• Title/Summary/Keyword: 범죄화 분석

Search Result 167, Processing Time 0.029 seconds

The Study on the Improvement Plan by Investigation Case of the Fire Crimes (소방사범 수사사례를 통한 개선방안 연구)

  • Chae, Jin;Woo, Seong-Cheon
    • Fire Science and Engineering
    • /
    • v.23 no.6
    • /
    • pp.142-151
    • /
    • 2009
  • Nowadays contents of crimes are complicated and diversified because of differentiation and specialization of society. For this reason, special judicial police officer system that each special field officers investigate crimes related to their special fields is introduced to produce high quality private law service. Nevertheless, special judicial police officers who deal with fire crimes show many problems because they have less experiences and ability about investigation than general judicial police officers. Then, purpose of this study is deduction problems by analyzing cases of fire crimes and suggesting improvements which are ways to improve special judcial police officers's who investigate fire crimes efficiencies and professionalisms. Problems about investigation of fire crimes are absence of professional investigation agency, a shortage of professional workforce, absence of professional investigation officers education system. Improvements are creation professional investigation agency, securing experts, developing professional investigation officers education system, construction professional techniques manage system, introduction fire crime cases manage system.

Procedure for the acquisition of digital evidence on a cloud computing platform (클라우드 컴퓨팅 플랫폼에서 디지털 증거 수집 절차)

  • Han, Su bin;Lee, Tae-Rim;Shin, Sang Uk
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.457-460
    • /
    • 2014
  • 클라우드 컴퓨팅은 IT 자원의 효율적인 관리와 비용 대비 양질의 서비스 제공을 위한 새로운 패러다임으로써, 국내외의 기업뿐만 아니라 많은 사용자들에게 주목 받고 있다. 하지만 관련 시장의 빠른 성장과 함께 다양한 사이버 범죄에 노출될 수 있는 위험이 높아졌음에도 불구하고, 클라우드 컴퓨팅에 대한 디지털 포렌식은 실질적인 역할을 수행하기에 아직 미비한 실정이다. 클라우드 컴퓨팅은 증거 데이터가 물리적으로 분산되어 있고, 자원이 가상공간에 존재할 수 있기 때문에 기존의 디지털 포렌식 수사와는 다르게 접근해야 한다. 이에, 본 논문에서는 추상화된 클라우드 계층에 따른 기존 포렌식 절차 상의 데이터 수집 방법에 관한 한계를 분석하고, 확보한 증거 데이터의 신뢰성 보장 및 다양한 클라우드 환경에 보다 유연하게 적용할 수 있는 디지털 증거 수집 절차를 제안한다. 해당 절차는 클라우드 구성 요소들 중 물리적인 자원들을 가상화하여 논리적으로 구성할 수 있도록 하며, 가상화된 자원들을 서비스 목적에 따라 폭넓게 활용할 수 있도록 관리 체계를 제공해주는 클라우드 플랫폼을 기반으로 한다.

A Pilot Evaluation Study for the Establishment of CPTED Criteria of Flat or Multiple Dwelling Houses (범죄로부터 안전한 다세대·다가구주택 계획기준 마련을 위한 시범평가 연구)

  • Kim, Yong-Gook;Cho, Young-Jin
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.4
    • /
    • pp.27-34
    • /
    • 2018
  • Flat or Multiple Dwelling Houses are relatively vulnerable to crime safety. Crime prevention measures are urgently needed because crime is 2.6 times higher than in real apartments. Through the analysis of domestic and foreign crime prevention design standards, field survey, and interviews with experts, 27 items of crime prevention design criteria for flat or multiple dwelling house were derived, and ten design criteria that should be considered first by the expert AHP were derived. As a result of the pilot evaluation of existing flat or multiple dwelling house, the houses completed after 2015 have relatively high level of crime prevention, but the houses constructed before that are very vulnerable. The policy and system improvement plan based on the analysis result is as follows. First, new housing should be promoted to meet minimum criteria by supplying and educating public officials, architects, and building owners in the short term to provide criteria for flat or multiple dwelling house crime prevention plans. Second, existing housing should be supported with basic crime prevention support projects such as security windows for flat or multiple dwelling house where security of residential environment such as urban renewal policy is poor. Third, the Enforcement Decree of the Building Act shall be revised to make the crime prevention environment design of flat or multiple dwelling house obligatory, and the criteria of flat or multiple dwelling house crime prevention plan should be reflected in the notice of crime prevention building standard.

