• Title/Summary/Keyword: Privacy Breaches

Search Result 30, Processing Time 0.029 seconds

A Study on countermeasure for privacy in mobile office (모바일 오피스 개인정보 보호 방안에 대한 연구)

  • Park, Yongjoon;Lee, Yunjung
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.178-188
    • /
    • 2015
  • The proliferation of devices such as tablets and smart phones, which are now used by many people in their daily lives, has led to a number of companies allowing employees to bring their own devices to work due to perceived productivity gains and cost savings. However, despite many advantage, security breaches (e.g., information leakage) can happen for various reasons (e.g., loss or theft of devices, and malicious code) and privacy breaches can happen by using personal devices for business. We should carefully scrutinize security threats in this area. We present the security threats analysis and the technical approach in this area, and discuss privacy threats and countermeasures.

Privacy Model Recommendation System Based on Data Feature Analysis

  • Seung Hwan Ryu;Yongki Hong;Gihyuk Ko;Heedong Yang;Jong Wan Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.81-92
    • /
    • 2023
  • A privacy model is a technique that quantitatively restricts the possibility and degree of privacy breaches through privacy attacks. Representative models include k-anonymity, l-diversity, t-closeness, and differential privacy. While many privacy models have been studied, research on selecting the most suitable model for a given dataset has been relatively limited. In this study, we develop a system for recommending the suitable privacy model to prevent privacy breaches. To achieve this, we analyze the data features that need to be considered when selecting a model, such as data type, distribution, frequency, and range. Based on privacy model background knowledge that includes information about the relationships between data features and models, we recommend the most appropriate model. Finally, we validate the feasibility and usefulness by implementing a recommendation prototype system.

Total internet Trust Service (안전한 인터넷 거래를 위한 토탈 전자인증 서비스)

  • 신홍식
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.238-241
    • /
    • 2002
  • ·전자상거래: 서로 보지 않고 하는 거래 온라인 범죄(Online Fraud)급증 90% of information security managers have detected breaches at their organizations within a year 74% of companies have experienced financial losses because of cybercrime price tag on e-security breaches:>$17 billion worldwide in 2000(source: CIO Magazine, March 2001) ·전자상거래 최대의 걸림돌: 신뢰 62% cited trust as the top E-commerce barrier -Authentication was key to 60%: Privacy was key to 56% ·(1999 ITAA and E&Y Survey) 인터넷을 신뢰의 공간(Trust Network)으로 만들자. (OECD의 Global Theme. 1998.10) 전자상거래 신뢰 확보→인증기관 출현(중략)

  • PDF

An Analysis on Intention to Use Information Service for Personal Information Breach (개인정보 침해 관련 정보 제공 서비스 사용 의도 분석)

  • Kim, Taek-Young;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.199-213
    • /
    • 2018
  • Since 2008, large-scale personal information breach incidents have occurred frequently. Even though national education, policy, and laws have been enacted and implemented to resolve the issue, personal information breaches still occur. Currently, individuals cannot confirm detailed information about what personal information has been affected, and they cannot respond to the breaches. Therefore, it is desirable to develop various methods for preventing and responding to personal information infringement caused by breach and leakage incidents and move to privacy protection behaviors. The purpose of this study is to create understanding of personal information security and information breach, to present services that can prevent breaches of personal information, to investigate the necessity of and analyze the potential public demand for such services, and to provide direction for future privacy-related information services.

Suggestions for Applications of Anonymous Data under the Revised Data Privacy Acts (데이터 3법 시대의 익명화된 데이터 활용에 대한 제언)

  • Chun, Ji Young;Noh, Geontae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.503-512
    • /
    • 2020
  • The revisions to data privacy acts allows the disclosure of data after anonymizing personal information. Such anonymized data is expected to be useful in research and services, but there are high concerns about privacy breaches such as re-identifying of the individuals from the anonymized data. In this paper, we showed that identifying individuals from public data is not very difficult, and also raises questions about the reliability of the public data. We suggest that users understand the trade-offs between data disclosure and privacy protection so that they can use data securely under the revised data privacy acts.

Blockchain-based Federated Learning for Intrusion Detection in IoT Networks (IoT 네트워크에서 침입 탐지를 위한 블록체인 기반 연합 학습)

  • Md Mamunur Rashid;Philjoo Choi;Suk-Hwan Lee;Ki-Ryong Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.262-264
    • /
    • 2023
  • Internet of Things (IoT) networks currently employ an increased number of users and applications, raising their susceptibility to cyberattacks and data breaches, and endangering our security and privacy. Intrusion detection, which includes monitoring and analyzing incoming and outgoing traffic to detect and prohibit the hostile activity, is critical to ensure cybersecurity. Conventional intrusion detection systems (IDS) are centralized, making them susceptible to cyberattacks and other relevant privacy issues because all the data is gathered and processed inside a single entity. This research aims to create a blockchain-based architecture to support federated learning and improve cybersecurity and intrusion detection in IoT networks. In order to assess the effectiveness of the suggested approach, we have utilized well-known cybersecurity datasets along with centralized and federated machine learning models.

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

The Improvement Plan of the Individual Information Protection of the Law on the Development of Cloud Computing and User Protection (클라우드 컴퓨팅 발전 및 이용자 보호에 관한 법률상 개인정보 보호에 대한 개선방안)

  • Lee, Hie-Houn
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.219-225
    • /
    • 2019
  • Today, in the era of the 4th Industrial Revolution, the cloud computing sector has advantages for cost reduction and efficiency of work, but problems related to privacy may arise. Therefore, the law on the development of cloud computing and user protection should be improved to enable providers of cloud computing services to proactively identify whether or not they contain their personal information, or to take steps to protect their privacy. And this same law is desirable to improve the implementation of a national mandatory certification system for privacy protection systems for cloud computing businesses. This same law is also desirable that cloud computing service providers create direct accountability for privacy breaches and appropriate scope for those responsibilities.

Development of Framework for Trusted Financial Service in N-Screen Environment (N-스크린 환경 내 신뢰할 수 있는 금융프레임워크 개발)

  • Kim, Kyong-Jin;Seo, Dong-Su;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.127-137
    • /
    • 2012
  • With the spread of the new technologies like a smart phone, a smart pad, N-Screen service for financial transaction quickly became commonplace through the Internet. Although it has been developed related technologies and policies since the N-Screen has been provided in Korea, infrastructure for financial services is still lacking. It also has many potential problems including phishing or malware attacks, privacy information exposure & breaches, etc. This work suggests the financial security framework in the side of information protection through threat vulnerability analysis. Further, we examine the possibility of effective application methods based on political technical design.