• Title/Summary/Keyword: Confidential data

Search Result 147, Processing Time 0.024 seconds

Real-time Abnormal Behavior Detection System based on Fast Data (패스트 데이터 기반 실시간 비정상 행위 탐지 시스템)

  • Lee, Myungcheol;Moon, Daesung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1027-1041
    • /
    • 2015
  • Recently, there are rapidly increasing cases of APT (Advanced Persistent Threat) attacks such as Verizon(2010), Nonghyup(2011), SK Communications(2011), and 3.20 Cyber Terror(2013), which cause leak of confidential information and tremendous damage to valuable assets without being noticed. Several anomaly detection technologies were studied to defend the APT attacks, mostly focusing on detection of obvious anomalies based on known malicious codes' signature. However, they are limited in detecting APT attacks and suffering from high false-negative detection accuracy because APT attacks consistently use zero-day vulnerabilities and have long latent period. Detecting APT attacks requires long-term analysis of data from a diverse set of sources collected over the long time, real-time analysis of the ingested data, and correlation analysis of individual attacks. However, traditional security systems lack sophisticated analytic capabilities, compute power, and agility. In this paper, we propose a Fast Data based real-time abnormal behavior detection system to overcome the traditional systems' real-time processing and analysis limitation.

A Study on Service-based Secure Anonymization for Data Utility Enhancement (데이터 유용성 향상을 위한 서비스 기반의 안전한 익명화 기법 연구)

  • Hwang, Chikwang;Choe, Jongwon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.681-689
    • /
    • 2015
  • Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.

The Health Hazard Evaluation Program by NIOSH (NIOSH의 건강유해도 평가 프로그램)

  • Jeong, Jee Yeon
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.10 no.1
    • /
    • pp.147-159
    • /
    • 2000
  • The NIOSH health hazard evaluation program (HHE program) was created in response to the mandate to determine the toxic effect and potential health hazard of workplace exposure, which is found in Occupational Safety and Health Act of 1970 and the Federal Mine Safety and Health Act of 1977, A primary benefit of HHE program is its ability to provide current health hazard data to employers and employees, which assists them in identifying solutions to occupational health and safety problems in their workplaces, The HHE program also stimulates research in the development and review of sampling methods and diagnostic tests and may prompt additional exposure assesment efforts and toxicological and epidemiological studies. HHE projects also provide human exposure-toxicity data that are used to asses the validity of existing occupational health standards and to support criteria for new standards of recommendation, The HHE request is classified into four categories: 1) category 1: As a administratively invalid, 2) category 2: These are valid requests for which a site visit is not essential to an appropriate response, 3) Category 3 : These are valid requests for which a site visit is necessary for an adequate evaluation, 4) These are valid request which present a complex problem or an opportunity for research, To carry out HHE program one or methods of investigation might be used: 1) direct observation and evaluation of production processes and employee work practices 2) employees exposure level and air contamination level 3) medical test or physical examinations of employees 4) private, confidential interviews with employees 5) review of employer's record of injuries and illness, employee exposure data, medical tests and job histories. After investigation and analysing the data, NIOSH issues a final report, giving finding and recommendation.

  • PDF

A Study on Method for Insider Data Leakage Detection (내부자 정보 유출 탐지 방법에 관한 연구)

  • Kim, Hyun-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.11-17
    • /
    • 2017
  • Organizations are experiencing an ever-growing concern of how to prevent confidential information leakage from internal employees. Those who have authorized access to organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. In this paper, we investigate the task of detecting such insider through a method of modeling a user's normal behavior in order to detect anomalies in that behavior which may be indicative of an data leakage. We make use of Hidden Markov Models to learn what constitutes normal behavior, and then use them to detect significant deviations from that behavior. Experiments have been made to determine the optimal HMM parameters and our result shows detection capability of 20% false positive and 80% detection rate.

A Study on Management of the Secret Data in Defense Information System (Focusing on Defense Ammunition Information System) (국방정보체계의 비밀데이터 관리 방안 연구 (국방탄약정보체계를 중심으로))

  • Yeo, Seong-Cheol;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1285-1292
    • /
    • 2014
  • Ministry of National Defense made has set a standard regulations and detail to classify the revision of the military security and the plan to adjust or use those secrets. Moreover, the confidential management system with online secret process is operated by it. However, the study for management plan of stored secret data in these systems should be urgently required because the current regulation of military headquarter is different from present military situation so that it is not applicable up to now. This paper is focused on the Defense Ammunition Information Systems to find the proper way to deal with the secret data of the Defense Information Systems. The purpose is to describe the management plan for the secret data consistent with the current situation of the Military by study for the secret classification and case study. Therefore limitations are considered and solutions are finally suggested in this paper.

