• Title/Summary/Keyword: 수사

Search Result 806, Processing Time 0.027 seconds

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Influencing Effects of Job Stress, Professional Autonomy, Reciprocity on the Job Embeddedness of Comprehensive Nursing Care Unit Nurses (간호·간병통합서비스 병동 간호사의 직무 스트레스, 전문직 자율성, 호혜성이 직무착근도에 미치는 영향요인)

  • Park, Seon Ok;Park, Wanju
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2023
  • Purpose: The purpose of this study was to identify the influencing effects of job stress, professional autonomy, and reciprocity on the job embeddedness among comprehensive nursing care unit nurses. Methods: The participants in this study were 147 nurses who have worked for over 6 months in Comprehensive Nursing Care Unit. Data were collected from January 3 to January 31, 2022 from six general hospitals with more than 300 beds in three cities in G, G and P. Results: As the results of hierarchical regression analysis, job embeddedness was lower when nurses had clinical experiences for 1 to under 5 years (β=-.49, p<.001), 5 to under 10 years (β=-.27, p=.035), 10 to under 20 years (β=-.54, p<.001) compared to those who had clinical experiences for more than 20 years. Also, job embeddedness was higher when there was greater balance within team caregiving of reciprocality (β=.27, p<.001) and intrinsic reward (β=.22, p=.003), and lower role conflict (β =-.27, p<.001). Conclusion: The results of the study showed that job embededness would increase if the role conflict of comprehensive nursing care unit nurses reduces, if there was a culture that the members can make cooperative relationship with other health care professionals and, if there was an appropriate intrinsic reward depending on their work experience.

Proposal on the Improvement of Psychological Support System for Cyber Sexual Crime Investigators Based on Their Mental Health Survey (사이버성폭력수사관 정신건강 실태조사에 근거한 심리지원제도 개선 방향에 관한 연구)

  • Bora Kim;Sujin Lim
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.43-67
    • /
    • 2022
  • One of the dark sides of the development of information and communication technology is the significant increase in cybercrime. In particular, investigators in charge of cyber sexual crime are repeatedly exposed to video data of illegal sexual violence; hence, they are at high risk of post-traumatic stress disorder (PTSD) and experiencing vicarious trauma. Notwithstanding, few studies have focused on these investigators' PTSD, and, to the best of our knowledge, no study has been conducted on the vicarious trauma of cyber sexual crime investigators. Therefore, this study identifies investigators' mental health status (trauma-related, especially) and examines their perception of the currently operating psychological support programs. Further, by reviewing the psychological support system of overseas institutions, we would suggest psychological support and policies necessary for domestic cyber sexual crime units to manage investigators' work stress and prevent mental illness under domestic circumstances.

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.

Effect of Bacteria in Soil on Microbiologically Influenced Corrosion Behavior of Underground X65 Pipeline (토양 속 박테리아가 지하매설 X65 배관의 미생물 부식 거동에 미치는 영향)

  • Choe, Byung Hak;Han, Sung Hee;Kim, Dae Hyun;Kim, Woosik;Kim, Cheolman;Choi, Kwang Su
    • Korean Journal of Materials Research
    • /
    • v.32 no.3
    • /
    • pp.168-179
    • /
    • 2022
  • Microbiologically Influenced Corrosion (MIC) occurring in underground buried pipes of API 5L X65 steel was investigated. MIC is a corrosion phenomenon caused by microorganisms in soil; it affects steel materials in wet atmosphere. The microstructure and mechanical properties resulting from MIC were analyzed by OM, SEM/EDS, and mapping. Corrosion of pipe cross section was composed of ① surface film, ② iron oxide, and ③ surface/internal microbial corrosive by-product similar to surface corrosion pattern. The surface film is an area where concentrations of C/O components are on average 65 %/16 %; the main components of Fe Oxide were measured and found to be 48Fe-42O. The MIC area is divided into surface and inner areas, where high concentrations of N of 6 %/5 % are detected, respectively, in addition to the C/O component. The high concentration of C/O components observed on pipe surfaces and cross sections is considered to be MIC due to the various bacteria present. It is assumed that this is related to the heat-shrinkable sheet, which is a corrosion-resistant coating layer that becomes the MIC by-product component. The MIC generated on the pipe surface and cross section is inferred to have a high concentration of N components. High concentrations of N components occur frequently on surface and inner regions; these regions were investigated and Na/Mg/Ca basic substances were found to have accumulated as well. Therefore, it is presumed that the corrosion of buried pipes is due to the MIC of the NRB (nitrate reducing bacteria) reaction in the soil.

