• 제목/요약/키워드: Information Breach

검색결과 127건 처리시간 0.025초

멀티미디어 저작도구의 비교.분석 (Comparative and analysis of multimedia author tools)

  • 권오탁;홍동헌
    • 경영과정보연구
    • /
    • 제2권
    • /
    • pp.23-46
    • /
    • 1998
  • In this paper, comparative and analysis of multimedia author tools for to proper compatible multimedia author tools on multimedia author tools function and usage, and which breach of contract each author tools specific property prepare to forecast future multimedia expansion trend on information technology expansion. Multimedia essential element is hardware(storage, digital video, CD), software, sound, hypertext and hypermedia etc. Analysis criteria of multimedia author tools is programming environment, which are card, script, icon, time method.

  • PDF

양도가능신용장거래에서 은행의 영업상 비밀 유지의무위반에 관한 연구 - Jackson v. Royal Bank of Scotland 사건에 대한 영국법원의 판결을 중심으로 (A Study on the Bank's Breach of Contract to keep the Business Secrecy in Transferable Credit Transactions - with a Special Emphasis on the English Case Law, Jackson v. Royal Bank of Scotland -)

  • 한재필
    • 한국중재학회지:중재연구
    • /
    • 제16권1호
    • /
    • pp.277-314
    • /
    • 2006
  • This article aims at analysing the reality of banks' liability resulting from the breach of contract on its part to keep the business secrecy with the supplier in the transferable credit, focusing on a English decision, Jackson v. Royal Bank of Scotland [2005] UKHL 3. In this case, the applicant, 'Econ', had purchased various varieties of pre-packed dog chews in bulk through 'Sam'(lst beneficiary) from 'PPLtd'(2nd beneficiary) in Thailand, using a transferable letter of credit issued by 'RBank'. 'Sam' charged a tremendous amount of mark-up on each transaction and it had not been disclosed to 'Econ', although the identity of 'PPLtd' was revealed to 'Econ' by various documents. However, 'RBank' made an unfortunate error to send an completion statement and other documents including 'PPLtd.'s invoice to 'Econ' instead of to 'Sam'. The effect of the Bank's error was to reveal to 'Econ' the substantial profit that 'Sam' was making on these transactions. CEO of 'Econ' was furious and, as a result, decided to cut 'Sam' out of its importing system and terminated their relationship. 'Sam' sued 'RBank' for damages to recover the loss of profits which could have been possibly made, if the information on the mark-up would not have been exposed to 'Econ'. The House of Lord held that 'RBank' was in breach of its duty of confidence, so 'Sam' was entitled to recover damages on a decreasing scale over 4 years, since there was no specific undertaking from the letter of credit.

  • PDF

하천제방 붕괴의 불확실성을 고려한 확률론적 홍수위험지도 개발 (Development of Probabilistic Flood Risk Map Considering Uncertainty of Levee Break)

  • 남명준;이재영;이창희
    • 융합정보논문지
    • /
    • 제9권11호
    • /
    • pp.125-133
    • /
    • 2019
  • 본 연구에서는 홍수시나리오에 의해 발생한 제방붕괴에서 불확실성을 포함한 확률홍수위험지도를 산정하였다. 불확실성을 포함한 극치수문시나리오와 그에 따른 홍수위가 산정된 선행연구자료를 활용하였고 이에 따라 제방붕괴 예측지점을 산정하였다. 단순한 조건에 따른 일률적인 파제폭을 제시하는 경험식과 지반공학적 복합요소들에 대한 불확실성을 고려한 물리적 기반의 수치모의 방식을 결합하여 파제폭을 산정하였다. 이에 따라 확률론적 파제유입량을 결정하였고, 신뢰도를 기반으로 100회 모의수행을 통한 2차원 제내지 침수해석을 실시하여 확률침수심도를 작성하였다. 이를 통해 홍수위험지도 작성기법을 기반으로 확률침수심도와 결합하여 확률홍수위험지도를 작성하였다. 본 연구결과는 제내지의 비상대처계획(EAP)의 정량적 근거자료로 보다 경제적, 안정적인 설계지표 제시하는데 효과적일 것으로 기대된다.

Exploring the Association between Board Structure and Information Security Breaches

  • Hsu, Carol;Wang, Tawei
    • Asia pacific journal of information systems
    • /
    • 제24권4호
    • /
    • pp.531-557
    • /
    • 2014
  • Although the area of information security planning and management has gained an increased attention, not much discussion was available on the role and the impact of the board members towards a firm's security management and governance decisions. In this research, we draw on corporate governance and the organizational demography literature to conduct an exploratory empirical study on the association between the board structure of a firm and the possibility of information security breaches. Our results show that the board size, the average age/tenure and the heterogeneity of age could reduce the possibility of security breaches while the proportion of independent directors and the heterogeneity of tenure could increase it. Our findings shed lights on the important role played by the board when managing information security risks in organizations.

