• 제목/요약/키워드: Personal information security breaches

검색결과 28건 처리시간 0.018초

개인정보 유출의 정보전이 효과 (The Effects of Information Transfer of Personal Information Security Breaches)

  • 박상수;이현철
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제27권1호
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.

개인정보 유.노출 사고로 인한 기업의 손실비용 추정 (Estimating Direct Costs of Enterprises by Personal Information Security Breaches)

  • 유진호;지상호;임종인
    • 정보보호학회논문지
    • /
    • 제19권4호
    • /
    • pp.63-75
    • /
    • 2009
  • 해킹에 의한 개인정보의 유출 또는 기업의 관리 소홀로 인한 개인정보 유 노출 등의 침해사고가 다양한 형태로 발생하고 있으며, 이로 인한 피해범위도 확대되고 있다. 개인정보 유 노출 사고의 발생시 기업의 손실비용을 산출하는 일은 정보보호 투자에 대한 의사결정을 위해 필요하다. 본고는 개인정보 유 노출 사고로 인한 기업의 직접적이고 정량적인 손실비용 산출방안을 제시하고자 한다. 먼저 개인정보 침해사고에 의해 발생할 수 있는 손실비용을 범주에 따라 분류하고, 비용을 구성하는 요소들을 구체적으로 분석하였다. 또한 제시된 모형으로 2005${\sim}$2007년 동안 국내에서 발생한 개인정보 유 노출 사고의 손실을 추정하였고, 이를 일본의 사례와 비교 분석하여 시사점을 도출하였다.

개인정보 침해 관련 정보 제공 서비스 사용 의도 분석 (An Analysis on Intention to Use Information Service for Personal Information Breach)

  • 김택영;전효정;김태성
    • 정보보호학회논문지
    • /
    • 제28권1호
    • /
    • pp.199-213
    • /
    • 2018
  • 2008년부터 대규모 개인정보 유출사고들이 빈번히 발생하면서 이를 해결하고자 국가적 차원의 교육, 정책, 법률 등이 제정 및 시행되고 있다. 현재까지 개인정보 침해와 유출사고는 지속적으로 발생하고 있지만, 개인이 개인정보 침해에 대한 상세 정보를 확인하고 추정 및 대처 할 수 가 없는 실정이다. 이에 본 연구는 개인 정보 침해 및 유출사고 등 개인정보 침해에 예방 및 대응하기 위한 여러 가지 방법 중 일반인을 대상으로 하여 개인정보 침해에 관한 정보가 제공 및 전달된다면, 개인은 개인정보 침해 정보를 얼마나 받아들이고 개인정보보호 행동으로 옮겨질지에 대하여 연구하고자 한다. 개인정보 침해와 관련된 정보를 제공하는 것이 어떠한 의미를 가지고 있으며, 어떠한 기능을 수행해야 하는지 정의하고, 정보 제공에 대한 일반인의 수용 영향에 대하여 분석하고자 한다. 이를 통해 개인정보 관련 정보 제공에 대한 필요성 및 가이드라인을 제시하고, 개인의 주동적인 정보보호 활동을 장려하는데 도움이 되고자 한다.

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • 제7권3호
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

모바일 오피스 개인정보 보호 방안에 대한 연구 (A Study on countermeasure for privacy in mobile office)

  • 박용준;이윤정
    • 한국멀티미디어학회논문지
    • /
    • 제18권2호
    • /
    • pp.178-188
    • /
    • 2015
  • The proliferation of devices such as tablets and smart phones, which are now used by many people in their daily lives, has led to a number of companies allowing employees to bring their own devices to work due to perceived productivity gains and cost savings. However, despite many advantage, security breaches (e.g., information leakage) can happen for various reasons (e.g., loss or theft of devices, and malicious code) and privacy breaches can happen by using personal devices for business. We should carefully scrutinize security threats in this area. We present the security threats analysis and the technical approach in this area, and discuss privacy threats and countermeasures.

지능형 사이버 훈련장의 기술 동향 (Technological Trends in Intelligent Cyber Range)

  • 유재학;구기종;김익균;문대성
    • 전자통신동향분석
    • /
    • 제37권4호
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

개인정보 유출 사고 시 정보보호 기업의 주가 변동에 관한 연구 (A Study on the Stock Price Fluctuation of Information Security Companies in Personal Information Leakage)

  • 김민정;허남길;유진호
    • 정보보호학회논문지
    • /
    • 제26권1호
    • /
    • pp.275-283
    • /
    • 2016
  • 현재 우리나라의 인터넷과 IT 인프라는 세계 최고 수준을 유지하고 있다. 그러나 그 이면에는 보안사고, 특히 개인정보 유출 사고가 빈번히 발생하고 있다. 개인정보 유출 사고 발생 시 해당 기업은 부정적 영향을 받게 되며, 이를 방지하기 위해 정보보호 업체의 다양한 보안 솔루션을 사용하고 있다. 따라서 개인정보 유출 사고 발생 시 발생 기업은 물론 기업에 보안 솔루션을 제공하는 정보보호 업체에도 영향을 미칠 것으로 생각된다. 이에 본 논문에서는 개인정보 유출 사고 발생 시 정보보호 업체의 주가 변화를 통해 보안 이벤트가 정보보호 업체의 가치에 어떠한 영향을 주는지 가설을 세워 검증하였다. 그 결과 개인정보 유출 사고 발생 시 정보보호 업체의 주가는 상승하였으며, 사고 규모, 사고 발생 업종에 따른 차이는 통계적으로 유의하지 않았고, 정보보호 업체의 업태 구분에 따른 차이가 존재하였다.

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • 제10권4호
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

보안경제성 연구동향 분석 : IS 저널 중심으로 (Research Trends in Information Security Economics : Focused on Information Systems Journals)

  • 강미화;김태성
    • Journal of Information Technology Applications and Management
    • /
    • 제23권1호
    • /
    • pp.79-96
    • /
    • 2016
  • As numerous security breaches on a variety of information assets such as personal information, corporate secrets, computer servers, and networks have occurred, information security has emerged as a critical social issue. However, researches on economically rational information security decision-making have been few. Such researches are especially rare in South Korea where information security is considered to be a discipline of engineers. This study aims to identify the preferred themes and methodologies of information security economics research in the field of information systems by reviewing papers published in Management Information Systems Quarterly (MISQ), Information Systems Research (ISR), European Journal of Information Systems (EJIS), Management Science (MS), and Information and Management (I&M). We hope that the results of the study will be helpful in rational managerial or policy decision-making for practitioners and suggest future research topics for researchers.

정보보호인력 직무이동의 추이 및 요인 (Trend and Cause of Information Security Workforce's Job Turnover)

  • 박상우;김태성
    • 한국IT서비스학회지
    • /
    • 제19권2호
    • /
    • pp.37-47
    • /
    • 2020
  • A significant proportion of information subjects experience information security breaches, and the number of reports and counseling cases of personal information infringements is increasing. Increased awareness of the importance of information security has raised interest in the personnel in charge of such tasks. However, hiring excellent new workers and preventing turnovers in information security remain unresolved. In this paper, by modeling the job career path of information security workforce as a Markov chain, we analyze the workforce turnover process and long-term turnover trends by information security jobs, and further analyze the number and duration of turnovers required to engage in specific jobs. The results of this study are expected to be a reference to balancing the supply and demand of information security workers for the government and to ensuring efficient management of the workforce for businesses.