• Title/Summary/Keyword: data protection policy

Search Result 350, Processing Time 0.034 seconds

Convergence Performance Evaluation Model for Intrusion Protection System based on CC and ISO Standard (CC와 ISO 표준에 따른 침입방지시스템의 융합 성능평가 모델)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.251-257
    • /
    • 2015
  • Intrusion protection system is a security system that stop abnormal traffics through automatic activity by finding out attack signatures in network. Unlike firewall or intrusion detection system that defends passively, it is a solution that stop the intrusion before intrusion warning. The security performance of intrusion protection system is influenced by security auditability, user data protection, security athentication, etc., and performance is influenced by detection time, throughput, attack prevention performance, etc. In this paper, we constructed a convergence performance evaluation model about software product evaluation to construct the model for security performance evaluation of intrusion protection system based on CC(Common Criteria : ISO/IEC 15408) and ISO international standard about software product evaluation.

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

Integrated Privacy Protection Model based on RBAC (RBAC에 기초한 통합형 프라이버시 보호 모델)

  • Cho, Hyug-Hyun;Park, Hee-Man;Lee, Young-Lok;Noh, Bong-Nam;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.135-144
    • /
    • 2010
  • Privacy protection can only be achieved by enforcing privacy policies within an enterprise's on and offline data processing systems. There are P-RBAC model and purpose based model and obligations model among privacy policy models. But only these models each can not dynamically deal with the rapidly changing business environment. Even though users are in the same role, on occasion, secure system has to opt for a figure among them who is smart, capable and supremely confident and to give him/her a special mission during a given period and to strengthen privacy protection by permitting to present fluently access control conditions. For this, we propose Integrated Privacy Protection Model based on RBAC. Our model includes purpose model and P-RBAC and obligation model. And lastly, we define high level policy language model based XML to be independent of platforms and applications.

An Analysis of the Impact of China's Pollution Reduction Policy on Sulfur Dioxide Emissions (중국의 오염저감 정책이 이산화황 배출에 미치는 영향 분석)

  • Kim, Ka Young;Lee, Jae Seung
    • Journal of Climate Change Research
    • /
    • v.6 no.4
    • /
    • pp.367-377
    • /
    • 2015
  • This study analyzed the effectiveness of China's policy to reduce of sulfur dioxide. China's $12^{th}$ Five-year plan on national economic and social development emphasized environmental protection and low-carbon economic development. Sulfur dioxide was one of the major gases to affect air pollution and climate change and its control became a key policy agenda in the environment and energy sector. As the absolute amount of sulfur dioxide emissions in China came from the industrial sector, the control of the coal-based energy was especially urgent. This study analyzed the factors that influenced the sulfur dioxide emissions and the policy effects to reduce sulfur dioxide in China from 2003 to 2012 based on regional data. The air pollution treatment investments showed the biggest impact together with energy conservation policy in reducing sulfur dioxide emissions. However, pollutant emissions charge did not show a relevant policy effectiveness in all regions as the amount of charge would be smaller than economic benefit from non-compliance. Rationalizing pollutant emissions charge is, therefore, a key policy task for further reduction of sulfur dioxide emissions.

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

A Study on the Protection of User Data in the Cloud System (클라우드 시스템에서의 사용자 데이터 보호에 관한 연구)

  • Lee, Ae-Ri;Cho, Do-Eun;Lee, Jae-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.389-394
    • /
    • 2012
  • The cloud computing is a system that provides IT resources service by using internet technologies, which grabs lots of attention today. Though cloud storage services provide service users with convenience, there is a problem in which data confidentiality is not guaranteed because it is hard for data owners to control the access to the data. This article suggested the technique by applying Public-Key Cryptosystem only to a block after dividing users' data into blocks in order to protect users' data in cloud system. Thus confidentiality and integrity are given to users' data stored in cloud storage server.

The Effect of Ethical Values on the Patient's Personal Information Protection of College Students Majoring in Healthcare Administration (보건행정 전공 대학생들의 윤리적 가치관이 환자 개인정보 보호인지에 미치는 영향)

  • Jung, Eun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.345-352
    • /
    • 2020
  • This study was conducted to investigate 820 university students in C and G areas to analyze the effects of ethical values of health administration major college students on the perception of patient personal information protection and to present important basic data for the development of education programs. The data were analyzed through SPSS/WIN 18.0 Program. As a result of analysis, the average of personal information protection of college students majoring in health administration was low at 2.04 ± 0.24, and ethical values were idealistic tendency 2.51 ± 0.32 points, and relativistic tendency was 2.34 ± 0.34 points, which showed a high idealistic tendency. Ethical values were also significantly related to idealistic ethics and relativistic ethics in terms of the level of awareness of patient personal information protection and the perception of patient personal information protection exposure. Therefore, in order to increase the protection of patients' personal information of university students majoring in health administration, the correct ethical values should be established, and systematic and continuous education is needed for this purpose.

Consumer Risk Perceptions and Milk Consumption associated with Food-Related Biotechnology: Exploring Gender Differences (생명공학기술 사용에 대한 소비자의 위험인지가 우유소비에 미치는 영향분석: 여성과 남성의 위험인지 및 소비행위 비교분석)

  • 유소이
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.12
    • /
    • pp.29-45
    • /
    • 2000
  • The purposes of this study were to determine what factors influence risk perceptions of females and males for milk produced using food-related biotechnology, to test whether risk perceptions or other factors influence self-protection actions and to estimate milk demand response in light of self-protection actions and other economic and demographic factors. The expected utility model was applied to explain the way consumers would take self-protection actions regarding risk perceptions and to drive milk demand. Telephone interviews were conducted and the data were collected from households(females=1,029, males=437) nationwide in the U.S. And the data were analyzed by Heckman two-step method using the software package LIMDEP. Risk perceptions were found to be influenced not by demographic factors but by outrage factors as well as attitudinal factors in both females and males, although some factors were different. In addition, risk perceptions and labeling availability were found to significantly influence self-protection actions in both groups. Furthermore, as an important concern in this study, self-protection action was found to significantly influence milk demand in only male group, implying a consistent behavior of males. Also milk price and household size were found to significantly influence milk demand in both groups. In fact, the results did demonstrate that labeling availability significantly influenced self-protection actions. That is, in markets where labeled laternatives were present, concerned consumers were more likely to self protect by substituting to these products. A policy implication of this result is that labeling food products produced using biotechnology enhances consumer choice. Hence, consumer could express a more accurate demand response and reduce the perceived food safety risk. Furthermore, education for females might be necessary to have a consistent behavior because self-protection action did not significantly influence female's milk demand, though they have greater risk perceptions than males have.

  • PDF

A Study on the Determinants of Personal Information Protection Activities: With a Focus on Personal Information Managers (개인정보보호 활동 결정요인 연구: 개인정보처리자를 중심으로)

  • Jang, Chul-Ho;Cha, Yun-Ho
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.64-76
    • /
    • 2021
  • The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the protection motivation theory, and the effects of each factor were analyzed using a multinomial logit model. The analysis results show that small-scale personal information managers need to be provided with both educational support to enhance their awareness and technical support, such as protection inspection tools, to help them carry out their own personal information protection activities. Personal information managers larger than a certain size also require tax support, including tax cuts, to support their budgets for and investments in personal information protection activities. In addition, they need professional education that emphasizes practice.

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.