영국(英國) 해상보험법(海上保險法)에서 최대선의원칙(最大善意原則)의 문제점(問題點)에 관한 고찰(考察) (A Study on the Problems of the Doctrine of Utmost Good Faith in English Marine Insurance Law)

  • 신건훈
    • 무역상무연구
    • /
    • 제14권
    • /
    • pp.103-152
    • /
    • 2000
  • English contract law has traditionally taken the view that it is not the duty of the parties to a contract to give information voluntarily to each other. In English law, one of the principal distinctions between insurance contract law and general contract law is the existence of the doctrine of utmost good faith in insurance law. The doctrine gives rise to a variety of duties, some of which apply before formation of the contract while others apply post-formation. This article is, therefore, designed to analyse the overall structure and problems of the doctrine of utmost good faith in English marine insurance law. The results of analysis are as following : First, the requirement of utmost good faith in marine insurance law arises from the fact that many of the relevant circumstances are within the exclusive knowledge of the assured and it is impossible for the insurer to obtain the facts to make a appropriate calculation of the risk that he is asked to assume without this information. Secondly, the duty of utmost good faith provided in MIA 1906, s. 17 has the nature as a bilateral or reciprocal, overriding and absolute duty. Thirdly, the Court of Appeal in Skandia held that breach of the pre-formation duty of utmost good faith did not sound in damages since the duty did not arise out of an implied contractual term and the breach did not constitute a tort. Instead, the Court of Appeal held that the duty was an extra-contractual duty imposed by law in the form of a contingent condition precedent to the enforceability of the contract. Fourthly, the scope of the duty of utmost good faith is closely related to the test of materiality and the assured is required to disclose only material circumstances subject to MIA 1906, s. 18(1) and 20(1). The test of materiality, which had caused a great deal of debate in English courts over 30 years, was finally settled by the House of Lords in Pan Atlantic and the House of Lords rejected the 'decisive influence' test and the 'increased risk' test, and the decision of the House of Lords is thought to accept the 'mere influence' test in subsequent case by the Court of Appeal. Fifthly, the insurer is, in order to avoid contract, required to provide proof that he is induced to enter into the contract by reason of the non-disclosure or misrepresentation of the assured. Sixthly, the duty of utmost good faith is, in principle, terminated before contract is concluded, but it is undoubtful that the provision under MIA 1906, s. 17 is wide enough to include the post-formation duty. The post-formation duty is, however, based upon the terms of marine insurance contract, and the duty lies entirely outside s. 17. Finally, MIA 1906, s. 17 provides expressly for the remedy of avoidance of the contract for breach of the duty. This means rescission or retrospective avoidance of the entire contract, and the remedy is based upon a fairly crude 'all-or-nothing' approach. What is needed in English marine insurance law is to introduce a more sophiscated or proportionate remedy.

  • PDF

k-SVM을 이용한 Rogue AP 탐지 기법 연구 (Detecting Rogue AP using k-SVM method)

  • 이재욱;이시영;문종섭
    • 정보보호학회논문지
    • /
    • 제24권1호
    • /
    • pp.87-95
    • /
    • 2014
  • 인가된 AP(Access Point)에 대해서만 사용을 허용하는 무선 통신 환경에서, 스마트폰의 테더링(tethering) 기능에 의한 로그 AP(rogue AP) 사용은 자료 유출과 같은 심각한 보안 문제를 발생시킨다. 이에 본 논문은 홉(hop) 간 RTT 값을 특징점(Feature)으로 하고 분류기로 k-SVM(Kernel Support Vector Machine)를 사용하여 로그 AP를 탐지하는 방법을 제안한다. 실험을 통해 유선 네트워크를 이용하여 설치한 일반 AP와 LTE 망을 활용하여 설치된 로그 AP 간의 구분이 가능함을 보였다.

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • 제21권4호
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

Key Management Server Design in Multiuser Environment for Critical File Protection

  • Sung-Hwa Han
    • Journal of information and communication convergence engineering
    • /
    • 제22권2호
    • /
    • pp.121-126
    • /
    • 2024
  • In enterprise environments, file owners are often required to share critical files with other users, with encryption-based file delivery systems used to maintain confidentiality. However, important information might be leaked if the cryptokey used for encryption is exposed. To recover confidentiality, the file owner must then re-encrypt and redistribute the file along with its new encryption key, which requires considerable resources. To address this, we propose a key management server that minimizes the distribution of encryption keys when critical files are compromised, with unique encryption keys assigned for each registered user to access critical files. While providing the targeted functions, the server employs a level of system resources comparable to that of legacy digital rights management. Thus, when implemented in an enterprise environment, the proposed server minimizes cryptokey redistribution while maintaining accessibility to critical files in the event of an information breach.

원격의료 서비스의 개인정보 침해 시나리오 개발 (A Scenario Development on the Personal Information Breach in Telemedicine Service)

  • 최현욱;김택영;김태성
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2021년도 추계학술발표대회
    • /
    • pp.301-304
    • /
    • 2021
  • 4차 산업혁명 시대가 도래함에 따라 사물인터넷(IoT)이 다양한 산업의 영역에서 활용되고 있다. 특히 IoT 기술 및 서비스를 활용하는 분야 중 하나인 스마트 의료 분야는 최근 소프트웨어 및 네트워크의 연결성이 강화되면서 사이버보안 사고가 급증하고 있다. 따라서 스마트 의료 기기·서비스 개발단계부터 보안을 고려하여 안전하게 개발하는 것이 필요하며, 서비스 제공시에도 보안을 고려하여 안전하게 관리 및 서비스를 제공하는 것이 필요하다. 이에 본 연구에서는 IoT 서비스 활용 분야 중 스마트 의료 분야에서 원격의료 서비스의 개인정보 침해 요인을 도출하고 이를 토대로 어택트리 기반의 시나리오 분석을 수행하고자 한다.

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]