• Title/Summary/Keyword: 침입범죄

Search Result 67, Processing Time 0.03 seconds

Developing a Model for Crime Prevention Hardware Performance Test and Certification System (방범하드웨어의 침입범죄 저항성능 시험·인증 체계에 관한 모형 연구)

  • Park, Hyeon-ho
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.255-292
    • /
    • 2013
  • Burglary (also called breaking and entering and sometimes housebreaking) is a crime, the essence of which is illegal entry into a building for the purposes of committing an offence. It is one of the most common types of crime and also a serious issue for every society. A house that is left insecure is an accessible and attractive target for burglars and therefore burglary resistance test & certification system for doors and windows has been developed in many countries. This paper explores several advanced foreign burglary resistance test/certifcation cases (the British SBD, the Dutch KOMO SKH/SKG, the Japanese CP mark, the Australian Standard Certification) for security products and domestic test/certification systems for fire safety products as a comparative study so that any improvement points can be gained for South Korea in the field of security product performance. The comparative analysis results show that South Korea is far behind the security product certification system and needs a lot of improvement in the system by benchmarking foreign cases. The domestic test/certification systems for fire safety products also give some insights for burglary-related security products' performance certification system in Korea. Overall, the need for relevant rules and regulations, the establishment of standards regarding testing and certification, including certified security +hardware product in building security certification system, performance testing as well as production testing (i.e. quality management system evaluation), the basic competency of testers, incentive system for certified/high quality security products were suggested in order to make an optimal model for the security production performance testing and certification system in Korea.

  • PDF

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

A RodSecurityRobot Model (로드경비로봇 모델 연구)

  • Yang, Keyong-ae;Shin, Seung-Jung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.4
    • /
    • pp.401-406
    • /
    • 2018
  • According to the National Security Service of the National Police Agency, intrusion into empty houses increased form 2013 to 2016. Consequentially this statistics seemed that house intrusion, burglary is increasing. Also according to the statistics of Public Prosecutors'Office, a total 203,573 theft crimes occurered in 2016, of which 18.9% were theft after intruding. By reson of this is most frequent case of intrusion and theft, we have been studing the RodSecurityRobot model to enhance security in many factories to manage. In order to care for security to the high place, we have propsed a road guard robot model which controls the ground in cooperation with the robot that manages the ground by using the drones. The robot and the drone move together to autonomy to avoid objects. And they check time interval. they also goes to the charger to charge when there is no battery.

은행원의 정보윤리 수칙에 관한 연구

  • 정경수;이동열;김병곤
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1997.10a
    • /
    • pp.489-502
    • /
    • 1997
  • 90년대에 들어오면서 개인용 컴퓨터 보급의 확산, 컴퓨터교육의 일반화, PC통신서 비스의 확대 등으로 인하여 우리 사회에 정보화가 급속히 이루어지면서 정보화의 역기능적 인 사례가 폭발적으로 증가하고 있다. 1955년에 발생한 역기능 사례중 대표적인 것은 컴퓨 터바이러스에 의한 피해, 개인정보를 다루는 기관에서 내부인에 의한 개인정보의 유출, 컴 퓨터에 무단 침입하여 자료의 변조 및 삭제, 금융기관에서 단말기를 조작하여 고객의 예금 을 횡령하는 경우, 그 외에 신용카드나 증권 및 채권을 위조한 사례 등이 포함되고 있다. 이와 같은 정보화사회의 역기능을 해결하기 위하여 관련법들이 제정되고 있지만 법만으로는 완전히 해결이 어렵다. 왜냐하면 대부분의 법들이 윤리적인 원칙에 입각하여 제정되지만 윤 리적인 문제와 법률적인 문제는 다르기 때문이다. 따라서 본 논문에서는 정보윤리의 개념과 중요성을 살펴보고, 컴퓨터 관련 범죄의 절대다수를 차지하고 있는 금융기관을 대상으로 설 문조사를 실시하여 종업원들의 정보윤리에 대한 의식 수준을 측정하고 컴퓨터관련 범죄의 예방을 위한 정보윤리 수준의 제고방안에 대하여 연구하였다.

  • PDF

General Purpose Packet Capturing Tool (범용 패킷 포획 도구)

  • 이준원;심영철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.606-608
    • /
    • 1998
  • 컴퓨터 통신의 발달로 인하여 정부기관, 학교, 연구소, 기업체등의 사회의 모든 분야에 걸쳐 인터넷 환경이 널리 보급되고 있다. 이를 통하여 컴퓨터간의 단순한 정보와 자원의 공유에 국한되었던 범위를 넘어 점자 결제, 전자 상거래, 상용 서비스 등 많은 편리함이 제공되고 있다. 그러나 최근 들어 이러한 인터넷을 이용한 불법 침입자들의 정보 유출이나 파괴 혹은 금융사고와 같은 범죄가 더욱 많아지고 지능화 되고 있다. 이러한 문제점을 보안 하기위해 불법적인 침입자들이 네트워크를 통해 시스템에 접근하여 중요한 정보를 유출 혹은 파괴하는 행위를 감시할 수 있는 시스템이 필요하게 되었다. 본 논문에서는 이러한 목적을 위해 사용하는 네트워크 모니터링 혹은 칩입 탐지를 위한 도구를 제안하고 기술할 것이다. 이 도구는 현존하는 도구들이 톡정 패킷만을 모니터링할 수 있는 문제점을 강력한 명세언어를 사용하여서 응용프로그램에서 사용하는 패킷까지도 포획할 수 있는 기능을 제공한다.

