• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2014³â Ãá°èÇмú´ëȸ

2014³â Ãá°èÇмú´ëȸ

Current Result Document : 6 / 23 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Åë½Å»ç ȨÆäÀÌÁö ÇØÅ·À» ÅëÇÑ °³ÀÎÁ¤º¸À¯Ãâ »ç°í Æ÷·»½Ä ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study on Website Operators Privacy Breaches through Hacking Forensic Research
ÀúÀÚ(Author) ³ëÁ¤È£   ¹Ú´ë¿ì   Jung-Ho Noh   Dea-Woo Park  
¿ø¹®¼ö·Ïó(Citation) VOL 18 NO. 01 PP. 0257 ~ 0260 (2014. 05)
Çѱ۳»¿ë
(Korean Abstract)
µðÁöÅÐ Æ÷·»½ÄÀº »ç°í ¹ß»ý ½Ã ½Ã½ºÅÛ ÆÄÀÏÀ» º¹¿ø ÇÏ¿© Áõ°Å ÀڷḦ ã´Â À¯ÀÏÇÑ ¼ö´ÜÀ̸ç Áö±Ý ÀϾ°í ÀÖ´Â KT ȨÆäÀÌÁö ÇØÅ·, Ä«µå»ç 3»ç °³ÀÎÁ¤º¸ À¯Ãâ ¹× ÃÖ±Ù ÀϾ ½ºÅ²Çªµå ȨÆäÀÌÁö °¡ÀÔ °í°´ Á¤º¸ À¯Ãâ µî ÀÌ·¯ÇÑ ¹üÁ˸¦ ÀúÁö¸¥ ÇØÄ¿¸¦ ã±â À§ÇÑ À¯ÀÏÇÑ ¼ö´ÜÀ̱⵵ ÇÏ´Ù. º» ¿¬±¸¿¡¼­´Â KT ȨÆäÀÌÁö ÇØÅ· °ø°Ý¿¡ ½ÃµµÇÑ ¿ìȸ ÇÁ·Î±×·¥ ¹× ÀÚµ¿È­ ÇÁ·Î±×·¥À» È°¿ëÇÏ¿© ÇØÅ·À» ½ÃµµÇßÀ» °æ¿ì ¾î¶² Á¤º¸°¡ À¯Ã⠵Ǿú´Â°¡¿¡ ´ëÇÑ ½ÇÇè°ú ÀÌ·¸°Ô ȨÆäÀÌÁö °ø°ÝÀ» ´ç ÇßÀ» °æ¿ì ¾î¶»°Ô Æ÷·»½ÄÀ» Çؼ­ ÇØÄ¿¿¡ ´ëÇÑ Áõ°Å ÀڷḦ ãÀº ÈÄ º¸°í¼­¸¦ ¸¸µé ¼ö ÀÖ´ÂÁö¿¡ ´ëÇØ ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Digital Forensics in the event of an accident, the system restore files and the only way to find evidence KT Website hacking happening now, credit card companies, and leakage of personal information by three recent spills occurred, such as Skin Food Home Up Customer Information hackers to find these crimes only means as
well.
This study attempted to bypass the KT website hacking attacks utilizing automated programs hacking programs, and if you try to experiment on whether any information has been disclosed and if so what home attacked forensics evidence for hackers to locate the can make a report is described.
Å°¿öµå(Keyword) KT Client Personal Information Leak   Homepage Hacking   Personal Information Leak   Hacking Attack   Vulnerability   Forensic  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå