• Title/Summary/Keyword: Database security

Search Result 643, Processing Time 0.025 seconds

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

The Effect of Female Employment and Prejudice against Women on Justification of Family Violence: A Multi-Level Analysis (여성취업률과 여성에 대한 편견이 가정폭력 정당화에 미치는 영향: 개인과 국가 수준의 위계선형 분석)

  • Jang, Cho-Rok;Hong, Myeong-Gi;Hwang, Eui-Gab
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.11-40
    • /
    • 2017
  • This study analyzed individual-level and country-level factors affecting justification of domestic violence amid emerging social significance of family violence. For individual-level variables, prejudice against women in economic and social roles were used from the World Value Survey data. As for country-level variables, total of 36 countries were analyzed with indices that represents gender equality such as women's employment rate and democracy index. Women's employment rate was gathered from the Labour Market Database of the World Bank and democracy index was from the Economist Intelligence Unit. Results showed that both individual-level, prejudice against women in economic and social roles and country-level variables such as women's employment rate and democracy index had significant effects on justification of domestic violence. This result implies the importance of creating positive social culture which promotes positive attitudes towards perceptions of gender role and gender equality. As well, country-level endeavors to raise gender equality in employment deem important. Based on these findings, policy implications and recommendations for future research were discussed.

  • PDF

Tracking Recent Terrorism Trends in Europe and North America (최근 북미 및 유럽지역의 테러리즘 동향연구: 2012-2017)

  • Park, Gi-Bbeum;Lee, Chang-Han;Yu, Hyo-Eun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.109-133
    • /
    • 2017
  • The purpose of this study is to provide a general trends in recent terrorism in North America and Europe over the last five years. In particular the terrorism which occurred after 2012 shows the transition in trends as terrorists attacks civilians and public places(soft target) rather than targeting national facilities or specific people. For instance, the Parris terror attack and Barcelona vehicle attack shows this changes clearly. The terrorists appeared to attack ordinary people in urban places with high population density. Although the trends are changing, there are still few studies focusing on the current situation, and most of the previous studies have focused on changing in strategies and counter-terrorism in each country after the 9.11 terror. Meanwhile, studies examining the trends of terrorism have been limited to analyzing few cases or using relatively monolithic data of Global Terrorism Data(GTD). While the types of terrorism that occur recent years including 'new terrorism' in many respects, it seems to be difficult to classify with GTD data and/or case studies. Therefore, it is necessary to construct new data that perhaps grasp the recent trend of terrorism from different perspectives. In this point of view, this Based on this, this study collects terrorism data from North America and Europe for the past five years, by using the National Intelligence Service's annual report on terrorism as a sampling framework and analyse the trends and changes. The result shows similarities in the methods of attack, and the type of weapon they used. As vehicle attacks has been raised in few years, damage area has been widen and casualties also have been increased.

  • PDF

A Proposal of Personal Information DB Encryption Assurance Framework (개인정보 DB 암호화 검증 프레임웍 제안)

  • Ko, Youngdai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.397-409
    • /
    • 2014
  • According to the Personal Information Protection Act(PIPA) which is legislated in March 2011, the individual or company that handles personal information, called Personal information processor, should encrypt some kinds of personal information kept in his Database. For convenience sake we call it DB Encryption in this paper. Law enforcement and the implementation agency accordingly are being strengthen the supervision that the status of DB Encryption is being properly applied and implemented as the PIPA. However, the process of DB Encryption is very complicate and difficult as well as there are many factors to consider in reality. For example, there are so many considerations and requirements in the process of DB Encryption like pre-analysis and design, real application and test, etc.. And also there are surely points to be considered in related system components, business process and time and costs. Like this, although there are plenty of factors significantly associated with DB Encryption, yet more concrete and realistic validation entry seems somewhat lacking. In this paper, we propose a realistic DB Encryption Assurance Framework that it is acceptable and resonable in the performance of the PIPA duty (the aspect of the individual or company) and standard direction of inspection and verification of DB Encryption (the aspect of law enforcement).

Development for Prediction Model of Disaster Risk through Try and Error Method : Storm Surge (시행 착오법을 활용한 재난 위험도 예측모델 개발 : 폭풍해일)

  • Kim, Dong Hyun;Yoo, HyungJu;Jeong, SeokIl;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.37-43
    • /
    • 2018
  • The storm surge is caused by an typhoons and it is not easy to predict the location, strength, route of the storm. Therefore, research using a scenario for storms occurrence has been conducted. In Korea, hazard maps for various scenarios were produced using the storm surge numerical simulation. Such a method has a disadvantage in that it is difficult to predict when other scenario occurs, and it is difficult to cope with in real time because the simulation time is long. In order to compensate for this, we developed a method to predict the storm surge damage by using research database. The risk grade prediction for the storm surge was performed predominantly in the study area of the East coast. In order to estimate the equation, COMSOL developed by COMSOL AB Corporation was utilized. Using some assumptions and limitations, the form of the basic equation was derived. the constants and coefficients in the equation were estimated by the trial and error method. Compared with the results, the spatial distribution of risk grade was similar except for the upper part of the map. In the case of the upper part of the map, it was shown that the resistance coefficient, k was calculated due to absence of elevation data. The SIND model is a method for real-time disaster prediction model and it is expected that it will be able to respond quickly to disasters caused by abnormal weather.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

