• Title/Summary/Keyword: 전자증거

Search Result 156, Processing Time 0.031 seconds

Digital Forensic Techniques using physical recovery method (물리적 복구 방법을 활용한 디지털 포렌식 기술)

  • Choi, Jae-Min;Shin, Dae-Min;Lee, Sang-Jin;Lim, Jong-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.146-149
    • /
    • 2007
  • 2000년대에 접어들어 컴퓨터가 보급화 되면서, 컴퓨터를 도구로 하는 범죄가 폭발적으로 증가하기 시작하였다. 컴퓨터 시스템에 접근하여 중요 정보를 빼돌리거나, 범죄의 목적이 되는 해킹과 같은 정보보호 침해사고가 크게 증가하였으며, 컴퓨터를 이용한 정상적인 서비스를 방해하는 형태의 디지털 범죄들이 다수 발생하기 시작하였다. 따라서 범죄 수사 과정에서 전자 매체에 대한 분석이 필수 불가결한 요소로 등장하고 있으며, 이를 분석하려는 디지털 포렌식 연구가 활발히 진행되고 있다. 특히 전자 매체에 기록되는 디지털 정보는 보관이 편리하지만 삭제와 복제가 용이하므로 디지털 증거는 매우 세심하게 다루어야 하며, 수사관에 의한 의도적인 훼손이 없었음을 증명할 수 있는 절차와 제도가 필요하다. 국내에서는 적법한 수사 절차와 무결성을 보장하기 위하여 '절차 연속성(chain-of-custody)'을 제공하는 수사 가이드라인을 제작하였으며, 체계적인 수사를 수행 하고 있다.[4] 이와 더불어 포렌식 수사 과정에서 물리적인 접근을 통해 디지털 저장 매체에 대한 복구할 수 있는 방법이 존재하며, 이에 대한 구체적인 방안을 논한다.[1]

  • PDF

A Study on the Fine Structure of Clonorchis sinensis, a Liver Fluke IV. Probable Function of the Laurer's Canal (간흡충의 미세횡조에 관한 연구 IV. Laurer's canal의 기능)

  • 정계헌
    • Parasites, Hosts and Diseases
    • /
    • v.21 no.2
    • /
    • pp.209-218
    • /
    • 1983
  • A study on the function of the Laurer's canal of Clonorchis sinensis was conducted with help of the light microscope, the transmission electron microscope, and the scanning elctron microscope. Some selected sexual organs concerning with the passages of the spermatozoa and the eggs were observed in detail. The conclusion of this study is that the Laurer's canal may be the copulatory organ of the female reproductive system as Miyazaki et al. suggested in case of lung flukes.

  • PDF

Method for Finding Related Object File for a Computer Forensics in a Log Record of $LogFile of NTFS File System (NTFS 파일시스템의 $LogFile의 로그레코드에 연관된 컴퓨터 포렌식 대상 파일을 찾기 위한 방법)

  • Cho, Gyu-Sang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.1-8
    • /
    • 2012
  • The NTFS journaling file($LogFile) is used to keep the file system clean in the event of a system crash or power failure. The operation on files leaves large amounts of information in the $LogFile. Despite the importance of a journal file as a forensic evidence repository, its structure is not well documented. The researchers used reverse engineering in order to gain a better understanding of the log record structures of address parts, and utilized the address for identifying object files to gain forensic information.

A Study on VDR System for a Small Fishing Vessel (소형어선을 위한 VDR 시스템에 관한 연구)

  • Yoo, Nam-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1025-1030
    • /
    • 2016
  • The big problem of accidents at sea is negligent watch, it causes collision, fender bender, stranding, rollover, and sinking of fishing vessel. Most accidents happens without an eyewitness, it is difficult to identify the cause of the accident. VDR(: Voyage Data Recorder) is needed to identify a cause of the accident, the VDR is not usually used for fishing vessel because of high cost. Thus, this paper designs and develops a VDR system for fishing vessel. If the system is used, cause of a sea accident can be quickly identified. Also, a VDR system can be used for appropriate measures to fix a cause of the accident. Finally, it also can be helpful to prevent maritime accidents.

On-demand Evidence Collection of Host Infringement based on the Analysis of Severity levels (위험도 분석에 기반한 On-demand 방식의 호스트 침해 증거 자료 수집 방안)

  • Choi, Yoon-Ho;Park, Jong-Ho;Kim, Sang-Kon;Seo, Seung-U;Kang, Yu;Choi, Jin-Gi;Moon, Ho-Gun;Lee, Myung-Su
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.33-34
    • /
    • 2006
  • Computer Forensics is a research area which finds the malicious users by collecting and analyzing the intrusion or infringement evidence of the computer crime. Many research about Computer Forensics has been done. But those research have focussed on how to collect the evidence after receiving the damage reports from computer users or network administrators. This paper describes about collecting the evidence of good quality at the time of infringement occurrence by the malicious user. By calculating Infringement severity of observable and protective hosts and referring to this value, we collect the evidence at the time of infringement occurrence to minimize the information modification of the evidence. We can reduce also the amount of logs that we use to analyze the infringement and can minimize the loss of the evidence.

