• Title/Summary/Keyword: 증거수집

Search Result 275, Processing Time 0.027 seconds

스마트 홈 IoT 포렌식 기술 동향

  • Kim, Minju;Shon, Taeshik
    • Review of KIISC
    • /
    • v.31 no.6
    • /
    • pp.31-35
    • /
    • 2021
  • 다양한 스마트 홈 IoT가 개발됨에 따라 가정 내에서 IoT를 활용한 서비스가 확장되고 있다. 스마트 홈 IoT와 IoT가 등록된 스마트 폰은 서비스 제공을 위해 클라우드 서버와 통신을 수행한다. 클라우드 서버와 통신 과정에서 스마트 홈 IoT와 스마트 폰, 클라우드 서버에는 사용자에 대한 다양한 정보가 저장될 가능성이 있다. 사용자에 대한 다양한 정보가 클라우드 서버로 전송되는 것은 개인정보 문제를 야기할 수 있지만, 포렌식 관점에서는 범죄를 해결하는 데 증거로 사용될 수 있다. 따라서 본 논문에서는 클라우드 서버와 통신을 수행하는 클라우드 기반의 스마트 홈 IoT를 대상으로 데이터를 수집하는 기법을 알아보고 데이터 수집 기법이 적용된 기존의 스마트 홈 IoT 연구를 스마트 홈 IoT 기기 별로 나누어 분석한다.

Analyzing Coordination of Theory and Evidence Presented in Pre-service Elementary Teachers' Science Writing for Inquiry Activities (예비 초등교사의 과학 탐구 글쓰기 활동에서 나타난 이론과 증거의 조정 과정 분석)

  • Lee, Sun-Kyung;Lee, Gyu-Ho;Choi, Chui-Im;Shin, Myeong-Kyeong
    • Journal of The Korean Association For Science Education
    • /
    • v.32 no.2
    • /
    • pp.201-209
    • /
    • 2012
  • This study aims to explore patterns and characteristics of coordination between evidence and theories which were found in pre-service elementary teachers' writing for their science inquiry. Five science inquiry activities and a total of 115 writings of the participant teacher at the elementary teacher preparation university in Korea were collected and analyzed for this study. Based on the writing analyses there were found four types of coordination between the evidence and theory. We proposed four types as: Type 1-Consistency of evidence and theory; Type 2-Consistence of evidence and theory including more extension or elaboration of theory; Type 3-Inconsistence of evidence and theory Type 4-Inconsistence of evidence and theory followed by coordination of them. Firstly the findings indicated that the most to least frequent types were Type 1, Type 3, Type 2, and Type 4. The most frequent type was Type 1. It is interpreted that theory in the inquiry questions were frequently figured out by participants and they selected supporting evidence out of data found. There were rarely found relations between activity topics and frequencies of coordination types except in activity 1. The findings in this study will connect to the point of how students collaborate their previously owned knowledge with experiment planning, data analysis and interpretation and making of their own scientific claims.

The realism of Camille Claudel Authenticity in Narrative ("까미유 끌로델"의 리얼리즘 내러티브의 진실성)

  • Cha, Young-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.11a
    • /
    • pp.331-332
    • /
    • 2014
  • 21세기 포스터모더니즘 트렌드는 실존 인물인 예술가의 삶과 예술품을 다루면서, 회화, 조각, 스케치, 음향, 조각소리 등, 복합적인 콘텐츠 융합의 시청각 효과로 스토리의 시너지 효과를 낸다. 그럼으로써 내러티브의 진실성을 나타내는 것이다. 그러나 무엇보다도 신빙성 있는 탄탄한 증거자료 수집이 영화의 진실성을 뒷받침하고 있다.

  • PDF

3D Object Recognition for Localization of Outdoor Robotic Vehicles (실외 주행 로봇의 위치 추정을 위한 3 차원 물체 인식)

  • Baek, Seung-Min;Kim, Jae-Woong;Lee, Jang-Won;Zhaojin, Lu;Lee, Suk-Han
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.200-204
    • /
    • 2008
  • In this paper, to solve localization problem for out-door navigation of robotic vehicles, a particle filter based 3D object recognition framework that can estimate the pose of a building or its entrance is presented. A particle filter framework of multiple evidence fusion and model matching in a sequence of images is presented for robust recognition and pose estimation of 3D objects. The proposed approach features 1) the automatic selection and collection of an optimal set of evidences 2) the derivation of multiple interpretations, as particles representing possible object poses in 3D space, and the assignment of their probabilities based on matching the object model with evidences, and 3) the particle filtering of interpretations in time with the additional evidences obtained from a sequence of images. The proposed approach has been validated by the stereo-camera based experimentation of 3D object recognition and pose estimation, where a combination of photometric and geometric features are used for evidences.

