• Title/Summary/Keyword: personal credit information

Search Result 91, Processing Time 0.028 seconds

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

A Personal Memex System Using Uniform Representation of the Data from Various Devices (다양한 기기로부터의 데이터 단일 표현을 통한 개인 미멕스 시스템)

  • Min, Young-Kun;Lee, Bog-Ju
    • The KIPS Transactions:PartB
    • /
    • v.16B no.4
    • /
    • pp.309-318
    • /
    • 2009
  • The researches on the system that automatically records and retrieves one's everyday life is relatively actively worked recently. These systems, called personal memex or life log, usually entail dedicated devices such as SenseCam in MyLifeBits project. This research paid attention to the digital devices such as mobile phones, credit cards, and digital camera that people use everyday. The system enables a person to store everyday life systematically that are saved in the devices or the deviced-related web pages (e.g., phone records in the cellular phone company) and to refer this quickly later. The data collection agent in the proposed system, called MyMemex, collects the personal life log "web data" using the web services that the web sites provide and stores the web data into the server. The "file data" stored in the off-line digital devices are also loaded into the server. Each of the file data or web data is viewed as a memex event that can be described by 4W1H form. The different types of data in different services are transformed into the memex event data in 4W1H form. The memex event ontology is used in this transform. Users can sign in to the web server of this service to view their life logs in the chronological manner. Users can also search the life logs using keywords. Moreover, the life logs can be viewed as a diary or story style by converting the memex events to sentences. The related memex events are grouped to be displayed as an "episode" by a heuristic identification method. A result with high accuracy has been obtained by the experiment for the episode identification using the real life log data of one of the authors.

Effects of MyData Service Attributes on Intention to Use (마이데이터 서비스 속성이 이용의도에 미치는 영향)

  • Kim, Soo-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.271-278
    • /
    • 2022
  • MyData service integrates and manages user's personal data such as finance, credit, etc, and is expected to provide useful information to the user as personal data in various fields are gradually integrated. Discovering factors that affect the intention to use of MyData service is a very important topic for understanding that service. To this end, in this study, the attributes of the MyData service were derived, and the derived service attributes were grouped together by using factor analysis. As a result, we found four factors such as "convenience", "usefulness", "security", and "control". After that, we established our research model to analyze the causal relationship between these four factors and the intention to use of MyData service. According to the analysis results, among the factors of the MyData service attribute, "convenience", "usefulness", and "control" had a significant effect, and "security" did not have a significant effect. In particular, it was confirmed that "control" had the greatest influence on the intention to use. This study suggests that MyData service provider need to make users recognize they are controlling their data and develop services that provide various benefits to users.

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

Activation of Health Care Big Data (헬스케어 분야에서의 빅데이터 활용 활성화 방안)

  • Moon, Ja-hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.483-486
    • /
    • 2021
  • With the explosive increase in data, the 'big data era' has arrived, focusing on deriving new values and insights through data. With the development of data analysis technology, the importance of data analysis and utilization in the field of diagnosis and treatment as well as prevention is expanding, while the use of big data is emerging in the healthcare field. Moreover, as the three data-related laws (Personal Information Protection Act, Information and Communication Network Act, and Credit Information Act) were passed in January 2020, it became possible to use a wide range of big data through pseudonym information. However, the use of healthcare big data is still struggling due to various policies and regulations, inconsistent data quality, and the absence of specialized personnel. Therefore, in this study, examines the current state of use of big data in the healthcare field, and analyzes the challenges, overseas cases, plans, and expected effects for activation of healthcare big data.

  • PDF

A Study on Deep Learning Model for Discrimination of Illegal Financial Advertisements on the Internet

  • Kil-Sang Yoo; Jin-Hee Jang;Seong-Ju Kim;Kwang-Yong Gim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.21-30
    • /
    • 2023
  • The study proposes a model that utilizes Python-based deep learning text classification techniques to detect the legality of illegal financial advertising posts on the internet. These posts aim to promote unlawful financial activities, including the trading of bank accounts, credit card fraud, cashing out through mobile payments, and the sale of personal credit information. Despite the efforts of financial regulatory authorities, the prevalence of illegal financial activities persists. By applying this proposed model, the intention is to aid in identifying and detecting illicit content in internet-based illegal financial advertisining, thus contributing to the ongoing efforts to combat such activities. The study utilizes convolutional neural networks(CNN) and recurrent neural networks(RNN, LSTM, GRU), which are commonly used text classification techniques. The raw data for the model is based on manually confirmed regulatory judgments. By adjusting the hyperparameters of the Korean natural language processing and deep learning models, the study has achieved an optimized model with the best performance. This research holds significant meaning as it presents a deep learning model for discerning internet illegal financial advertising, which has not been previously explored. Additionally, with an accuracy range of 91.3% to 93.4% in a deep learning model, there is a hopeful anticipation for the practical application of this model in the task of detecting illicit financial advertisements, ultimately contributing to the eradication of such unlawful financial advertisements.

Analysis on Mobile Forensic of Smishing Hacking Attack (Smishing 사고에 대한 Mobile Forensic 분석)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2878-2884
    • /
    • 2014
  • The Smishing attacks are caused using smartphone since 2013. Smishing hacking attacks are increasing due to the approximately 104 million private information leakage incidents by the 3 domestic credit card companies occurred in January 2014. The Smishing attack occurred in conjunction with hacking illegal leakage of personal information and direct financial damage. In this paper, i am analyze real-world case studies in the lab and study accident on Smishing Mobile Forensic analysis. I am study of a real case Smishing hacking attacks. And studying evidence for a Mobile Forensic analysis of the technical principles of Smishing attacks. The study for the Mobile Forensic evidence proved the Smishing hacking attacks using Mobile Forensic technic and create Mobile Forensic reports. Through this paper, the research will be safe for the people living in the smartphone can be used safely and conveniently, with the development of Mobile Forensic technology, to study the extraction of Smishing accident evidences from the court.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

The Study on Service Model and Case Study of Internet Bank (인터넷 뱅킹의 사례분석을 통한 서비스모델 구현에 관한 연구)

  • Lee, Je-Hong
    • The Journal of Information Technology
    • /
    • v.5 no.3
    • /
    • pp.97-119
    • /
    • 2002
  • It is Study Service Model for Case Study of Internet Bank. With most major full service banks having launched transactional Internet banking, attention is shifting to the realities of managing the Internet channel as a profitable component of an overall delivery strategy. In addition to examining Case Study and Internet Bank Model. Services of Internet Banking available through the Internet are as follows. 1. credit card loans, personal loans. 2. high-yield financial products. 3. insurance products. 4. securities products. 5. Case study of Foreign Internet Banking(ING, BNP, HSNC, City Bank). The study reviewed fields, including financial services, customer service, Website formation and design, convenience of use and system safety, Internet Banking Model, and many related areas. Internet Banking earned high marks in most fields. This Study review focuses on the following: Understanding and meeting consumer expectations for us ability, site performance and functionality. Integrating the Internet channel into overall marketing, product delivery and customer service strategies. Strategies to increase customer satisfaction with Internet Banking and to attract new Internet bankers. therefore this study review activity model concretion of Internet Banking Model and Case Study.

  • PDF

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.