• Title/Summary/Keyword: Theft

Search Result 273, Processing Time 0.027 seconds

Smartphone-based OTP Door Lock System (스마트폰 기반의 OTP 도어락 시스템)

  • Kim, Jin-Bae;Oh, Chang-Seok;Jeong, Si-Yeong;Jeong, Sang-Heon;Kim, Tae Yong;Jang, Won-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.560-563
    • /
    • 2015
  • Door lock system is used for the conventional method by using a key or a card, a pad Replication, loss, and the risk of damage, and has a problem that exposure to others. In this paper, Bluetooth communication and OTP built into smartphones in order to complement the existing door lock system problems OTP(One-Time-Password), Hide-Key utilizing the authentication method and the Arduino smartphone-based design of wireless OTP door lock system by enabling users it allows for more convenient and safe life free from the risk of theft and robbery.

  • PDF

PEC: A Privacy-Preserving Emergency Call Scheme for Mobile Healthcare Social Networks

  • Liang, Xiaohui;Lu, Rongxing;Chen, Le;Lin, Xiaodong;Shen, Xuemin (Sherman)
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.102-112
    • /
    • 2011
  • In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA) of the patient runs the PEC to collect the emergency data including emergency location, patient health record, as well as patient physiological condition. The PEC then generates an emergency call with the emergency data inside and epidemically disseminates it to every user in the patient's neighborhood. If a physician happens to be nearby, the PEC ensures the time used to notify the physician of the emergency is the shortest. We show via theoretical analysis that the PEC is able to provide fine-grained access control on the emergency data, where the access policy is set by patients themselves. Moreover, the PEC can withstandmultiple types of attacks, such as identity theft attack, forgery attack, and collusion attack. We also devise an effective revocation mechanism to make the revocable PEC (rPEC) resistant to inside attacks. In addition, we demonstrate via simulation that the PEC can significantly reduce the response time of emergency care in MHSNs.

Study on Improved Detection Rule Formation via Information Leakage Malware Analysis (정보유출 악성코드 분석을 통한 개선된 탐지 규칙 제작 연구)

  • Park, Won-Hyung;Yang, Kyeong-Cheol;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2008
  • Not only the recent hacking techniques are becoming more malicious with the sophisticated technology but also its consequences are bringing more damages as the broadband Internet is growing rapidly. These may include invasion of information leakage, or identity theft over the internet. Its intent is very destructive which can result in invasion of information leakage, hacking, one of the most disturbing problems on the net. This thesis describes the technology of how you can effectively analyze and detect these kind of E-Mail malicious codes. This research explains how we can cope with malicious code more efficiently by detection method.

  • PDF

A Study on the Application of Block Chain Ethereum Technology to Activate Digital Contents Trading as Sharing economy - data encryption and modify merkle tree-

  • Min, Youn-a;Baek, Yeong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.73-80
    • /
    • 2018
  • The shared economy began with the concept of sharing the physical and intellectual assets of individuals with others. Nowadays, the concept of shared economy is becoming one of the industries as an enterprise type. Especially, with the development of the Internet and smart devices, various forms of shared economy have been developed in accordance with the need of sharing of individual income. Digital content is also a shareable commodity and it is seeking to utilize it as an item of shared economy. Accordingly, when digital contents are used as a shared economy, there are various possible threats -security threats that may arise in the course of transactions, potential for theft, alteration and hacking of contents. In this paper, we propose transaction method and content protection method using block chain-ethereum technology to reduce security threats and transparent transactions that can occur in digital contents transactions. Through the proposed method, the trust of the consumer and the supplier can be measured and the encryption can be performed considering the characteristics of the data to be traded. Through this paper, it is possible to increase the transparency of smart transaction of digital contents and to reduce the risk of content distortion, hacking, etc.

Study on Consumer Problems Related to Use of Online Game Services by Type and Age (온라인게임 서비스 이용 소비자의 연령별.유형별 소비자문제 연구)

  • Choi, Eun-Sill
    • Journal of Family Resource Management and Policy Review
    • /
    • v.10 no.3
    • /
    • pp.23-43
    • /
    • 2006
  • The purpose of this study is to identify the types of consumer problems involving the use of online game services in Korea. This study analyzed the consumer damage cases by age and type that were reported to the Korea Consumer Protection Board (KCPB). The results of this study are as follows: The online game complaints varied by age. In the case of children, most complaints involved phone charging online game fees without parents' consent. There were similarities in the victimization of teens and children according to reason for complaint, handling result and type of damage. However, based on method of charging, mobile phone and credit card payments were causes in the case of teen victimization. Meanwhile, complaints among adults showed more complexity than the previous two groups such as cases relating to online game companies illegally seizing game items and game accounts, and charging fees for unused services caused by identity theft. By type of charging method, most complaints involved phone and mobile phone payments. According to the analysis result of online game victims, the monetary damage of consumers did not differ among socio-demographic variables such as age, residence, gender and occupation but there was difference in the method of charging. In the handling period, differences could be seen by age, year, gender and type of damage.

