• Title/Summary/Keyword: 修辭

Search Result 820, Processing Time 0.028 seconds

Design and Implementation of Forensic Tool on Window Live System (윈도우 활성 시스템상의 디지털 증거 수집 도구 설계 및 구현)

  • Baek, Eun-Ju;Sung, Jin-Won;Lim, Kyoung-Su;Lee, Sang-Jin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.91-100
    • /
    • 2007
  • Nowadays, there exist many forensic tools in forensic investigation. For common investigator it may cause some difficulty in handling the existing forensic tools. In case of urgent condition, if it takes long time to get the useful evidence from data, then it makes the investigation process difficult. Thus, the common investigator can collect the evidence easily by simple clicking the mouse. The only thing he needs is a tool for examination before investigating in details. Therefore, in this paper we refer to useful information in the forensic investigation, discuss the design and the implementation of tool.

  • PDF

Invstigation about Sminshing Hacking (Smishing 해킹에 대한 수사기술)

  • Moon, Soon-hol;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.293-295
    • /
    • 2015
  • This paper proposed have been the business card information to the computer when creating business card printing agency saved to a file, there is always the risk of personal information leakage. Application file organization information into the card, the name, phone number, email address information, such as is capable of easily accessible because it is not encrypted. This paper proposed it encrypts the information entered on the Business Card application file to automate the process of the card application and simplifying the business card application process minimizes the work of staff and linked directly to the print shop how to automatically delete the print file after the completion of business card printing and research.

  • PDF

A Study on the Countermeasures against International Computer Crimes - Focusing on The Police Investigation Procedure - (컴퓨터범죄의 국가간 대응방안에 관한 연구 - 경찰 수사절차를 중심으로 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.287-295
    • /
    • 2005
  • A Study on the Countermeasures against International Computer Crime focusing on the Police Investigation Procedure. These days, much more intelligent, varied and advanced techniques for computer crimes have been used than for development of technology. In particular, it has been reported that the damages are enormous. Damages of some computer crimes can not be accurately reported. This study is to speculate specific types of computer crimes and obtain its prevention and countermeasures centering on the Police Investigation Procedure. In particular, it is to speculate international cooperation under the condition that global damages occur frequently due to preparation of advanced network environment.

  • PDF

Increased Ventrolateral Prefrontal Cortex Activation during Accurate Eyewitness Memory Retrieval: An Exploratory Functional Near-Infrared Spectroscopy Study (목격 여부에 따른 배가쪽 이마앞 영역의 활성화 차이: Functional Near-Infrared Spectroscopy Study 연구)

  • Ham, Keunsoo;Kim, Ki Pyoung;Jeong, Hojin;Yoo, Seong Ho
    • The Korean Journal of Legal Medicine
    • /
    • v.42 no.4
    • /
    • pp.146-152
    • /
    • 2018
  • We investigated the neural correlates of accurate eyewitness memory retrieval using functional near-infrared spectroscopy. We analyzed oxygenated hemoglobin ($HbO_2$) concentration in the prefrontal cortex during eyewitness memory retrieval task and examined regional $HbO_2$ differences between observed objects (target) and unobserved objects (lure). We found that target objects elicited increased activation in the bilateral ventrolateral prefrontal cortex, which is known for monitoring retrieval processing via bottom-up attentional processing. Our results suggest bottom-up attentional mechanisms could be different during accurate eyewitness memory retrieval. These findings indicate that investigating retrieval mechanisms using functional near-infrared spectroscopy might be useful for establishing an accurate eyewitness recognition model.

Study on the Method for Effective Operation of Special Judicial Police System for Fire Service (소방특별사법경찰제도의 효율적인 운용방안에 관한 연구)

  • Jo, Dae-Kun;Hwang, Euy-Hong;Choi, Don-Mook
    • Fire Science and Engineering
    • /
    • v.32 no.6
    • /
    • pp.100-107
    • /
    • 2018
  • As the contents of crimes become specialized due to the diversification and modernization of modern society, the role of a special judicial police system is becoming important and diverse. Nevertheless, most special judicial police for the fire service, which conducts investigative work, have problems, such as lack of expertise in investigation caused by a lack of manpower, investigation and work due to concurrent fire investigation. Based on the experience gained through the investigation cases of fire crimes, this study suggests improvements of the telegraph restriction system, improvement of the education system, improvement of the education and training system, and the establishment of a dedicated department as measures to improve the actual problems.

