• Title/Summary/Keyword: Infringement Case

Search Result 114, Processing Time 0.027 seconds

Applying CBR algorithm for cyber infringement profiling system (사례기반추론기법을 적용한 침해사고 프로파일링 시스템)

  • Han, Mee Lan;Kim, Deok Jin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1069-1086
    • /
    • 2013
  • Nowadays, web defacement becomes the utmost threat which can harm the target organization's image and reputation. These defacement activities reflect the hacker's political motivation or his tendency. Therefore, the analysis of the hacker's activities can give the decisive clue to pursue criminals. A specific message or photo or music on the defaced web site and the outcome of analysis will be supplying some decisive clues to track down criminals. The encoding method or used fonts of the remained hacker's messages, and hacker's SNS ID such as Twitter or Facebook ID also can help for tracking hackers information. In this paper, we implemented the web defacement analysis system by applying CBR algorithm. The implemented system extracts the features from the web defacement cases on zone-h.org. This paper will be useful to understand the hacker's purpose and to plan countermeasures as a IDSS(Investigation Detection Support System).

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2588-2594
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

Exploring the Application of Impact Mitigation Regulations through Biotope Maps (도시생태현황지도를 활용한 침해조정 제도 국내 적용 사례 연구)

  • Choi, Nakhoon;Kil, Jihyon;Shin, Youngkyu
    • Ecology and Resilient Infrastructure
    • /
    • v.4 no.4
    • /
    • pp.237-244
    • /
    • 2017
  • The Impact Mitigation Regulation was first introduced in Germany with an intention to avoid or reduce the natural ecology and landscape infringement as much as possible according to the development project. The system has is an advantage of being able to efficiently operate the linkage policy of land planning and environment planning to prevent the excessive development of the national land and to continue to manage it. This study applied the German natural impact mitigation system by revising and supplementing it according to the domestic situation with a biotope map of Juam-dong, Gwacheon City, as a case study area. Spatial analysis was conducted of biotope maps, landscape maps, and NDVI maps to suggest a plan to derive and preserve the areas excellent in an ecological and environmental value. It was confirmed the Impact Mitigation Regulation could be used as a policy link of the land-environment policy that minimizes the degree of the damage that cannot help occurring necessarily in the development of the national land and to manage that damage from the planning stage.

$\alpha$ Scaling Parameter Optimization On Watermarking Using Autostereogram (오토스테레오그램을 이용한 워터마킹에서 $\alpha$스켈링 파라미터 최적화)

  • 허덕규;이인정;김성옥
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.101-109
    • /
    • 2001
  • In recent year, the use of digital picture information and general picture information has been increased, However, numerous copyright infringement and pirate copy of picture information through Internet and CD-ROM happen very often, As a result, several methods of watermarking have been presented to solve and verify distortion of the original data, In addition, watermark data have been suggested to resolve the vastness of the original data, Watermarking methods are often used to protect the right of ownership of a copyright, However, these Watermarking methods have brought the obscurity of recognition caused by the complexity of verification procedure and the increase of magnitude computation occurrence, This paper mainly mentions about the local optimization of scaling parameter, the maximization of hiding of Watermark information and maximization of watermark information in case of restoration that determine the amount of inserted information which is used for preventing distortion and transformation of the original data caused by insertion and hiding of Watermark information on compounding Autostereogram into JPEG picture information.

  • PDF

Place-shifting of TV Content by the Use of Slingbox and the Copyright (슬링박스를 이용한 TV프로그램의 장소이동 시청의 저작권법상의 성격)

  • Cho, Youn-Ha
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.7
    • /
    • pp.158-167
    • /
    • 2013
  • This research examines the legal liability of place-shifting of TV contents by the use of the Slingbox. The place-shifting of TV contents is fair use because it is a non-commercial private use based on the relevant case law regarding time-shifting and device-shifting such as Sony, RIAA and Napster. But the sharing of place-shifting function is likely to be liable for copyright infringement. And place-shifting may not be fair use based on the cases which denied fair use of time-shifting and space-shifting because the consumers' convenience for the use of the copyrighted work is against the purpose of legislation of copyright law. Place-shifting is unlikely to have a significant effect on the potential market for TV contents because it presents lucrative new platforms to disseminate TV contents to computers and mobile devices. However it is likely to have negative effect because various devices can be the follow-up marketplaces of the copyright holders of TV contents. This study proposes the "innovative medium defense," a new doctrine to analyze liability of innovative media.

