• Title/Summary/Keyword: acquisition process

Search Result 1,224, Processing Time 0.031 seconds

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

Audiobook Text Shaping for Synesthesia Voice Training - Focusing on Paralanguages - (오디오북 텍스트 형상화를 위한 공감각적 음성 훈련 연구 - 유사언어를 활용하여 -)

  • Cho, Ye-Shin;Choi, Jae-Oh
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.167-180
    • /
    • 2019
  • The purpose of this study is to find out the results of synesthesia speech training using similar language for shaping audiobook text. The audiobook text for training uses Tolstoy's work, and uses similar language of tone, tone, pose, speed, intonation, accent, and expression of emotions. The participants who ten visually impaired trainee in H library were selected for qualitative research. Based on the research questions raised in this study, the results are as follows. First, synesthesia training, in which more than two senses of the five senses work simultaneously in voice training for audio book text shaping, produced the result by visualizing the original purpose, meaning, and background of the text. Second, the use of similar language was helpful in the whole process of expressing the meaning of sentence and dialogue for audiobook text shaping. In addition, although there were some differences among the study subjects, they found commonalities that considered tone, pose, and intonation important. Third, the visually impaired have advanced sensory aspects and memory, which resulted in rapid acquisition of metabolism and acceptance of transmission during training. In addition, the teacher's friendly behavior was a very important key mediator in the training process.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Material Discrimination Using X-Ray and Neutron

  • Jaehyun Lee;Jinhyung Park;Jae Yeon Park;Moonsik Chae;Jungho Mun;Jong Hyun Jung
    • Journal of Radiation Protection and Research
    • /
    • v.48 no.4
    • /
    • pp.167-174
    • /
    • 2023
  • Background: A nondestructive test is commonly used to inspect the surface defects and internal structure of an object without any physical damage. X-rays generated from an electron accelerator or a tube are one of the methods used for nondestructive testing. The high penetration of X-rays through materials with low atomic numbers makes it difficult to discriminate between these materials using X-ray imaging. The interaction characteristics of neutrons with materials can supplement the limitations of X-ray imaging in material discrimination. Materials and Methods: The radiation image acquisition process for air-cargo security inspection equipment using X-rays and neutrons was simulated using a GEometry ANd Tracking (Geant4) simulation toolkit. Radiation images of phantoms composed of 13 materials were obtained, and the R-value, representing the attenuation ratio of neutrons and gamma rays in a material, was calculated from these images. Results and Discussion: The R-values were calculated from the simulated X-ray and neutron images for each phantom and compared with those obtained in the experiments. The R-values obtained from the experiments were higher than those obtained from the simulations. The difference can be due to the following two causes. The first reason is that there are various facilities or equipment in the experimental environment that scatter neutrons, unlike the simulation. The other is the difference in the neutron signal processing. In the simulation, the neutron signal is the sum of the number of neutrons entering the detector. However, in the experiment, the neutron signal was obtained by superimposing the intensities of the neutron signals. Neutron detectors also detect gamma rays, and the neutron signal cannot be clearly distinguished in the process of separating the two types of radiation. Despite these differences, the two results showed similar trends and the viability of using simulation-based radiation images, particularly in the field of security screening. With further research, the simulation-based radiation images can replace ones from experiments and be used in the related fields. Conclusion: The Korea Atomic Energy Research Institute has developed air-cargo security inspection equipment using neutrons and X-rays. Using this equipment, radiation images and R-values for various materials were obtained. The equipment was reconstructed, and the R-values were obtained for 13 materials using the Geant4 simulation toolkit. The R-values calculated by experiment and simulation show similar trends. Therefore, we confirmed the feasibility of using the simulation-based radiation image.

An Exploratory Study of Information Seeking Behavior of Generation Alpha Elementary School Students in Academic and Everyday Life (알파세대 초등학생의 학업 및 일상생활에서의 정보추구행태에 관한 연구)

  • InBeom Hwang;JungWon Yoon
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.35 no.2
    • /
    • pp.25-45
    • /
    • 2024
  • This study aims to understand the everyday information-seeking behaviors of Alpha-generation elementary school students. A survey was conducted among 4th to 6th grade students to investigate their information needs in daily life, the sources they use to fulfill these needs and the reasons for their choices, the barriers they encounter during the information search process, and their satisfaction and trust in the information obtained. The results indicate that Alpha generation elementary students most frequently use video platforms and have the highest information needs related to hobbies and leisure activities. The main reasons for choosing information sources were familiarity and convenience. Differences based on demographic characteristics and media literacy education were also analyzed. There were significant differences in information-seeking behavior based on gender. Also, students who had received media literacy education experienced fewer difficulties in the information acquisition process compared to those who had not. The findings of this study are expected to provide valuable data for developing information services and media literacy education directions for the Alpha generation in school settings.

