• Title/Summary/Keyword: 개인정보 유출 위험

Search Result 150, Processing Time 0.034 seconds

A Case study f i-PIN Service for Information Security (보안성 강화를 위한 i-PIN 서비스 적용 사례 연구)

  • Kim, Hyunjoo;Lee, Soojong
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.19-28
    • /
    • 2012
  • Personal registration number has been used as a means of personal identification on existing internet. However, its use on internet sites has become a major factor increasing danger of leaking of personal information. Presently, the government recommends i-PIN to minimize the collection of personal registration numbers and leaking of personal information on internet. Original purpose of i-PIN is to recognize persons by its virtual number of 13 digits instead of using personal registration number on internet websites. These days, i-PIN continues to be used increasingly as a form of certification. This study seeks to explore software service methodology of using i-PIN as a form of certification on internet websites and examples in which its other forms of self certification are used than existing i-PIN services.

  • PDF

Named Entity Detection Using Generative Al for Personal Information-Specific Named Entity Annotation Conversation Dataset (개인정보 특화 개체명 주석 대화 데이터셋 기반 생성AI 활용 개체명 탐지)

  • Yejee Kang;Li Fei;Yeonji Jang;Seoyoon Park;Hansaem Kim
    • Annual Conference on Human and Language Technology
    • /
    • 2023.10a
    • /
    • pp.499-504
    • /
    • 2023
  • 본 연구에서는 민감한 개인정보의 유출과 남용 위험이 높아지고 있는 상황에서 정확한 개인정보 탐지 및 비식별화의 효율을 높이기 위해 개인정보 항목에 특화된 개체명 체계를 개발하였다. 개인정보 태그셋이 주석된 대화 데이터 4,981세트를 구축하고, 생성 AI 모델을 활용하여 개인정보 개체명 탐지 실험을 수행하였다. 실험을 위해 최적의 프롬프트를 설계하여 퓨샷러닝(few-shot learning)을 통해 탐지 결과를 평가하였다. 구축한 데이터셋과 영어 기반의 개인정보 주석 데이터셋을 비교 분석한 결과 고유식별번호 항목에 대해 본 연구에서 구축한 데이터셋에서 더 높은 탐지 성능이 나타났으며, 이를 통해 데이터셋의 필요성과 우수성을 입증하였다.

  • PDF

Analysis on Pending Issue of Information Security for Smart Disaster Investigation (스마트 재난피해조사를 위한 정보보안 현안 분석)

  • Cho, Jae-Woong;Choi, Woo-Jung;Choi, Seon-Hwa
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.28-30
    • /
    • 2012
  • 2010년 이후 국내 스마트폰 보급은 급속히 증가하여 2011년에 이미 스마트폰 가입자수가 2천만명을 넘어서면서 계속하여 증가하고 있으며, '12년 하반기에는 휴대폰 가입자중 79%가 스마트폰을 차지할 것으로 예측하고 있다(마케팅인사이트, '12.02). 이러한 스마트폰의 증가와 함께 스마트폰을 이용한 각종 서비스 및 업무의 비중도 증가하고 있으며, 이에 대한 정보보안의 문제도 이슈화 되고 있다. 특히 스마트폰의 경우 일반 PC와 비교하여 보안에 취약하며, 특히 분실/도난 등으로 인한 개인정보의 유출위험성 또한 높다. 본 연구에서는 국립방재연구원에서 추진중인 스마트 재난피해조사를 바탕으로 정보보안의 현안을 분석하였으며, 스마트폰 내 정보저장에 대한 보안취약을 해결하기 위해서는 MDM(Mobile Device Management)를 이용한 단말의 통제 뿐만 아니라 1차적으로 단말의 접근을 통제할 수 있는 얼굴인식, 지문인식 등의 인체인식기술과 저장된 정보의 해킹으로 인한 유출을 방지하기 위한 복호화 및 자동삭제 기능 등을 도입하여야 할 것으로 판단된다.

Study for the Pseudonymization Technique of Medical Image Data (의료 이미지 데이터의 비식별화 방안에 관한 연구)

  • Baek, Jongil;Song, Kyoungtaek;Choi, Wonkyun;Yu, Khiguen;Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.6
    • /
    • pp.103-110
    • /
    • 2016
  • The recent frequent cases of damage due to leakage of medical data and the privacy of medical patients is increasing day by day. The government says the Privacy Rule regulations established for these victims, such as prevention. Medical data guidelines can be seen 'national medical privacy guidelines' is only released. When replacing the image data between the institutions it has been included in the image file (JPG, JPEG, TIFF) there is exchange of data in common formats such as being made when the file is leaked to an external file there is a risk that the exposure key identification information of the patient. This medial image file has no protection such as encryption, This this paper, introduces a masking technique using a mosaic technique encrypting the image file contains the application to optical character recognition techniques. We propose pseudonymization technique of personal information in the image data.

