• 제목/요약/키워드: sensitive information

검색결과 2,325건 처리시간 0.028초

망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안 (The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments)

  • 이주승;김일한;김현수
    • 융합보안논문지
    • /
    • 제23권1호
    • /
    • pp.125-137
    • /
    • 2023
  • 공공기관을 필두로 민감정보를 취급하는 기업들은 사이버 공격 예방을 위하여 업무망과 인터넷망을 분리 구축하고, 강한 접근통제를 바탕으로 중요 데이터를 보호하고 있다. 그렇기에 업무망과 인터넷망이 연결되는 접점을 수반하는 시스템은 관리적, 기술적으로 안전한 보안환경 구축이 필수적으로 요구되고 있다. 기관에서 사용하고자 하는 모바일 장치의 경우 기기를 통제하기 위한 MDM(Mobile Device Management) 솔루션이 그 예라 할 수 있다. 이 시스템은 모바일 장치 정보, 사용자 정보 등의 민감정보를 인터넷망에서 취급하여 동작하므로 운영 시 각별한 보안대책이 요구된다. 본 연구에서 인터넷망에서 반드시 운영되어야 하는 시스템에서의 민감정보 데이터 처리를 내부망에서 관리할 수 있도록 모델을 제시하였으며, 이를 망연동 솔루션을 기반으로 한 MDM 솔루션을 중심으로 기능 설계 및 구축하였다.

민감한 개인정보 보호를 위한 효율적인 접근제어 기법 (Effective Access Control Mechanism for Protection of Sensitive Personal Information)

  • 문형진;김기수;엄남경;이영진;이상호
    • 한국통신학회논문지
    • /
    • 제32권7C호
    • /
    • pp.667-673
    • /
    • 2007
  • 은행, 병원과 같은 기관이나 기업은 효율적인 개인별 서비스를 위해 정보주체의 동의하에 개인정보를 수집 관리하고 있다. 저장된 개인정보는 정보주체마다 민감도의 차이가 존재한다. 같은 속성정보 누출시 개인이 느끼는 민감도에 따라 프라이버시 침해정도가 다르다. 그러나 현재 기관이나 기업에서 민감도에 상관없이 일괄적으로 보호하고 있다. 이 논문에서는 정보주체의 민감한 정보 항목을 개인별정책에 반영하고 개인에 의해 지정된 민감한 개인정보 접근에 대해 엄격하게 제한하는 프라이버시 정책 기반의 접근제어 기법을 제안한다. 제안 기법에서 개인정보는 정보주체별로 각기 다른 키로 암호화하여 데이터베이스에 저장된다. 정보주체는 자신의 민감한 정보의 접근권한에 대한 정책을 세우며, 개인별정책과 기관 프라이버시정책에 따라 허가된 정보사용자에게 정보를 제공하므로 써 정보 접근의 통제가 가능하다.

Hiding Sensitive Frequent Itemsets by a Border-Based Approach

  • Sun, Xingzhi;Yu, Philip S.
    • Journal of Computing Science and Engineering
    • /
    • 제1권1호
    • /
    • pp.74-94
    • /
    • 2007
  • Nowadays, sharing data among organizations is often required during the business collaboration. Data mining technology has enabled efficient extraction of knowledge from large databases. This, however, increases risks of disclosing the sensitive knowledge when the database is released to other parties. To address this privacy issue, one may sanitize the original database so that the sensitive knowledge is hidden. The challenge is to minimize the side effect on the quality of the sanitized database so that non-sensitive knowledge can still be mined. In this paper, we study such a problem in the context of hiding sensitive frequent itemsets by judiciously modifying the transactions in the database. Unlike previous work, we consider the quality of the sanitized database especially on preserving the non-sensitive frequent itemsets. To preserve the non-sensitive frequent itemsets, we propose a border-based approach to efficiently evaluate the impact of any modification to the database during the hiding process. The quality of database can be well maintained by greedily selecting the modifications with minimal side effect. Experiments results are also reported to show the effectiveness of the proposed approach.

