• Title/Summary/Keyword: Information Leakage

Search Result 1,511, Processing Time 0.029 seconds

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

Low Leakage Input Vector Searching Techniques for Sequential Circuits (시퀀셜 회로를 위한 리키지 최소화 입력 검색방법)

  • Lee, Sung-Chul;Shin, Hyun-Chul;Kim, Kyung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.655-658
    • /
    • 2005
  • Due to reduced device sizes and threshold voltages, leakage current becomes an important issue in CMOS design. In a CMOS combinational logic circuit, the leakage current in the standby state depends on the state of the inputs and thus can be minimized by applying an optimal input when the circuit is idling. In this paper, we present a New Input Vector Control algorithm, called Leakage Minimization by Input vector Control (LMIC) for minimal leakage power. This algorithm finds the minimal leakage vector and reduces leakage current up to 22.% on the average, for TSMC 0.18um process parameters. Minimal leakage vectors are very useful in reducing leakage currents in standby mode of operation.

  • PDF

A Monitoring Tool for Personal Information Leakage Prevention in Network Packets (네트워크 패킷 내 개인정보 유출 방지를 위한 모니터링 도구 개발)

  • Ju, Tea Kyung;Hong, Chong Min;Shin, Weon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.489-494
    • /
    • 2013
  • Personal information has been transmitted in a variety of services of Internet environment, but individual users do not know what information is sent. In this paper, we aim to develop a monitoring tool that continuously monitors personal sensitive information in network packets and informs the user whether or not to leak. So we implement a monitoring tool of personal information and analyze the experiment results. In addition, we introduce a prevention of confidential information in company and a leakage prevention of medical information, for applications that take direct advantage. The results of this study, by contributing to prevent leakage of personal information, can help reduce cyber threats variously targeting personal information of users.

Development of Vehicle Status Alerts System for Personal Information Leakage Protection using the NFC-based GCM Service (개인정보 유출 방지를 위한 NFC 기반 GCM 서비스를 이용한 차량 상황 알림 시스템 개발)

  • Kang, Hyun-Min;Choi, Hyun-Su;Cha, Kyung-Ae
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.317-324
    • /
    • 2016
  • This paper proposes a message transfer application using smartphone with NFC(Near Field Communication) and GCM(Goolge Cloud Messaging) technology for prevention of personal information leakage. In implementing for the proposed system, we design a NFC-based vehicle status alerts service which make it possible to communicate with smartpone message without phone-number between a car driver and an unspecified person. The application provides message communication mechanism without exposing the real phone number, using the NFC tag written with the driver's smartphone device ID and GCM push messages. Through the evaluation result of the actual implemented application, the proposed system can be efficient technology in protection for leakage of personal information such as personal phone- number in daily life.

A Study on Implementation Method of ECM-based Electronic Document Leakage Prevention System through Security Area Location Information Management (보안구역 위치정보 관리를 통한 ECM기반 전자문서유출방지 시스템 구현방안 연구)

  • Yoo, Gab-Sang;Cho, Seung-Yeon;Hwang, In-Tae
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.83-92
    • /
    • 2020
  • The current technology drain at small and medium-sized enterprises in Korea is very serious. According to the National Intelligence Service's survey data, 69 percent of technology leaks are made through employees of small and medium-sized enterprises. A document security system was introduced to compensate for the problem. However, small and medium-sized enterprises are not doing well due to their poor environment. Therefore, it proposes a document security system suitable for small businesses by developing a location information machine learning system that automatically creates a document security Green Zone through learning, and an ECM-based electronic document leakage prevention system that manages generated Green Zone information by reflecting it into the document authority system. And step by step, propose a universal solution through cloud services..

Analysis of the Electromagnetic Leakage from Liquid Crystal Display Monitors (LCD 모니터의 누설 전자파에 대한 분석)

  • Lee, Ho seong;Sim, Kyuhong;Oh, Seungsub;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.9
    • /
    • pp.844-853
    • /
    • 2016
  • Generally, the compromising electromagnetic emanations are generated from LCD(Liquid Crystal Display) monitor which is typical output component of computer. Because display information transmitted to LCD monitor is included in these emanations, there are risks about information leakage of monitor by eavesdropping of leaked signal. So, analysis about possibility of information leakage is necessary because electromagnetic security through the electromagnetic emanations is being at issue. In this paper, the possibility of display information leakage are demonstrated by analyzing the electromagnetic emanations from desktop and laptop monitors. The characteristics of leaked signal from LCD monitor is verified by analyzing display mechanism and the electromagnetic emanations are measured in the long distance by eavesdropping experiment. Also, threat of information leakage is confirmed by recovering display information with several signal processing technique and comprising with target display.

Joint Transmitter and Receiver Design based on Effective-leakage in Multi-user MIMO systems (다중사용자 다중안테나 시스템에서 effective-leakage 기반 송신기와 수신기 결합 설계)

  • Seo, Dong-Joon;Lee, Jae-Hong
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.191-192
    • /
    • 2008
  • We give new definition of the effective-leakage and the signal to effective-leakage plus noise ratio (SELNR) to consider receiver combining motivated by the leakage. We propose a method to find jointly beamforming vector and combining vector for the two linear receivers (maximal ratio combining (MRC) receiver and minimum mean square error (MMSE) receiver) based on the SELNR.

  • PDF

Development of Mobile Alarm System using Message Tree for Personal Information Management (개인정보관리를 위한 메시지 트리 기반의 모바일 알람 시스템 구축)

  • Jang, Eun-Young;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.153-162
    • /
    • 2009
  • When a private information security incident occurs, the people who own the information are not acknowledged about their information leakage until those affairs appear in public media. This research aims at developing a mobile alarm system for acknowledging suspicious events to the information owners. The mobile alarm system was designed considering the limited user interface of mobile terminal and concept of "personal information leakage message tree" is deployed. The message tree contains every possible situation about personal information leakage and the leaves of the tree has several choices that the information owner can select. This message tree concept enables each information owner to manager his or her information leakage situation by just pushing a few buttons of mobile device. The contribution of this paper is in design of a comprehensive alarm message tree and development of mobile alarm system containing the message tree concept.

A Study on the Artistic Representation of the Cellular-Phone Addiction and the Personal Data Leakage of Modern Society

  • Lee, Joohun;Baek, Jiseon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.65-72
    • /
    • 2015
  • Although the development of digital technology and network has brought great convenience in modern lives, amongst the aggravated complexity in the contemporary society, modern minds who have failed to create genuine relationships undergo a sense of alienation and solitude that may appear as a type of social pathology called cellular-phone addiction. Also, while the emergence of the information age seemingly brings about benefits including diverse acquisition regarding knowledge and broader communication, underneath exists side effects involving leakage of private information. Especially, being excessively addicted to relationship network may induce one to become insensitive towards leakage of private information without recognizing, and thereby instigating yet another social problem. Media art is very practical in terms of suggesting a critical perspective concerning social phenomena and elevating them into a work of art by rendering them artistically. Particularly, when social problems of the modern days are expressed through digital technology, media art provides the audience with a foundation that will enable them to sympathize without hostility. This dissertation calls attention to the contemporary problems regarding cellular-phone addiction and possible hazards of information leakage based on media art, while at the same time proposing the production process of a media art work that attempts to raise awareness and sympathy on such social issues.