• Title/Summary/Keyword: Infringement Case

Search Result 114, Processing Time 0.033 seconds

Analysis on Mobile Forensic of Smishing Hacking Incident (Smishing 사고에 대한 Mobile Forensic 분석)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.207-210
    • /
    • 2014
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

  • PDF

A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm (통합 보안정책 알고리즘 적용에 따른 최적화 방어 시스템 구축에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.39-46
    • /
    • 2011
  • This study is conducted to examine the optimal integrated security policy based on network in case of attacks by implementing unique security policies of various network security equipments as an algorithm within one system. To this end, the policies conduct the experiment to implement the optimal security system through the process of mutually integrating the unique defense policy of Firewall, VPN(Virtual Private Network), IDS(Intrusion Detection System), and IPS(Intrusion Prevention System). In addition, this study is meaningful in that it designs integrated mechanism for rapid detection of system load caused by establishment of the security policy and rapid and efficient defense and secures basic network infrastructure implementation.

A Study on the Chinese Parallel Import System: Focused on Law Cases in China (중국 병행수입제도의 법적 문제에 관한 연구: 중국 판례를 중심으로)

  • Zhou, Ling-Ke;Park, Kwang-So
    • Korea Trade Review
    • /
    • v.41 no.1
    • /
    • pp.21-39
    • /
    • 2016
  • The problems of parallel import in China have been becoming hot issues day by day, because the brand name goods' price in China is much higher than in other developed countries. This study researched the parallel import's basic theories and law cases, and analyzed the legal matters of Chinese parallel import system. First of all, China hasn't any law on parallel import so far. So the court judges determined the law cases based on 「patent law」, 「trademark law」 or 「anti-unfair competition law」. Therefore even in the same case, there might be different decisions according to judges or applied laws. This study handled three different law cases on the parallel import. We found some problems of Chinese parallel import system, so our conclusion is that to solve those kinds of problems, China should legislate the new parallel import law as soon as possible.

  • PDF

Analysis of vulnerabilities and Breaches in a network separation environment (망분리 환경에서 취약성 및 침해사고 분석)

  • Choe, Ye-won;Lee, DongHwi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.632-634
    • /
    • 2021
  • In proportion to the development of the Internet and the increase in users, the rate of cyber-incident using it is increasing. As a countermeasure, there is a network separation method that separates the system accessible to users and the system containing key information from each other. However, in the case of tasks that require the use of the Internet network, it is exposed to cyber attacks, and there are many loopholes in the method of data transmission between networks and the management and operation of the system, resulting in infection of the closed network. In this paper, we aim to enhance the safety of the networking system by investigating the types and cases of infringement accidents in these network separation environments.

  • PDF

Supply chain attack detection technology using ELK stack and Sysmon (ELK 스택과 Sysmon을 활용한 공급망 공격 탐지 기법)

  • hyun-chang Shin;myung-ho Oh;seung-jun Gong;jong-min Kim
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.13-18
    • /
    • 2022
  • With the rapid development of IT technology, integration with existing industries has led to an increase in smart manufacturing that simplifies processes and increases productivity based on 4th industrial revolution technology. Security threats are also increasing and there are. In the case of supply chain attacks, it is difficult to detect them in advance and the scale of the damage is extremely large, so they have emerged as next-generation security threats, and research into detection technology is necessary. Therefore, in this paper, we collect, store, analyze, and visualize logs in multiple environments in real time using ELK Stack and Sysmon, which are open source-based analysis solutions, to derive information such as abnormal behavior related to supply chain attacks, and efficiently We try to provide an effective detection method.

A Study on the Risk and Countermeasures of Hacking Cable

  • Hea-Jun Kim;Young-Bok Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.75-81
    • /
    • 2023
  • Since the introduction of smartphones, the introduction of charging cable infrastructure that can be used for public use is underway. Thanks to this, people use public cables comfortably without doubt, but most people are not aware of the dangers of public cables. These public cables can lead to infringement accidents such as personal information exposure due to the development of hacking cables, and in the worst case, hackers can take control of smartphones and laptops. This study analyzed the operating principles and attack principles of hacking cables that seem like these general charging cables, but contain malicious scripts or hardware inside. In addition, physical and logical countermeasures were considered based on the analysis.

EDR platform construction using ELK Stack and Sysmon (ELK Stack과 Sysmon을 이용한 EDR 플랫폼 연구)

  • Shin, Hyun-chang;Kong, Seung-Jun;Oh, Myung-ho;Lee, Dong-hwi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.333-336
    • /
    • 2022
  • With the development of IT technology, cybercrime is becoming sophisticated and intelligent. In particular, in the case of BackDoor, which is used in the APT attack (intelligent continuous attack), it is very important to detect malicious behavior and respond to infringement because it is often unaware that it has been damaged by an attacker. This paper aims to build an EDR platform that can monitor, analyze, and respond to malicious behavior in real time by collecting, storing, analyzing, and visualizing logs in an endpoint environment in real time using open source-based analysis solutions ELK Stack and Sysmon.

