• Title/Summary/Keyword: custody

Search Result 102, Processing Time 0.027 seconds

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

The Table Design Reconstructing in the Chosun Dynasty Haejuban (조선조 해주반의 이미지를 재해석한 테이블디자인)

  • Lee, Sang Il;Kim, Myeong Tae
    • Journal of the Korea Furniture Society
    • /
    • v.24 no.1
    • /
    • pp.15-23
    • /
    • 2013
  • The form of the furniture developed variously according to the flow of the time. The Soban used in the modern living space is used as a decoration. but the furniture has to be used according to the form of the modern life and residential space. The furniture is the medium interacting with the surrounding environment in the residential space. I reconstruct the splendid fanciness of the pattern of the Haejuban and nature of structure and apply to the table design. The table gave the change of the form in order to be suitable for the residential space. and it raised the efficiency of the convenient of the custody and space utilization.

  • PDF

고려의 관학과 효경

  • 전준우
    • Journal of Korean Library and Information Science Society
    • /
    • v.3
    • /
    • pp.79-88
    • /
    • 1976
  • In Ecorea Lrynasty, the authority all officers a compulsary obligatic.~ to learn the Nyo-I~.'z~\ulcorneruzngd er the custody of a super1 iscr o; Letters wino -1 a\ulcorner the ~ejponsible officer to train ci~ril senants. The Nyo-Kjli ilg was possible to interpret the pious love of ci I illans to the~re lders as a mutual ethics between the parental ber~ec;~lc nce and the filial piety of inferiors which n-as far superior to the traditional cthic; that was laid on an firm obligation of inieri~rs to tEei:- elders. The filial piety as a lovc for elders mean2 a mutual harrn~n:a~n d show\ulcorner a berieiolent conduct as an influence of a political morality. Thc heaer-o!erLt conduct was developed as a political morality of Confucius originated from the filial piety of Confucius based on a moral policj . Such a kenerolent conduct is to become a main spring to effect a mutual tie betn-een the king and his people as a national system of the Confucian theory. In i*

  • PDF

Comparison of Fear and Prevention Behavior on Accident between Mother and Teacher in Family Childcare Center (어머니와 가정보육시설 보육교사의 안전사고에 대한 두려움과 안전 예방 행동에 대한 비교 연구)

  • Kim, Hye-Gum
    • Journal of the Korean Home Economics Association
    • /
    • v.48 no.3
    • /
    • pp.43-53
    • /
    • 2010
  • This study aimed to compare fear and prevention behaviors on accidents between mothers and teachers in family childcare centers. The participants were 117 mothers whose children were 0~2 year-olds and 121 teachers. Based on Hendrickson(2008) and Reichert & Henricks(1996), the scale was developed by the researcher, and it was composed of fear and prevention behaviors on accident. The data were analyzed using descriptive statistics and $x^2$ analysis. Results showed that mothers feared fall accidents and step-on-accidents while teachers feared suffocation accidents and liability for injury medical fee. Also, mothers did more prevention behaviors on use of car seats than teachers, whereas teachers did more behaviors on walk safety, custody of drugs and dangerous articles, and food safety.

- Technology and Tasks of Computer Forensics for Suppressing Computer Crime - (범죄 억제를 위한 컴퓨터 포렌식의 기술과 과제)

  • Lee Sang Rak;Shin Seung Ho;Park Sang Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.3
    • /
    • pp.327-337
    • /
    • 2004
  • The soaring increase in the number of Internet users combined with the constant computerization of business process has created new opportunities for computer criminals and terrorist. Fortunately, the computer security field is also progressing at a brisk rate. In particular, the field of computer forensics brings new ways of preserving and analyzing evidence related to computer crime. Computer forensics is a new emerging professions of the 21st century. It is the collection, preservation, analysis, and presentation of computer related evidence. For this reason, the various technology of computer forensics is regarded as a powerful tool for suppressing computer crime. Our aims is to introduce the overview of computer forensics technology. We also present the survey results of the state of the art of computer forensics in the domestics and of foreign country.