  • PDF

A Study on the model of CCTV Image Information Integration portal (CCTV 영상자료 통합포털 구축 모델에 관한 연구)

  • Kang, Poo-Reum;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.43-51
    • /
    • 2012
  • CCTV would be the effective way in the prevention of abuse, as well as recorded image information evidence of the crime as a significant legal effect. But recorded image information As evidence by utilizing the Complaint/complaint handling, and administrative business processes that are currently operating offline procedural complexity and unnecessary time appear costly, privacy remains an issue to be solved, etc. Runoff. In this paper, incidence rate of offline business processing phase to solve the problems proposed to build unified portal for CCTV image information and the existing studies on the effectiveness of electronic civil service system, previous studies by analyzing e-government in accordance with laws and privacy laws, CCTV image information portal deployment model is applied to data integration occurs are trying to solve the problem effectively.

A Study on Appraisal in Electronic Records Environment (전자기록 환경에서의 평가에 관한 연구)

  • Kim, Myoung-hun
    • The Korean Journal of Archival Studies
    • /
    • no.11
    • /
    • pp.91-122
    • /
    • 2005
  • Appraisal is a basic archival function that analyzes values of records and determines the eventual disposal of records based upon their archival values. In electronic records environment, however, appraisal is different from traditional appraisal system that mainly is based on paper records. Since electronic records don't have physical entity and strongly depend on computer technologies, archivists fall into various dilemma in appraisal of electronic records. Moreover, because creation environment of electronic records is remarkably complex and diversified, appraisal of electronic records cannot be done until the later stages of the life cycle of the records. In Korea, appraisal system is founded on the Tables of Transaction for Records Scheduling through which disposal activities of all records are definite in a concrete form. However, there are little institutional infrastructures associated with appraisal of electronic records. Therefore this paper will intend to analyze characteristic features about appraisal of electronic records as a preliminary study for establishing appraisal system of electronic records in Korea. For this purpose, I have firstly compared creation environment of electronic records with traditional creation environment mainly based on paper records, and analyzed differences between appraisal of electronic records and traditional appraisal system based on paper records in view of recordness of electronic record. then I have examined functional appraisal that focuses on functions and activities in which the records are created and used, and discussed about main issues in relation to establishing appraisal system of electronic records.

A Study on Contents Security Method Based on a Content Delivery Network (CDN 환경에서 콘텐츠 보안 방법 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.51-56
    • /
    • 2008
  • Is caused by with growth etc. of the digital contents circulation market which leads suddenly accommodates in order to control the network traffic which increases and the researches which are various are being advanced the explosive evidence and a electronic transaction of the Internet user. The present paper protects a digital contents and a copyright from CDN system environments which will appear the center of new network service with the plan for the dispersive DRM system of CDN bases plans. Respect this dispersion DRM package formats which provide a stronger security characteristic in the contents which is stored the operational process of the dispersive DRM system for to be defined, CDN system and of existing interoperability they present.

  • PDF

Network Forensic using Fuzzy Decision Tree (퍼지 의사결정 나무를 이용한 네트워크 증거 분석)

  • Lee, Yong-Hyun;Lee, Seong-Yong;Kim, Dong-Kook;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1017-1020
    • /
    • 2007
  • 컴퓨터의 생활 전반에 걸친 영향으로, 컴퓨터는 우리 생활 속에서 빼놓을 수 없는 하나의 정보 매체로 자리 매김 되었다. 하지만 그 이면에는 컴퓨터를 이용한 전산망 침해 행위, 전자기록 위.변조, 각종 음란물 유통, 바이러스 제작 유포 등 많은 위험들이 우리를 위협하고 있다. 그래서 컴퓨터를 사용한 범죄 행위를 탐지하는 방법에 대한 관심이 높아지고 있다. 또한 각종 범죄 행위는 인터넷을 통한 범죄가 늘고 있어, 네트워크 정보를 통한 포렌식에 관한 연구가 활발하다. 하지만, 매일 많은 양의 패킷을 분석하는 것은 많은 전문 인력과 비용이 소요된다. 본 논문에서는 의사결정나무를 이용한 패킷분석을 통하여 네트워크 포렌식의 정보를 추출하는 방법을 제안한다.

  • PDF

Film Coating and Micro - Pattering Process of Nano-particle Conductive Ink System by Using ESD Method

  • Yang, Jong-Won;Jo, Sang-Hyeon;Sin, Na-Ri;Kim, Jin-Yeol
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2011.05a
    • /
    • pp.238.1-238.1
    • /
    • 2011
  • 본 연구에서는 non-contact deposition method의 일환인 ESD (electroctatic deposition)의 박막공정을 이용하여 Conductive layer 위에 Gold nanoparticles 및 Silver nanoparticles 등 organic/inorganic nano particle conductive ink system의 단분산 2D 박막을 제조를 연구하였다. ESD head를 통해 여러가지 organic / inorganic nano particle conductive ink system을 Deposition하였으며 분산도가 높고 균일한 단분산의 2차원 박막 구조를 얻을 수 있었으며, 전도성 PEDOT과의 Hybridization을 통해 균일상의 표면 Morphology를 갖는 고 전도성 투명 필름을 제작하였다. ESD technique를 이용하는 박막공정 기술은 나노입자 및 나노구조물의 박막화 패턴화를 포함하는 새로운 Deposition 기술로써 이를 응용하여 금속 나노입자의 2차원의 패턴화된 박막 구현을 통해 유기반도체 및 전자소자에의 응용성을 증거할 수 있었다.

  • PDF