• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.025 seconds

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

A Study on the Korean National Police's Protesting Policing Policy through the Analysis of Negotiated Management Model (협의관리모델 분석을 통한 한국 경찰의 집회시위 관리정책 연구)

  • Hwang, Kyu-Jin;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.65-77
    • /
    • 2011
  • In Western Europo and the US, there has been a general trend over 30 years of reducing the amount of force by the police, through a paradigm shift from 'Escalated Force Model' towards 'Negotiated Management Model'. In tune with this trend, for example, the Swedish Police have implemented the uniformed 'Dialogue Police' system, in order to establish communication contact with demonstrators, before, during, and after their events, The Negotiated Management Model involves a greater respect for the rights of protesters, a more tolerant approach to community, and improved intelligence, communication, and flexibility, in order to facilitate lawful protests and to reduce the possibility of an escalation of major public disorder. The Korean National Police (KNP) appears to be operated within this negotiated management framework, since in preparation for the G20 Seoul Summit, they have also emphasized good communication between the police and protest groups, by newly creating the concept of 'Protest Policing Through Facilitation of Lawful Protests'. In this context, this study first attempts to analyze not only the negotiated management model, but also the Swedish dialogue police. Secondly, the study conducts a comparative study between the KNP's Protest Policing Through Facilitation of Lawful Protest and the Swedish dialogue police system, particularly, in conjunction with the negotiated management. Although Korean and western police have different system and history, protest policing model is now approaching with each other through a link between conflict resolution techniques, such as dialogue, negotiation, mediation and facilitation. Finally, the study is to prove if the KNP's protest policing model corresponds with the negotiated management model, and further to suggest new 'Facilitation of Conflict Resolution Model' as a desirable future of the KNP's protest policing.

Korean Aspect of the Medical Problems of the Aged (노인의료문제의 한국적 측면)

  • Kwun, Koing-Bo;Chung, Jong-Hak
    • Journal of Yeungnam Medical Science
    • /
    • v.2 no.1
    • /
    • pp.191-202
    • /
    • 1985
  • As the result of a significant improvement in the economic situation and development of scientific techniques in Korea during the last 20 years, the life expectancy of the Korean people has lengthened considerably and as a result the number of old aged people has markedly increased. Such an increase of the number of aged people brought about many problems. Authors would like to take a medical look at the "Problem of old aged people" presently facing us in Korea. Currently the number of people over 65 has increased rapidly and is 1,620,000, 4% of total population. But it is still much lower than 8.9% in Japan, 10.7% in U.S.A., and 14.9% in the United Kingdom. Over 25% of these aged people were found to have at least more than one disease which requires medical care. Diseases occur in the circulatory system, 30.9%, respiratory system, 17.1%, digestive system 8.6%, mental disorders, 8.4%, malignant neoplasms, 7.0%. About 51% of the aged over 65 are under medical security benefit, mostly with partial coverage plan. Their clinic visit rate was very low (2.0% in 1981), which might be due to financial reasons. Since diseases affecting the aged progress chronically, early detection and long term care are utter most important. However there is almost no special facility, long term care center or geriatric specialist. For proper management of medical problems in the growing population of the Korean eldery expansion of medical security coverage, greater number of specialized facilities, education of geriatric special manpower and efficient operating system should be established.

  • PDF

A study on extraction of optimized API sequence length and combination for efficient malware classification (효율적인 악성코드 분류를 위한 최적의 API 시퀀스 길이 및 조합 도출에 관한 연구)

  • Choi, Ji-Yeon;Kim, HeeSeok;Kim, Kyu-Il;Park, Hark-Soo;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.897-909
    • /
    • 2014
  • With the development of the Internet, the number of cyber threats is continuously increasing and their techniques are also evolving for the purpose of attacking our crucial systems. Since attackers are able to easily make exploit codes, i.e., malware, using dedicated generation tools, the number of malware is rapidly increasing. However, it is not easy to analyze all of malware due to an extremely large number of malware. Because of this, many researchers have proposed the malware classification methods that aim to identify unforeseen malware from the well-known malware. The existing malware classification methods used malicious information obtained from the static and the dynamic malware analysis as the criterion of calculating the similarity between malwares. Also, most of them used API functions and their sequences that are divided into a certain length. Thus, the accuracy of the malware classification heavily depends on the length of divided API sequences. In this paper, we propose an extraction method of optimized API sequence length and combination that can be used for improving the performance of the malware classification.

The extension of the IDEA Methodology for a multilevel secure schema design (다단계 보안 스키마 설계를 위한 IDEA 방법론의 확장)

  • Kim, Jung-Jong;Park, Woon-Jae;Sim, Gab-Sig
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.879-890
    • /
    • 2000
  • Designing a multilevel database application is a complex process, and the entities and their associated security levels must be represented using an appropriate model unambiguously. It is also important to capture the semantics of a multilevel databse application as accurate and complete as possible. Owing to the focus of the IDEA Methodology for designing the non-secure database applications on the data-intensive systems, the Object Model describes the static structure of the objects in an application and their relationships. That is, the Object Model in the IDEA Methodology is an extended Entity-Relationship model giving a static description of objects. The IDEA Methodology has not been developed the multilevel secure database applications, but by using an existing methodology we could take advantage of the various techniques that have already been developed for that methodology. That is, this way is easier to design the multilevel secure schema than to develop a new model from scratch. This paper adds the security features 새? Object Model in the IDEA Methodology, and presents the transformation from this model to a multilevel secure object oriented schema. This schema will be the preliminary work which can be the general scheme for the automatic mapping to the various commercial multilevel secure database management system such as Informix-Online/Secure, Trusted ORACLE, and Sybase Secure SQL Server.