Abnormal Crowd Behavior Detection via H.264 Compression and SVDD in Video Surveillance System (H.264 압축과 SVDD를 이용한 영상 감시 시스템에서의 비정상 집단행동 탐지)

  • Oh, Seung-Geun;Lee, Jong-Uk;Chung, Yongw-Ha;Park, Dai-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.183-190
    • /
    • 2011
  • In this paper, we propose a prototype system for abnormal sound detection and identification which detects and recognizes the abnormal situations by means of analyzing audio information coming in real time from CCTV cameras under surveillance environment. The proposed system is composed of two layers: The first layer is an one-class support vector machine, i.e., support vector data description (SVDD) that performs rapid detection of abnormal situations and alerts to the manager. The second layer classifies the detected abnormal sound into predefined class such as 'gun', 'scream', 'siren', 'crash', 'bomb' via a sparse representation classifier (SRC) to cope with emergency situations. The proposed system is designed in a hierarchical manner via a mixture of SVDD and SRC, which has desired characteristics as follows: 1) By fast detecting abnormal sound using SVDD trained with only normal sound, it does not perform the unnecessary classification for normal sound. 2) It ensures a reliable system performance via a SRC that has been successfully applied in the field of face recognition. 3) With the intrinsic incremental learning capability of SRC, it can actively adapt itself to the change of a sound database. The experimental results with the qualitative analysis illustrate the efficiency of the proposed method.

An Efficient and Transparent Blockchain-based Electronic Voting and Survey System (효율성과 투명성을 확보한 블록체인 기반 전자투표 및 설문조사 시스템)

  • Kim, HyeonA;Na, YeonJu;Lee, JaeYun;Jeong, YuRi;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.4
    • /
    • pp.9-19
    • /
    • 2021
  • Electronic voting has been recognized as an alternative to complement the limitations of existing paper voting. At the same time, security concerns are being raised. This paper presents a blockchain-based electronic voting and survey system that can guarantee reliability. Our smart contract was created using Solidity on Ethereum which is a blockchain-based distributed computing platform, and the system was implemented in connection with the Javascript based user interface. In addition, in order to protect the personal information of participants, the system is generating hash of the personal data and storing the hash of users for the contract data. Since we exploited different kinds of languages for the system, we derived items of functionality testing and presented the functionality testing result. Moreover, we made use of the Chrome's performance evaluation functionality to see the response time of the blockchain-based system. In addition, we compared the performance with the system which has the same functionality on database. The contribution of this research is design and implementation of blockchain-based electronic voting system and presentation of the functionality and performance simulation result.

A Study on the Method of Creating a Safety Vulnerable Class Distribution Diagram for Non-Structural Countermeasures in the Comprehensive Natural Disaster Reduction Plan (자연재해저감종합계획 비구조적 대책의 안전취약계층도 작성방안에 관한 연구)

  • Doo Hee Kim;In Jae Song;Byung-Sik Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2023
  • The comprehensive natural disaster reduction plan, the highest plan in the disaster prevention field, was implemented by local governments. second plan is currently being formulated. In order to minimize human and property damage, structural and non-structural measures for each of the nine disaster types are established and implemented for 10 years. Structural measures are based on engineering and quantitative analysis, and the criteria for setting reduction measures are clear. Non-structural measures, however, currently lack the set criteria. the basic disaster and safety management law included the safety vulnerable class in 2018. Currently, the safety vulnerable class of the detailed establishment criteria of the comprehensive natural disaster reduction plan is being established, including children, the elderly, and the disabled. However, due to the lack of data securing and database construction by local governments, it is difficult to prepare a location map for establishing reduction measures for the safety vulnerable. Therefore, in this study, OPEN API data of the safety vulnerable class were collected and statistical information and GIS of SGIS information services were used. The distribution diagram of the safety vulnerable class in Samcheok, Gangwon-do, which is a sample area, and the distribution diagram of the safety vulnerable class in units of the output area (OA) in Geundeok-myeon were prepared.

Risk Assessment Improvement Method of Small Stream When Small Sized Hazard Infrastructures Survey (소규모 공공시설 조사시 세천의 위험도 평가 방안)

  • Jungsoo Rho;Kyewon Jun;Jaesung Shin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.23-35
    • /
    • 2023
  • Recently, the damage caused by natural disasters such as typhoons and localized torrential rains has been increasing rapidly. The Ministry of the Interior and Safety enacted a 「law on safety management of small sized infrastructures」 and local governments have to register small sized infrastructures with the National Disaster and Safety Management System (NDMS) until March 31st every year. Recently, each local government has ordered Safety inspections of small sized infrastructures and maintenance plans and six types of facilities, including small streams, small bridges, farm roads, access roads to village, inlet weirs, and drop structures are being surveyed and digitized into a database. Each facility is being evaluated for risk, and for those deemed hazardous, maintenance plans are being developed. However, since the risk assessment method of small sized infrastructures is not clear so that is conducted through visual investigation by field investigators, risk assessment is conducted in a subjective and ambiguous form. Therefore, this study presented a reasonable and quantitative risk assessment method by providing a quantitative evaluation indicator for small stream, which has the highest disaster risk among other small sized infrastructures, so that small sized hazard infrastructures can be selected to secure transparent evidence for improvement plans and action plans.