CHOBUN, Understanding the Double Burial Custom in Korea from a Jungian Perspective : Focusing on Putrefaction and Reduction to Bones (초분, 한국 이중장제의 분석심리학적 고찰 : 부패와 뼈로의 환원을 중심으로)

  • Jahyeon Cho
    • Sim-seong Yeon-gu
    • /
    • v.31 no.2
    • /
    • pp.113-150
    • /
    • 2016
  • Chobun refers to a temporary grave covered with straw thatch that contains a corpse until its flesh is gone. When all the flesh has rotted away, the straw grave is disassembled and only the bones are retrieved. Therefore, Chobun is an example of a secondary burial custom (German : Doppel Bestattung) that is composed of a first temporary funeral for processing the corpse's flesh, and a second permanent burial of the final remains (bones or ashes). The duration of the temporary burial is determined by the time needed for decomposing the flesh of the deceased. Building a Chobun progresses putrefaction and reduction to bone. In the literature of alchemy, putrefaction and new life occur simultaneously. The purpose of rotting is to make the flesh disappear, leaving only its essence. It is making the physical body enter a spiritual state, so that the dead can enter into a different world. One must endure the unstable rotting process until the smell of flesh has faded. The rotting process is the attitude of accepting the terrible, polluted aspect of the corpse, while maintaining a helpless, passive posture, in order to allow new possibilities. When we try to approach an archetypal aspect of the unconscious, it is often experienced in threatening, aggressive ways. In the individuation process, the unconscious offers us the blessing of a new spiritual awakening and renewed sense of life, only when we have the courage to see this terrifying and contaminated side of our psyche. This is exactly what putrefaction means. Bone and skeleton symbolize the indestructible, imperishable, and essential elements of life. Bone is the minimum unit and foundation for regeneration, where new life can grow. Reduction to bone is moving back to the origin of life, to the womb. Psychologically, it means discarding one's ego-centeredness and allowing the Self to lead the entire process of individuation. Going through the painful process of reduction to a skeleton for the purpose of further development is a declaration of the death of the ego, aiming at the liberation from perishable flesh and acquisition of the spiritual, regenerative, and immortal elements of life. Chobun also denotes the yearly decay and revival of life, especially of vegetal life. In Chobun, this symbolic meaning of the vegetal cycle of life is emphasized to represent the part of life that survives even after death. Vegetation related to Chobun deals with the continuity of life and psychologically with the Self. Images of vegetation are closely related to the existence of life beyond death, which is the existence of the Self, the source of energy that constantly renews and rejuvenates the consciousness.

Development Process and Methods of Audit and Certification Toolkit for Trustworthy Digital Records Management Agency (신뢰성 있는 전자기록관리기관 감사인증도구 개발에 관한 연구)

  • Rieh, Hae-young;Kim, Ik-han;Yim, Jin-Hee;Shim, Sungbo;Jo, YoonSun;Kim, Hyojin;Woo, Hyunmin
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.3-46
    • /
    • 2010
  • Digital records management is one whole system in which many social and technical elements are interacting. To maintain the trustworthiness, the repository needs periodical audit and certification. Thus, individual electronic records management agency needs toolkit that can be used to self-evaluate their trustworthiness continuously, and self-assess their atmosphere and system to recognize deficiencies. The purpose of this study is development of self-certification toolkit for repositories, which synthesized and analysed such four international standard and best practices as OAIS Reference Model(ISO 14721), TRAC, DRAMBORA, and the assessment report conducted and published by TNA/UKDA, as well as MoRe2 and current national laws and standards. As this paper describes and demonstrate the development process and the framework of this self-certification toolkit, other electronic records management agencies could follow the process and develop their own toolkit reflecting their situation, and utilize the self-assessment results in-house. As a result of this research, 12 areas for assessment were set, which include (organizational) operation management, classification system and master data management, acquisition, registration and description, storage and preservation, disposal, services, providing finding aids, system management, access control and security, monitoring/audit trail/statistics, and risk management. In each 12 area, the process map or functional charts were drawn and business functions were analyzed, and 54 'evaluation criteria', consisted of main business functional unit in each area were drawn. Under each 'evaluation criteria', 208 'specific evaluation criteria', which supposed to be implementable, measurable, and provable for self-evaluation in each area, were drawn. The audit and certification toolkit developed by this research could be used by digital repositories to conduct periodical self-assessment of the organization, which would be used to supplement any found deficiencies and be used to reflect the organizational development strategy.

