• Title/Summary/Keyword: 정보보호시장

Search Result 518, Processing Time 0.025 seconds

The relationship between security incidents and value of companies : Case of listed companies in Korea (정보보안 사고가 기업가치에 미치는 영향 분석: 한국 상장기업 중심으로)

  • Hwang, Haesu;Lee, Heesang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.649-664
    • /
    • 2015
  • Recently, the risk of security incidents has been increased due to change of IT environment and development of new hacking methods. Event study methodology that measures the effect of a specific security incident on the stock price is widely adopted to analyze the damage cost of security incidents on market value. However, analysis of company's temporary stock price change is limited to immediate practical implication, and reputation loss should be considered as a collateral damage caused by security incidents. We analyzed 52 security incidents of listed Korean companies in the last decade; by refining the criteria presented by Tobin's q, we quantitatively showed that the companies has significantly higher reputation loss due to security loss than the other companies. Our research findings can be used in order that the companies can efficiently allocate its resource and investment for information security.

A Survey of applying Fully Homomorphic Encryption in the Cloud system (클라우드 컴퓨팅 환경에서의 개인정보보호를 위한 완전 동형 암호 적용 방안 고찰)

  • Kim, Sehwan;Yoon, Hyunsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.941-949
    • /
    • 2014
  • Demands for cloud computing service rapidly increased along with the expansion of supplying smart devices. Interest in cloud system has led to the question whether it is really safe. Due to the nature of cloud system, cloud service provider can get a user's private information and disclose it. There is a large range of opinion on this issue and recently many researchers are looking into fully homomorphic encryption as a solution for this problem. Fully homomorphic encryption can permit arbitrary computation on encrypted data. Many security threats will disappear by using fully homomorphic encryption, because fully homomorphic encryption keeps the confidentiality. In this paper, we research possible security threats in cloud computing service and study on the application method of fully homomorphic encryption for cloud computing system.

Token-Based User Dynamic Access Control for Secure Device Commands in Smart Home (스마트 홈에서 안전한 디바이스 제어 명령을 위한 토큰 기반 사용자 동적 접근제어 기법)

  • Hyeseon Yu;Minhye Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.553-568
    • /
    • 2024
  • Due to the rapid development of IoT technology and the increase in home activities after the COVID-19 pandemic, users' demand for smart homes has increased significantly. As the size of the smart home market increases every year and the number of users increases, the importance of personal information protection and various security issues is also growing. It often grants temporary users smart home owner rights and gives them access to the system. However, this can easily allow access to third parties because the authorities granted are not properly managed. In addition, it is necessary to prevent the possibility of secondary damage using personal information collected through smart home devices and sensors. Therefore, in this paper, to prevent indiscriminate access to smart home systems without reducing user convenience, access rights are subdivided and designed according to the functions and types of smart home devices, and a token-based user access control technique using personal devices is proposed.

A Study on the Regulations and Market of Location Based Service(LBS) (위치기반서비스(LBS)의 규제와 시장 활성화에 관한 연구)

  • Nam, Sunmi;Park, Minsu;Kim, Kyungshin;Kim, Seungjoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.141-152
    • /
    • 2014
  • According to proliferation of smartphones and extension of various services utilizing location information, markets of Location Based Service(LBS) have been activating all over the world. However, as the privacy violations of personal location information have been continuously increased, interests in the deregulation have been grown as well. While the regulations of location information can protect personal information and privacy, it causes some negative affect in terms of development of diverse services and industry activation. In particular, Korea is the only country that has applied strict restrictions of LBS by making location information related independent 'Location Information Protection Act'. As a result of this, the issues that LBS industry has no longer developed in Korea and it is necessary for us to relax the regulations have been consistently raised. Thus, this study confirmed that there was the negative(-) relationship between the regulations and the market activation of LBS by comparing and analyzing the correlation between the market growth rate of LBS and relevant regulations at home and abroad; the regulations are strengthened, restrictions in market entry and the business performance can occur. In other words, LBS business will be able to be activated if the regulations which have not directly related to the privacy have been relaxed.

Drone Delivery Service Commercialization Plan Study (드론 택배서비스 실용화 방안 연구)

  • Kang, Ho-Jeung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.2
    • /
    • pp.281-312
    • /
    • 2020
  • Despite the recent economic difficulties, the on-line market is overtaking the off-line market. Since US Amazon CEO Jeff Bezos mentioned that a delivery service using drones is possible, it has been creating new perspectives and values that have never been seen before. Drones are being used in various fields. Among them, the delivery service using drones will be the future growth engine of Korea in cooperation with the 4th industrial revolution. However, as drones are put into practical use, problems such as human life and property damage and personal information protection due to public collisions or falls are expected. The practical use of future drones is inevitable, not optional. As a method for commercialization of drones, first, securing safety through drone use and securing a national certification system, which is the minimum standard system for drone safety, and second, securing various infrastructures by activating drone use, and third, aviation regulations and personal information protection, etc. It needs to be supplemented in terms of laws and regulations.

