• Title/Summary/Keyword: Misuse Service

Search Result 51, Processing Time 0.02 seconds

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

A study of access control using fingerprint recognition for Electronic Medical Record System (지문인식 기반을 이용한 전자의무기록 시스템 접근제어에 관한 연구)

  • Baek, Jong Hyun;Lee, Yong Joon;Youm, Heung Youl;Oh, Hae Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.127-133
    • /
    • 2009
  • The pre-existing medical treatment was done in person between doctors and patients. EMR (Electronic Medical Record) System computerizing medical history of patients has been proceed and has raised concerns in terms of violation of human right for private information. Which integrates "Identification information" containing patients' personal details as well as "Medical records" such as the medical history of patients and computerizes all the records processed in hospital. Therefore, all medical information should be protected from misuse and abuse since it is very important for every patient. Particularly the right to privacy of medical record for each patient should be surely secured. Medical record means what doctors put down during the medical examination of patients. In this paper, we applies fingerprint identification to EMR system login to raise the quality of personal identification when user access to EMR System. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing carries out it in client. And the confidence of hospital service is improved because login is forbidden without fingerprint identification success.

Design of Privilege Delegation Mechanism using Proxy Certificate (위임 인증서를 이용한 권한 위임 메커니즘 설계)

  • Jin, Seung-Hun;Cho, Sang-Rae;Kim, Tae-Sung;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.739-746
    • /
    • 2003
  • In real life, we frequently use th proxy signatrue by delegating one's own privileges. It is necessary to distribute the data related to privilege delegation securely in order to use such a proxy signature in the Internet. However, inorder to use the secure proxy signature, we need to have some mechanism to prevent a proxy signer from misuse of privileges by applying proxy certificate and a privilege delegation mechanism to manage information with related to privilege delegarion. In addition, we have implemented the prototype to demonstrate the possible proxy signature service using proxy certificate.

Design for Automation System for Pharmaceutical Prescription Using Arduino and Optical Character Recognition

  • Lim, Myung-Jae;Jung, Dong-Kun;Kim, Kyu-Dong;Kwon, Young-Man
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.66-71
    • /
    • 2021
  • Recent healthcare environments have characteristics of expanding the scope of healthcare-impacting healthcare, complexity resulting from diversification of components, and accelerating the pace of change. Drugs are used for the prevention, mitigation, and treatment of diseases, so they can inevitably cause harm, while they have efficacy and effectiveness, which are key elements of health recovery. Therefore, many countries regulate permits for safe and effective medicines, and also designate essential drugs directly related to life as pay targets and guarantee health insurance. Especially Pharmacist relying on manpower for composition medicine is liable for mal-manufacture due to combination of toxic medical substances or other chemical usage. In this paper, we focus on using Kiosk and Optical Character Recognition (OCR) for automated pharmacy to level up medical service and create labor friendly environment for pharmacist themselves through maintenance of prescription data and automated manufacturing solution. Presentation of drug substances and precautions will lead to efficient drug prescription and prevent misuse of information while auto manufacturing system efficiently maintain labor force and raise patient satisfaction level by reduction of waiting time.

A Study on Education-Career-Qualification Link and Utilization Method Based on NCS (NCS기반 학력-경력-자격 연계 및 활용 방안 관한 연구)

  • Choi, Sung-Hee;Park, Jae-Hyeon;Yang, Kwang-Mo
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.4
    • /
    • pp.35-43
    • /
    • 2020
  • The National Competency Standards(NCS) has been developed a good curriculum to reflect the demand in the industry. NCS is defined as systemizing the knowledge, skill, and attitude required to perform a task in the industry. It is an effort to reduce the gap between educational requirements and occupational requirements. However, when NCS is applied, the task level is changed to the title of qualification according to the policy outcomes for the government project. And, the NCS has been emphasizing the purpose of license acquisition, rather than using the standard for tasks in the industry. It means that the misuse of NSC hinders utilizing it as the original purpose of standardizing a task. It requires the customer to study the required competency unit with a no-choice option. Moreover, it makes it hard for companies or industry autonomically run the NCS. Therefore, we define the operational range in terms of the education field, the qualification field, and the career field to diffuse and apply NCS, and suggest the effective utilization method.

Blockchain E-voting System and Governance: The Case of Korean National Pension Service (블록체인 기술을 활용한 전자투표시스템과 지배구조: 국민연금 사례를 중심으로)

  • Chung, Hae Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.1-16
    • /
    • 2019
  • Blockchain technology prevents tampering of central authorities that manage voting process, enhancing trust in the vote results. This technology enables citizens to participate more directly in the areas where delegation was inevitable due to the difficulties in polling fair and trustworthy public opinions. There are many projects around the world proposing to implement voting system for public decision making using blockchain technology. The blockchain voting system is expected to work as a transparent and fair channel for polling public opinions, which will transform the public decision-making process and governance. Korean National Pension Service (NPS) recently introduced stewardship code to better represent the interest of beneficiaries. However, because of the mistrust in governance of NPS, introduction of stewardship code is facing criticism for potential misuse of their voting rights against the interest of beneficiaries and for government's interference with corporate management. This study proposes a voting system applying blockchain technology for polling the opinions of National Pension Fund's beneficiaries to support public decision-making, and discusses social and institutional conditions for implementation of the proposed system.