  • PDF

Asset Localization in Wireless Sensor Networks

  • Jo, Jung-Hee;Kim, Kwang-Soo;Kim, Sun-Joong
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.5
    • /
    • pp.465-471
    • /
    • 2007
  • Many hospitals have been considering new technology such as wireless sensor network(WSN). The technology can be used to track the location of medical devices needed for inspections or repairs, and it can also be used to detect of a theft of an asset. In an asset-tracking system using WSN, acquiring the location of moving sensor nodes inherently introduces uncertainty in location determination. In fact, the sensor nodes attached to an asset are prone to failure from lack of energy or from physical destruction. Therefore, even if the asset is located within the predetermined area, the asset-tracking application could "misunderstand" that an asset has escaped from the area. This paper classifies the causes of such unexpected situations into the following five cases: 1) an asset has actually escaped from a predetermined area; 2) a sensor node was broken; 3) the battery for the sensor node was totally discharged; 4) an asset went into a shadow area; 5) a sensor node was stolen. We implemented and installed our asset-tracking system in a hospital and continuously monitored the status of assets such as ventilators, syringe pumps, wheel chairs and IV poles. Based on this real experience, we suggest how to differentiate each case of location uncertainty and propose possible solutions to prevent them.

API Similarity Comparison Tool Development for Detecting Theft of Android Application (안드로이드 앱 도용 탐지를 위한 API 유사도 비교 도구 구현)

  • Choi, Sung-Ha;Lee, Hyun-Young;Cho, Seung-Min;Park, Heewan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.792-795
    • /
    • 2012
  • 최근 오픈 소스 커뮤니티가 활성화되고 수많은 오픈 소스들이 공개되고 있어서 많은 개발자들이 오픈 소스를 활용하고 있다. 그러나 오픈 소스도 정해진 라이선스 기반으로 공개되므로 오픈 소스를 사용할 때는 반드시 라이선스를 확인해야 한다. 본 논문에서는 안드로이드 앱의 라이선스 위반이나 코드 도용을 확인할 수 있는 방법으로서 안드로이드 앱 사이의 API 메소드 호출 유사도를 측정하는 방법을 제안한다. 원본 프로그램과 도용된 프로그램은 유사한 API 메소드를 사용할 것임을 예상할 수 있기 때문에 API 메소드 호출이 유사한 것을 확인하면 간접적으로 코드 도용을 확인할 수 있다. 본 논문에서 개발한 API 유사도 측정 도구는 안드로이드 앱의 소스 코드를 필요로 하지 않고, 안드로이드 달빅(Dalvik) 바이트 코드로부터 직접 API 호출 명령어를 분석하여 유사도를 측정한다는 특징이 있다. 본 논문에서 구현한 도구의 평가를 위해서 API 호출 유사도 비교 실험을 수행하였다. 그 결과, 실제로 API 호출 유사도가 높았던 두 앱이 서로 공통된 모듈을 포함하고 있음을 밝혀내었다. 그리고 선행 연구에서 제안했었던 안드로이드 달빅 코드 전체에 대한 유사도 비교 도구보다 비교 속도가 35% 정도 향상된 것을 확인하였다.

Knowing the Level of Information Security Awareness in the Usage of Social Media Among Female Secondary School Students in Eastern Makkah Al-Mukarramah- Saudi Arabia

  • Gharieb, Magdah Ezat
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.360-368
    • /
    • 2021
  • This study aims at knowing both the level of information security awareness in the use of social media among female secondary school students in Makkah Al-Mukarramah, and the procedures that students follow when exposed to hacking or other security problems. The study relied on the descriptive survey approach. The results showed a high percentage of social media use among the study sample, and the most used applications by the students are snapchat and Instagram applications successively. In fact, 48% of the study sample have awareness of information security, the majority of the students memorize the password in the devices, most of them do not change them, and they have knowledge of fake gates and social engineering. However, their knowledge of electronic hacking is weak, and students do not share passwords with anyone at a rate of 67%. At the same time, they do not update passwords. Moreover, most of the procedures followed by students when exposed to theft and hacking is to change the e-mail data and the password, and the results varied apart from that, which reflects the weak awareness of the students and the weakness of procedures related to information security. The study recommends the necessity to raise awareness and education of the importance of information security and safety, especially in light of what the world faces from data electronic attacks and hackings of electronic applications.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

A Study on the Current Status of the Use of Bike Parking Lots in Apartments - For the Apartments with Bike Parking Lots in Gwangju Metropolitan City - (아파트 자전거 주차장 이용실태에 관한 조사 연구 - 광주광역시 자전거 주차장 설치 아파트를 대상으로 -)

  • Kim, Yun-Hag;Park, Sung-Jin
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.21 no.2
    • /
    • pp.43-51
    • /
    • 2019
  • The purpose of this study was to examine the current status of the use of bike parking lots in apartment complexes located in Gwangju Metropolitan City. The results were as follows. While common respondents answered the use of a bike for leisure or health, relatively few respondents answered a means of transportation such as going to school or work. It suggests that systematic plans to expand the range of using a bike should be made such as the connection of an apartment complex with a bike road. The common places to keep bikes were the entrance, the inside of the house, or stairs rather than bike parking lots because of safety problems such as theft or damage. In this regard, it is necessary to prepare clear regulation guidances to complement the safety problems of bike parking lots such as CCTV installation in the parking lots or compulsory installation of night lighting. Based on the findings, the methods to improve a bike parking lot should consider safety solutions and the complement of locations or keeping types. To activate the use of a bike, it is necessary to improve facilities to help residents' use of bike parking lots and expand their size in the future and examine the design of bike racks.