• Title/Summary/Keyword: Information protection industry

Search Result 392, Processing Time 0.028 seconds

Design Of A Secure Authentication Protocol Against Phishing And Pharming Attacks (피싱과 파밍 공격에 대응하기 위한 인증 프로토콜 설계)

  • Kim, Ik Su;Choi, Jong Myung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • As individuals spend more time doing social and economic life on the web, the importance of protecting privacy against Phishing and Pharming attacks also increases. Until now, there have been researches on the methods of protection against Phishing and Pharming. However, these researches don't provide efficient methods for protecting privacy and don't consider Pharming attacks. In this paper, we propose an authentication protocol that protects user information from Phishing and Pharming attacks. In this protocol, the messages passed between clients and servers are secure because they authenticate each other using a hash function of password and location information which are certificated to clients and servers only. These messages are used only once, so that the protocol is secure from replay attacks and man-in-the-middle attacks. Furthermore, it is also secure from Pharming attacks.

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

A Study on Protection of Visual Information Design by Arbitration (중재제도를 활용한 시각정보디자인 보호에 관한 연구)

  • Kim, Sung-Ryong;Kim, In-Kyung
    • Journal of Arbitration Studies
    • /
    • v.26 no.1
    • /
    • pp.53-72
    • /
    • 2016
  • The importance of design is emphasized in many industries. It began to earn recognition as part of industry rather than the arts. In particular, utilization of visual information design including moving images, packaging, advertisement, publication, editorial and visual information processing is higher than others in the design field. However, disputes relating to intellectual property rights have been also increasing as it became known. Therefore, now is the time to consider and establish an effective dispute settlement system for the design industry. In this view, arbitration will be a suitable method for dispute settlement in visual information design because of characteristics such as confidentiality, professionalism, efficiency, economy and flexibility. However, Arbitration system is not well known to the people who work in this industry. Thus, in order to aggressively advertise the arbitration system, an arbitration institution has to appoint design experts as new arbitrators for domestic and international arbitration. Next, an arbitration institution needs to prepare the new and expediting rules with design field characterization. Finally, it has to plan to cooperate with all of the institutions and schools concerned.

A Research on the Effectiveness of the Vulnerability Detection Against Leakage of Proprietary Information Using Digital Forensic Methods (디지털 포렌식 기법을 통한 기업 정보유출에 대한 취약점 탐지 효율성에 관한 연구)

  • Park, Yoon-Jae;Chae, Myung-Sin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.464-472
    • /
    • 2017
  • In the ICT (Information and Communication Technology) convergence security environment, a lot of companies use an external public web system for the external disclosure and sharing of product information, manufacturing technology, service manualsand marketing materials. In this way, the web system disclosed on the Internet is an important aspect of cyber security management and has an always-on vulnerability requiringan information protection solution and IT vulnerability checks. However, there are limits to vulnerability detection management in anexternal environment. In this study, in order to solvethese problems, we constructed a system based on digital forensics and conducted an empirical study on the detection of important information in enterprises by using forensic techniques. It was found thatdue to the vulnerability of web systems operated in Korea and overseas, important information could be revealed,such as the companies' confidential data and security management improvements. In conclusion, if a system using digital forensic techniques is applied in response to theincreasing number of hacking incidents, the security management of vulnerable areas will be strengthened and the cyber security management system will be improved.

Trademark Protection In The Fashion Industry with ICT Issues (패션산업의 상표권 보호 및 ICT 쟁점 - Louboutin 사건, Levi 사건에 대한 분석을 중심으로 -)

  • Lee, Jae-Kyoung
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.185-209
    • /
    • 2013
  • With the broader range of information and communications technology, of which fashion is a foundational medium, to analyze fashion as an information technology in order to better understand the industry's desire for intellectual property protection, popular resistance to such protection, and the most efficacious balance between them in terms of creative expression. It is, therefore to be focused on cultural and historical reasons for the limited degree of intellectual property protection extended in the past to certain categories of human creativity, including fashion design. So, the question of why some tension still exists between creators and consumers of fashion, how information theory can contribute to an explanation for that tension, and what role law can play in its resolution with Louboutin case and Levi case. Consumers and designers alike are better served by promotion of fair competition, lower litigation costs, and the inventive synergy of the fashion industry. Louboutin shows the comfortable, respectful limits of trademark law, while Levi illustrates the dangerous, overreaching deference that a few circuits have granted to famous marks. The Supreme Court could clarify the standard for dilution claims, requiring that a junior mark be "identical or nearly identical" or even "significantly similar" to a senior mark. Courts should need a deference in making dilution determinations and can choose to make this factor quite subjective with the highest degree of similarity.