Recognizing the Direction of Action using Generalized 4D Features (일반화된 4차원 특징을 이용한 행동 방향 인식)

  • Kim, Sun-Jung;Kim, Soo-Wan;Choi, Jin-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.5
    • /
    • pp.518-528
    • /
    • 2014
  • In this paper, we propose a method to recognize the action direction of human by developing 4D space-time (4D-ST, [x,y,z,t]) features. For this, we propose 4D space-time interest points (4D-STIPs, [x,y,z,t]) which are extracted using 3D space (3D-S, [x,y,z]) volumes reconstructed from images of a finite number of different views. Since the proposed features are constructed using volumetric information, the features for arbitrary 2D space (2D-S, [x,y]) viewpoint can be generated by projecting the 3D-S volumes and 4D-STIPs on corresponding image planes in training step. We can recognize the directions of actors in the test video since our training sets, which are projections of 3D-S volumes and 4D-STIPs to various image planes, contain the direction information. The process for recognizing action direction is divided into two steps, firstly we recognize the class of actions and then recognize the action direction using direction information. For the action and direction of action recognition, with the projected 3D-S volumes and 4D-STIPs we construct motion history images (MHIs) and non-motion history images (NMHIs) which encode the moving and non-moving parts of an action respectively. For the action recognition, features are trained by support vector data description (SVDD) according to the action class and recognized by support vector domain density description (SVDDD). For the action direction recognition after recognizing actions, each actions are trained using SVDD according to the direction class and then recognized by SVDDD. In experiments, we train the models using 3D-S volumes from INRIA Xmas Motion Acquisition Sequences (IXMAS) dataset and recognize action direction by constructing a new SNU dataset made for evaluating the action direction recognition.

Raman Spectroscopic Study for Investigating the Spatial Distribution and Structural Characteristics of Mn-bearing Minerals in Non-spherical Ferromanganese Nodule from the Shallow Arctic Ocean (북극해 천해저 비구형 망가니즈단괴 내 광물종 분포 및 구조적 특성 규명을 위한 라만 분광분석 연구)

  • Sangmi, Lee;Hyo-Jin, Koo;Hyen-Goo, Cho; Hyo-Im, Kim
    • Korean Journal of Mineralogy and Petrology
    • /
    • v.35 no.4
    • /
    • pp.409-421
    • /
    • 2022
  • Achieving a highly resolved spatial distribution of Mn-bearing minerals and elements in the natural ferromanganese nodules can provide detailed knowledge of the temporal variations of geochemical conditions affecting the formation processes of nodules. While a recent study utilizing Raman spectroscopy has reported the changes in the manganate mineral phases with growth for spherical nodules from the Arctic Sea, the distributions of minerals and elements in the nodules from the shallow Arctic Sea with non-spherical forms have not yet fully elucidated. Here, we reported the micro-laser Raman spectra with varying data acquisition points along three different profiles from the center to the outermost rim of the non-spherical ferromanganese nodules collected from the East Siberian Sea (~73 m). The elemental distributions in the nodule (such as Mn, Fe, etc.) were also investigated by energy dispersive X-ray spectroscopy (EDS) analysis to observe the internal structure and mineralogical details. Based on the microscopic observation, the internal structures of a non-spherical nodule can be divided into three different regions, which are sediment-rich core, iron-rich substrate, and Mn-Fe layers. The Raman results show that the Mn-bearing mineral phases vary with the data acquisition points in the Mn-Fe layer, suggesting the changes in the geochemical conditions during nodule formation. In addition, we also observe that the mineral composition and structural characteristics depend on the profile direction from the core to the rim. Particularly, the Raman spectra obtained along one profile show the lack of Fe-(oxy)hydroxides and the noticeably high crystallinity of Mn-bearing minerals such as birnessite and todorokite. On the other hand, the spectra obtained along the other two profiles present the presence of significant amount of amorphous or poorly-ordered Fe-bearing minerals and the low crystallinity of Mn-bearing minerals. These results suggest that the diagenetic conditions varied with the different growth directions. We also observed the presence of halite in several layers in the nodule, which can be evidence of the alteration of seawater after nodule formation. The current results can provide the opportunity to obtain detailed knowledge of the formation process and geochemical environments recorded in the natural non-spherical ferromanganese nodule.