The Introduction of the Trim & List Sensor and Confirm of the Sensor Location (Trim & List Sensor의 소개와 설치위치 확정)

  • Song, Young-Seung;Park, Kyeng-Ryong;Nam, Sung-Il
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2008.09a
    • /
    • pp.33-37
    • /
    • 2008
  • The evidence of the Cargo tank volume is very important between Buyer and Seller for agreement each other for LNG Ship. CTS(Custody Transfer System) Radar type level gauging sensor to be measured for cargo volume. The data of Trim & List sensor to be compensated for measuring data which is original data of the CTS sensor. The latest days, the Buyer would have posed a problem both the location and the accuracy of trim/list sensor specially neared final stage of the ship's delivery. So, we would like to report the introducing to the trim/list sensor and the confirmation of actual location for the trim/list sensor.

  • PDF

A Study on the GSCM Strategy and Business Performance - Focus on DOOLEE VISION Case - (GSCM전략과 사업성과에 관한 연구 -두리비전 사례를 중심으로-)

  • Kim, Chang-Bong
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.325-336
    • /
    • 2006
  • This paper examines the global supply chain management strategy and business performance of Doolee Vision Co. Ltd.. Based on the analysis of eighty-seven cases, the following results were found. First, it was found that just-in-time of GSCM strategy of firm have a positive influences on the business performance in transformation sector. Second, just-in-time of GSCM strategy of firm have a positive influences on the business performance in custody sector. Third, just-in-time of GSCM strategy of firm have a positive influences on the business performance in order response and support sector. Forth, just-in-time of GSCM strategy of firm have a positive influences on the business performance in customs sector. Fifth, just-in-time of GSCM strategy of firm have a positive influences on the business performance in customer service sector. However, several limitations, such as measurement for intra-industry homogeneity, measurement for flexibility of global supply chain management strategy, and measurement for business performance of global supply chain management, that make the preceding conclusions be considered preliminary.

  • PDF

Performance Improvement of Fan and Duct System for Kimchi Refrigerator (김치 냉장고용 홴 및 덕트 시스템 성능 개선)

  • Kim, Joon-Hyung;Choi, Young-Seok;Yoon, Joon-Yong;Park, Sung-Kwan;Hyun, Seok-Ho
    • The KSFM Journal of Fluid Machinery
    • /
    • v.14 no.4
    • /
    • pp.45-51
    • /
    • 2011
  • The kimchi refrigerator is the electronic home appliance which is used for the maturing and a custody of the kimchi. In this paper, performance improvement of fan and duct system for kimchi refrigerator has been studied by using a commercial CFD code. In order to achieve a improved fan performance, three-dimensional computational fluid dynamics and the Design of Experiments method have been applied. Additionally, to know the optimized duct inlet shape with the optimized fan, the overall performances were calculated with various duct inlet shapes. The final fan and duct system for kimchi refrigerator showed improved performance in efficiency and total head compared with the existing model.

디지털증거 확보체계

  • Lee, Insoo
    • Review of KIISC
    • /
    • v.26 no.5
    • /
    • pp.37-43
    • /
    • 2016
  • 정보저장매체에 저장된 디지털정보로부터 범죄 단서를 찾고, 법정에 증거로 제출하기 위한 일련의 활동을 일컫는 디지털 포렌식의 개념과 기법이 국내 수사기관에 도입되어 활용된 지 10여년의 시간이 흘렀다. 그러나 디지털증거라는 새로운 개념의 탄생은 최근까지 정보의 압수대상 여부 논란 등 수사실무에서의 혼란을 초래하고 있다. 기존 증거와 구별되는 디지털정보의 특성으로 말미암아 증거로 활용함에 있어 필요한 별도의 절차적 기술적 조건이 요구되고 있으나, 과거 규정과 지침만으로는 디지털증거를 취급함에 있어 해석, 처리의 혼선을 가져 왔으며, 아직 명확하고 구체적인 실무 지침과 규정은 마련되지 못하고 있는 실정이다. 디지털증거 확보체계는 이러한 혼선을 최소화하기 위해 디지털증거의 증거능력 유지를 위해 필요한 최소한의 요건을 정의하고, 이를 바탕으로 법정 제출시까지 동일성, 무결성과 이를 증명하기 위한 보관연속성(Chain of Custody) 등을 유지 관리하기 위해 수사기관간에 구축하고 있는 인프라 시스템이다. 본 고에서는 수사기관간의 디지털정보, 디지털증거 처리, 유통, 취급에 있어 문제점을 살펴보고, 이를 보완 개선하기 위한 그간의 노력과 향후 발전방향에 대해 고찰해 보고자 한다.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.