• Title/Summary/Keyword: 침해

Search Result 2,138, Processing Time 0.024 seconds

Factors That Influence Digital Contents Piracy (디지털 콘텐츠 저작권 침해의도에 관한 영향요인 연구)

  • Kim, Kyunghee;Kim, Tae Ung
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.63-71
    • /
    • 2013
  • This investigates the major factors that impact digital contents piracy in a college environment, mainly because the violation of the copyright is known to occur most often in college environments. Using a theoretical model based on Theory of Reasoned Action, this study examines the causal relationships among the variables of the digital contents piracy behavior. Major research variables include intention to commit piracy, attitude, social influence, fear of legal consequences, enjoyment, perceived easiness, knowledge level, and facilitating conditions. Survey responses from 335 undergraduate and graduate students indicate that the attitude and social influence affect the intention to commit piracy, and that social influence, enjoyment and perceived easiness influence the attitude. But, contrary to our expectation, knowledge level has been found to have no impact on the attitude. Perceived easiness, fear of legal consequences and facilitating conditions have all been shown to affect social influence. As a conclusion, the academic and practical implications of these findings are discussed.

  • PDF

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

A study of Copyright Infringement Countermeasures for designers (디자이너를 위한 저작권 침해 대응 방안 연구)

  • Lee, Je;Ryu, Seuc-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.447-452
    • /
    • 2016
  • Designers need to manage their copyrights. Designers be placed in both situations. The two situations is sometimes the case that infringes their copyrights and infringes the copyrights of others. But most designers do not know what to do to deal with this situation. Designers have to judge a lot of things for themselves. Designers should inform the user that you have infringed my copyright. And they will have to think about the legal proceedings. This paper was written based on the legal process, conducted from 2012 to 2014. Copyright infringement countermeasures for designers through this case were investigated. And to organize a correspondence course was organized personal correspondence, legal action, ruling process. The study of the processes for copyright holders themselves to respond to the piracy situation is needed.

An Analysis on Intention to Use Information Service for Personal Information Breach (개인정보 침해 관련 정보 제공 서비스 사용 의도 분석)

  • Kim, Taek-Young;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.199-213
    • /
    • 2018
  • Since 2008, large-scale personal information breach incidents have occurred frequently. Even though national education, policy, and laws have been enacted and implemented to resolve the issue, personal information breaches still occur. Currently, individuals cannot confirm detailed information about what personal information has been affected, and they cannot respond to the breaches. Therefore, it is desirable to develop various methods for preventing and responding to personal information infringement caused by breach and leakage incidents and move to privacy protection behaviors. The purpose of this study is to create understanding of personal information security and information breach, to present services that can prevent breaches of personal information, to investigate the necessity of and analyze the potential public demand for such services, and to provide direction for future privacy-related information services.

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

A Study on the Infringement Incident Response Curriculum Model in IoT Environment (사물인터넷 환경에서 침해사고대응 교육과정 모델에 관한 연구)

  • Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.55-60
    • /
    • 2023
  • The IoT environment is very vulnerable to security threats, and if an intrusion occurs, it can cause great damage. In order to strengthen the security of the IoT environment, a curriculum that considers the characteristics of the IoT environment is needed. In this paper, we propose a curriculum model for cyber incident response in the Internet of Things environment. The proposed curriculum model was designed as a model for security threats in the IoT environment, types of intrusion incidents, and incident response procedures. The proposed curriculum model is expected to contribute to improving security awareness in the IoT environment and fostering cyber incident response experts in the IoT field. The proposed curriculum model strengthens the security of the IoT environment and is expected to be safe through security incident response in the IoT.

A Study on the Utilization of Artificial Intelligence-Based Infringement Analysis Tools (인공지능 기반 침해분석 도구 활용에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.3-8
    • /
    • 2024
  • Recently, in order to build a cyber threats have increased in number and complexity. These threats increase the risk of using personally owned devices for work. This research addresses how to utilize an AI-enabled breach analysis tool. To this end, we developed and proposed the feasibility of using an AI-based breach analysis tool that reduces the workload of analysts and improves analysis efficiency through automated analysis processes. This allows analysts to focus on more important tasks. The purpose of this research is to propose the development and utilization of an AI-based breach analysis tool. We propose a new research direction in the field of breach analysis and suggest that automated tools should be improved in performance, coverage, and ease of use to enable organizations to respond to cyberattacks more effectively. As a research method, we developed a breach analysis tool using A.I. technology and studied various use cases. We also evaluated the performance, coverage, and ease of use of automated tools, and conducted research on predicting and preventing breaches and automatically responding to them. As a result, this research will serve as a foundation for the development and utilization of AI-based breach analysis tools, which can be used to respond to cyberattacks more effectively through experiments.

국내 DB 지적재산권 침해 및 보호 관련 현황 조사

  • Korea Database Promotion Center
    • Digital Contents
    • /
    • no.1 s.68
    • /
    • pp.42-43
    • /
    • 1999
  • 한국데이터베이스진흥센터는 지난해 10월~11월에 걸쳐 국내 데이터베이스 제작업체 400여곳을 대상으로 (응답업체 81개처) 데이터베이스 지식재산권 침해 및 보호와 관련한 현황 조사를 실시하였다. 조사 결과에 따르면 데이터베이스의 지적재산권 침해가 높게 나타나고 있는 반면 이에 대해 보호받은 적이 있느냐의 질문에는 대부분 아니라고 응답함으로써 데이터베이스의 지적재산권 보호에 심각한 문제가 있음이 나타났다.

  • PDF

한국전산망침해사고 대응팀협의회

  • Korea Database Promotion Center
    • Digital Contents
    • /
    • no.2 s.45
    • /
    • pp.22-24
    • /
    • 1997
  • 작년 어느 무렵 포항공대와 한국과학기술대 사이에서 벌어진 해킹논쟁은 시사하는 바가 크다. 그만큼 해킹이나 전산망 침해사례가 우리에게 더욱 가까이 와 있음을 의미하는 것이다. 이때 우리에게 필요한 것은 무엇인가. 전문가들은 혼자의 힘으로는 이 사고를 예방하기 힘들다고 경고한다. 이런 의미에서 태동된 한국전산망침해사고 대응팀협의회(CONCERT)를 찾아 그 임무와 활동계획 등에 대해 들어봤다.

  • PDF

인터넷 침해사고 조기탐지 및 대응 체계 운영 현황

  • 정태인;강준구;이두원
    • Review of KIISC
    • /
    • v.15 no.1
    • /
    • pp.9-16
    • /
    • 2005
  • 인터넷침해사고대응지원센터(KISC)에서는 2003년 1원 25일에 있었던 인터넷의 접속 불능 사태의 재발을 방지하기 위하여 기존의 한국정보보호진흥원(KISA)내의 해킹바이러스 상담지원센터를 확대 개편하여 KISC글 개소하여 운영하고 있다. 본 고에서는 KISC 개소 1주년을 맞이하여 운영현황 및 주요 인터넷 침해사고 대응 사례를 살펴보고, 개선점을 찾고자 한다.