  • PDF

The Rules of Law on Warranty Liability in Contracts for the International Sale of Goods - With Special Reference to CISG - (국제물품매매계약에 있어서 하자담보책임에 관한 법리 - CISG를 중심으로 -)

  • Hong, Sung-Kyu
    • Journal of Arbitration Studies
    • /
    • v.24 no.4
    • /
    • pp.147-175
    • /
    • 2014
  • In contracts for the international sale of goods, a seller must deliver appropriate goods and hand over relevant documents according to a contract, which will transfer the ownership of the goods to a buyer. In this case, if there are defects in the contracted goods, the warranty liability will occur. However, in the United Nations Convention on Contracts for the International Sale of Goods (CISG), a term-the conformity of the goods to the contract-is used universally instead of the warranty. According to the CISG, a seller must deliver goods in conformance with the relevant contract in terms of quantity, quality, and specifications, and they must be contained in vessels or in packages according to the specifications in the contract. In addition, a certain set of requirements for conformity will be applied implicitly except when there is a separate agreement between parties. Further, the base period of conformity concerning the defects of goods is the point when the risk is transferred to the buyer. A seller shall be obliged to deliver goods that do not belong to a third party or subject to a claim then, and such obligations shall affect the right or claim of a third party to some extent based on intellectual property rights clauses. If the goods delivered by the seller lack conformity, or incur right infringement or claim of a third party, then it shall be regarded as a default item per the obligation of the seller. Thus, the buyer can exercise diverse means of relief as specified in Chapter 2, Section 3 (Article 45-Article 52) of the CISG. However, such means of relief have been utilized in various ways for individual cases as shown in judicial precedents made until now. Contracting parties shall thus keep in mind that it is best for them to make every contract airtight and they should implement each contract thoroughly and faithfully to cope with any possible occurrence of a commercial dispute.

  • PDF

A Study on the Types of Crime and Scalability in Metaverse (메타버스 내 범죄발생 유형과 확장성에 관한 연구)

  • Song, HyeJin;Nam, Wanwoo
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.218-227
    • /
    • 2022
  • Purpose: In the case of cavity discovered by ground penetrating radar exploration, it is necessary to accurately predict the filling amount in the cavity in advance, fill the cavity sufficiently and exert strength to ensure stability and prevent ground subsidence. Method: The cavity waveform analysis method by GPR exploration and the method using the cavity shape imaging equipment were performed to measure the cavity shape with irregular size and shape of the actual cavity, and the amount of cavity filling of the injection material was calculated during rapid restoration. Result: The expected filling amount was presented by analyzing the correlation between the cavity size and the filling amount of injection material according to the cavity scale and soil depth through the method by GPR exploration and the cavity scale calculation using the cavity shaping equipment. Conclusion: The cavity scale measured by the cavity imaging equipment was found to be in the range of 20% to 40% of the cavity scale by GPR exploration. In addition, the filling amount of injection material compared to the cavity scale predicted by GPR exploration was in the range of about 60% to 140%, and the filling amount of the injection material compared to the cavity size by the cavity shaping equipment was confirmed to be about 260% to 320 Purpose: The purpose of this study is to examine the types of crimes taking place in the metaverse, and to establish a crime prevention strategy and find a legal deterrent against it. Method: In order to classify crime types in the metaverse, crime types were analyzed based on the results of previous studies and current incidents. Result: Most of the crimes taking place in the metaverse are done in games such as Roblox or Zeppetto. Most of the game users were teenagers. Looking at the types, there are many teens for sexual crimes, violent crimes, and defamation, but professional criminals are often included in copyright infringement, money laundering using virtual currency, and fraud. Conclusion: Since the types of crimes in the metaverse are diverse, various institutional supplementary mechanisms such as establishment of police crime prevention strategies, legal regulations, and law revisions will have to be prepared.

A case study of Abusing of Game Technology License - The Konami's Music Game Licence Lawsuit Approach - (게임 기술 특허 남용에 대한 사례연구 -코나미사의 음악게임 특허 소송 사례를 중심으로-)

  • Jeon, Hong Sik;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.81-88
    • /
    • 2014
  • The patent right is that creators are received the right of monopoly for supporting their creation work perseveringly but sometimes it causes infringement of freedom of creation. In this study, we examine the patent of music game in arcade game field and also examine Konami's, which is a main producer in this field, institutes many lawsuits repeatedly. It brought on diversion of rivals and depression of game market. We examine the abuse of music game patent through the case of Konami. We examine the negative influence through all music game market that creativity blocked by repetitive patent lawsuit institutes from little change of operation device and music game hardware even though it is reasonable for guarantee of new technology patent in game field which is a idea industry. We examine the lawsuit cases of abuse of music game patent in Korea, China and Japan and we analyze market change through the cases. We recommend policy for this industry development.