• Title/Summary/Keyword: 인터넷 금융거래

Search Result 122, Processing Time 0.021 seconds

A Study on the Utilization of Biometric Authentication for Digital Signature in Electronic Financial Transactions: Technological and Legal Aspect (전자금융 거래 시 생체인증을 전자서명에 활용하기 위한 기술 및 법률에 관한 연구)

  • Song, Jae-Hun;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.41-53
    • /
    • 2016
  • Today, leading smartphone manufacturers offer biometric technologies such as fingerprints, voice recognition, and iris patterns in their flagship models. These biometric technologies are used for authentication. Biometric authentications are widely used in device security and even in financial transaction. This paper examines cases where a user uses biometric authentication during financial transaction (both online and smartphone banking), and explains biometric for non-repudiation by digital signature. Finally, the paper also explains technical and legal requirements for biometric authentication in the area of financial services.

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

A Study on Trace-Back Method of Financial Network Using IP Marking Server (IP 마킹 서버를 활용한 금융 전산망 공격자 역추적 기술 연구)

  • Park, Keunho;Choi, Ken;Shon, TaeShik
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.129-139
    • /
    • 2017
  • With the advent of FinTech, many financial services have become available in the mobile Internet environment and recently, there is an internet bank that provides all bank services online. As the proportion of financial services over the Internet increases, it offers convenience to users, but at the same time, the threat of financial network is increasing. Financial institutions are investing heavily in security systems in case of an intrusion. However attacks by hackers are getting more sophisticated and difficult to cope with. However, applying an IP Trace-back method that can detect the actual location of an attacker to a financial network can prepare for an attacker's arrest and additional attacks. In this paper, we investigate IP Trace-back technology that can detect the actual location of attacker and analyze it to apply it to financial network. And we propose a new IP Trace-back method through Infra-structure construction through simulation experiments.

Information Asymmetry Issues in Online Lending : A Case Study of P2P Lending Site (인터넷 대부시장에서의 정보비대칭성 문제 : P2P 금융회사 사례를 중심으로)

  • Yoo, Byung-Joon;Jeon, Seong-Min;Do, Hyun-Myung
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.285-301
    • /
    • 2010
  • Peer-to-peer (P2P) lending is an open marketplace for loans not from bank but from individuals online. Financial transactions are facilitated directly between individuals ("peers") without any intermediation of a traditional financial institution. A market study by renowned research company forecasts that P2P lending will grow very fast and a couple of P2P lending sites in Korea also are getting attentions by providing the alternative financial services. In P2P lending market, Lender will enjoy higher income generated from the loans in the form of interest than interest that can be earned by financial products provided by official financial institutions. Furthermore, lenders are able to decide who they would lend the money for themselves. Meanwhile, borrowers with low credit scores are able to finance their liquidity requirement with low cost and convenient access to the Internet. The objective of this paper is to introduce P2P lending and its issues of information asymmetry. We provide the insights from the case study of one of P2P lending sites in Korea and review the issues in P2P lending market as research topics. Specifically, information asymmetry issues in both traditional financial institutions and P2P lending are discussed.

A study on the selection of the target scope for destruction of personal credit information of customers whose financial transaction effect has ended (금융거래 효과가 종료된 고객의 개인신용정보 파기 대상 범위 선정에 관한 연구)

  • Baek, Song-Yi;Lim, Young-Bin;Lee, Chang-Gil;Chun, Sam-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.163-169
    • /
    • 2022
  • According to the Credit Information Act, in order to protect customer information by relationship of credit information subjects, it is destroyed and stored separately in two stages according to the period after the financial transaction effect is over. However, there is a limitation in that the destruction of personal credit information of customers whose financial transaction effect has expired cannot be collectively destroyed when the transaction has been terminated, depending on the nature of the financial product and transaction. To this end, the IT person in charge is developing a computerized program according to the target and order of destruction by investigating the business relationship by transaction type in advance. In this process, if the identification of the upper relation between tables is unclear, a compliance issue arises in which personal credit information cannot be destroyed or even information that should not be destroyed because it depends on the subjective judgment of the IT person in charge. Therefore, in this paper, we propose a model and algorithm for identifying the referenced table based on SQL executed in the computer program, analyzing the upper relation between tables with the primary key information of the table, and visualizing and objectively selecting the range to be destroyed. presented and implemented.