Implementation of anti-screen capture modules for privacy protection (개인 정보 보호를 위한 화면 캡쳐 방지 모듈 구현)

  • Lee, Jong-Hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.91-96
    • /
    • 2014
  • According to the spread of computers and the development of the information society, people are focused on privacy information. As the development of its associated policy and technology, it has been tried various attempts to protect their personal information. In this paper, we proposed anti-screen capture modules to protect personal information or a company's confidential information for agencies and departments that keeps top security. As a result, we can prevent an illegal use or a stealing of another person's information in a public agency or personal computer. Also modules can stop exposures of top security data and personal information during they communicate with others in their institution's sever system.

A Study for The Pharmaceutical Pricing Standard of the National Health Insurance in Japan (일본의 건강보험 약가 산정기준에 관한 연구)

  • Ryu, Chung-Kul
    • Korea Journal of Hospital Management
    • /
    • v.14 no.4
    • /
    • pp.52-70
    • /
    • 2009
  • This study is to analyse the reimbursement prices of drugs in Japan. Japan has the world's second-largest pharmaceutical market, and the world's largest price-controlled pharmaceutical market. The reimbursement prices of new drugs in Japan are determined by confidential negotiations between the manufacturer and the Japanese Ministry of Health, Labor, and Welfare. Pharmaceuticals account for a larger share of total healthcare expenditures in Japan than in most other major pharmaceutical markets such as France, Germany, United Kingdom and United States. Prescription drugs' share of total healthcare spending has slightly increased in recent years, from 20.2% in 2000 to 21.5% in 2004, the most recent year for which data are currently available. This trend is attributable to the effect of the Japanese rapidly aging population that stimulates demand for healthcare services. There are several method of price setting for drugs as below. First, on the initial pricing of branded drugs, is the similar-efficacy pricing method and cost calculation method. Second is postmarketing price changes which are biennial price revisions under the rule of National Health Insurance. Third is the rule of the generics price. Recently, the generics market is expanded because there are increasing numbers of hospitals by DPCs(Diagnosis-procedure Combinations).

  • PDF

Economic Analyses of a Korean University's Internal Labor Market and Related Policy Issues -The Case of the 'M' University- (대학 내부노동시장의 경제 분석과 정책 대응 - 'M' 대학의 사례 -)

  • Cho, Woo-Hyun
    • Journal of Labour Economics
    • /
    • v.33 no.1
    • /
    • pp.31-52
    • /
    • 2010
  • Internal labor market in a firm is normally designed to solve the adverse-selection problem as well as the moral hazard problem in the world of information asymmetry. The internal labor market of a Korean university as a non-profit organization should have the same function as the firm. The purpose of this paper is to evaluate the economic performances of a university's internal labor market, using confidential data. And I suggest how to improve the performances of a Korean university's interal labor market. Specifically, I suggest incentive pay for university professors. I also suggest eight job classification and job-related pay system for staffs and secretaries to enhance the efficiency of the university's internal labor market.

  • PDF

A Study on the Educational Effectiveness of e-Learning (이러닝 수강생 교육 효과에 관한 연구)

  • Moon, Sook-Kyung;Nam, Sang-Zo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.161-168
    • /
    • 2007
  • In this study, we investigated the effectiveness of e-Learning, and attempted to identify factors affecting educational results. Based on survey data from 712 distance learning participants, we selected and verified factors affecting educational results through a correlation analysis and confidential test. Participants' scores were standardized and considered as a dependent variable representing educational effectiveness. Through several tests using the program AMOS, we suggest the most appropriate structural equation that can verify the causal relation of factors affecting the effectiveness of e-Learning. In result, the most important factor affecting score which is our measurement for educational effectiveness is job-possession. The fidelity has slightly direct influence to the score and the satisfaction has least indirect influence to the score.

Construction of Korean Space Weather Prediction Center: SCINTMON and All-Sky Camera

  • Kwak, Young-Sil;Hwang, Jung-A;Cho, Kyung-Suk;Bong, Su-Chan;Choi, Seong-Hwan;Park, Young-Deuk;Kyeong, Jae-Mann;Park, Yoon-Ho
    • Bulletin of the Korean Space Science Society
    • /
    • 2008.10a
    • /
    • pp.33.1-33.1
    • /
    • 2008
  • As a part of the construction of Korean Space Weather Prediction Center (K-SWPC), Korea Astronomy and Space Science Institute (KASI) installed a Scintillation Monitor (SCINTMON) and an All-Sky Camera to observe upper atmospheric/ionospheric phenomena. The SCINTMON is installed in KASI building in Daejeon in cooperation with Cornell university and is monitoring the ionospheric scintillations on GPS L-band signals. All-Sky Camera is installed at Mt. Bohyun in Youngcheon in cooperation with Korea Polar Research Institute. It is used to take the photograph for upper atmospheric layer through appropriate filters with specific airglow or auroral emission wavelengths and to observe upper atmospheric disturbance, propagation of gravity wave and aurora. The integrated data from the instruments including SCINTMON and All-Sky Camera will be used for giving nowcast on the space weather and making confidential forecast based on some space weather prediction models.

  • PDF