  • PDF

Hybrid Intelligent Intrusion Detection System Utilizing Local Image Analysis and Cloud Services (로컬 영상 분석과 클라우드 서비스를 활용하는 하이브리드 지능형 침입 감지 시스템)

  • Park, Yu-Hwan;Jeong, Yeong-Bin;Lee, Jeong-Hun;Hwang, Kwang-il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.956-959
    • /
    • 2018
  • 각종 테러 및 범죄 예방을 위한 지능형 영상분석 시스템을 구현하는데 기본적으로는 로컬 기반의 처리를 진행하고 필요에 따라 클라우드 기반의 처리가 병렬적으로 처리됨과 동시에 기존의 시스템에서 추가적인 구축, 설비비용 없이 설치되어있던 DVR 또는 NVR 장치를 활용하여 간단한 소프트웨어를 추가함으로서 영상분석 서비스를 이용 가능하도록 하여 영상분석 결과에 대한 신뢰성이 높고 비용 절약적인 하이브리드 지능형 침입 감지 시스템을 제안.

Implementation of Home Care Crime Prevention IoT System using Real-time Streaming Technology (실시간 스트리밍 기술을 활용한 홈 케어 방범 IoT 시스템 구축)

  • Jaehoon Sim;Nohyeon Park;Namseok Lee;Gyujin Son;Jinyoung Kim;Dongho You
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.11a
    • /
    • pp.218-221
    • /
    • 2022
  • 본 논문은 라즈베리 파이(Raspberry Pi) 아두이노(Arduino)을 이용하여 무단 침입자를 스마트폰을 통해 실시간으로 스트리밍 되는 영상을 통해 확인하고, 즉각적으로 신고할 수 있는 홈 케어 방범 IoT 시스템 구축에 대한 내용을 다룬다. 이는 1인 가구 및 비어있는 원룸 등의 무단 침입을 방지하고 범죄를 예방하는데 큰 도움이 될 것으로 기대한다.

  • PDF

Design and Implementation of Infrared Camera Guarding System Based on Web Service (적외선 카메라를 이용한 웹 서비스 기반 원격 트래킹 방범 시스템의 설계 및 구현)

  • Chung, Byong-Ho;Kwak, No-Jung;Kim, Young-Man
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.113-117
    • /
    • 2008
  • 범죄 예방과 자원 보호를 위해 CCTV 카메라를 이용하는 방범 시스템의 필요성은 점차 커지고 있다. 아날로그 형식에서부터 디지털 형식으로 발전된 형태의 방범 시스템이 개발되고 사용 중이지만, 비용이 높고 효율성이 떨어지는 문제가 있다. 본 논문에서는 웹 서비스 기반의 서버에 적외선 카메라를 연결하고 사용자가 사전 인지 없이도 클라이언트에서 실시간으로 침입을 탐지하여 적절하게 대처할 수 있는 방범 시스템을 설계하고 구현한다.

  • PDF

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

Improvement of the Checklist for Residential Housing's Crime Prevention Accreditation Assessment (주거시설에 대한 CPTED 평가인증 기준 개선방안 연구)

  • Park, Hyeon-Ho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.117-141
    • /
    • 2018
  • Police crime statistics report that residential housing such as apartment, low rise, detached houses is the second most vulnerable to crime, which is closely followed by the number of street crimes. Also residential houses are often exposed to quality-of-life crime, e.g burglary. It threatens the basic human rights of house residents in terms of safety and comfort within the urban living environment. This study examines related precedent studies regarding the vulnerability of residential housing including studios, multi-family housing from the viewpoint of crime prevention through environment design(CPTED), extracted the elements and items suitable for the safety of residential facilities and the certification evaluation indicators and check items to be the basis for the checklist are derived. Based on these evaluation indicators and inspection items, we conducted on-site surveys of residential facilities in three areas of Seoul, Yongin and Asan, and the final draft of the checklist was revised based on the results of the field survey. There are 43 items on the 7 fields of evaluation in the final version of checklist, 11 items in the management and operation, 20 items in the surveillance, 7 items in the access control, 1 item in the territoriality, 2 items in the activity support, and 2 items in the security and safety facilities. In addition, various points of interest were added to allow the administrator of the residential facility to earn points for special measures taken for safety. This checklist can be appropriately modified and utilized in consideration of the characteristics of each facility. Korean national police agency has CPOs to check the residential facilities in their jurisdiction using checklists and to certify excellent facilities with high level of safety.