• Title/Summary/Keyword: Leakage management

Search Result 662, Processing Time 0.027 seconds

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

Issues and Preventions of Insider Information Leakages in Public Agencies for National Security: Cyber Security and Criminal Justice Perspectives (국가안보를 위한 공공기관의 내부자 정보 유출 예방대책: 사이버 안보·형사정책 관점)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.167-172
    • /
    • 2016
  • The purpose of this study is to provide implications for preventing insider information leakages in public agencies for national security. First, the study examined the definitions and current usage of information security systems of public agencies were examined. Second, web-service base information leaks and malware-base information leaks were discussed and three major credit card companies' personal information leakage cases were analyzed. Based on the analysis, four solutions were provided. First, information leakages can be protected by using web filtering solutions based on the user, which make possible to limit frequencies of malware exposures. Second, vaccine programs and vaccine management system should be implemented to prevent information leakages by malware. Third, limit the use of portable devices within local networks to prevent information leakages and vaccines programs for malware should be regularly used. Forth, to prevent information leakages by smartphone malwares, data encryption application should be used to encrypt important information.

Neobladder-vaginal Fistula Repair with Modified Martius Bulbocavernosus Fat Pad Flap (변형 Martius 구해면체 지방피판술을 이용한 신생방광-질루의 치험례)

  • Myung, Yu-Jin;Park, Ji-Ung;Jeong, Eui-Cheol;Kim, Suk-Wha
    • Archives of Plastic Surgery
    • /
    • v.38 no.3
    • /
    • pp.329-332
    • /
    • 2011
  • Purpose: In developed countries, vesicovaginal fistula occur from various pelvic operations including total hysterectomy, leading to urinary leakage and incontinence. Although various methods have been proposed for adequate tissue coverage in fistula repair, the surgical treatment of is not simple and still controversial. We report a case of neobladder-vaginal fistula repair using modified Martius fat pad flap. Methods: A 62-year-old female patient underwent radical cystectomy with total abdominal hysterectomy and neobladder formation due to invasive bladder tumor 5 years ago. For 3 years following the operation, urine leakage was observed. Exploration demonstrated neobladder-vaginal fistula and primary repair including fistulectomy and direct closure was performed. Urinary incontinence relapsed 2 years after primary repair, and after demonstrating the recurrence of fistula on urography, repair of recurrent fistula was performed. After dissection of vagina and neobladder and closure of fistula by urologic surgeon, fibroadipose flap was elevated, rotated and advanced through the tunnel at vaginal sidewall, and interpositioned to the fistula site between neobladder and vagina. Results: There was no acute complication after the surgery and urethral catheter was extracted on the 8th day after the operation. During six month follow-up period after the operation, there is no clinical evidence of fistula recurrence. Conclusion: From our clinical experience and literature review, we think Martius fat pad flap is a useful technique in management of neobladder-vaginal fistula, for it provides enough vascularity, major epithelization surface and better lymphatic drainage, and also prevents overlapping of vesical, vaginal suture lines at the same time.

A Study on the Selection System of Waterproof Method by Using Database (데이터베이스화에 의한 지수공법 선정시스템에 관한 연구)

  • 천병식;최춘식;하광현
    • Journal of the Korean Geotechnical Society
    • /
    • v.18 no.6
    • /
    • pp.43-59
    • /
    • 2002
  • In this study, database systems which were used to select the waterproof method according to leakage patterns of underground structures were built by performing pilot tests, reviewing literatures, and analysing the gathered data statistically. The database was built by using check lists which consisted of 5 major items and 73 subdivided items, and 26 major parameters according to 4 classified grades were determined on the base of survey which considered various in-situ conditions. The database of waterproof methods was comprised of 10 methods which were applied in Korea. From the database of waterproof methods, application ranges and design conditions of waterproof methods were suggested. From the results of study, database system consists of parameters selection database, waterproof method database, and design condition database. From the results of pilot tests, when the database of waterproof methods was applied to design stage, saving time and reducing mistakes for selecting waterproof method were gained. In addition, when the database of waterproof methods was applied to construction stage, effects such as evaluation of applicability of waterproof method, improvement of constructability and post management were expected.