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

A Study on Phishing Prevention Mechanism of OpenID using Certificate Authority (인증기관을 이용한 OpenID 피싱 방지 기법에 관한 연구)

  • Kim, Sung-Soo;Kim, Jae-Woo;Kim, Hyun-Chul;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1389-1392
    • /
    • 2009
  • OpenID는 서비스와 ID 관리를 사이트 독자적으로 수행하는 Silo 모델의 계정 및 정보 관리 문제를 해결한다. 그러나 악의적인 공격자로 인한 OpenID Provider에 대한 피싱 공격 위험이 발견됨에 따라 개인 정보 유출에 대한 큰 위협이 되고 있다. 본 논문에서는 기존 OpenID 구조에 인증기관을 추가하여 사용자 인증 이전에 IDP에 대한 유효성 검증을 먼저 수행함으로써 IDP 피싱으로 인한 개인 정보 유출 문제를 사전에 방지 할 수 있는 인증기관을 이용한 OpenID 피싱 방지 기법을 제안한다. 또한, 기존의 OpenID 피싱 방지 기법과의 비교 실험을 통하여 편리성, IDP 신뢰성, 피싱 공격의 대한 안전성 항목에서 우수함을 확인 할 수 있었다.

A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions (금융IT인력의 보안사고 위험도에 기반한 정보접근 통제 정책 연구)

  • Sim, Jae-Yoon;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.343-361
    • /
    • 2015
  • The financial industry in South Korea has witnessed a paradigm shift from selling traditional loan/deposit products to diversified consumption channels and financial products. Consequently, personification of financial services has accelerated and the value of finance-related personal information has risen rapidly. As seen in the 2014 card company information leakage incident, most of major finance-related information leakage incidents are caused by personnel with authorized access to certain data. Therefore, it is strongly required to confirm whether there are problems in the existing access control policy for personnel who can access a great deal of data, and to complement access control policy by considering risk factors of information security. In this paper, based on information of IT personnel with access to sensitive finance-related data such as job, position, sensitivity of accessible data and on a survey result, we will analyze influence factors for personnel risk measurement and apply data access control policy reflecting the analysis result to an actual case so as to introduce measures to minimize IT personnel risk in financial companies.

Analysis and Considerations for a Vulnerability of SSL/TLS Transmission Interval on Smartphones (스마트폰에서의 SSL/TLS 전송구간 취약점 분석 및 고찰)

  • Kang, Won Min;Jeong, Hwa Young;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.890-891
    • /
    • 2013
  • 인터넷이 발달함에 따라 사용자들은 웹에서 여러 가지 일의 처리가 가능하게 되었다. 최근에는 휴대폰의 성능과 기능이 발달하고 스마트폰의 보급이 급속히 확산되면서 스마트폰을 사용하여 많은 양의 데이터들의 전달이 이루어지고 있다. 이러한 처리 과정에서 개인 및 기업정보들이 유출될 수 있는 위험이 증가하고, 스마트폰과 클라이언트 사이에서의 개인, 기밀 정보가 SSL (Secure Sockets Layer) 또는 TLS (Transport Layer Security)프로토콜을 통해 암호화 되어 전송 되어도 프록시 서버에서 인증서 변조를 통하여 유출될 가능성이 점점 높아지고 있다. 본 논문에서는 스마트폰 상의 안전한 통신을 위해 많이 이용되는 SSL/TLS의 전송구간에 대한 취약점 분석 등 보안 이슈와 연구 방향에 대해 논의한다.

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

Cards Automated Designed Research for Personal Information Leak Prevention (개인정보 유출 방지를 위한 명함 자동화 설계 연구)

  • Park, Jong-Youel;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.275-277
    • /
    • 2015
  • This paper proposed have been the business card information to the computer when creating business card printing agency saved to a file, there is always the risk of personal information leakage. Application file organization information into the card, the name, phone number, email address information, such as is capable of easily accessible because it is not encrypted. This paper proposed it encrypts the information entered on the Business Card application file to automate the process of the card application and simplifying the business card application process minimizes the work of staff and linked directly to the print shop how to automatically delete the print file after the completion of business card printing and research.

  • PDF