• Title/Summary/Keyword: Internet Leakage

Search Result 253, Processing Time 0.021 seconds

A Study on the Blocking of Commercial Mail Systems for the Prevention of Information Leakage in Public Institutions (공공기관 내부 정보유출 방지를 위한 상용메일시스템 차단 방안)

  • Kim, Seo-Hye;Kim, Do-hyun;Lee, Dae-sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.195-197
    • /
    • 2022
  • In this paper, we intend to study the fundamental blocking methodology for the use of external commercial mail systems in the corporate internal Internet network, which is a common concern of public and administrative agencies. By checking the limitations of the blacklist-based blocking method used in the past, and by analyzing packet of the mail sending web page, the delimiter used for mail transmission is extracted, and the purpose is to monitor and block the leakage of intenal information of the company using whitelist technology.

  • PDF

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

A Study of Network 2-Factor Access Control Model for Prevention the Medical-Data Leakage (의료 정보유출 방지를 위한 네트워크 이중 접근통제 모델 연구)

  • Choi, Kyong-Ho;Kang, Sung-Kwan;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.341-347
    • /
    • 2012
  • Network Access Control system of medical asset protection solutions that installation and operation on system and network to provide a process that to access internal network after verifying the safety of information communication devices. However, there are still the internal medical-data leakage threats due to spoof of authorized devices and unauthorized using of users are away hours. In this paper, Network 2-Factor Access Control Model proposed for prevention the medical-data leakage by improving the current Network Access Control system. The proposed Network 2-Factor Access Control Model allowed to access the internal network only actual users located in specific place within the organization and used authorized devices. Therefore, the proposed model to provide a safety medical asset environment that protecting medical-data by blocking unauthorized access to the internal network and unnecessary internet access of authorized users and devices.

A Study on an Improvement of the Performance by Spectrum Analysis with Variable Window in CELP Vocoder (CELP 부호화기에서 가변 윈도우 스펙트럼 분석에 의한 성능 향상에 관한 연구)

  • Min So-Yeon;Kim Eun-Hwan;Bae Myung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.233-238
    • /
    • 2005
  • In general CELP(Code Excited Linear Prediction) type vocoders provide good speech qualify around 4.8kbps. Among them, G.723.1 developed for Internet Phone and video-conferencing includes two vocoders, 5.3kbps ACELP(Algebraic-CELP) and 6.3kbps MP-MLQ(Multi-Pulse Maximum Likelihood Quantization) In order to improve the speech qualify in CELP vocoder, in this paper. we proposed a new spectrum analysis algorithm with variable window In CELP vocoder, the spectrum of the synthesised speech signal is distorted because the fixed size windows is used for spectrum analysis. So we have measured the spectral leakage and in order to minimize the spectral leakage have adjusted the window size. Applying this method G.723.1 ACELP, we can got SD(Spectral Distortion) reduction 0.084(dB), residual energy reduction 6.3$\%$ and MOS(Mean Opinion Score) improvement 0.1.

  • PDF

Research Regard to Necessity of Smart Water Management Based on IoT Technology (IoT 기술을 활용한 스마트 물관리 필요성에 관한 연구)

  • Choi, Young Hwan;Kim, Yeong Real
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.11-18
    • /
    • 2017
  • The Objective of this Study is to Prove the Effectiveness of a Smart Water Management(SWM) Technology. The SWM Technology can Reduce the Production Cost using Internet of Thing(IoT) Technology that Utilizes Remote Metering of Consumer's Water usage and Reduce the Leakage of Supply Facilities. The SWM Demonstration Model Installed a Remote Water Leakage Sensor, Smart Metering and Micro Multi Sensor in Water Supply Facility, and Provided Real-Time Monitoring of the Operation Status. Consumers can be Provided the usage of Tap Water and the Water Puality through a Smart Phone Application. At this Time, we Surveyed Whether Consumers save the Tap Water or Drinking Directly using the Tap Water usage Information. Also, this Study is to Verify the Degree of Improvement of Water Supply Rates and Drinking Water Rate, and to Decrease Consumer's Complaints, Operating Costs, and Water Consumption by the SWM Technology. It is also Established a SWM Model Combined with the IoT Sensor at Supply Facilities, operator monitoring system and explored recovery solution detected events. It means the upbringing of the domestic water industry by developing the related technologies and spreading the SWM to advanced levels.

Status Diagnosis Algorithm for Optimizing Power Generation of PV Power Generation System due to PV Module and Inverter Failure, Leakage and Arc Occurrence (태양광 모듈, 인버터 고장, 누설 및 아크 발생에 따른 태양광발전시스템의 발전량 최적화를 위한 상태진단 알고리즘)

  • Yongho Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.135-140
    • /
    • 2024
  • It is said that PV power generation systems have a long lifespan compared to other renewable energy sources and require little maintenance. However, there are cases where the performance expected during initial design is not achieved due to shading, temperature rise, mismatch, contamination/deterioration of PV modules, failure of inverter, leakage current, and arc generation. Therefore, in order to solve the problems of these systems, the power generation amount and operation status are investigated qualitatively, or the performance is comparatively analyzed based on the performance ratio (PR), which is the performance index of the solar power generation system. However, because it includes large losses, it is difficult to accurately determine whether there are any abnormalities such as performance degradation, failure, or defects in the PV power generation system using only the performance coefficient. In this paper, we studied a status diagnosis algorithm for shading, inverter failure, leakage, and arcing of PV modules to optimize the power generation of PV power generation systems according to changes in the surrounding environment. In addition, using the studied algorithm, we examined the results of an empirical test on condition diagnosis for each area and the resulting optimized operation of power generation.

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

Optimal Inter-Element Spacing of FD-MIMO Planar Array in Urban Macrocell with Elevation Channel Modelling

  • Abubakari, Alidu;Raymond, Sabogu-Sumah;Jo, Han-Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4759-4780
    • /
    • 2017
  • Full Dimension multiple input multiple output (FD-MIMO) architecture employs a planar array design at the Base Station (BS) to provide high order multi-user MIMO (MU-MIMO) via simultaneous data transmission to large number of users. With FD-MIMO, the BS can also adjust the beam direction in both elevation and azimuth direction to concentrate the energy on the user of interests while minimizing the interference leakage to co-scheduled users in the same cell or users in the neighboring cells. In a typical highly populated macrocell environment, modelling the elevation angular characteristics of three-dimensional (3D) channel is critical to understanding the performance limits of the FD-MIMO system. In this paper, we study the throughput performance of FD-MIMO system with varying elevation angular spread and inter-element spacing using a 3D spatial channel model. Our results show that for a typical urban scenario, horizontal beamforming with correlated antenna spacing achieves optimal performance but by restricting the spread of elevation angles of departure, elevation beamforming achieves high array gain with wide inter-element spacing. We also realize significant gains due to spatial array processing via modelling the elevation domain and varying the inter-element spacing for both the transmitter and receiver.

A pairing-free key-insulated certificate-based signature scheme with provable security

  • Xiong, Hu;Wu, Shikun;Geng, Ji;Ahene, Emmanuel;Wu, Songyang;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1246-1259
    • /
    • 2015
  • Certificate-based signature (CBS) combines the advantages of both public key-based signature and identity-based signature, while saving from the disadvantages of drawbacks in both PKS and IBS. The insecure deployment of CBS under the hostile circumstances usually causes the exposure of signing key to be inescapable. To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS. Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices. Furthermore, the unforgeability of our scheme has been formally proven to rest on the discrete logarithm assumption in the random oracle model.