A study on the security policy improvement using the big data (빅데이터를 이용한 보안정책 개선에 관한 연구)

  • Kim, Song-Young;Kim, Joseph;Lim, Jong-In;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.969-976
    • /
    • 2013
  • The information protection systems of company are intended to detect all weak points, intrusion, document drain. All actions of people in company are recorded and can check persistently. On the other hand, what analyze security log generated by these systems becomes more difficult. Most staff who manages the security systems, and analyze log is more incomprehensible than a user or a person of drain for an information distribution process of the work-site operations and the management procedure of the critical information. Such a reality say the serious nature of the internal information leakage that can be brought up more. While the research on the big data proceeds actively recently, the successful cases are being announced in the various areas. This research is going to present the improved big data processing technology and case of the security field.

Regional Groundwater Flow Characteristics due to the Subway System in Seoul, Korea (지하철에 의한 서울특별시 광역 지하수 유동 특성)

  • Shin, Esther;Kim, Hyoung-Soo;Ha, Kyoochul;Yoon, Heesung;Lee, Eunhee
    • Journal of Soil and Groundwater Environment
    • /
    • v.20 no.3
    • /
    • pp.41-50
    • /
    • 2015
  • Hydrogeologic environment of the Mega City such as Seoul, suffers from rapid changes caused by urbanization, construction of underground subway or buildings, and contaminant loading by diverse anthropogenic activities. Understanding the present condition of groundwater environment and water budget is necessary to prevent natural and manmade disasters and to prepare for sustainable water resource management of urban environment. In this study, regional groundwater flow and water budget status of Seoul was analyzed using numerical simulation. Modeling result indicated that groundwater level distribution of Seoul generally followed the topography, but the significant decreases in groundwater level were observed around the subway network. Steady-state water balance analysis showed groundwater recharge by rainfall and leakage from the water supply network was about 550,495 m3/day. Surface water inflow and baseflow rate via Han River and major streams accounted for 799,689 m3/day and 1,103,906 m3/day, respectively. Groundwater usage was 60,945 m3/day, and the total groundwater leakage along the subway lines amounted to 114,746 m3/day. Modeling results revealed that the subway could decrease net groundwater baseflow by 40%. Our study result demonstrated that the subway system can have a significant influence on the groundwater environment of Seoul.

An Experimental Study on Detection of Gas Leakage Position by Monitoring Pressure Values at City Gas Pipeline (압력값 모니터링을 통한 배관 내 가스누출감지에 대한 실험적 연구)

  • Jin, Kyoung-Min;Choi, Gyu-Hong;Lee, Song-Kyu;Chung, Tae-Yong;Shin, Dong-Hoon;Hwang, Seung-Sik;Oh, Jeong-Seok
    • Journal of Energy Engineering
    • /
    • v.20 no.4
    • /
    • pp.292-297
    • /
    • 2011
  • Gas pipeline safety management and risk prediction are recognized as a very important issue. And the effort to prevent accidents is essential. So, in this study, it was studied through correlation of pressure changes for leak point detection in real-time. It experimented by installing the five leakage valves in the pipe of 378 m and compared the actual leak points with simulation results. The results showed that experimental leak points and the actual leak points have differences within the 6 m. And this technology has to be commercialized by the demonstration in dangerous zone.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

Security Analysis of Information Flow using SAT (SAT를 이용한 정보흐름의 안전성 분석)

  • Kim, Je-Min;Kouh, Hoon-Joon
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.253-261
    • /
    • 2016
  • As many people use internet through the various programs of PC and mobile devices, the possibility of private data leak is increasing. A program should be used after checking security of information flow. Security analysis of information flow is a method that analyzes security of information flow in program. If the information flow is secure, there is no leakage of personal information. If the information flow not secure, there may be a leakage of personal information. This paper proposes a method of analyzing information flow that facilitates SAT solver. The method translates a program that includes variables where security level is set into propositional formula representing control and information flow. The satisfiability of the formula translated is determined by using SAT solver. The security of program is represented through the result. Counter-example is generated if the program is not secure.

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.