Analysis of Information Security Technology Development for ICT Convergence Services (ICT 융합서비스 제공을 위한 정보보호 기술개발 현황분석)

  • Kim, Dong-Chul
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.27-33
    • /
    • 2015
  • In this paper, the development level of information security technology for internet of things(Iot), big data and clo ud services is analyzed, and the detail policy is proposed to be leader in area of patents and ICT standard. The conc ept of ICT convergence is defined frist, market and current state of technology for three convergence services is the n analyzed, and finally main function and security target for each technology are presented. The evaluation criteria a nd IPR are analyzed to diagnose the level of patent and standard for the technology. From the results, even though the domestic competence is inferior compared to other advanced country, the efficient policy should be presented by using our capability for the big data and cloud. Furthermore, the technology development for the IoT and cloud is ne eded in advance considering the market-technology influence effects. In addition to, M2M security framework in IoT, data security in big data and reliable networking in cloud should be developed in advance.

Tariffs on Irrelevant Industries (무관한 산업에 대한 정벌적 관세부과)

  • Rhee, Byung-Chae
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.399-410
    • /
    • 2011
  • Traditionally, tariffs have been used to protect domestic industries. In particular, a country with more bargaining power makes a punitive threat to maintain a certain level of market share in the market of other country. In this paper, we study the effect of punitive tariffs on an irrelevant industry. In particular, when a country tries to achieve a market share or quantity target in an industry, we examine the effect of threats to impose tariffs on the major export of another industries which are irrelevant to the targeted industry. Using a simple duopoly model, we show that there is a Cournot-Nash equilibrium which supports that a country has an incentive to resolve a trade dispute voluntarily to protect its major export industry under the credible treat of punitive tariffs. This result is mainly due to the fact that the trade policy of a country concerns the aggregate benefits from trade over all its export industries. To obtain this result, this paper employs the linkage between the targeted and irrelevant industries by using the lobby of the irrelevant industry to curb the targeted industry. A lot of recent bilateral trade agreements can be applied to our results.

  • PDF

The Study on Security Architecture and Security Algorithm on IMT-2000 of 3GPP (3GPP에서 IMT-2000용 보안 아키텍처 및 보안 알고리즘에 관한 연구)

  • Hong, Seong-Nam;Choe, Seong;Jeong, Il-Yong
    • Annual Conference of KIPS
    • /
    • 2001.04b
    • /
    • pp.685-688
    • /
    • 2001
  • IMT-2000 시스템의 서비스는 회선 방식의 음성 및 데이터 서비스를 지원하는 기존 시스템의 기능을 포함하면서 데이터 전송률을 최대 2Mbps로 광대역화하여 고속 데이터 전송 등의 멀티미디어 서비스를 제공하며 국제 표준화된 이동 전화망의 접속 표준을 사용하여 글로벌 로밍 서비스가 제공된다. 그 중 정보보호 서비스의 요구는 기존 이동통신 시장에서와 같이 중요한 부분으로써 이미 ITU-R에서는 그 동안 발생한 보안 침범의 유형을 분석하고 방어 방법에 대한 연구를 진행하고 있다. 그러므로 본 논문은 국내 정보통신망 환경에서 적용될 IMT-2000 보안기술의 개발과 보안 구조의 국제 표준기술 연구개발을 위하여 3GPP에서 연구중인 UMTS(유럽형 IMT-2000)에서 표준화 작업중인 보안 아키텍처와 여기서 사용하는 KASUMI 알고리즘을 분석한다.

  • PDF

Analysis for Performance Evaluation of IPSec and SSL (IPSec과 SSL의 성능평가를 위한 분석)

  • Park, Yu-Ra;Lee, Kyung-Bae;Lee, Hye-Min;Lee, Kwang-Woo;Lee, Keun-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.933-936
    • /
    • 2005
  • 인터넷의 발달은 우리 생활에 많은 변화를 가져왔다. 이제는 단순한 통신뿐만 아니라 금융, 경제 분야에 이르기까지 다양한 범위의 활동들이 네트워크에서 이루어지고 있으며 그에 따라 정보보호의 중요성도 증가했다. 네트워크 상에서의 정보보를 위해 현재 대표적으로 VPN 시장에서는 IPSec 기반의 VPN과 SSL 기반의 VPN이 경쟁을 하고 있다. 이에 본 논문에서는 IPSec과 SSL 프로토콜의 성능을 비교하고 다양한 관점에서 성능을 평가한 사례들을 분석한다. 그리고 이를 통해 IPSec과 SSL 프로토콜의 대한 성능평가 도구의 연구 필요성을 제시한다.

  • PDF

The Analysis on The Technical Trend of Security Architecture on IMT-2000 (IMT-2000용 보안 아키텍처 기술동향에 관한 분석)

  • Choi, Seong;Chung, Il-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.582-584
    • /
    • 2000
  • IMT-2000 시스템의 서비스는 회선 방식의 음성 및 데이터 서비스를 지원하는 기존 시스템의 기능을 포함하면서 데이터 전송률을 최대 2Mbpe로 광대역화하여 고속 데이터 전송 등의 멀티미디어 서비스를 제공하며 국제 표준화된 이동 전화망의 접속 표준을 사용하여 글로벌 로밍 서비스가 제공된다. 그 중 정보보호 서비스의 요구는 기존 이동통신 시장에서와 같이 중요한 부분으로써 이미 ITU-R에서는 그 동안 발생한 보안 침범의 유형을 분석하고 방어 방법에 대한 연구를 진행하고 있다. 그러므로 본 논문은 국내 정보통신망 환경에서 적용될 IMT-2000 보안기술의 개발과 보안 구조의 국제 표준기술 연구개발을 위하여 3GPP에서 연구중인 UMTS(유럽형 IMT-2000)에서 표준화 작업중인 보안 아키텍처의 기술동향을 분석한다.

  • PDF