The Recovery and Analysis of Digital Data in Digital Multifunction Copiers with a Digital Forensics Perspective (디지털포렌식 관점에서의 디지털복합기내 데이터 복구 및 분석)

  • Park, Il-Shin;Kang, Cheul-Hoon;Choi, Sung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.23-32
    • /
    • 2010
  • Caused by the development of IT environment, the frequency of using the embedded machines is increasing in our regular life. A typical example of these embedded machines is a Multi Function Copier and it has various functions; it is used as copier, scanner, fax machine, and file server. We would like to check the existence of and the way to abstract the data that may have been saved through using the scanner of the multi function printer and discuss how to use those data as the evidence.

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.

Analyzing the Language Usage Characteristics of Korean Dark Web Users (국내 다크웹 사용자들의 언어 사용 특성 분석)

  • Youjin Lee;Dayeon Yim;Yongjae Lee
    • Annual Conference on Human and Language Technology
    • /
    • 2022.10a
    • /
    • pp.397-402
    • /
    • 2022
  • 익명 네트워크 기술에 기반한 다크웹은 일반 표면웹보다 더 강화된 익명성을 제공한다. 최근 이 익명성을 악용하여 다수의 다크웹 사용자들이 다크웹 내에서 범죄 행위를 모의하는 행위가 꾸준히 발생하고 있다. 특히, 국내 다크웹 사용자들은 마약 유포를 위한 방법을 공유하거나 성착취물 유포 행위 등에 직간접적으로 가담하고 있다. 이와 같은 범죄 행위들은 수사 기관의 눈을 피해 현재까지도 계속해서 발생하고 있어 국내 다크웹 범죄 동향 파악의 필요성이 증대되고 있다. 그러나 다크웹 특성상 범죄 행위를 논의하는 게시글을 수집하기가 어렵고, 다크웹 내에서의 언어 사용 특성에 대한 이해 부족으로 그동안 다크웹 사용자들이 어떤 내용의 범죄를 모의하는지 파악하기가 어려웠다. 본 논문에서는 국내 사용자들이 활동하는 다크웹 포럼들을 중심으로 사용자들의 언어 사용 특성을 연구하고, 이를 통해 다크웹에서 다뤄지는 범죄 유형들을 분석한다. 이를 위해, 자연어처리 기반의 분석 방법론을 적용하여 다크웹에서 공유되는 게시글을 수집하고 다크웹 사용자들의 은어와 특정 범죄군에서 선호되는 언어 특성을 파악한다. 특히 현재 다크웹 내에서 사용자들 사이에 관측되는 어휘들에 대한 기술통계 분석과 유의어 관계 분석을 수행하였고, 실제 다크웹 내에서 사용자들이 어떠한 범죄에 관심이 많은지를 분석하였으며, 더 나아가 수사의 효율성을 증대시키기 위한 소셜미디어, URL 인용 빈도에 대한 연구를 진행하였다.

  • PDF

Study on Truth and Error of Information Visualization Expression (정보시각화 표현의 진실과 오류에 관한 연구)

  • Sungkon Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.135-141
    • /
    • 2024
  • Information visualization is divided into delivery, description, and beautiful fun. The dilemma is delivered to the user by emphasizing a certain part of the data as a visual rhetorical expression after grasping the table format and content of the data. The visual rhetoric representation used at this time helps users deliver content, but the data graphics used have a dilemma that becomes some false. In this study, errors that occur in rhetorical descriptions such as paradox, gradation, omission, synecdoche, meter, enumeration, and metaphor were discussed. Errors include graphic areas that differ from data values, showing only selective data, inappropriate use of grids, misunderstanding simple geometric depictions, and inappropriate graphic blocking.

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.