• Title/Summary/Keyword: Industrial secrets

Search Result 29, Processing Time 0.026 seconds

A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident (산업기밀 유출사고 사례분석을 통한 유형별 대응방안 연구)

  • Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.39-45
    • /
    • 2015
  • Industrial secrets that companies own recently protected by various act related industrial security such as Trade Secret Act, Act on Prevention of Divulgence and Protection of Industrial Technology, etc. However, despite such protection infringement and leakage accidents of industrial secrets is increasing every year. According to a survey conducted by KAITS(Korean Association for Industrial Technology Security) annual average of estimated damage by industrial secrets leakage is estimated to be "50 trillion won." This is equivalent to the amount of annual revenue of small businesses more than 4,700 units. Following this, industrial secrets leakage causes serious damages to competitiveness of nation and companies and economic. However investment and effort to the industrial secrets leakage crime is lack of level compared to the scale of damage. Actually, most companies except some major companies are lack of response action about industrial secrets leakage because of shortage of separate organization, workforce, budget for industrial secrets leakage security. This paper aims to understand the overall flow of the industrial secrets leakage crime through various taxonomy such as cause of occurrence and leakage pathway and grasp the condition of damage from industrial secrets leakage through analyzation of internal and external industrial secrets leakage crime. This is expected to be the basis for related research.

A study on the actual conditions of trade secrets in the MSDS and the improvement of the relevant system (사업장 MSDS 영업비밀 적용실태 및 제도 개선방안에 관한 연구)

  • Lee, Jong Han;Lee, Kown Seob;Park, Jin Woo;Han, Kyu Nam
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.21 no.3
    • /
    • pp.128-138
    • /
    • 2011
  • Objectives: It has been pointed out that there are problems in handling and managing chemicals due to trade secrets of Material Safety Data Sheet(MSDS). To date, some company intentionally leave out of several parts and use an inaccurate expression in MSDS. In particular, with the result of the inspection of the government and labour community, it is required that the 2nd section in MSDS included the composition and information on ingredients has to be provided with comprehensive expression to secure more reliability. Methods: Therefore, this study is aimed: 1) to recognize the current status of trade secrets of MSDS in workplaces with both domestic manufacturers of chemical products and multinational corporations; 2) to make contributions to prevention of the industrial accidents by providing the accurate information of MSDS; 3) to improve the risk communication system related with chemicals; 4) to impress workers on the importance of right of known for MSDS. With the result we analyzed the status of trade secrets in MSDS in 73 companies, such as petrochemistry production, paint production, metal processing oil production, detergent production, and international company related with chemicals, we have found that 38,150 (45.5%) have the trade secrets parts in the total number of 83,832 in MSDS. Also, based on the 288 MSDS gathered by the Occupational Safety and Health Research Institute (OSHRI) from 2005 to 2009, 41.7% of the MSDS are classified into the trade secrets. Conclusions: Therefore, to procure an assurance system of MSDS, we suggest that a MSDS picking up and checking system be legislated in the Occupational Safety and Health Act to protect workers from the unidentified chemical hazards due to the secret trade of MSDS.

PRACTICAL FHE PARAMETERS AGAINST LATTICE ATTACKS

  • Cheon, Jung Hee;Son, Yongha;Yhee, Donggeon
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.1
    • /
    • pp.35-51
    • /
    • 2022
  • We give secure parameter suggestions to use sparse secret vectors in LWE based encryption schemes. This should replace existing security parameters, because homomorphic encryption (HE) schemes use quite different variables from the existing parameters. In particular, HE schemes using sparse secrets should be supported by experimental analysis, here we summarize existing attacks to be considered and security levels for each attacks. Based on the analysis and experiments, we compute optimal scaling factors for CKKS.

