• Title/Summary/Keyword: Internal Information Leakage

Search Result 93, Processing Time 0.027 seconds

A Study on Decision Making Process of System Access Management (시스템 접근관리에 대한 의사결정 프로세스 연구)

  • Cho, Young-Seok;Im, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.225-235
    • /
    • 2015
  • Recently, the administration and supervision of Information Security Certification and Security Inspection has been enforced but information leakage and security accidents by insiders are increasing consistently. The security accidents by insiders ran to 21% in 2010, by the 2011 Cyber Security Watch Survey. The problem is that immediate recognition is difficult and stopgap measure is mostly adopted without company's external notice apprehensive for cost increase or credit drop in case of internal security accidents. In the paper, we conducted the regression study on security access management then proposed the standard process available for other systems and businesses sites. It can be very useful for many companies to investigate, analyze and improve the problem of security management conveniently.

Study on History Tracking Technique of the Document File through RSID Analysis in MS Word (MS 워드의 RSID 분석을 통한 문서파일 이력 추적 기법 연구)

  • Joun, Jihun;Han, Jaehyeok;Jung, Doowon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1439-1448
    • /
    • 2018
  • Many electronic document files, including Microsoft Office Word (MS Word), have become a major issue in various legal disputes such as privacy, contract forgery, and trade secret leakage. The internal metadata of OOXML (Office Open XML) format, which is used since MS Word 2007, stores the unique Revision Identifier (RSID). The RSID is a distinct value assigned to a corresponding word, sentence, or paragraph that has been created/modified/deleted after a document is saved. Also, document history, such as addition/correction/deletion of contents or the order of creation, can be tracked using the RSID. In this paper, we propose a methodology to investigate discrimination between the original document and copy as well as possible document file leakage by utilizing the changes of the RSID according to the user's behavior.

A study on the design of the stable internal voltage system for DRAM's (DRAM의 안정한 내부 전압 시스템 설계에 관한 연구)

  • 주종두;이승훈;곽계달
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.542-545
    • /
    • 1998
  • This paper presents a new reference voltage generator(RVG) for advanced DRAM's. The proposed RVG with three temperature coefficient is independent of temperature variation, and supply voltage. This is used to shorten leakage current using the boosted sense ground(BSG). This circuit is designed in a 0.8.mu.m nwell CMOS, double-polysilicon, double-metal technology. The simulation resutls in jindependent temperature and supply voltage. In hspice simulation results, temperature dependency of RVG is 130.mu.V/.deg. C and supply voltage dependency is .+-.0.91%, $V_{cc}$ =3.3V.+-. 0.5V.3.3V.+-. 0.5V.

  • PDF

Vacuum distribution with depth in vertical drains and soil during preloading

  • Khan, Abdul Qudoos;Mesri, G.
    • Geomechanics and Engineering
    • /
    • v.6 no.4
    • /
    • pp.377-389
    • /
    • 2014
  • The vacuum consolidation method which was proposed by Kjellman in 1952 has been studied extensively and used successfully since early 1980 throughout the world, especially in East and Southeast Asia. Despite the increased successful use, different opinions still exist, especially in connection to distribution of vacuum with depth and time in vertical drains and in soil during preloading of soft ground. Porewater pressure measurements from actual cases of field vacuum and vacuum-fill preloading as well as laboratory studies have been examined. It is concluded that (a) a vacuum magnitude equal to that in the drainage blanket remains constant with depth and time within the vertical drains, (b) as expected, vacuum does not develop at the same rate within the soil at different depths; however, under ideal conditions vacuum is expected to become constant with depth in soil after the end of primary consolidation, and (c) there exists a possibility of internal leakage in vacuum intensity at some sublayers of a soft clay and silt deposit. A case history of vacuum loading with sufficient subsurface information is analyzed using the ILLICON procedure.

Research on the Level Evaluation Model of the Organization Research Security (조직의 연구보안 수준평가 모형 연구)

