• 제목/요약/키워드: Cyber Protection

Search Result 244, Processing Time 0.023 seconds

Development of Lifecycle Model for Copyright Infringement Site (저작권 침해 사이트 생애 주기 모델 개발)

  • Kim, Deuk-Hun;Jeong, Hae-Seon;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.101-121
    • /
    • 2020
  • Technology and culture are converging with various industries to create added value of contents. In addition, the country is creating a foundation environment for grafting new technologies onto the cultural content. However, copyright infringement by voice demand and supply is continuously occurring for cultural contents with copyright, and more and more recently, there have been increasing cases of creating and operating sites with servers overseas to bypass monitoring on infringement sites. To prevent this, various copyright protection studies are under way in many areas, but the current detection and prevention technologies are largely reactive and therefore have problems of effectiveness. Accordingly, this paper proposes a model of the lifecycle of copyright infringement site to lay the foundation for preemptive response to the distribution of illegal copies through analysis of the lifecycle of copyright infringement site.

Design and Implementation of TCP Supporting Optional Encryption Functionalities (선택적인 암호화 기능을 지원하는 TCP의 설계 및 구현)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.190-195
    • /
    • 2018
  • Recently, Due to the ongoing increase in cyber attacks and the improved awareness of privacy protection, most Internet services encrypt the traffic by using security protocols. Existing security protocols usually have additional layer between transport layer and application layer, and they incur additional costs because of encrypting all the traffic transmitted. This results in unnecessary performance degradation because it also encrypts data that does not require confidentiality. In this paper, we propose TCP OENC(Optional Encryption) which enables users of the application layer to optionally encrypt only confidential data. TCP OENC operates by TCP option to allow the application layer to encrypt the TCP stream transmitted only on demand. And it ensures transparency between the TCP layer and the application layer. To verify this, we verified that TCP OENC optionally encrypts the stream of TCP session on the embedded board. And then analyzed the performance of the encrypted stream by measuring the elapsed time.

A Study of Electronic Transaction Law : Basic Electronic Trasaction Law in Korea and Uniform Electronic Transaction Act (전자상거래법 소고 - 우리나라 전자거래기본법과 미국 통일전자거래법 (Uniform Electronic Transaction Act)을 중심으로 -)

  • Kim, Un-Young
    • Korean Business Review
    • /
    • v.13
    • /
    • pp.207-221
    • /
    • 2000
  • In this era of changing system, we may learn lesson from newly developed Uniform Electronic Transation Act(UETA) in 1999. Korea has its counterpart as the Basic Electronic Transaction Act and Electronic Signature Act made by 1999. While UETA stresses on transaction law between individuals, that of Korean stresses on the role of government in electronic transaction. Both laws have the common definitions as electronic record, electronic signature, however, UETA has its own definitions such as automated transaction, computer program, electronic agent, information, information processing system, and security procedure. Especially, transferable record in section 16 is one of the most unique concept which Korean law does not provide. Korean government is planning to introduce electronic note in the near future, which will make unprecedented reform in Korean financial industry. Since Korean law does not have such a concept as electronic note, revision of the law is expected soon. Korean law has its specialty which puts stress on cyber mall, authentication agency, and consumer protection. In U.S., the interpretation of law by court is important when they have disputes according to common law traditon. Studies on cases on disputes in U.S. is needed most for Korean application.

  • PDF

Analysis of Standardization Level for Information Security Technology (정보보호 기술 개발 및 표준화 현황 분석)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.53-59
    • /
    • 2013
  • As the hacking technology for cyber-terror and financial fraud evolves, the research and development for advanced and standardized information security technology is growing to be more and more important. In this paper, the domestic level of technology and standardization for information security as compared to advanced country is diagnosed, and future policy is presented by analyzing the influence effect for market and technology. The information security is classified into information security-based & user protection, network & system security, and application security & evaluation validation with details of OTP-based validation, smart-phone app security, and mobile electronic finance, etc. The analytic results indicate that domestic level is some poor for advanced country, the technological development and standardization capability for smart-phone app security and mobile electronic finance is needed, and finally the government's supporting policy for the future Internet is urgently needed.

Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models (공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델)

  • Kim, Nam-Jeong;Kong, Mun-Soo;Lee, Gang-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.17-27
    • /
    • 2017
  • Recently, as cyber attacks have been activated, many such attacks have come into contact with various media. Research on security engineering and reverse engineering is active, but there is a lack of research that integrates them and applies attack systems through cost effective attack engineering. In this paper, security - enhanced information systems are developed by security engineering and reverse engineering is used to identify vulnerabilities. Using this vulnerability, we compare and analyze lifecycle models that construct or remodel attack system through attack engineering, and specify structure and behavior of each system, and propose more effective modeling. In addition, we extend the existing models and tools to propose graphical attack specification models that specify attack methods and scenarios in terms of models such as functional, static, and dynamic.