An analysis study on the quality of article to improve the performance of hate comments discrimination (악성댓글 판별의 성능 향상을 위한 품사 자질에 대한 분석 연구)

  • Kim, Hyoung Ju;Min, Moon Jong;Kim, Pan Koo
    • Smart Media Journal
    • /
    • v.10 no.4
    • /
    • pp.71-79
    • /
    • 2021
  • One of the social aspects that changes as the use of the Internet becomes widespread is communication in online space. In the past, only one-on-one conversations were possible remotely, except when they were physically in the same space, but nowadays, technology has been developed to enable communication with a large number of people remotely through bulletin boards, communities, and social network services. Due to the development of such information and communication networks, life becomes more convenient, and at the same time, the damage caused by rapid information exchange is also constantly increasing. Recently, cyber crimes such as sending sexual messages or personal attacks to certain people with recognition on the Internet, such as not only entertainers but also influencers, have occurred, and some of those exposed to these cybercrime have committed suicide. In this paper, in order to reduce the damage caused by malicious comments, research a method for improving the performance of discriminate malicious comments through feature extraction based on parts-of-speech.

A Study on Key Data Decryption and Security Evaluation for Password Management Apps (비밀번호 관리 어플리케이션의 주요 데이터 복호화 연구 및 보안성 평가)

  • Han-gyeol Kim;Sinyoung Lee;Myungseo Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.61-70
    • /
    • 2024
  • As users use various services along with the rapid increase in Internet services, it may be difficult to manage accounts. To solve these difficulties, various password management applications are emerging. From a forensic point of view, password management applications can provide clues to obtain criminal evidence. The purpose of this paper is to acquire the data stored by the user in the password management application. To this end, we propose a better way to decrypt the encrypted data through reverse engineering, evaluate the security of the application to be analyzed, and safely store the data.

A Study on the Evaluation Technique of Intelligent Security Technology Based on Spatial Information : Multi-CCTV Collaboration Technology (공간정보 기반 지능형 방범 기술의 기술성 평가 방안에 관한 연구 : 다중 CCTV 협업 기술을 대상으로)

  • Han, Sun-Hee;Shin, Young-Seob;Lee, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.111-118
    • /
    • 2019
  • In this age where the social environment is changing rapidly and unpredictably, interest in safety from crime is increasing in Korean society. As the desire to live a life free from the fear of crime increases, interest in the construction of safe cities is also rising nationwide. For this, it is important to develop precision-positioning technology and support-service and intelligent security-service technology based on spatial information. Therefore, this study analyzes cases of multiple CCTV collaboration technology from among the intelligent-security technologies, and evaluates the technology's guarantee system through the evaluation system of the Technology Guarantee Fund, and evaluates continuity based on innovation, spreadability, usability, and proposed commercialization in order to enable utilization and commercialization. As a result of analyzing multiple CCTV collaborative technologies through the evaluation system of the Technology Guarantee Fund, the technology with the highest outlook was given five points, and the others were rated as excellent in terms of spreadability, usability, and differentiation. For innovation, the score was three points lower than the other evaluation items, but we expect to overcome that by introducing the latest technology and converging it with other technologies, such as the Internet of Things.

A Study on Service-based Secure Anonymization for Data Utility Enhancement (데이터 유용성 향상을 위한 서비스 기반의 안전한 익명화 기법 연구)

  • Hwang, Chikwang;Choe, Jongwon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.681-689
    • /
    • 2015
  • Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

Forensic Analysis of Element Instant Messenger Artifacts (포렌식 관점에서의 Element 인스턴트 메신저 아티팩트 분석)

  • Cho, Jae-min;Byun, Hyeon-su;Yun, Hui-seo;Seo, Seung-hee;Lee, Chang-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1113-1120
    • /
    • 2022
  • Recently, the investigation has been difficult due to the emergence of messengers that encrypt and store data for the purpose of protecting personal information and provide services such as end-to-end encryption with a focus on security. Accordingly, the number of crime cases using security messengers is increasing, but research on data decoding for security messengers is needed. Element security messengers provide end-to-end encryption functions so that only conversation participants can check conversation history, but research on decoding them is insufficient. Therefore, in this paper, we analyze the instant messenger Element, which provides end-to-end encryption, and propose a plaintext verification of the history of encrypted secure chat rooms using decryption keys stored in the Windows Credential Manager service without user passwords. In addition, we summarize the results of analyzing significant general and secure chat-related artifacts from a digital forensics investigation perspective.

Analysis of anti-forensic trends and research on countermeasuresucation (안티 포렌식 동향 분석 및 대응 방안 연구)

  • Han Hyundong;Cho Young Jun;Cho Jae Yeon;Kim Se On;Han Wan Seop;Choi Yong Jun;Lee Jeong Hun;Kim Min Su
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2023
  • With the popularization of digital devices in the era of the 4th industrial revolution and the increase in cyber crimes targeting them, the importance of securing digital data evidence is emerging. However, the difficulty in securing digital data evidence is due to the use of anti-forensic techniques that increase analysis time or make it impossible, such as manipulation, deletion, and obfuscation of digital data. Such anti-forensic is defined as a series of actions to damage and block evidence in terms of digital forensics, and is classified into data destruction, data encryption, data concealment, and data tampering as anti-forensic techniques. Therefore, in this study, anti-forensic techniques are categorized into data concealment and deletion (obfuscation and encryption), investigate and analyze recent research trends, and suggest future anti-forensic research directions.