Extracting Feature in the Crowd using MTCNN (MTCNN을 활용한 군중 속 특징 추출)

  • Park, jin Woo;Kim, Minju;Kim, Sihyun;Jang, Donghwan;Lee, Sung-jin;Moon, Sang-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.380-382
    • /
    • 2021
  • According to the National Police Agency, 161 out of 38,496 unsolved cases as of 2020. Most of the adult missing persons, the highest of the unsolved causes, are evaluated as simple runaway, which takes a long time to investigate. Even if search through CCTV, it can take a long time and the accuracy can be somewhat low because you have to check the faces of the characters one by one and find the characters only with the characteristics of the statements. This paper utilizes MTCNN to conduct research on character extraction in CCTV. We initiate simultaneous analysis of the features of faces learned with MTCNN and the clothes we are wearing, so that only the overlapping characters are extracted so that they can be identified to the related parties. For aim to learn more diverse feature detection to narrow down the features of missing persons in the future and increase their accuracy.

  • PDF

A Study on the Efficient Digital Evidence Processing in Case Transfer : Focused on Military and Police Case Studies and Expert Interviews (사건 이송 시 효율적인 디지털 증거 처리 절차에 관한 고찰 : 군·경 사례연구 및 전문가 인터뷰를 중심으로)

  • Young June Kim;Wan Ju Kim;Jae sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.121-130
    • /
    • 2022
  • Recently, as soldiers are allowed to use mobile phones, cases are frequently transferred from the police to the military due to criminal acts, and digital evidence is collected separately from the reliability of previous investigations, such as overlapping seizure and search procedures. In this study, through in-depth interviews with practitioners in charge of digital evidence in the military, police, and courts, problems related to digital evidence handling, such as infringement of evidence ability due to overlapping human factors and procedures, are derived and analyzed. The presented procedure verified the effectiveness of the procedure through case analysis, and is expected to contribute to the guarantee of the evidence capacity of digital evidence and the efficiency of handling cases.

Study on The Data Decryption and Artifacts Analysis of KakaoTalk in Windows Environment (윈도우 환경에서 카카오톡 데이터 복호화 및 아티팩트 분석 연구)

  • Minuook Jo;Nam Su Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.51-61
    • /
    • 2023
  • Messengers such as KakaoTalk, LINE, and Facebook Messenger are universal means of communication used by anyone. As the convenience functions provided to users and their usage time increase, so does the user behavior information remaining in the artifacts, which is being used as important evidence from the perspective of digital forensic investigation. However, for security reasons, most of the data is currently stored encrypted. In addition, cover-up behaviors such as intentional manipulation, concealment, and deletion are increasing, causing the problem of delaying digital forensic analysis time. In this paper, we conducted a study on the data decryption and artifacts analysis in a Windows environment for KakaoTalk, the messenger with the largest number of users in Korea. An efficient way of obtaining a decryption key and a method of identifying and decrypting messages attempted to be deleted are presented, and thumbnail artifacts are analyzed.

Molecular holographic QSPR analysis on the reactivity between glycine and ninhydrin analogues as latent fingerprints detector (잠재지문 검출제로서 Ninhydrin 유도체들과 Glycine과의 반응성에 관한 분자 홀로그래픽적인 QSPR 분석)

  • Kim, Se-Gon;Jang, Seok-Chan;Cho, Yun-Gi;Hwang, Tae-Yeon;Park, Sung-Woo;Sung, Nack-Do
    • Analytical Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.339-346
    • /
    • 2007
  • To search the ninhydrin derivatives that have high chromogenic and fluorogenic properties, molecular holographic quantitative structure property relationship (HQSPR) models on the reactivity between glycine and ninhydrin analogues as latent fingerprint detector were derived and investigated quantitatively. The ${\varepsilon}LUMO$ (e.v.) energy of ninhydrin molecule was an important factor to reactivity of ninhydrin. And, it is suggested that the nucleophilic reaction by orbital-controlled reaction from the frontier molecular orbital (FMO) interaction between glycine and ninhydrin derivatives was more superior than that of electrophilic reaction by charged controlled reaction. The analytical results in atomic contribution maps also shows that the reactivity of ninhydrin was increased by meta-substituents as strong electron withdrawing groups on the benzo ring. Therefore, it is sugested by HQSPR and QSPR model that the 5,6-dinitroninhydrin molecule would increase the reactivity as much as three times as compared to none substituted ninhydrin molecule.