• Title/Summary/Keyword: information Protection

Search Result 4,492, Processing Time 0.031 seconds

A Preliminary Study on State Responsibility for Establishment and Protection of Information and Telecommunication Infrastructure in COVID-19 Pandemic (코로나19 사태에서 국가의 정보통신기반 구축·보호 책임에 대한 시론적 고찰)

  • Park, Sangdon
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.49-54
    • /
    • 2020
  • COVID-19 pandemic is an opportunity to recognize the necessity of information and telecommunications infrastructure which is base of information and telecommunication. This paper discusses the importance of information and telecommunications infrastructure in COVID-19 pandemic and overview proper institutional measures to fulfill state responsibility for establishment and protection of the infrastructure through documentary survey and normative study with juristic consideration. Information and telecommunications infrastructure has critical functions to respond to the pandemic and is one of the key to make digital transformation. A state is responsible for establishment and protection of Information and telecommunications infrastructure. Institutional measures have significance for the state responsibility and they are formed by not only statute but also constitution with making state object provision for establishment and protection of Information and telecommunications infrastructure. This paper shows premise and direction of further studies on related individual legislation.

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.

Protection Profile for Smart Meters: Vulnerability and Security Requirements Analysis (스마트미터의 취약성/보안요구사항 분석 CC v3.1 기반 보호프로파일 개발)

  • Jung, Chul-Jo;Eun, Sun-Ki;Choi, Jin-Ho;Oh, Soo-Hyun;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.111-125
    • /
    • 2010
  • There is a growing interest in "smart grid" technology, especially after the government recently announced "low-carbon green-growth industry" project. A smart grid uses "smart meters", which can be deployed in any power-consuming places like homes and factories. It has been shown that smart meters have several security weaknesses. There is, however, no protection profile available for smart meters, which means that safety with using them is not guaranteed at all. This paper analyzes vulnerabilities of smart meters and the relevant attack methods, thereby deriving the security functions and requirements for smart meters. Finally, we propose a protection profile based on Common Criterion v3.l for smart meters.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

Protection Effects According to the Conditions of Installations of SPDs for Information-Oriented Equipments (정보화 기기용 SPD의 설치조건에 따른 보호효과)

  • Lee, Bok-Hee;Lee, Dong-Moon;Cheong, Dong-Chul;Lee, Su-Bong;Lee, Seung-Chil
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.1
    • /
    • pp.35-41
    • /
    • 2007
  • Recently, there are increasing social needs for stable supply of electric power and securing high quality of information and communication services. In this work, to propose the effective protection countermeasures of information-oriented equipments against lightning surges, the protection effects of surge protective devices(SPDs) were experimentally investigated using actual-sized test circuits in various installation conditions. As a result, it was found that the protection effect of SPDs is quite different depending on the factors, such as the grounding system of power source, numbers of branch circuits, wiring method of grounding leads, and etc. In case of installing SPDs for information-oriented equipments, including all electric power lines and communication lines, the common grounding should be the most effective. Wiring method containing grounding leads with power lines in metal conduit is suitable to improve the surge cutoff performance of SPDs.

The Application for the Protection System of Location-based Information on a Smart-phone Environment (스마트폰 환경에서 개인위치정보 보호시스템 응용방안)

  • Kim, In-Jai;Choi, Jae-Won;Kim, Woon-Yoeng
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.129-147
    • /
    • 2012
  • In this paper, we research on the personal information protection system in smart-phone based on mobile environment. This paper proposes the enhanced personal location privacy mechanism in location-based service environment of a smart phone operating system(iOS, Android) for the relevant regulations on location-based protection and utilization. Also, the result verified that possibility on a self-control mechanism of the personal information protection system's subject in the window platform throughout the experiment. Therefore, this study have drew a method that user positively can cope with a protection of personal location information by having a user's self-control method in the system under development or done by illegal location-based service providers and illegal application developer.

Linear Unequal Error Protection Codes based on Terminated Convolutional Codes

  • Bredtmann, Oliver;Czylwik, Andreas
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2015
  • Convolutional codes which are terminated by direct truncation (DT) and zero tail termination provide unequal error protection. When DT terminated convolutional codes are used to encode short messages, they have interesting error protection properties. Such codes match the significance of the output bits of common quantizers and therefore lead to a low mean square error (MSE) when they are used to encode quantizer outputs which are transmitted via a noisy digital communication system. A code construction method that allows adapting the code to the channel is introduced, which is based on time-varying convolutional codes. We can show by simulations that DT terminated convolutional codes lead to a lower MSE than standard block codes for all channel conditions. Furthermore, we develop an MSE approximation which is based on an upper bound on the error probability per information bit. By means of this MSE approximation, we compare the convolutional codes to linear unequal error protection code construction methods from the literature for code dimensions which are relevant in analog to digital conversion systems. In numerous situations, the DT terminated convolutional codes have the lowest MSE among all codes.

A Study of Patentability on the paper in Traditional Korea Medicine by using technology information search to detect all existing similar patents (선행기술 조사를 통한 한의학 논문의 특허성 연구)

  • Song, Mi-Young;Lee, Joung-Hwa;Ahn, Sang-Woo
    • Korean Journal of Oriental Medicine
    • /
    • v.11 no.2
    • /
    • pp.53-66
    • /
    • 2005
  • This study is concerned with the patentability and protection of intellectual property rights in Traditional Korea Medicine Paper. The results analyzed significance of patentability by investigated for many kinds of Traditional Korea Medicine Paper. It provide extension of intellectual property rights protection and further research region of TKM field by analysing information of patentability. Recently, In the protection of intellectual property rights, the importance of traditional knowledge resource in many country is increased. It will predict the number of apply for the patent increased annually This study will be provide judging guideline and strategy of intellectual property rights protection by search to detect all existing similar patents in Patent Office (Korea, Japan, U.S.A. EPO) about Traditional Korea Medicine Paper. As a result, It can not be investigated about 33% because of paper research or theoretical study or question investigation etc. But the case of 'The Korea Association of Herbology' and 'The Korean Oriental Medical Ophthalmology & Otolaryngology & Dematology Society' have about 10% rate. If it will be constructed DB system, they will be protected by national treatment.

  • PDF