비정질 실리콘 광센서를 이용한 터치 감응 디스플레이 설계 및 제작 (A Touch-sensitive Display with Embedded Hydrogenated Amorphous-silicon Photodetector Arrays)

  • 이수연;박현상;한민구
    • 전기학회논문지
    • /
    • 제58권11호
    • /
    • pp.2219-2222
    • /
    • 2009
  • A new touch-sensitive hydrogenated amorphous silicon(a-Si:H) display with embedded optical sensor arrays is presented. The touch-sensitive panel operation was successfully demonstrated on a prototype of 16-in. active-matrix liquid crystal display (AMLCD). The proposed system provides the finger touched point without the real-time image processing of information of the captured images. Due to the simple architecture of the system, we expect the introduction of large-area touch-sensitive display panels.

Implementation of Qualitative Unrelated Question Model for Obtaining Sensitive Information at Internet Survey

  • 박희창;명호민
    • Journal of the Korean Data and Information Science Society
    • /
    • 제13권2호
    • /
    • pp.341-354
    • /
    • 2002
  • This paper is planned to use randomized response technique which is an indirect response technique on internet as a way of obtaining much more precise information, not revealing secrets of responsors, considering that respondents are generally reluctant to answer in a survey to get sensitive information targeting employees, customers, etc.

  • PDF

Implementation of Forced Answer Model for Sensitive Information at On-Line Survey

  • Park, Hee-Chang;Ryu, Jee-Hyun;Lee, Sung-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • 제14권3호
    • /
    • pp.489-499
    • /
    • 2003
  • In this paper we implement the system for the forced answer model which is an indirect response technique on the internet as a way of obtaining much more precise information, not revealing secrets of responsors. In this system we consider that respondents are generally reluctant to answer in a survey to get sensitive information targeting employees, customers, etc.

  • PDF

Implementation of Quantitative Unrelated Question Model for Obtaining Sensitive Information at On-Line Survey

  • Park, Hee-Chang;Ryu, Jee-Hyun;Lee, Sung-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • 제14권3호
    • /
    • pp.591-603
    • /
    • 2003
  • This paper is planned to use randomized response technique which is an indirect response technique on internet as a way of obtaining much more precise information, not revealing secrets of responsors, considering that respondents are generally reluctant to answer in a survey to get sensitive information targeting employees, customers, etc.

  • PDF

What Affects the Value of Information Privacy on SNS?

  • Jung, Woo-Jin;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • 제25권2호
    • /
    • pp.289-305
    • /
    • 2015
  • The dramatic growth of social networking sites (SNS) has created a myriad of privacy concerns. Our study focuses on how much monetary incentive SNS users are willing to accept in exchange for disclosing their SNS information by accepting friend requests. First, we focused on information privacy in SNS, and estimated the value of information privacy by using the contingent valuation method. Second, we attempted to estimate how SNS users' willingness to accept would change when demographic information and additional information vary. Privacy-sensitive SNS users have the following characteristics: higher education, less SNS experience, and higher security consciousness. On the contrary, those who make good use of SNS and use open-based SNS are less sensitive to privacy. In summary, privacy-sensitive SNS users are fearful or uneasy when they have insufficient control of SNS information. Considering 14 conditions on the value of information privacy on SNS, the mean value of SNS information per person is 173,957 won. If we apply this value to Facebook users, the total Facebook information value would be 1.91 trillion won, considering that there are 11 million users in Korea.

인터넷 서점의 배송정책에 관한 연구 (A Study on the Delivery Policy of Internet Bookstores)

  • 김지표;홍순혁
    • 산업공학
    • /
    • 제16권spc호
    • /
    • pp.33-38
    • /
    • 2003
  • In this paper we study the delivery policy of internet bookstores and recommend the improved policy to increase customer satisfaction and sales revenue. We classify customers into two, the price-sensitive and the delivery time-sensitive, and develop a new shipping method, the unhurried shipping, for the price-sensitive who are reluctant to pay shipping fee for the small purchase but willing to wait extra time for the ordered goods. The customers could get discount on shipping fee by the unhurried shipping but have to accept the longer delivery lead-time. We investigate the possible ways to reduce costs with the prolonged delivery time and show that some costs regarding shipmentand inventory could be saved in order to make up for additional shipping costs for the price-sensitive.

A Study on the Encryption Model for Numerical Data

  • Kim, Ji-Hong;Sahama, Tony
    • Journal of information and communication convergence engineering
    • /
    • 제7권1호
    • /
    • pp.30-34
    • /
    • 2009
  • The encryption method is a well established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data. In this paper we review the conventional encryption method which can be partially queried and propose the encryption method for numerical data which can be effectively queried. The proposed system includes the design of the service scenario, and metadata.