subcontracting Act(FTSA), and in 2019 the Patent Act, Trade Secret Protection Act(TSPA), Industrial Technology Protection Act(ITPA), and Mutually Beneficial Cooperation Act(MBCA). In punitive damages, the judgment of 'intentional' is especially important, and it is necessary to refer to US precedents since there is no accumulated case. Major Company can avoid intentional counseling through the advice of lawyers, but SMEs may have to punish punitive damages due to a lack of awareness of the system. In the case of TSPA, ITPA, FTSA, and MBCA, except for Patent Act, the provisions related to proof of damage have not been well maintained yet. Therefore, the data submission order system of these laws needs to be revised to the level of patent Act need to be. TSPA needs to be amended in the future to estimate the amount of the royalties in estimating the amount of damages so that it can receive the 'reasonably' estimated amount rather than the usual amount. On the other hand, ITPA, FTSA, and MBCA do not have any provisions for the estimation of damages. Besides, it is difficult to evaluate the technology value in the case of leakage or deodorization of new technologies. Therefore, valuation needs to be carried out by a credible institution along with the development of a model for calculating damages.