• Title/Summary/Keyword: Information Breach

Search Result 126, Processing Time 0.022 seconds

Problems of Distance Learning in Specialists Training in Modern Terms of The Informative Society During COVID-19

  • Kuchai, Oleksandr;Yakovenko, Serhii;Zorochkina, Tetiana;Оkolnycha, Tetiana;Demchenko, Iryna;Kuchaі, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.143-148
    • /
    • 2021
  • The article considers the training of specialists in education in the conditions of distance learning. It is lights up the advantages of distance learning and determined the characteristic features of distance learning of students training in the implementation of these technologies in the educational process. The article focuses on the main aspects of computerization of studies as a technological breach in methodology, organization and practical realization of educational process and informative culture of a teacher. Information technologies are intensive involved in life of humanity, educational process of schools and higher educational establishments. Intercommunication is examined between the processes of informatization of the society and education.

Anonymized Network Monitoring for Intrusion Detection Systems

  • Srinivas, DB;Mohan, Sagar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.191-198
    • /
    • 2022
  • With the ever-increasing frequency of public sector and smalls-cale industries going live on the internet in developing countries, their security of which, while crucial, is often overlooked in most cases. This is especially true in Government services, whilst essential, are poorly monitored if at all. This is due to lack of funds and personnel. Most available software which can help these organizations monitor their services are either expensive or very outdated. Thus, there is a need for any developing country to develop a networking monitoring system. However, developing a network monitoring system is still a challenge and expensive and out sourcing network monitoring system to third party is a security threat. Therefore, in this article we propose a method to anonymize network logs and outsource networking monitoring system to third-party without breach in integrity of their network logs.

A Study on the Alteration in Duty of Disclosure in the Marine Insurance Act 1906 (1906년 해상보험법상 고지의무의 변경에 관한 연구)

  • KIM, Chan-Young
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.71
    • /
    • pp.171-194
    • /
    • 2016
  • In the UK, the legal principle for the duty of disclosure established in Carter v Boehm case was codified in the Marine Insurance Act 1906("MIA"). The duty of disclosure under the MIA is the pre-contractual duty by the insured and therefore, the insured should disclose the every material circumstance that would influence a prudent insurer's judgement. If the insured violates the duty of disclosure, the insurer is entitled to avoid the insurance contract, regardless of whether there was the deliberate or reckless breach, which is unfavorable to the insured. The Law Commission reviewed the duty of disclosure under the MIA in detail and provided the Insurance Act 2015 for the purpose of enhancing the interests of the insured. The Insurance Act 2015("Act"),while the basic legal structure of the duty of disclosure under the MIA still remains, amends it in respect of non-consumer insurance and furthermore, integrate the duty of disclosure and the duty not to misrepresent into the duty of fair presentation of risk. And according to the Act, the insurer is required to more actively communicate with the insured before entering the contract with the result that, if the insured fails to disclose the material circumstance but provides the sufficient information to put the insurer on notice, the insurer should further inquire for the purpose of the insured's revealing the material circumstance. In addition, the Act details the insured's constructive knowledge of material circumstance by reviewing the current case law and introduces a new system for the insurer's proportionate remedy against the insured's breach of the duty of fair presentation of risk.

  • PDF

Online Users' Password Security Behavior : The Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior (온라인 사용자의 비밀번호 보호행위 : 공포 소구와 메시지 프레이밍 효과, 그리고 비밀번호 보호행위의 동기요인)

  • Park, Jaeyoung;Kim, Jeondo;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.147-165
    • /
    • 2017
  • Recently, there have been numerous issues about password breaches and it is becoming important for the users to manage their passwords. In practice, the online service provider are asking the online users to change their passwords periodically. However, majority of the users are not changing their passwords regularly, and this can increase the risk of password breach. The purpose of this study is to investigate whether 'fear appeals' and 'message framing' enhance the behavior of changing passwords by the online users. Furthermore, we identify the mechanism on how the behavior of changing passwords is enabled using protection motivation theory. The results of an online experiment show that the online users who are exposed to 'fear appeals' perceived a more vulnerability and severity of password breaches, which in turn, increased the intention of changing their password. In addition, we found that perceived severity of password breaches affect fear positively. Moreover, we found that fear has significant impact on the willingness of changing passwords. Finally, Message framing plays a moderating role between fear and change intentions. That is, in a situation where 'fear appeal' is presented, it means that 'gain framing' is more effective than 'loss framing' These findings suggest that the online service providers may need to use 'fear appeals' to the online users. Security managers can address issues related to the password breaches by carefully designing 'fear appeals'.

