• Title/Summary/Keyword: Legal System for Information Security

Search Result 161, Processing Time 0.022 seconds

A Discriminating Mechanism of Suspected Copyright Infringement Video with Strong Distortion Resistance (왜곡 저항력이 강한 저작권 침해 영상 저작물 판별 기법)

  • Yu, Ho-jei;Kim, Chan-hee;Chung, A-yun;Oh, Soo-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.387-400
    • /
    • 2021
  • The increase in number of streaming platforms and contents thereof, owing to an advancement of cloud environment, has triggered the rapid proliferation of illegally replicated contents as well as legal contents. This necessitates the development of technology capable of discriminating the copyright infringement of various contents. The Korea Copyright Protection Agency operates a video content demonstration system using AI, but it has limitations on distortions such as resolution changes. In this paper, we propose the powerful mechanism using skeleton, which is resistant against distorted video contents and capable of discriminating copyright infringement of platforms streaming illegal video contents. The proposed mechanism exploits the calculation of Hamming distance to the original video by converting collected data into binary ones for the efficient calculation. As a result of the experiment, the proposed mechanism have demonstrated the discrimination of illegally replicated video contents with an accuracy of 94.79% and average magnitude of 215KB.

A Study on Decision Making for Blockchain-based IT Platform Selection for Security Token (블록체인 기반의 토큰 증권 IT 플랫폼 선택을 위한 의사결정 연구)

  • Soo-oh Yang;Byung Wan Suh
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.37-48
    • /
    • 2023
  • Since the announcement of the Financial Services Commission's 'Token Securities Issuance and Distribution System Improvement Plan' in February 2023, financial institutions, securities firms, and blockchain companies have been actively considering implementing IT platforms, but they are facing difficulties in selecting IT platforms for token securities because related legal regulations have not yet been clearly established. As a result, the need for rational and systematic criteria for the selection of blockchain-based token securities IT platforms has emerged, and this study explores and evaluates the key factors of token securities IT platform selection. Four factors were identified as the top-level factors, including 'maturity of the platform', 'operation and management of the platform', 'cost of introducing and maintaining the platform', and 'regulatory compliance for token securities', and 17 factors were identified as sub-level factors, including 'diversity', 'user authentication management', 'Adoption Costs', and 'financial regulations'. Among the 17 sub-factors, 'government financial regulation' and 'personal information protection' are selected as important factors, and the results of this study can help related organizations and financial companies make strategic decisions by providing systematic decision-making criteria for selecting token securities IT platforms.

  • PDF

An SMS Notarization System Using Smartphones (스마트폰을 활용한 SMS 공증 시스템)

  • Lee, Yunho
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.13-19
    • /
    • 2018
  • Although it's been nearly decade since the electronic notarization system enforced, the utilization is not high because of the troublesomeness of the client or his agent to visit the notarial office directly. Recently, the ministry of justice introduced e-notary based on audio-visual conference through amendament of the notarial law, and hence it will vitalize the usage of e-notary. In addition, due to the spread of smartphones, many people use SMS messages to express simple statements or promises. However, in case of legal disputes, the judgment of the court is different according to the case. The electronic notarization system can be used to prove of evidence of SMS messages, however, there is a hassle to convert SMS messages to electronic documents. To solve this problem, this paper proposes an SMS notarization system using smartphones. The proposed system uses reliable notarization server and it is divided into notarization system for message senders and notarization system for message receivers according to notary requestor.

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

Knowledge and Current Status about AED in the Public Facilities - Focused on the Gwangju City - (다중이용시설에서의 AED에 관한 지식 및 운영실태에 관한 연구 - 광주광역시 중심으로 -)

  • Park, Si-Goo;Park, Chang-Hyun;Chae, Min-Jung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.14 no.3
    • /
    • pp.13-28
    • /
    • 2010
  • Purpose: In this study, we investigated the better application of the law which is about the AED installation and more effective ways of emergency medical care system, to understand the law and to research the current condition of public facilities which belong to local governments, and to seize the aspect of safety guards who currently work in order to provide the installation of AED in the public facilities and to provide more efficient emergency medical service with the effectuation of the immunity law of the good intention of first-aid treatment. Methods: In Gwang-ju, 234 public facilities have been identified by 31 December, 2008. With the exception of the duplication, we researched 158 facilities and received the answers from 95 of them. Results: In the research, 53% of them have had internal emergency first-aid education, and 55% of them didn't have this education and a CPR education manual, and 30% of the facilities even didn't know how to connect with the manager of the company for the first-aid department. On the other hand, most of them were highly interested in CPR and AED education on the ratio of 91% and 93%. 88% of them have been trained about first-aid, 51% of them haven't been retrained, 17% have never been trained. so, the reality of emergency system at public facilities is serious. 78% of them knew they are working at public facilities, though 49% of them didn't know about AED installation. 57% of them didn't know the fact there is the immunity law related with good intentions for first-aid treatment. 63% of the facilities have security guards, and 30% of them didn't answer the questions. Also, many of them agreed to the opinion that all employees should have first-aid training. At representative survey report of participator of public-facility, emergency treatment is 61%, 16% of patients calling. Accordingly they importantly think better doing an on-site first-aid than evacuating the patient. And the rates show that 57% of them answerers tend to call Fire-Office(119) for evacuating the patients, and 28% of them EMIC(1339) for the first-aid. Conclusions: In this study, we are suggest to improve the details of the efficient operations and management after the grasp of the uninstallation, indifference, and unreliable conditions of AED. 1) Need a publicity of AED install cognition which is an emergency medical instrument at public facilities. 2) Arrangement of safety agents at facilities and concerns about them for good management from the parties concerned. 3) Need a designation of legal details according to the decision of the AED installation and the standard of the AED installation. 4) Training about first-aid of safety guards and the persons concerned in the facilities should be practiced participation with the positive and through this, first-aid treatment could be done by anyone who knows the immunity law related to medical emergency. 5) The brochures for the potential users and the results form practicing the instructions need to be improved in many ways through recording the emergency cases that have happened.