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.

A Commodity Classification Method of Domestic Rack-Type Warehouse for Sprinkler System Design (스프링클러 설계를 위한 국내 적층형 물류창고의 수용물품 등급분류 방법)

  • Yang, So-Jin;Lee, Young-Jae;Kim, Woon-Hyung;Dewey, James M.;Ham, Eun-Gu
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.531-539
    • /
    • 2019
  • Purpose: The purpose of this study is to present the commodity classification method of domestic rack-type warehouse for sprinkler system design. Method: On-site surveys and classification criteria of the NFPA, FMDS, EN and Japan were analysed and ISO 12949 test were carried out with proposed each classification commodity. Result: Based on a heat of combustion, a classification method for extra high, high, medium and low are proposed. Conclusion: Sprinkler design criteria to secure the maximum extinguishing strength for each class of commodity need to be applied.

Digital Image Watermarking Scheme in the Singular Vector Domain (특이 벡터 영역에서 디지털 영상 워터마킹 방법)

  • Lee, Juck Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.122-128
    • /
    • 2015
  • As multimedia information is spread over cyber networks, problems such as protection of legal rights and original proof of an information owner raise recently. Various image transformations of DCT, DFT and DWT have been used to embed a watermark as a token of ownership. Recently, SVD being used in the field of numerical analysis is additionally applied to the watermarking methods. A watermarking method is proposed in this paper using Gabor cosine and sine transform as well as SVD for embedding and extraction of watermarks for digital images. After delivering attacks such as noise addition, space transformation, filtering and compression on watermarked images, watermark extraction algorithm is performed using the proposed GCST-SVD method. Normalized correlation values are calculated to measure the similarity between embedded watermark and extracted one as the index of watermark performance. Also visual inspection for the extracted watermark images has been done. Watermark images are inserted into the lowest vertical ac frequency band. From the experimental results, the proposed watermarking method using the singular vectors of SVD shows large correlation values of 0.9 or more and visual features of an embedded watermark for various attacks.

A Study on the Earthquake Safety Assessment of Energy Storage Facilities According to Climate Change (기후변화에 따른 에너지 저장시설 지진 안전성평가에 관한 연구)

  • Ham, Eun-Gu;Lee, Sung-Il
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.226-235
    • /
    • 2021
  • Purpose: The risk assessment for earthquakes was conducted in accordance with the current design standard (KBC2016) for the Coalescer facility, which is a major facility of energy storage facilities. Method: The risk assessment for earthquakes was conducted in accordance with the current design standard (KBC2016) for the Coalescer facility, which is a major facility of energy storage facilities. Result: In this study, by statically loading earthquake loads and evaluating the level of collapse prevention of special-class structures, facility managers can easily recognize and evaluate the risk level, and this analysis result can be applied to future facility risk management. Earthquake analysis was performed so that. Conclusion: As a result of analyzing the Coalescer facility according to the current design standard KBC2016, the stress ratio of the main supporting members was found to be up to 4.7%. Therefore, the members supporting Coalescer were interpreted as being safe against earthquakes with a reproducibility period of 2400 years that may occur in Korea.

The Difference of Housing Welfare Outcomes Between Public Rental Housing and Market Rental Housing (공공임대주택과 민간임대주택의 주거복지 성과 차이)

  • Lim, Se-Hee
    • 한국사회정책
    • /
    • v.25 no.3
    • /
    • pp.75-101
    • /
    • 2018
  • The purpose of the study was to examine the difference of housing welfare outcomes between public rental housing and market rental housing. Housing welfare is defined as living at adequate, affordable housing with stability and measured as substandard housing, unaffordable housing, unstable housing. This study was based on 2016 Housing Fact Finding Survey, sampled the households which their incomes are below 120% average income of city workers. This study controlled the socio-economic characters of householders to identify the difference of housing welfare performance between public and market rental housing. The study showed the ratios of public rental housing of substandard housing and unaffordable housing are not low. But It is revealed that the achievements of housing welfare of the public rental housing are better than market rental housing and the differences between them are more consistent after controlling the socio-economic characters of householders. The problems of substandard housing, unaffordable housing and unstable housing in market rental housing are more than public rental housing. This study provides the basis that the regulation for market tenant protection should be reinforced and the policy of public housing should be expanded and improved for housing welfare.