  • PDF

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

A Study on the Development Direction of Crisis Negotiations of the Police - With Focus on the Police Department Education Development Plan - (경찰 위기협상 발전 방향에 관한 연구 - 경찰 기관의 교육 발전 방안을 중심으로 -)

  • Cho, Se-Hee
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.161-189
    • /
    • 2015
  • As the terrorist act inflicted on the American Ambassador to Korea, Mark Lippert on March 5, 2015, the hunting rifle case in Sejong-si in which 3 persons were killed on February 25, and the hunting rifle murder case in Hwaseong-si Namyang-dong on February 27 occurred in succession, there is growing concern that our country is no long safe from firearm violence. Internationally, there is growing concern that our country is no longer safe from international terrorist organizations such as Islamic State (IS), the Sunni Muslims fundamentalists' Islamic militia group, which an 18-year old Korean boy Kim voluntarily joined in January 2015. The police crisis negotiation of our country was established and operated to prepare for the 1988 Olympic Games mainly for counter-terrorism purposes, and due to the characteristics of the prohibition of the use of guns, not a counter-terrorism incident has occurred, so the skepticism about its existence and the development directions are actively being discussed. Our country still prefers the traditional use of force such as SWAT team to resolve crisis case, such as such as murder, terrorism, robbery, and is reinforcing tactical capabilities. However, to perform the primary mission of the police to protect the people's lives and properties, it is necessary to establish the system in which crisis negotiations are possible in the initial stages no matter what incidents may occur by expanding the education for crisis negotiations techniques which are emphasized in the advanced countries such as the United States. In this research, the police department's internal education materials and media are analyzed so that the new police officers who work hardest on the forefront can carry out the roles as basic negotiators of crisis negotiations, and the measures for the development directions of the police crisis negotiations are presented.

  • PDF

Effects and Limitations of Separating Overlapped Fingerprints Using Fast Fourier Transform (고속 푸리에 변환(fast Fourier transform, FFT)을 이용한 겹친지문 분리의 효과와 한계)

  • Kim, Chaewon;Kim, Chaelin;Lee, Hanna;Yu, Jeseol;Jang, Yunsik
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.377-400
    • /
    • 2019
  • Photography is the most commonly used method of documenting the crime and incident scene as it helps maintaining chain of custody (COC) and prove integrity of the physical evidence. It can also capture phenomena as they are. However, digital images can be manipulated and lose their authenticity as admissible evidence. Thus only limited techniques can be used to enhance images, and one of them is Fourier transform. Fourier transform refers to transformation of images into frequency signals. Fast Fourier transform (FFT) is used in this study. In this experiment, we overlapped fingerprints with graph paper or other fingerprints and separated the fingerprints. Then we evaluated and compared quality of the separated fingerprints to the original fingerprints, and examined whether the two fingerprints can be identified as same fingerprints. In the case of the fingerprints on graph paper and general pattern-overlapping fingerprints, fingerprint ridges are enhanced. On the other hand, in case of separating complicated fingerprints such as core-to-core overlapping and delta-to-delta overlapping fingerprints, quality of fingerprints can be deteriorated. Quality of fingerprints is known to possibly bring negative effects on the credibility of examiners. The result of this study may be applicable to other areas using digital imaging enhancement technology.

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

A Comparative Analysis of Ensemble Learning-Based Classification Models for Explainable Term Deposit Subscription Forecasting (설명 가능한 정기예금 가입 여부 예측을 위한 앙상블 학습 기반 분류 모델들의 비교 분석)

  • Shin, Zian;Moon, Jihoon;Rho, Seungmin
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.97-117
    • /
    • 2021
  • Predicting term deposit subscriptions is one of representative financial marketing in banks, and banks can build a prediction model using various customer information. In order to improve the classification accuracy for term deposit subscriptions, many studies have been conducted based on machine learning techniques. However, even if these models can achieve satisfactory performance, utilizing them is not an easy task in the industry when their decision-making process is not adequately explained. To address this issue, this paper proposes an explainable scheme for term deposit subscription forecasting. For this, we first construct several classification models using decision tree-based ensemble learning methods, which yield excellent performance in tabular data, such as random forest, gradient boosting machine (GBM), extreme gradient boosting (XGB), and light gradient boosting machine (LightGBM). We then analyze their classification performance in depth through 10-fold cross-validation. After that, we provide the rationale for interpreting the influence of customer information and the decision-making process by applying Shapley additive explanation (SHAP), an explainable artificial intelligence technique, to the best classification model. To verify the practicality and validity of our scheme, experiments were conducted with the bank marketing dataset provided by Kaggle; we applied the SHAP to the GBM and LightGBM models, respectively, according to different dataset configurations and then performed their analysis and visualization for explainable term deposit subscriptions.