Identification of hazardous chemicalsin semiconductor manufacturing (반도체 제조업에서 유해화학물질의 확인)

  • Kim, Soo-Geun
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.22 no.1
    • /
    • pp.20-25
    • /
    • 2012
  • Objectives: Hazard identification is the most important step in occupational health monitoring at the workplace. This paper reviewed the several related stuffs to the hazard identification in the semiconductor industry. Methods: I checked the MSDS system, chemical toxic informations, trade secrets and by-products by experience and the literature used in semiconductor industry. Results: I found and experienced as follows; (1) There are a few inventory and history of chemicals used in workplace. Toxic information of chemicals to be available is very limited. (2) There are many trade secrets in MSDS for chemical mixtures. It is difficult to identify the accurate information from MSDS. (3) By-products is necessary to identify that they will produce in workplace. Conclusions: It is necessary to regulate the obligations of employers which check the inventory and history of chemicals used in workplace. It is necessary to amend the trade secrets in MSDS system.

The Industrial Security along with the International Transfer of Technology (국제기술이전계약에서의 산업보안에 관한 연구)

  • SEO, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.1-20
    • /
    • 2017
  • The industrial technology (including trade secrets), which is commonly understood as systematic and applied technical knowledge, can be transferred to third parties by contracting for the transfer of technology or by granting of a licence. The activity of industrial espionage, due to the gradual increase of the economic interests of intellectual property, is displaying intensively in order to gain advanced technology information. With our outstanding high technology, but compared to the level of the advanced countries, the technical protection systems, the legal protection measures and the systematic management thereof may still be insufficient. Our industrial technology outflow abroad, due to the vulnerability to the security control system in our country, has been increasing since the 2000. Computer software and SNS, such as smart devices, appear as a rapid change in the technical information environment. In order to minimize the dead zone of a new industrial security, the country's organic activity is being conducted. In 2006, Industrial Technology Outflow Prevention and Protection Law was enacted, which emphasized the responsibilities of the country. In this paper for the economic entity's efforts to prevent technology leakage oversea, I have looked to how the industrial technology can be protected in terms of national security and economic benefits of our enterprises. To solve the above-mentioned problems hereof, Korean government should willingly establish a reliable legal system for supporting to enterprise's operations, and Korean companies should autonomously introduce a synthetic technology protection system and incorporate the confidentiality clauses in an international transfer of technology agreement with third parties.

  • PDF

Security Frameworks for Industrial Technology Leakage Prevention (산업기술 유출 방지를 위한 보안 프레임워크 연구)

  • YangKyu Lim;WonHyung Park;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.33-41
    • /
    • 2023
  • In recent years, advanced persistent threat (APT) attack organizations have exploited various vulnerabilities and attack techniques to target companies and institutions with national core technologies, distributing ransomware and demanding payment, stealing nationally important industrial secrets and distributing them on the black market (dark web), selling them to third countries, or using them to close the technology gap, requiring national-level security preparations. In this paper, we analyze the attack methods of attack organizations such as Kimsuky and Lazarus that caused industrial secrets leakage damage through APT attacks in Korea using the MITRE ATT&CK framework, and derive 26 cybersecurity-related administrative, physical, and technical security requirements that a company's security system should be equipped with. We also proposed a security framework and system configuration plan to utilize the security requirements in actual field. The security requirements presented in this paper provide practical methods and frameworks for security system developers and operators to utilize in security work to prevent leakage of corporate industrial secrets. In the future, it is necessary to analyze the advanced and intelligent attacks of various APT attack groups based on this paper and further research on related security measures.

A study on the Application Status to Trade Secret of GHS MSDSs distributed in the Workplaces and its Improvement Measures (산업체 유통 GHS MSDS의 영업비밀 적용실태 및 개선방안 연구)

  • Lee, Kwon Seob;Lee, Hye Jin;Hong, Mun Ki
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.26 no.3
    • /
    • pp.293-300
    • /
    • 2016
  • Objectives: This study is designed to survey the current status of trade secrets in GHS MSDS circulated in workplaces and indicate problems in the chemical information system. According to the survey results, we suggest management plans including political improvement of the trade secret system for MSDS and technical support to workplaces following enhanced chemical communication. Methods: To review this subject, we selected 153 manufacturers and six importers working in such fields as organic chemical production. We then investigated the retention status of GHS MSDS, application of trade secrets, and the content of trade secret components in MSDSs for mixtures. Results and Conclusions: Within the results, the content of trade secret ingredients was 67.4% (single: 9.0%, mixture: 75.6%). This is an increase compared with the previous results of 45.5% in 2011. Among 59,393 GHS MSDSs, 74.5% had ingredients less than 10% trade secret components, 19.1% had 10-30%, 1.8% had 30-50%, and 4.6% had more than 50%. To settle this issue, we recommend registration or evaluation of trade secrets as implemented in advanced countries. Also, business should be required to undergo regular evaluations of application status for trade secrets in workplace GHS MSDS.

