• Title/Summary/Keyword: Leakage of Personal Information

Search Result 332, Processing Time 0.029 seconds

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

The Secure Algorithm on the Sensitive data using Bloom filter and bucket method (버킷과 블룸필터를 혼합한 민감한 데이터 보안)

  • Yu, Choun-Young;Kim, Ji-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.939-946
    • /
    • 2012
  • Recently privacy breaches has been an social issues. If we should encrypt the sensitive information in order to protect the database, the leakage of the personal sensitive data will be reduced for sure. In this paper, we analyzed the existing protection algorithms to protect the personal sensitive data and proposed the combined method using the bucket index method and the bloom filters. Bucket index method applied on tuples data encryption method is the most widely used algorithm. But this method has the disadvantages of the data exposure because of the bucket index value presented. So we proposed the combined data encryption method using bucket index and the bloom filter. Features of the proposed scheme are the improved search performance of data as well as the protection of the data exposure.

Design of MIR Security System in Mobile Environment (모바일 환경에서의 MIR 시큐리티 시스템에 관한 연구)

  • Kim, Seok-Soo;Ha, Kyung-Jae;Han, Kun-Hee
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.25-32
    • /
    • 2006
  • MIR system is a nationwide medical record information system that makes medical information available to any hospital and health institution at any time, and information in the system mostly requires high security. In particular, personal information related to patients and doctors, medical technology information and each hospital's digital information are used very frequently and are likely to be modified for illegal use. Thus we need to develop a system equipped with security measures to prevent information leakage while providing medical information service effectively.

  • PDF

A Study on the Function Development of Security System Using USB (USB를 활용한 보안 시스템 기능개발에 관한 연구)

  • Bak, Ji ye;Lee, Deok Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.472-474
    • /
    • 2020
  • in order to minimize damage from increasing personal information leakage and cyber risks, a new authentication system plan was devised that can be used in combination with existing authentication methods for the purpose of improving security. A more closed and extreme authentication method was established by installing a self-made security module using USB that can be easily utilized, enabling only individuals with registered USB to freely use information.

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs (개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업 및 소상공인을 중심으로)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.911-918
    • /
    • 2014
  • Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.

Development of an Integrated Quarantine System Using Thermographic Cameras (열화상 카메라를 이용한 통합 방역 시스템 개발)

  • Jung, Bum-Jin;Lee, Jung-Im;Seo, Gwang-Deok;Jeong, Kyung-Ok
    • Journal of the Korea Safety Management & Science
    • /
    • v.24 no.1
    • /
    • pp.31-38
    • /
    • 2022
  • The most common symptoms of COVID-19 are high fever, cough, headache, and fever. These symptoms may vary from person to person, but checking for "fever" is the government's most basic measure. To confirm this, many facilities use thermographic cameras. Since the previously developed thermographic camera measures body temperature one by one, it takes a lot of time to measure body temperature in places where many people enter and exit, such as multi-use facilities. In order to prevent malfunctions and errors and to prevent sensitive personal information collection, this research team attempted to develop a facial recognition thermographic camera. The purpose of this study is to compensate for the shortcomings of existing thermographic cameras with disaster safety IoT integrated solution products and to provide quarantine systems using advanced facial recognition technologies. In addition, the captured image information should be protected as personal sensitive information, and a recent leak to China occurred. In order to prevent another case of personal information leakage, it is urgent to develop a thermographic camera that reflects this part. The thermal imaging camera system based on facial recognition technology developed in this study received two patents and one application as of January 2022. In the COVID-19 infectious disease disaster, 'quarantine' is an essential element that must be done at the preventive stage. Therefore, we hope that this development will be useful in the quarantine management field.

Effective Evaluation about the Antivirus Solution for Smart Phone

  • Shin, Suk-Jo;Kim, Seon-Joo;Jiang, Chun-Yan;Jo, In-Jun
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.695-700
    • /
    • 2011
  • Smartphone has formed a new market and introduced a new environment. They have an operating system like PCs, enabling free installation and removal of application programs. As the number of Smartphone users is increasing, more personal information is also exposed to malicious codes. There are problem of modification and deletion of files, battery consumption, and information leakage due to malicious codes. As the needs of Smartphone antivirus solutions are increasing, the antivirus solutions should be evaluated with quality characteristics. In this paper, we propose an effective evaluation method for functionality and performance of Smartphone antivirus solutions, and the best practices for evaluation.

A proposal of preventing the leakage of personal information from public institution information system using blockchain (블록체인을 활용한 공공기관 정보시스템에서의 개인 정보 유출 방지 시스템 제안)

  • Choi, Seung-Joo;Park, Jae-hoon;Seo, HwaJeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.146-149
    • /
    • 2020
  • 보건 복지부, 병원, 동사무소 등의 공공기관에서는 업무 처리를 위해 사람들의 주민등록번호, 연락처, 주소 등 수많은 개인정보를 업무 처리를 위해 각 기관마다 사용하는 정보 시스템을 통해 다룬다. 그런데 이러한 정보 시스템을 통한 내부 정보 유출 사건이 지속적으로 발생하고 있다. 이와 같이 유출된 정보는 단순 유출자의 호기심으로 끝나기도 하지만 다른 영리 기관들에 팔려 악용되기도 한다. 이에 본 논문은 정보 시스템을 통한 개인 정보 유출을 방지하기 위해 블록체인을 활용한 시스템을 제안한다.

A Study of Detection Measures about the Personal Information Leakage through Scenario-Based Integrated Security Log Analysis (시나리오 기반의 통합 보안 로그 분석을 통한 개인정보 유출 탐지 방안 연구)

  • Ryu, Seung-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.354-357
    • /
    • 2015
  • 최근 정보기술의 발달로 기업의 비즈니스 모델이 아날로그에서 디지털로 전환되고 있다. 기업에서는 다양한 서비스 제공을 위해 고객의 개인정보를 수집하고 있으며, 이러한 정보는 보안 위협의 대상이 되고 있다. 대다수 기업에서는 다양한 분야의 보안 솔루션이 구축 운용되고 있으나, 솔루션 개발사들의 서로 다른 보안 로그들로 인해 통합 분석에 어려움을 겪고 있으며 이로 인해 보안 모니터링 업무 효율이 낮아지는 문제점을 안고 있다. 본 연구에서는 시간적 연관성을 기반으로 통합 보안 로그를 분석 하고 시나리오화 하여 좀 더 빠르고 정확한 개인정보 유출의 이상징후를 탐지할 수 있는 방안을 제안한다.