  • PDF

Sender Authentication Mechanism based on DomainKey with SMS for Spam Mail Sending Protection (대량 스팸메일 발송 방지를 위한 SMS 기반 DomainKey 방식의 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.20-29
    • /
    • 2007
  • Although E-mail system is considered as a most important communication media, 'Spam' is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Therefore advanced anti-spam techniques are required to basically reduce its transmission volume on sender mail server or MTA, etc. In this study, we propose a new sender authentication model with encryption function based on modified DomainKey with SMS for Spam mail protection. From the SMS message, we can get secret information used for verification of its real sender on e-mail message. And by distributing this secret information with SMS like out-of-band channel, we can also combine proposed modules with existing PGP scheme for secure e-mail generation and authentication steps. Proposed scheme provide enhanced authentication function and security on Spam mail protection function because it is a 'dual mode' authentication mechanism.

A Study on the Legislation Directions of FRAMEWORK ACT ON KOREA COAST GUARD(tentative name) ((가칭) 해양경찰기본법 입법방향에 관한 연구)

  • Son, Yeongtae
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.396-407
    • /
    • 2014
  • In 19th May 2014, the government announced that KCG(Korea Coast Guard) is dissolved regarding responsibility for recently accident which is Sewol ferry disaster. But KCG, a central administrative agency is responsible for protecting maritime sovereignty of South Korea; the most basic and indispensable organization. Furthermore, The purpose of KCG is to provide the safety of the public and keeping of public order by prescribing matters necessary for the securement of maritime security, maintenance of public order and protection of marine resources & facilities. Therefore, In this article, I would like to suggest tentatively named FRAMEWORK ACT ON KOREA COAST GUARD's management plan which could reflect the scope of functions. It means we examine the current state of KCG, and would like to signpost for the most ideal way of legal system in Korea Coast Guard. Finally, this treatise is expected that this research can be a guideline contribute to improving Korea Coast Guard relevant laws even a little.

A Study of Institutional Improvements for Responding to Electric Vehicle Fires: Focusing on the Case of Seoul (전기자동차 화재 대응을 위한 제도적 개선 방안 연구: 서울시 사례를 중심으로)

  • Nam-Kwun Park;Seung-Hee Ham
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.32-39
    • /
    • 2024
  • Purpose and Method: This study aims to suggest institutional improvements to enhance the response to electric vehicle fires. To this end, we examined the prevalence of electric vehicles, fires, and related legal systems in Seoul. Results: The top-level laws and ordinances related to electric vehicles are centered on distribution policies, so there is no practical fire response plan for electric vehicle fires. In order to apply the same regulations to each local government, it is necessary to set standards and establish a system for firefighting and safety facilities in higher laws. Conclusion: Establishing standards for the installation of fire and safety facilities that take into account the characteristics of electric vehicle fires and improving related systems will ultimately lead to an increase in the penetration rate of electric vehicles.

A Study on the Appropriate Management of Maritime Police Authority in Korea Coast Guard: Focusing on the Japan Coast Guard (해양경비안전본부의 해양경찰권 적정 운영방안에 관한 연구: -일본 해상보안청과의 비교를 중심으로-)

  • Son, Yeong-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.361-391
    • /
    • 2015
  • Regarding the [Government Organization Act; which is legislated on 19th November, 2014] Korea Coast Guard(KCG) has been re-organized and belong from Korea Coast Guard shall be established under the Minister of Oceans and Fisheries to Ministry of Public Safety and Security. Furthermore, National Police Agency(NPA) Commissioner has the right for administer duties concerning investigation and information by succession from Korea Coast Guard Commissioner. That means that main rule has been moved from prior KCG to Ministry of Public Safety and Security(MPSS) and NPA currently which is dual structure. Meanwhile, This kind of organization change has been effective to investigative agency which exert KCG's call of duty and causes needs of variety problems. In other words, There are quite huge changes such as KCG's reduction of their work, call of duty and re-organization regarding revised government organization act. However this change - including re-organization by government, was not able to take current MPSS's special features such as organization specialty and legal rights. It means, the current change has not been taken present law system CRIMINAL PROCEDURE LAW and there was no preparation to stable maritime police authority action as well. To sum up, this revised GOVERNMENT ORGANIZATION ACT is supposed to provide total, quick security service by establishing strong disasters and safety control tower. However they only contains few area such as organization revision regarding 'Sewol Ferry Disaster', they was not able to contain the other parts of Society. Therefore, in this article I would like to check the part of re-evaluation of current change made by KCC's organization revision. It is supposed to provide better legal stability by making clear of work area by government agencies who acts maritime police authority.

  • PDF