A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident (산업기밀 유출사고 사례분석을 통한 유형별 대응방안 연구)

  • Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.39-45
    • /
    • 2015
  • Industrial secrets that companies own recently protected by various act related industrial security such as Trade Secret Act, Act on Prevention of Divulgence and Protection of Industrial Technology, etc. However, despite such protection infringement and leakage accidents of industrial secrets is increasing every year. According to a survey conducted by KAITS(Korean Association for Industrial Technology Security) annual average of estimated damage by industrial secrets leakage is estimated to be "50 trillion won." This is equivalent to the amount of annual revenue of small businesses more than 4,700 units. Following this, industrial secrets leakage causes serious damages to competitiveness of nation and companies and economic. However investment and effort to the industrial secrets leakage crime is lack of level compared to the scale of damage. Actually, most companies except some major companies are lack of response action about industrial secrets leakage because of shortage of separate organization, workforce, budget for industrial secrets leakage security. This paper aims to understand the overall flow of the industrial secrets leakage crime through various taxonomy such as cause of occurrence and leakage pathway and grasp the condition of damage from industrial secrets leakage through analyzation of internal and external industrial secrets leakage crime. This is expected to be the basis for related research.

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.141-145
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

  • PDF

Role-based User Access Control with Working Status for u-Healthcare System (u-Healthcare 시스템을 위한 RBAC-WS)

  • Lee, Bong-Hwan;Cho, Hyun-Sug
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.173-180
    • /
    • 2010
  • Information technology is being applied to the development of ubiquitous healthcare system, which provides both efficient patient care and convenient treatment regardless of patient's location. However, the increasing number of users and medical information give rise to the problem of user management and the infringement of privacy. In order to address this problem we propose a user access scheme based on the RBAC (Role Based Access Control) model. The preceding trust management model for Grid security, FAS(Federation Agent Server), was analyzed and extended to provide supplementary functions for role-based access control in u-Healthcare system. The RBAC model provides efficient user management and access control, but very vulnerable in case when one with valid role tries to leak confidential inner medical information. In order to resolve this problem, a RBAC-WS (Work Status with RBAC) model has been additionally developed which allows only qualified staffs to access the system while on duty. Th proposed RBAC and RBAC-WS model have been merged together and applied to the PACS (Picture Archiving and Communication System).

A Qualitative Study on Public management of the Admission and Discharge of mental hospital (정신장애인의 정신의료기관 입·퇴원과 국가관리에 관한 질적 연구)

  • Lee, Yong-pyo;Chung, Hyun-ju
    • Korean Journal of Social Welfare Studies
    • /
    • no.37
    • /
    • pp.369-397
    • /
    • 2008
  • The purpose of this study is to understand the context of mental hospital admission and discharge related with the stakeholder and to find out issues about public management on mental health disabilities. To this process, the more effecive alternative policies for mental health will be offered. As a research tool, the qualitative study was used, and the 6 case were analyzed. Through this study, we find 5 theme such as admission type occurred outside public management, uneffective public management in mental hospital treatment, long-term treatment mechanism occured in mental hospital, helplessness and role distortion of public follow-up system. According to the mental health law, mental hospital admission and discharge on mental health disabilities is to managed public system. But public management with mental health disabilities did not work on. In this results, we are find infringement on mental health disabilities. According to these findings, several suggestions are offered for better policies about admission and discharge procedures managed by public system.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.