• Title/Summary/Keyword: Misuse Service

Search Result 51, Processing Time 0.024 seconds

A Study on the Improvement of Information Protection Policy to Prevent the Misuse of Personal Information : Based on the Results of the Monitoring Personal Information Misuse in Financial Companies (개인정보 오남용 예방을 위한 정보보호정책 개선에 관한 연구 : 금융회사의 개인정보 오남용 모니터링 결과 중심으로)

  • Kim, Young-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1437-1446
    • /
    • 2019
  • As a result of various personal information leakage incidents, the government implemented enhanced privacy protection measures, and financial companies are making efforts to periodically check whether personal information is misused according to government measures, but the problem of misuse of personal information is still not improved. The purpose of this study is to analyze the results of field experiments using the monitoring system for misuse of personal information and to suggest ways to improve the misuse problem. Based on the specific deterrence theory, this study examined the effects of misuse prevention according to the method of dealing with misusers, and analyzed the relationship between the duties of misusers and their years of service and misuse. It is expected that the analysis results of this study will be used for effective policy establishment.

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

The Empirical Study on the Misuse Intention Using Information System : Focus on Healthcare Service Sector (정보시스템 오남용 의도에 관한 실증적 연구 : 의료기관을 대상으로)

  • Kim, Eun Ji;Lee, Joon Taik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.23-31
    • /
    • 2016
  • Despite the number of security incidents in healthcare sector is considerable, earlier studies have been done in business sector. We have tried to empirically analyze the misuse intention using information system for healthcare sector. As a result, the preventative security software of the information security management have positive impact on the effectiveness of sanctions. Though further analysis is needed, the security policies, security awareness program and monitoring practices are determined to have a valid impact on the effectiveness of sanctions equivalent to the preventative security software.

Comparing Inhaler Use Technique Based on Inhaler Type in Elderly Patients with Respiratory Disease

  • Lee, Ha Youn;Song, Jin Hwa;Won, Ha-Kyeong;Park, Yeonkyung;Chung, Keun Bum;Lim, Hyo-Jeong;Ahn, Young Mee;Lee, Byoung Jun
    • Tuberculosis and Respiratory Diseases
    • /
    • v.84 no.1
    • /
    • pp.46-54
    • /
    • 2021
  • Background: The aim of this study was to investigate inhaler device handling in elderly patients. Inhaler devices with respect to misuse and error correction were also compared. Methods: Inhaler use technique was assessed using standardized checklists at the first visit and 3-month follow-up visit after retraining. The primary outcome was difference in the acceptable use ratio among inhaler devices. Secondary outcomes included differences in error correction, the most common step of misuse, and factors affecting the accuracy of inhaler use. Results: A total of 251 patients (mean age, 76.4 years) were included. The handling of 320 devices was assessed in the study. All patients had been trained before. However, only 24.7% of them used inhalers correctly. Proportions of acceptable use for Evohaler, Respimat, Turbuhaler, Ellipta, and Breezhaler/Handihaler were 38.7%, 50.0%, 61.4%, 60.8%, and 43.2%, respectively (p=0.026). At the second visit, the acceptable use ratio had increased. There were no significant differences among inhaler types (Evohaler, 63.9%; Respimat, 86.1%; Turbuhaler, 74.3%; Ellipta, 64.6%; and Breezhaler/Handihaler, 65.3% [p=0.129]). In multivariate analysis, body mass index, Turbuhaler, and Ellipta showed positive correlations with acceptable use of inhalers, whereas Chronic Obstructive Pulmonary Disease Assessment Test score showed a negative correlation. Conclusion: Although new inhalers have been developed, the accuracy of inhaler use remains low. Elderly patients showed more errors when using pressurized metered-dose inhalers than using dry powder inhalers and soft-mist inhalers. However, there were no significant differences in misuse among inhaler devices after individual training. Results of this study suggests that repeat training is more important than inhaler type.

Analysis of residual pesticides in dead wild birds and other animals during 2008-2009 in Korea (2008-2009년 국내 폐사 야생조류 및 동물 체내의 잔류농약 분석)

  • Jang, Jung-Hee;Bong, Young-Hoon;Kim, Dong-Gyu;Kim, MeeKyung;Chung, Gab-Soo;Son, Seong-Wan
    • Korean Journal of Veterinary Research
    • /
    • v.50 no.3
    • /
    • pp.197-203
    • /
    • 2010
  • Pesticides are useful to eliminate harmful insects and grow crops however, misuse and abuse of pesticides may cause a death of wild birds, livestock, and companion animals. We analyzed residual pesticides in the ingesta and tissues from the dead wild birds, livestock, and companion animals which were suspected pesticide poisoning based on the diagnosis of the Animal Disease Diagnostic Center of National Veterinary Research and Quarantine Service (NVRQS). The samples were primarily brought to NVRQS from local communities and veterinary diagnostic laboratories. The 231 suspicious samples of pesticide poisoning based on the necropsy were analyzed by GC/NPD, GC/FPD, GC/ECD, or GC/MSD in 2008 and 2009. Pesticides were identified from the 55 samples of total 143 samples analyzed in 2008 and from the 34 samples of total 88 samples analyzed in 2009. The pesticide identification rates in 2008 were higher than the rates in 2009. It may have relevance to the increased samples with the outbreak of avian influenza in 2008 in Korea. The concentrations of pesticides found in the dead animals varied and exceeded the respective $LD_{50}$ of pesticides in many cases. Monochrotophos, phosphamidon, and methomyl were the most common pesticides found and those pesticides are high rank sales in Korea. The cause of pesticide poisoning in animal is assuming a misuse and an abuse of commonly used pesticides in Korea.

Attitude and Recognition to Drug Abuse in Adolescent in Jeollanam-do (전라남도 청소년의 약물남용 인식 및 태도 조사)

  • Park, Chong-Sun;Kim, Eun-Yeob
    • The Korean Journal of Health Service Management
    • /
    • v.4 no.2
    • /
    • pp.11-22
    • /
    • 2010
  • In this study, adolescent understanding of and attitude towards unintentional drug use were investigated. 22 elementary, middle and high schools in cities and counties in Jeollanam-do Province were selected randomly and a survey was carried out. 489 students (46.9%) replied that they had received training on drug prevention and 553 (53.1%) said they never received training about drug prevention. That does one or two drugs with curiosity, thinks that is bad(p=0.002), and drug using thought that does not become the help in stress(p<0.001). With regards to the question on whether they would use drugs if suggested by friends, 88.7% answered they would decline the offer. 91.4% indicated they will participate if there is training about drug misuse in the future. 91.0% replied that this training about drug misuse was "satisfaction". Therefore it is be very important to understand the characteristics of adolescent and provide continuous training and campaign to help them to acquire correct habits to maintain good health and in doing so; help them to establish a healthy foundation for adulthood.

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF