• Title/Summary/Keyword: infringement

Search Result 549, Processing Time 0.025 seconds

Design of a Privacy-based Confirmed Case Contact Notification System in the With-Corona Era (With-Corona 시대에 프라이버시 보호 기반의 확진자 접촉 여부 알림 시스템 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.138-143
    • /
    • 2021
  • As of this moment, we are tracing people who are closed contact with Covid-19 patients and trying to block the spread of Covid-19 through diagnostic tests. However, the incubation period of the confirmed case is two weeks, and it takes a lot of human resources, time, and money to trace the routes of the confirmed case. In particular, as the number of confirmed cases have been increasing, the cost for finding closed contacts and blocking them in advance exponentially have almost reached the limitation of the budget. In finding closed contacts, all citizens must record an electronic access list every time they visit an amenities such as a store or a restaurant. This is likely the invasion of the privacy of personal location information. In this study, we designed a system that keeps one's location in real time, it will download the movement information of the confirmed case which is collected by KDCA, and it will notify the user when there is an overlap. Moreover, then guide for diagnostic test in advance will be used. The proposed method can solve the difficulty of recording in an electronic access list when visiting a store, and it can block infringement of privacy without providing personal information from KDCA.

A Study on the Identification of Open Source License Compatibility Violations (오픈 소스 라이선스 양립성 위반 식별 기법 연구)

  • Lee, Dong-Gun;Seo, Yeong-Seok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.12
    • /
    • pp.451-460
    • /
    • 2018
  • Open source software is used in various ways when developing new softwares all around the world. It requires rights and responsibilities as a form of an open source software license. Because the license is a contract between original software developers of the open source software and users, we must follow it and extremely cautious to avoid copyright infringement. In particular, we must verify license compatibility when we develop new software using the existing open source softwares. However, license violation issues always occur and lead to lawsuits so that they are having an adverse effect on the open source software ecosystem. Thus, in this paper, we propose a method, OSLC-Vid, to identify license violations whether compatibility issues exist between open source softwares. The proposed method is verified by the experiments to detect actual license violation cases.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique (정적 분석 기반 기계학습 기법을 활용한 악성코드 식별 시스템 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.775-784
    • /
    • 2019
  • Malware infringement attacks are continuously increasing in various environments such as mobile, IOT, windows and mac due to the emergence of new and variant malware, and signature-based countermeasures have limitations in detection of malware. In addition, analytical performance is deteriorating due to obfuscation, packing, and anti-VM technique. In this paper, we propose a system that can detect malware based on machine learning by using similarity hashing-based pattern detection technique and static analysis after file classification according to packing. This enables more efficient detection because it utilizes both pattern-based detection, which is well-known malware detection, and machine learning-based detection technology, which is advantageous for detecting new and variant malware. The results of this study were obtained by detecting accuracy of 95.79% or more for benign sample files and malware sample files provided by the AI-based malware detection track of the Information Security R&D Data Challenge 2018 competition. In the future, it is expected that it will be possible to build a system that improves detection performance by applying a feature vector and a detection method to the characteristics of a packed file.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

A Study on Issues and Tasks of Humanity and Social Science in a Fourth Industrial Revolution Era (제4차 산업혁명시대 인문사회학적 쟁점과 과제에 관한 연구)

  • Kim, Jin-Young;Heo, Wan-Gyu
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.137-147
    • /
    • 2018
  • To prepare for and implement policies for the Fourth Industrial Revolution, which is characterized by convergence, super-connectivity, and AI, this study summarized the effects and characteristics of individual technologies on our society and discussed the issues with humanity and social science perspectives. As a result, in terms of AI technology, the issues of job losses, project-type works, basic income and robot taxes, accountability of AI, and algorithm inequality were dealt with. Security, cyber hacking and privacy infringement issues were highlighted in big-data technology. In the part of block-chain and bioengineering, the society of decentralization, the concentration, digital divide, and ethical issues were discussed. On-demand economic aspects highlighted the problems of civil ethics and human commercialization. Lastly, the development of VR is discussed including side effects such as cyber-syndrom, avoidance of reality, and so on.

Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement (PC보안 강화를 위한 기술적 취약점 진단항목 개선 연구)

  • Cho, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.1-7
    • /
    • 2019
  • There are various cyber attacks on business PCs. In order to reduce the threat of PC security, we are preventing the vulnerability from being diagnosed beforehand. However, this guideline is difficult to cope with because the domestic vulnerability guide does not update the diagnostic items. In this paper, we examine the cyber infringement cases of PCs and the diagnostic items of foreign technical vulnerabilities in order to cope with security threats. In addition, an improved guide is provided by comparing the differences in the diagnostic items of technical vulnerability from abroad and domestic. Through 41 proposed technical vulnerability improvement items, it was found that various security threats can be coped with. Currently, it is mainly able to respond to only known vulnerabilities, but we hope that applying this guideline will reduce unknown security threats.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

Copyright Issues to User-Contributed Content in Participatory Digital Archives (참여형 디지털 아카이브에서의 이용자기여콘텐츠에 관한 저작권 고찰)

  • Kim, Su-jin;Sinn, Donghee
    • The Korean Journal of Archival Studies
    • /
    • no.49
    • /
    • pp.5-49
    • /
    • 2016
  • This study investigates how participatory digital archives should handle user-contributed content in order to legitimately collect from and make available to users according to current copyright laws and related regulations. In doing so, this study surveys the current national and international copyright laws that would apply for digital contents in archives. It also reviews the existing literature that analyzes the understanding and interpretation of regulations and specific infringement cases. Then, it examines the cases of participatory digital archives as to how they deal with the copyright issues to user-contributed content and provide guidance to users in this respect. Based on such analysis, the study suggests a few methods of how digital archives acquire necessary rights for the user-contributed content being housed in archives and how they provide useful guidance to users about their rights and responsibilities. These methods include terms and conditions for contribution/service and essential elements in terms, contributor agreements and their details, and other user guidelines.