Antimicrobial resistance of Campylobater spp. from duck feces in northern area of the Gyeongnam province, Korea (경남 북부지역 오리 분변에서 분리된 Campylobacter spp.의 항생제 내성)

  • Kim, Hyeong-Su;Seo, Deok-Jin;Seong, Min-Ho;Han, Kwon-Seek;Park, Jung-Yong;Jeong, Myeong-Ho;Park, Dong-Yeop;Park, Dong-Ju;Koh, Phil-Ok
    • Korean Journal of Veterinary Service
    • /
    • v.40 no.2
    • /
    • pp.101-105
    • /
    • 2017
  • The purpose of this study was to investigate prevalence and antimicrobial resistance patterns of Campylobacter spp. from duck feces in northern area of the Gyeongnam province, Korea. Samples of 121 duck feces were taken from April to December 2014 for this survey. Samples were examined by bacteria isolation and reverse transcriptase-polymerase chain reaction assay for detection of Campylobacter spp. Campylobacter were isolated in 37 samples (30.6%). Among these samples, C. jejuni and C. coli were isolated in 35 samples and 2 samples, respectively. Minimum inhibitory concentration (MIC) test is performed to investigate antimicrobial resistance patterns of Campylobacter spp. C. jejuni were resistant to ciprofloxacin (85.7%), nalidixic acid(82.9%), tetracycline (77.1%), gentamicin (57.1%), azithromycin (40.0%), clindamycin (34.3%), erythromycin (22.9%), and florfenicol (8.6%). These data support a database of pollution and antimicrobial resistance of Campylobacter spp. from duck feces and provide a basic information of reducing the secondary damage of antibiotic misuse.

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

Genetic counseling in Korean health care system (유전상담의 제도적인 고찰)

  • Kim, Hyon-J.
    • Journal of Genetic Medicine
    • /
    • v.4 no.1
    • /
    • pp.1-5
    • /
    • 2007
  • Unprecedented amount of genetic information being generated from the result of Human Genome Project (HGP) and advances in genetic research is already forcing changes in the paradigm of health and disease. The ultimate goal of genetic medicine is to use genetic information and technology to develop new ways of treatment or even prevention of the disease on an individual level for 'personalized medicine'. Genetics is play ing an increasingly important role in the diagnosis, monitoring and management of common multifactorial diseases in addition to rare single-gene disorders. While wide range of genetic testing have provided benefits to patients and family, uncertainties surrounding test interpretation, the current lack of available medical options for the diseases, and risks for discrimination and social stigmatization may remain to be resolved. However an increasing number of genetic tests are becoming commercially available, including direct to consumer genetic testing, yet public is often unaw are of their clinical and social implications. The personal nature of information generated by a genetic test, its power to affect major life decisions and family members, and its potential misuse raise important ethical considerations. Therefore appropriate genetic counseling is needed for patient to be informed with the benefits, limitations and risks of genetic tests, prior to informed consent for the tests. Physician also should be familiar with the legal and ethical issues involved in genetic testing to tell patients how w ell a particular genetic risk factor relates with likelihood of disease, and be able to provide appropriate genetic counseling. Genetic counseling become a mandatory requirement as global standard for many genetic testing such as prenatal diagnosis, presymtomatic DNA diagnostic tests and cancer susceptibility gene test for familial cancer syndrome. In oder to meet the challenge of genetic medicine of 21 century in korean health care system, professional education program and certification board for medical genetics specialist including non-MD genetic counselors should be addressed by medical society and regulatory policy of national health insurance reimbursement for genetic counseling to be in place to promote the implementation of clinical genetic service including genetic counseling for proper genetic testing.

  • PDF

A Study on Privacy Protection in Financial Mydata Policy through Comparison of the EU's PSD2 (유럽 PSD2 시행에 따른 금융분야 마이데이터 정책의 개인정보보호 강화 방안 연구)

  • Song, Mi-Jung;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1205-1219
    • /
    • 2019
  • As the ability to use data becomes competitive power in the data-driven economy, the effort to create economic value by using personal data is emphasized as much as to protect personal data. EU's PSD2(the second Payment Service directive) became the initiative of the Open Banking trends all over the world, as it is the Mydata policy which protects the data subject's right by empowering the subject to control over the personal data with the right to data portability and promotes personal data usages and transfer. Korean government is now fast adopting EU's PSD2 in financial sector, but there is growing concerns in personal data abuse and misuse, and data breach. This study analyzes domestic financial Mydata policy in comparison with EU's PSD2 and focus on Personal information life-cycle risks of financial Mydata policy. Some suggestions on how to promote personal information and privacy in domestic financial Mydata Policy will be given.