• Title/Summary/Keyword: preventing information leakage

Search Result 61, Processing Time 0.022 seconds

Duplicated Information and Connecting Information Method of Preventing the Leakage of Personal Information (주민등록번호 유출을 방지하는 Duplicated Information 과 Connecting Information 방법론)

  • Yang, Jung-Hoon;Lee, Heejo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.375-378
    • /
    • 2014
  • 본 논문은 인터넷에서 주민등록번호가 유출 또는 도용되고 있는 문제점을 해결하기 위해 인터넷 사업자에게 이용자의 중복가입을 확인할 수 있는 방법 DI(Duplicated Information) 와 사업자간 동일 사용자를 식별하는 방법 CI(Connecting Information)을 제안한다. 인터넷 사업자가 이용자의 인터넷 사이트에 중복으로 가입하는 것을 확인 할 수 있는 정보를 제공하기 위한 중복 가입확인 정보 메시지 형식 규정을 제안하고, 인터넷 사업자가 타 인터넷 사업자와 연계 정보, 포인트 적립 등 제휴 서비스를 제공하기 위해 동일 이용자를 식별 할 수 있도록 연계 정보 메시지 형식 규격을 제안한다. 이용자의 개인 정보를 보호하는 수단을 제공하고 인터넷 사업자에게는 이용자의 유일성을 확인할 수 있는 수단을 제공할 것이다.

A Study on the Perceived Seriousness of the Consumer Problem between E-commerce Users and Non-Users - Focused on University Consumers - (인터넷상거래 이용자/비이용자의 소비자문제 심각성지각 연구 - 대학생소비자를 중심으로 -)

  • 류미현;이승신
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.8
    • /
    • pp.19-31
    • /
    • 2003
  • This study was intended to present the plan for preventing and solving the seriousness of the consumer problem perceived in the e-commerce. For this purpose, 723 questionnaires were distributed to university As a result of analysis, the following findings were obtained: 1) It was found that e-commerce users had higher knowledge of the degree of internet un, the ability to use information on the internet, the disposition of computerization, and e-commerce related consumer than e-commerce non-users. 2) It was found that e-commerce non-users had the higher level of perceived seriousness of the consumer problem than e-commerce users. Especially, it was found that e-commerce non-users had the high level of perceived seriousness of the consumer problem related to the problem of exchange, termination and after-sale nice and the leakage of exchange, termination and after-sale service and the leakage of private information e-commerce user. 3) It was found that university consumers' perceived seriousness of the consumer problem in e-commerce over the internet showed a significant difference in the ability to use information on the internet between e-commerce users and non-users.

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk

  • Cheng, Yong;Ma, Jun;Ren, Jiangchun;Mei, Songzhu;Wang, Zhiying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2276-2291
    • /
    • 2017
  • Data protection of removable storage devices is an important issue in information security. Unfortunately, most existing data protection mechanisms are aimed at protecting computer platform which is not suitable for ultra-low-power devices. To protect the flash disk appropriately and efficiently, we propose a trust based USB flash disk, named UTrustDisk. The data protection technologies in UTrustDisk include data authentication protocol, data confidentiality protection and data leakage prevention. Usually, the data integrity protection scheme is the bottleneck in the whole system and we accelerate it by WH universal hash function and speculative caching. The speculative caching will cache the potential hot chunks for reducing the memory bandwidth pollution. We adopt the symmetric encryption algorithm to protect data confidentiality. Before mounting the UTrustDisk, we will run a trusted virtual domain based lightweight virtual machine for preventing information leakage. Besides, we prove formally that UTrustDisk can prevent sensitive data from leaking out. Experimental results show that our scheme's average writing throughput is 44.8% higher than that of NH scheme, and 316% higher than that of SHA-1 scheme. And the success rate of speculative caching mechanism is up to 94.5% since the access pattern is usually sequential.

Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis (로지스틱 회귀분석을 이용한 중소기업 기술보호 요인 분석)

  • Hong, Jun Suk;Park, Won Hyung;Kim, Yanghoon;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.

The Implementation of the system-on-board controllable the electrical fires due to ground fault, arc fault and overload (누전, 아크, 과부하에 의한 전기화재 제어 시스템 보드의 구현)

  • Kim, Byung-Cheul;Chun, Joong-Chang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.419-424
    • /
    • 2011
  • The system-on-board detectable and controllable the electrical fires due to ground fault(GF), arc fault and overload is implemented. The system IC for controlling and preventing the electrical fires is available to this system. The GF detection circuit for detecting the electrical leakage current, the arc fault detection circuit and the overload detection circuit controllable the input voltage for flowing the overload current are designed. The GF detection circuit and the arc fault detection circuit are good operated to the electrical leakage current and the arc signal, respectively. It is confirmed that the overload detection circuit has shown no erratic operation with the noise or the load variation and is only operated at the overload condition.

A proposal of preventing the leakage of personal information from public institution information system using blockchain (블록체인을 활용한 공공기관 정보시스템에서의 개인 정보 유출 방지 시스템 제안)

  • Choi, Seung-Joo;Park, Jae-hoon;Seo, HwaJeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.146-149
    • /
    • 2020
  • 보건 복지부, 병원, 동사무소 등의 공공기관에서는 업무 처리를 위해 사람들의 주민등록번호, 연락처, 주소 등 수많은 개인정보를 업무 처리를 위해 각 기관마다 사용하는 정보 시스템을 통해 다룬다. 그런데 이러한 정보 시스템을 통한 내부 정보 유출 사건이 지속적으로 발생하고 있다. 이와 같이 유출된 정보는 단순 유출자의 호기심으로 끝나기도 하지만 다른 영리 기관들에 팔려 악용되기도 한다. 이에 본 논문은 정보 시스템을 통한 개인 정보 유출을 방지하기 위해 블록체인을 활용한 시스템을 제안한다.

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Design and Implementation of Memory Management for preventing a memory leakage on Real-Time Operating System, $\textrm{iRTOS}^{TM}$ (실시간 운영체제의 효율적인 메모리 관리 설계 및 구현)

  • 박윤미;이재규;이철훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.175-177
    • /
    • 2004
  • 최근 임베디드 시스템 분야에서의 실시간 운영체제는 정보가전을 비롯한 임베디드 시스템 등 적용범위가 점차 확대되는 추세이다. 실시간 운영체제는 다른 범용 운영체제와는 달리 시간 결정성을 보장하는 운영체제로서, 주로 자원(resource)이 한정된 시스템에 탑재되어야 하기 때문에 효율적인 자원관리가 필요하다. 시스템의 자원 중에서도 메모리는 실시간 운영체제의 실행에 있어서 꼭 필요한 자원이므로 이에 대한 효과적인 관리가 필수적이라 할 수 있다. 대부분 실시간 운영체제에서는 효율적인 메모리 관리를 위해서 동적 메모리 할당 방법을 채택하고 있다. 그러나 할당된 메모리를 해제하지 않고 종료되는 태스크로 인해 메모리 누수 문제가 발생하였다. 본 논문에서는 동적 메모리 할당에서 메모리 누수를 최소화 할 수 있도록 개선한 메모리 관리 기법을 설계 및 구현하였다.

  • PDF