A Study on Data Compliance Measures of Digital Healthcare Service - Focusing on Personal Information Lifecycle (디지털 헬스케어 서비스의 데이터 컴플라이언스 방안에 관한 연구 - 개인정보 라이프사이클을 중심으로)

  • Jung, Jaeeun;Yang, Jinhong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.134-143
    • /
    • 2022
  • 'Data' is the key component that leads Digital Healthcare. Most of the Healthcare Data is personal information of data subject and includes Sensitive Information. It is very important for companies to use data lawfully and safely during the lifecycle of data collection, use, provision, and destruction. However, small and medium-sized enterprises(SMEs), ventures, and startups, which account for 78% of the Healthcare Services Industry, have had difficulties in performing tasks related to personal information protection. The personal Information Protection Act's requirements depending on the purpose of using Personal Information are different. Also, the requirements for each personal information lifecycle are varied. Therefore, this study suggests six purposes for companies to use healthcare data. It examines the considerations during the lifecycle in which personal information is collected to be destroyed.

The Suggestion for Improvement of the Education System of Private Security Employees (민간경비원 교육과정의 문제점과 개선방안)

  • Ahn, Hwang-Kwon;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.13-21
    • /
    • 2012
  • The purpose of this study is to profile actual conditions of personal information protection systems operated in overseas countries and examine major considerations of personal information that security service providers must know in the capacity of privacy information processor, so that it may contribute to preventing potential occurrence of any legal disputes in advance. Particularly, this study further seeks to describe fundamental idea and principle of said Personal Information Protection Act; enhancement of various safety measures (e.g. collection/use of privacy data, processing of sensitive information/personal ID information, and encryption of privacy information); restrictions on installation/operation of video data processing devices; and penal regulations as a means of countermeasure against leakage of personal information, while proposing possible solutions to cope with these matters. Using cases among foreign countries for this study.

A Study of the Internet of Thing Industry and Policy Implications (사물인터넷 산업 현황 및 정책적 대응방향)

  • Chun, Hwang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.724-727
    • /
    • 2014
  • This paper is analyzing the situation of the Internet of Things Industry and draw the policy implications to promote Internet of Things industry. Major IT companies as Apple, Google, IBM, Sony, and Samsung have developed various smart glass and smart watch as a Iot products. In order to promote Iot Industry, we should take the build up of eco system between IT makers and the various contents provider, protection of personal information and data, development of killer applications and business models, and the conversion from IPv4 to IPv6 as a next internet address infra, build up of international standard platform on IoT.

  • PDF

Food safety regulation based on WTO SPS agreement and the required future work (WTO SPS 협정에 기초한 식품안전 규제와 향후 과제)

  • Cho, Seung Yong;Cho, Sanggoo
    • Food Science and Industry
    • /
    • v.51 no.3
    • /
    • pp.196-208
    • /
    • 2018
  • This paper described the contents of the WTO (world trade organization) SPS (world trade organization) Agreement and trends in the WTO SPS provisions such as equivalence, localization, transparency, and risk assessment. The purpose of the WTO SPS agreement is to promote international trade by preventing arbitrary and unreasonable use of SPS measures, which are the rights of a country for the protection of human health and animal and plant health, and by abolishing the non-tariff barriers. To this end, the requirements for implementing the SPS measures taken by the importing country are restricted to those that can scientifically prove to be inevitable for SPS protection. The major provisions in WTO SPS agreement were elaborated to promote international trades. When trade-restricted SPS measures such as prohibition of imports are made, a scientific basis should be provided. Therefore, it is essential to provide scientific evidence based on risk analysis to protect people's health from potentially harmful imported foods.

A Survey research on Current Situation and Effectiveness of Performance Information in the Hang-Tag of Functional Outdoor Jacket (기능성 아웃도어 재킷의 행택을 통한 성능정보 제공 현황과 유용성 및 대안연구)

  • Lee, Eun Byol;Bang, Gi seong;Yoo, Shin Jung
    • Fashion & Textile Research Journal
    • /
    • v.16 no.5
    • /
    • pp.800-810
    • /
    • 2014
  • In this study, the current status of product information of functional outdoor jackets in the hang-tags was investigated in perspective of consumer protection. Effectiveness and preferred alternatives to hang-tag information were also investigated. For the market survey, 1560 hang-tags from 676 functional outdoor jackets were investigated. For the effectiveness and preferred alternatives, 472 adults in their 20-60's were surveyed. The average number of hang-tags was 2.3 but 5.9% did not provide any product information. The contents included functional property of fabric; quality guarantee; brand introduction; product characteristics; instructions for care/usage; subsidiary material information, and they were different depending on end-use of jackets. Consumers strongly wanted explanations of the terms used in the hang-tag and could not accurately figure out the functions of the products from hang-tag information regardless of expression methods. The percentage of incorrect answer of 'figure/foreign language' method was extremely high. It is a noticeable feature of graph method that customers perceived that the graph was difficult to understand, but the percentage of correct answers was much higher than other methods, implying that graph method was possibly more useful at delivering accurate information to the customers who pursuit information. Customers strongly agreed to need of alternative methods and preferred an unified performance grade from selected functions based on the end-use of products. Customers also wanted to include the information of performance change after laundering. The results could provide practical insights to the consumers, companies, and the government to prepare proper guideline/policies for consumer protection.