빠른 응답속도와 안정성은 필수 요소

  • Seong, Gi-Yun
    • Digital Contents
    • /
    • no.10 s.77
    • /
    • pp.21-24
    • /
    • 1999
  • 사이버 금융 시스템은 안정적이어야 한다. 은행 시스템에서 거래 내용이 누락되거나 월말 업무 폭주 등으로 인한 전산 시스템 마비가 오는 경우가 있었고, 최근 인터넷 증권 시스템이 고객 숫자에 비해 용량이 부족하다는 점이 지적되고 있다. 사용자 수의 급증, 정전 등의 사태에 안정적으로 대응할 수 있는 시스템 구축이 필수적이다. 사이버 금융 시스템 구축 방안에 대해 살펴본다.

  • PDF

A Study on improvement for a means of access to electronic financial service (전자금융서비스 접근매체 변화에 따른 법제도 개선방안)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.17-22
    • /
    • 2015
  • As financial deregulation policies implemented by the government, electronic financial service is improved but security concerns are increasing and ultimately weaken trust in the financial service. Electronic financial service becomes more and more dependant on the IT platform and the initiatives of access device is also gradually shift to that platform. As biometric sensor is mounted on the smartphone, structural change in the access device is coming. It must be a positive signs in terms of fintech development, in the other side, it can cause many problems such as weakness of regulation and ambiguity of principals of responsibility. So in this paper, by analysing this problem-the shift of service initiative-on the access device I'll propose the best way to the the legal amendments.

사이버 금융에서의 인터넷 보안

  • Seong, Gi-Yun
    • Digital Contents
    • /
    • no.2 s.81
    • /
    • pp.52-59
    • /
    • 2000
  • 사이버 주식거래의 등장과 폭발적 증가는 단순히 기존의 판매망에 새로운 판매채널이 추가된 정도의 의미가 아니며, 또한 인터넷이라는 별도 영역에서의 또 다른 경쟁을 의미하는 것도 아니다. 증권회사가 인터넷의 전략적 활용이라는 선도적 자세를 갖고 어떻게 기존의 사업구조, 상품구조, 마케팅 구조, 영업구조, 전산시스템 구조의 개선을 추진하느냐가 디지털, 글로벌 경제시대에 선도기업으로 앞서나갈 수 있는 요소가 될 것이다.

  • PDF

인터넷을 이용한 금융 거래 시 보안성 강화 수단에 관한 고찰

  • 이상진
    • Review of KIISC
    • /
    • v.15 no.4
    • /
    • pp.39-43
    • /
    • 2005
  • 최근 국내의 인터넷 뱅킹에 대한 해킹 사고를 계기로 시스템의 문제점을 진단하고 이에 따른 대응책을 기술한다. 이러한 시도는 특히 근간의 PKI 체계를 보완/강화하는 방향으로 진행하는 것이 바람직하다. 또한 인터넷 뱅킹의 궁극적은 안전성 보장을 위한 별도의 부가적인 보안장치의 특징과 장/단점을 소개함으로써 개인의 정보보호를 위한 대안을 제시한다.

Analysis of an Intrinsic Vulnerability on Keyboard Security (키보드 보안의 근본적인 취약점 분석)

  • Yim, Kang-Bin;Bae, Kwang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.89-95
    • /
    • 2008
  • This paper analyzes the intrinsic vulnerability problems of the authentication system for Internet commerce based on the ID and password strings gathered from the computer keyboard. Through the found vulnerability, it is easy to sniff user passwords as well as any other keyboard inputs even when each of the existing keyboard protection softwares is running. We propose several countermeasures against the possible attacks to the vulnerability at both points of the hardware and the software concerns. The more secure environment for Internet commerce is highly required by implementing the proposed countermeasures.