Detection Framework for Advanced and Persistent Information Leakage Attack (지능적이고 지속적인 정보유출 공격 탐지 프레임워크)

  • Kil, Ye-Seul;Jeon, Ga-Hye;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.203-205
    • /
    • 2022
  • As digital transformation and remote work environment advanced by Covid-19 become more common, the scale of leakage damage to industrial secrets and personal information caused by information leakage attacks is increasing. Recently, advanced and persistent information leakage attacks have become a serious security threat because they do not quickly leak large amounts of information, but continuously leak small amounts of information over a long period of time. In this study, we propose a framework for detecting advanced and persistent information leakage attacks based on traffic characteristics. The proposed method can effectively detect advanced and persistent information leakage attacks using traffic patterns, packet sizes, and metadata, even if the payload is encrypted.

  • PDF

Industrial Security Crime's Realities and Counter-Measure (산업보안범죄의 실태 및 대응방안)

  • Seo, Bong Sung;Lim, You Seok
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.141-149
    • /
    • 2015
  • Modern society is to have an significant impact on the competitiveness of the country in which the economic value is very high occupancy and ensure a state-of-the-art science and technology. The country's core technology or industry security crimes going seized state-of-the-art technology firms can threat of damage to the country's economic security. In particular, the defense industry serious crime that is directly related to national security. The company's core technology and trade secrets leaked once the industrial countries must prevent security breaches and offenses of strict punishment measures because it is impossible to recover. Also, some advanced countries directly has been operating industrial security crime for the country's economy and national security. In recent years, Nation core technology infringement cases are rapidly increasing in the country. In addition, industrial security crime threat to national security. Therefore, the industry security crimes damage to the national security that infringe on the business secrets of core technologies and businesses. It is necessary to identify that industry security crime associated with the visibility of the broad scope of intellectual property protection.

Review of the Revised 2019 Trade Secret Protection Act and Industrial Technology Protection Act : Focusing on Civil and Criminal Remedies (2019년 개정 영업비밀보호법 및 산업기술보호법에 대한 검토: 민·형사적 구제를 중심으로)

  • Cho, Yongsun
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.333-352
    • /
    • 2019
  • In January and August 2019, there were amendments to the Unfair Competition and Trade Secrets Protection Act (UCPA) and the Industrial Technology Protection Act(ITPA). These amendments will contribute to technology protection. But these amendments need to be supplemented further. In the area of civil remedies, despite the introduction of treble damages in the case of the UCPA and ITPA, the provisions related to the submission of supporting data have not been maintained. Therefore, it is necessary to recognize the claim of the other party as true if it is maintained at the level of the revised Patent Act and the scope of submission of supporting data. And the enforcement of the case of compulsory submission for the calculation of damages, and the order of filing documents are not followed. ITPA, on the other hand, has introduced the compensation for damages, but there is no provision for estimating the amount of damages. Therefore, it is necessary to estimate the amount of lost profits, profits, and royalties. In the area of criminal remedies, both the UCPA and ITPA have raised the penalty, but the sentencing regulations are not maintained. In addition, although the recent outflow of technology has expanded beyond organizational deviations to organizational outflows, amendments need to be made in relation to the serious consequence for the punishment of related juristic persons, such as companies involved in it. It should be noted that Japan and the United States have corporate regulations and regulations. In addition, in relation to the confiscation system, Act on Regulation and Punishment of criminal proceeds concealment require that domestic defenses be confiscated by defense industry technology, while trade secrets and industrial technologies are confiscated only by "foreign" outflows, and an amendment is necessary.