• Title/Summary/Keyword: Internal Information Leakage

Search Result 93, Processing Time 0.02 seconds

Secure Knowledge Management for Prevent illegal data leakage by Internal users (내부 사용자에 의한 불법 데이터 유출 방지를 위한 안전한 지식관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Lee, Min-Kyung;Yoon, Mi-Yeon;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2010
  • Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

Design of Context-Aware-Based Drone Control Mechanism by Using Two-Factor (이중요소를 이용한 상황인지 기반 드론 제어 메커니즘 설계)

  • Oh, Yoon-Seok;Kim, Aeyoung;Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.57-66
    • /
    • 2019
  • Drones, which are used in various fields, are vulnerable to various security threats such as physical deodorization attacks and information leakage attacks because they operate in an unmanned environment and use wireless communication with weak security. In particular, research is needed to prevent damages such as leakage of stored information and unauthorized use due to illegal drone deodorization. In this paper, we propose a context - aware drone control mechanism that protects stored internal information and prevents unauthorized use when the drones are illegally deactivated. We also demonstrated the feasibility of the proposed mechanism as a prototype implementation and experiment.

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Ultra-Structures And $^{14}C$-Mannitol Transport Study of Human Nasal Epithelial Cells Using ALI Culture Technique (ALI 배양법 이용한 비강 점막 상피세포의 미세구조와 $^{14}C$-mannitol 투과도)

  • Kwak, Kyung-Rok;Hwang, Jee-Yoon;Lee, Ji-Seok;Park, Hye-Kyung;Kim, Yun-Seong;Lee, Min-Ki;Park, Soon-Kew;Kim, Yoo-Sun;Roh, Hwan-Jung
    • Tuberculosis and Respiratory Diseases
    • /
    • v.50 no.2
    • /
    • pp.205-212
    • /
    • 2001
  • Background : The information on nasal transport and the metabolism of peptides have been obtained from pharmacokinetic investigations in experimental animals. However, there are no transport and metabolic studies of human nasal epithelial cells. In this study, the permeability characteristics and the metabolic properties of in vitro human nasal cell monolayers were investigated. Material and Methods : Normal human inferior nasal conchal tissue samples were obtained from patients undergoing endoscopic nasal cavitary surgery. The specimens were cultured in a transwell using an air-liquid Interface (ALI) culture, and the transepithelial electrical resistance (TEER) value of the blank filter and confluent cell monolayers were measured. To determine the % leakage of mannitol, $4{\mu}mol%$ $^{14}C$-labelled mannitol was added and the % leakage was measured every 10 minute for 1 hour. Result : Human nasal epithelial cells in the primary culture grew to a confluent monolayer within 7 days and expressed microvilli. The tight junction between the cells was confirmed by transmission electron microscopy. The TEER value of the blank filter, fifth day and seventh day reached $108.5\;ohm.cm^2$, $141\;ohm.cm^2$ and $177.5\;ohm.cm^2$, respectively. Transcellular % leakage of the $^{14}$-mannitol at 10, 20, 30, 40, 50 and 60 minutes was $35.67{\pm}5.43$, $34.42{\pm}5.60$, $32.75{\pm}5.71$, $31.76{\pm}4.22$, $30.96{\pm}3.49$ and $29.60{\pm}3.68\;%$, respectively. Conclusion : The human nasal epithelial monolayer using ALI culture techniques is suitable for a transcellular permeability study. The data suggests that human nasal epithelial cells In an ALI culture technique shows some promise for a nasal transport and metabolism study.

  • PDF

A Study on the Blocking of Commercial Mail Systems for the Prevention of Information Leakage in Public Institutions (공공기관 내부 정보유출 방지를 위한 상용메일시스템 차단 방안)

  • Kim, Seo-Hye;Kim, Do-hyun;Lee, Dae-sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.195-197
    • /
    • 2022
  • In this paper, we intend to study the fundamental blocking methodology for the use of external commercial mail systems in the corporate internal Internet network, which is a common concern of public and administrative agencies. By checking the limitations of the blacklist-based blocking method used in the past, and by analyzing packet of the mail sending web page, the delimiter used for mail transmission is extracted, and the purpose is to monitor and block the leakage of intenal information of the company using whitelist technology.

  • PDF

Diagnostic Imaging of Urological Diseases in Dogs (개에서 비뇨기계 질환의 진단영상)

  • 장동우;정주현;장진회;정우조;원성준;이기창;최호정;이희천;윤화영
    • Journal of Veterinary Clinics
    • /
    • v.18 no.4
    • /
    • pp.459-464
    • /
    • 2001
  • Excretory urography is a procedure where opacification of the kidneys, renal pelvic diverticula, ureters, and urinary bladder is a result of renal excretion of an intravenously administered iodinated contrast agent providing both anatomical and functional assessment. And ultrasonography is a non-invasive modality to evaluate the important anatomic information concerning the size, shape, and internal architecture of kidney even in the presence of impaired renal function or abdominal fluid. We describe four dogs with urological signs diagnosed with excretory urography and ultrasonography. Parients showed a variety of clinical signs including vomiting, hematuria, anorexia, abdominal pain, and abdominal distension. The hydronephrosis was diagnosed in case 1, 2, and 3 that had pelvic dilation, dilation of pelvic recesses, ureteral dilation. In case 3, proximal ureteral rupture was diagnosed with evidence of contrast media leakage was seen in proximal ureter. In case 4, the rupture of urinary bladder was diagnosed with leakage of contrast media through its ventral portion.

  • PDF

The Construction of Logical, Physical Network Separation by Virtualization (가상화를 이용한 논리적, 물리적 망분리 구축)

  • Lee, YongHui;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management (상황 인지 기술과 모바일 단말 관리 기술을 이용한 비인가 단말 탐지 및 차단 기법)

  • Mun, Jiman;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.1-8
    • /
    • 2014
  • This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.

Design and Implementation of DB Protection System through Critical Query Signature (핵심 쿼리 결제를 통한 DB 보호 시스템 설계 및 구현)

  • Kim, Yang-Hoon;Kwon, Hyuk-Jun;Lee, Jae-Pil;Park, Chun-Oh;Kim, Jun-Woo;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.228-237
    • /
    • 2011
  • The risk of leakage or theft of critical data which is stored in database is increasing in accordance with evolution of information security paradigm. At the same time, needs for database security have been on the rapid increase due to endless leakage of massive personal information. The existing technology for prevention of internal information leakage possesses the technical limitation to achieve security goal completely, because the passive control method including a certain security policy, which allows the only authorized person to access to DBMS, may have a limitation. Hence in this study, we propose Query Signature System which signatures the queries accessing to the critical information by interrupting and passing them. Furthermore this system can apply a constant security policy to organization and protect database system aggressively by restricting critical query of database.