A Case Note on the Medical Negligence of Traditional Chinese Herbal Medicine in the UK

  • Lee, Hai Woong
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.18 no.3
    • /
    • pp.105-115
    • /
    • 2014
  • Objective : Traditional medicine (TM) has been playing its role in national healthcare system and it is taken as complementary and alternative medicine (CAM) from the viewpoint of modern Western medicine. In the UK, not a few practitioners of Traditional Chinese Medicine (TCM) are working as CAM practitioners using herbal medicine and acupuncture therapy. Cases of dispute in the TCM practice are not rare these days because patients who take TCM service are increasing by year. Method : In the UK, dispute cases of the Traditional Medicine of East Asia can be found these days, however, it is hard to find a reported court case. A medical dispute case of TCM will be analysed to see the legal management and the resolving principle in the alternative medicine practice with some cases of Korean Medicine (KM) being discussed. Results : The usual pattern of clinical negligence can be discussed from the points of a duty of care, breach of that duty by negligence, and the harm to the patient from that breach of duty. The judge followed this procedure In this case to discuss the claims. The department of health proposed to introduce regulation to provide the reasonable quality in TCM practice, and the governmental system would be essential to regulate both the TCM practice and practitioners. Conclusion : The dispute case of traditional Chinese herbal medicine (TCHM) practice is important for the clinical negligence in TCHM practice. Judging the negligence of a TCHM practitioner involves the conventional negligence principle in tort law, and the TCHM practitioners are required to keep up with the up-to-date information on the related medical specialty. The reasoning is almost the same as that shown in the court case of Korea. The TCHM practice in the UK needs to be under the regulation by the government. The standard of care we expect of a TCHM practitioner is a further matter to discuss from the healthcare and social viewpoints.

A Development of Comprehensive Framework for Continuous Information Security (기업의 지속적 정보보안 강화를 위한 접근법 개발)

  • Jeong, Tae-Seok;Yim, Myun-Seong;Lee, Jae-Beom
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.1-10
    • /
    • 2012
  • The growth in computer use has ushered increased concerns of information security throughout the world. Historically, researchers interested in the security of information systems have long investigated extensively themselves with building technological countermeasures in order to prevent several information security problems. However, due to infusion of more procedures and logical or physical devices within the information environment, no system can be completely secure. Therefore, keeping IT environment safe demands a more comprehensive understanding of the phenomenon, which requires broadening information security far beyond the technical aspects. This study is aimed at proposing a information security framework from holistic view.

Inference of birthplaces of users with public information in FaceBook (페이스북 공개 정보를 이용한 사용자 출생지 추론)

  • Choi, Daeseon;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.431-434
    • /
    • 2014
  • This paper shows the users' birthplace information can be inferred with only the public information in FaceBook SNS. Through experiments with various machine learning algorithms and various parameters, we have found that SVM algorithm with the location of the highschool, the current address, and the graduate year of highschool performs best for the inference, as this can infer 78% of users' birthplaces correctly. Since the birthplace information is used for various security purpose such as questions for getting the forgotten password and a part of korean residence registration number, this is a non-trival security breach and users need be cautious about it.

A User Anonymous Mutual Authentication Protocol

  • Kumari, Saru;Li, Xiong;Wu, Fan;Das, Ashok Kumar;Odelu, Vanga;Khan, Muhammad Khurram
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4508-4528
    • /
    • 2016
  • Widespread use of wireless networks has drawn attention to ascertain confidential communication and proper authentication of an entity before granting access to services over insecure channels. Recently, Truong et al. proposed a modified dynamic ID-based authentication scheme which they claimed to resist smart-card-theft attack. Nevertheless, we find that their scheme is prone to smart-card-theft attack contrary to the author's claim. Besides, anyone can impersonate the user as well as service provider server and can breach the confidentiality of communication by merely eavesdropping the login request and server's reply message from the network. We also notice that the scheme does not impart user anonymity and forward secrecy. Therefore, we present another authentication scheme keeping apart the threats encountered in the design of Truong et al.'s scheme. We also prove the security of the proposed scheme with the help of widespread BAN (Burrows, Abadi and Needham) Logic.

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.

A Study on the Responsibility of Shipper under the Rotterdam Rules (로테르담규칙상 송하인의 책임에 관한 고찰)

  • Hang, Nak-Hyun;Kim, Young-Kon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.53
    • /
    • pp.101-133
    • /
    • 2012
  • The paper aims to analyse the obligations and Responsibilities of shipper in the Rotterdam Rules. The Rotterdam Rules, has underlying intention that it will provide uniform law for the international carriage of goods by sea. It is highly expected that the Rotterdam Rules will create the new international legal regime replacing Hague-Visby Rules and Hamburg Rules. Rotterdam Rules provide the obligations and responsibilities of shipper in express. The shippers obliged to provide, (a) duty as to the condition in which the cargo has to be delivered to the carrier, (b) cooperation of the shipper and the carrier in providing information and instruction, and (c) shipper's obligation to provide information, instructions and documents. The shipper is liable for loss or damage sustained by the carrier if the carrier proves that such loss or damages was caused by a breach of the shipper's obligations. However, the shipper is relieved of all or part of its liability if the cause or one of the causes of the loss or damage is not attributable to its fault or to the fault. But, the shipper shall indemnify the carrier against loss or damage resulting from the inaccuracy of such information. Rotterdam Rules is providing rather concrete as to the shipper's responsibilities and burden of proof in separate chapter. The question is whether such burden of proof of the fault should be imposed to the shipper.

  • PDF