최근 부각되고 있는 사생활유출범죄 유형 중 CCTV 해킹을 이용한 범행에 대한 것이다. 요즘 CCTV를 사용이 증가함에 따라 악의적인 해커들은 CCTV를 사생활유출수단으로써 이용하고 있다. 그러나 이러한 CCTV 해킹을 통한 범죄가 늘어나고 있는 반면 일반 사용자들의 보안의식 수준은 현저히 낮았고, 국가적 차원에서의 대응 대책 또한 부실한 상황이다. 따라서 이번 연구논문을 통해 CCTV 해킹을 방지할 수 있는 여러 보안기술에는 중 사용자 인증 프로토콜, SSH 터널링을 통한 원격접속, 미디어 암호화 알고리즘 등을 소개하고, 최근에 출시된 기술로는 우경정보기술사의 SecuWatcher for CCTV, 노르마사의 CCTV Care 앱, 마크애니사의 Password SAFERTM for CCTV 등을 분석하여 대응책을 제시하여 CCTV 해킹으로부터 피해를 줄이기 위한 제안을 하였다.
최근 부각되고 있는 사생활유출범죄 유형 중 CCTV 해킹을 이용한 범행에 대한 것이다. 요즘 CCTV를 사용이 증가함에 따라 악의적인 해커들은 CCTV를 사생활유출수단으로써 이용하고 있다. 그러나 이러한 CCTV 해킹을 통한 범죄가 늘어나고 있는 반면 일반 사용자들의 보안의식 수준은 현저히 낮았고, 국가적 차원에서의 대응 대책 또한 부실한 상황이다. 따라서 이번 연구논문을 통해 CCTV 해킹을 방지할 수 있는 여러 보안기술에는 중 사용자 인증 프로토콜, SSH 터널링을 통한 원격접속, 미디어 암호화 알고리즘 등을 소개하고, 최근에 출시된 기술로는 우경정보기술사의 SecuWatcher for CCTV, 노르마사의 CCTV Care 앱, 마크애니사의 Password SAFERTM for CCTV 등을 분석하여 대응책을 제시하여 CCTV 해킹으로부터 피해를 줄이기 위한 제안을 하였다.
This is about the CCTV hacking which is one of the recently emerging privacy-spilling crime. Recently, the usage of CCTV is being increased, and Black Hat Hackers spill the individual's privacy by hacking it. However, That crime is being increased. However, most users rarely fulfill the security man...
This is about the CCTV hacking which is one of the recently emerging privacy-spilling crime. Recently, the usage of CCTV is being increased, and Black Hat Hackers spill the individual's privacy by hacking it. However, That crime is being increased. However, most users rarely fulfill the security management, and the government's measures are insufficient. Therfore, this research report implies some security technologies including user authentication protocols such as SSH Tunneling and Media Encryption Algorithm. and recently developed technologies including Wookyeong Information Technology's SecuWatcher for CCTV, Norma's CCTV Care App, and MarkAny's Password SAFERTM for CCTV.
This is about the CCTV hacking which is one of the recently emerging privacy-spilling crime. Recently, the usage of CCTV is being increased, and Black Hat Hackers spill the individual's privacy by hacking it. However, That crime is being increased. However, most users rarely fulfill the security management, and the government's measures are insufficient. Therfore, this research report implies some security technologies including user authentication protocols such as SSH Tunneling and Media Encryption Algorithm. and recently developed technologies including Wookyeong Information Technology's SecuWatcher for CCTV, Norma's CCTV Care App, and MarkAny's Password SAFERTM for CCTV.
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
문제 정의
Though most of the causes are in the user's management mismanagement, technical measures to prevent professional hacking, such as information leakage from China, are also needed. Therefore, this chapter describes CCTV security related technologies which are present or under development.
가설 설정
7. VMS performs authentication and notifies service availability if it matches.
제안 방법
The user authentication protocol is used to authenticate the user during the user registration process. In addition, the user authentication is strengthened by using the R number, which is a random number given at the time of login, in addition to the unique number concept of the CCTV, and prevents unauthorized access due to the unlock crack It is designed. The user is accessed through the Integrated Management System (VMS) to be authenticated.
SecuWatcher for CCTV is a product launched by Woo Kyung Information Technology, a security solution company in 2017. The feature of this product is to encrypt and transmit images transmitted from CCTV in real time, and to protect user authentication and image file by applying image forgery prevention technology when exporting image data to the outside. The dynamic object privacy management technology based on face recognition is a unique technology of this company and it can be applied to all images generated in real time by providing customized privacy[9].
성능/효과
Analysis of the hacking method revealed that most of them use 'Shodan' site to access CCTV which is in a defenseless state and hack in real time.
참고문헌 (14)
M. C. Yim. (2018. 10. 10.). Congressman Seong-Jung Park says "Most of the CCTV Hacking is Defenseless state". ZDNetKorea. .http://www.zdnet.co.kr/news/news_view.asp?artice_id20181010140028&typedet&rezdk
Y. S. Go. (2016. 2.). Study of Security vulnerability IOT device IP exposure threat prevention system.. Bukyeong National University, Busan.
J. Y. Byeon. (2017). 'IP camera' hacked 'clumsy'... Clear outflow immediately. Sanup News. http://www.kidd.co.kr/news/199010
K. T. Lee. (2018. 8. 22). Chinese CCTV Hackes Korean Privacy. Digital Times. http://www.dt.co.kr/contents.html?article_no2018082302100351041002&ref
B. S. Jeon & H. C. Yang. (2018). Chinese CCTV hacking is defenseless. MBN News. http://www.mbn.co.kr/pages/vod/programView.mbn?bcastSeqNo1194180
T. S. Park. (2011). Design and Implementation User Authentication Protocol to Prevent Malicious User in IP CCTV Enviornment. Sungsil University, Seoul.
G. J. Hwang, J. P. Park & S. M. Yang. (2016). Security Technique using SSH Tunneling for CCTV Remote Access. Sungsil University, Seoul.
S. C. Hwang. (2012). Development of Media Crypto Algorithm for anti-hacking into CCTV. Indeok University, Seoul.
N. I. Heo. (2017). CCTV Video Hacking Protection Solution "SECUWATCHER". Money Today. http://news.mt.co.kr/mtview.php?no2017121109240835573
N. I. Heo. (2018). Norma released CCTV Security App "CCTV Care". ETNews. http://www.etnews.com/20180717000198
S. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. DOI : 10.15207/jkcs.2017.8.2.021
G. W. Lee. (2012). A Study on Public Institutions CCTV Information Security Management System. Dankook University, Yongin.
S. Hong. (2014). Analysis of DDoS Attack and Countermeasure: Survey. The Journal of Digital Policy and Management, 12(1), 423-429. DOI : 10.14400/jdpm.2014.12.1.423
S. Hong. (2013). Disconnection of Wireless LAN Attack and Countermeasure. The Journal of Digital Policy and Management, 11(12), 453-458. DOI : 10.14400/jdpm.2013.11.12.453
※ AI-Helper는 부적절한 답변을 할 수 있습니다.