  • PDF

Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation (모바일 포렌식 증거능력 확보 방안 연구)

  • Eo, Soowoong;Jo, Wooyeon;Lee, Seokjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.135-152
    • /
    • 2016
  • Because of the evolution of mobile devices such as smartphone, the necessity of mobile forensics is increasing. In spite of this necessity, the mobile forensics does not fully reflect the characteristic of the mobile device. For this reason, this paper analyzes the legal, institutional, and technical considerations for figuring out facing problems of mobile forensics. Trough this analysis, this study discuss the limits of screening seizure on the mobile device. Also, analyzes and verify the mobile forensic data acquisition methods and tools for ensuring the admissibility of mobile forensic evidence in digital investigation.

A Study on the Development of a Platform for the Prevention of Digital Sexual Crimes in the Virtual-Reality Metaverse (가상현실 메타버스 디지털 성범죄 예방을 위한 플랫폼 구축 제안 연구)

  • Jae-Won, Hwang;Jung-Heum, Park;Sang-Jin, Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1157-1166
    • /
    • 2022
  • With the advent of the non-face-to-face era, a new type of digital sexual crime with avatars is emerging on the Metaverse virtual reality platform. Due to the lack of clearly established in legal and regulatory systems, it is challenging to punish offenders and acquire digital proof for sexual crimes using these avatars. This research aims to suggest a service and technological solution is development platform that may assist crime prevention and the collection of digital evidence, with a particular emphasis on digital sex crimes that occur in the metaverse, a virtual reality realm. This study explores the reasons behind the difficulty of legal application in the metaverse and then determines the types of digital sex crimes that may occur in the metaverse. In addition, it is suggested what service components the metaverse should contain from the stage of construction and design, can be utilized what element of metaverse in order to prevent illegal activity of avatars.

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

An Analysis of Chinese Maritime Simplified Navigation Systems for Digital Forensic of Chinese illegal fishing vessels (중국 불법조업 선박 포렌식을 위한 중국 항해장비종류 및 모델 분석)

  • Byung-Gil Lee;Byeong-Chel Choi
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2021.11a
    • /
    • pp.139-141
    • /
    • 2021
  • In the maritime digital forensic part, it is very important and difficult process that analysis of data and information with vessel navigation system's binary log data for situation awareness of maritime accident. In recent years, anaysis of vessel's navigation system's trajectory information is an essential element of maritime accident investigation for vessel digital forensic process. So, we analysis of maritime navigation systems of vessel and feature of device and environments. In the future, we will research on information of ship's trajectory and movement for useful forensic service.

  • PDF

The Research for Digital Evidence Acquisition Procedure within a Full Disk Encryption Environment (Full Disk Encryption 환경에서 디지털 증거 수집 절차에 관한 연구)

  • Jang, Sung-Min;Park, Jung-Heum;Pak, Chan-Ung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.39-48
    • /
    • 2015
  • As a growing number of people are concerned about the protection of personal information, the use of encryption solution has been increased. In addition, with the end of support for Windows XP and the improvement of operating system, the use of the Full Disk Encryption solution like Bitlocker will be increased. Therefore, it is necessary to consider countermeasures against Full Disk Encryption for the future digital forensic investigation. This paper provides the digital evidence acquisition procedure that responds to the Full Disk Encryption environment and introduces the countermeasures and detection tool against Full Disk Encryption solutions that are widely used.

Practical and Legal Challenges of Cloud Investigations (클라우드 환경에서 수사 실무와 법적 과제)

  • James, Joshua I.;Jang, Yunsik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.33-39
    • /
    • 2014
  • An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in both theory and practice, and supplemented with current literature on the subject. Finally, legal challenges with digital forensic investigations in cloud environments are discussed.