  • Na, Onechul;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.3
    • /
    • pp.109-130
    • /
    • 2020
  • Recently, the importance of research and development for technological innovation is increasing. The rapid development of research and development has a number of positive effects, but at the same time there are also negative effects that accelerate crimes of information and technology leakage. In this study, a research security level measurement model was developed that can safely protect the R&D environment conducted at the organizational level in order to prepare for the increasingly serious R&D result leakage accident. First, by analyzing and synthesizing security policies related to domestic and overseas R&D, 10 research security level evaluation items (Research Security Promotion System, Research Facility and Equipment Security, Electronic Information Security, Major Research Information Security Management, Research Note Security Management, Patent/Intellectual Property Security Management, Technology Commercialization Security Management, Internal Researcher Security Management, Authorized Third Party Researcher Security Management, External Researcher Security Management) were derived through expert interviews. Next, the research security level evaluation model was designed so that the derived research security level evaluation items can be applied to the organization's research and development environment from a multidimensional perspective. Finally, the validity of the model was verified, and the level of research security was evaluated by applying a pilot target to the organizations that actually conduct R&D. The research security level evaluation model developed in this study is expected to be useful for appropriately measuring the security level of organizations and projects that are actually conducting R&D. It is believed that it will be helpful in establishing a research security system and preparing security management measures. In addition, it is expected that stable and effective results of R&D investments can be achieved by safely carrying out R&D at the project level as well as improving the security of the organization performing R&D.

Added Value of Contrast Leakage Information over the CBV Value of DSC Perfusion MRI to Differentiate between Pseudoprogression and True Progression after Concurrent Chemoradiotherapy in Glioblastoma Patients

  • Pak, Elena;Choi, Seung Hong;Park, Chul-Kee;Kim, Tae Min;Park, Sung-Hye;Won, Jae-Kyung;Lee, Joo Ho;Lee, Soon-Tae;Hwang, Inpyeong;Yoo, Roh-Eul;Kang, Koung Mi;Yun, Tae Jin
    • Investigative Magnetic Resonance Imaging
    • /
    • v.26 no.1
    • /
    • pp.10-19
    • /
    • 2022
  • Purpose: To evaluate whether the added value of contrast leakage information from dynamic susceptibility contrast magnetic resonance imaging (DSC MRI) is a better prognostic imaging biomarker than the cerebral blood volume (CBV) value in distinguishing true progression from pseudoprogression in glioblastoma patients. Materials and Methods: Forty-nine glioblastoma patients who had undergone MRI after concurrent chemoradiotherapy with temozolomide were enrolled in this retrospective study. Twenty features were extracted from the normalized relative CBV (nCBV) and extraction fraction (EF) map of the contrast-enhancing region in each patient. After univariable analysis, we used multivariable stepwise logistic regression analysis to identify significant predictors for differentiating between pseudoprogression and true progression. Receiver operating characteristic (ROC) analysis was employed to determine the best cutoff values for the nCBV and EF features. Finally, leave-one-out cross-validation was used to validate the best predictor in differentiating between true progression and pseudoprogression. Results: Multivariable stepwise logistic regression analysis showed that MGMT (O6-methylguanine-DNA methyltransferase) and EF max were independent differentiating variables (P = 0.004 and P = 0.02, respectively). ROC analysis yielded the best cutoff value of 95.75 for the EF max value for differentiating the two groups (sensitivity, 61%; specificity, 84.6%; AUC, 0.681 ± 0.08; 95% CI, 0.524-0.837; P = 0.03). In the leave-one-out cross-validation of the EF max value, the cross-validated values for predicting true progression and pseudoprogression accuracies were 69.4% and 71.4%, respectively. Conclusion: We demonstrated that contrast leakage information parameter from DSC MRI showed significance in differentiating true progression from pseudoprogression in glioblastoma patients.

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.

A study on Priority Control Target(high-risk) Selection for Monitoring of Internal Data Leakage Prevention (내부정보유출방지 모니터링을 위한 중점관리 대상(고위험군) 선정에 관한 연구)

  • Park, Jang-Su;Kim, Su-Hyun;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.492-494
    • /
    • 2014
  • 정보유출사고가 증가됨에 따라, 기업 및 기관 내 주요정보(개인정보 및 핵심기술)가 유출되어 큰 피해가 발생하고 있다. 이러한 정보유출 사고 중 대부분이 내부자에 의한 고의 또는 실수로 발생하는 경우가 대부분이다. 이를 방지하기 위해 다양한 보안 솔루션을 도입하여 운영하고 있지만 내부자에 의한 정보유출사고는 본인이 소유하고 있는 권한을 이용하여 불법적인 정보유출을 시도하는 것으로, 이러한 위험행동을 탐지하는 것은 쉽지 않다. 이를 해결하기 위해 기업 및 기관에서는 기 구축된 다양한 보안 솔루션을 통합하여 모니터링 할 수 있는 '내부정보유출방지 모니터링시스템'을 구축하고 있으며, 내부정보유출방지 모니터링을 위한 연구도 지속적으로 진행되고 있다. 따라서 본 논문에서는 중점관리 대상(고위험군) 선정을 통해 효율적인 내부정보유출방지 모니터링을 수행할 수 있도록 연구하고자 한다.