Response to Security Threats through Importance Analysis of NFT Service Provider Security Level Check Items

NFT 서비스 제공자 보안 수준 점검 항목 중요도 분석을 통한 보안 위협 대응

  • 임동성 (오산대학교 컴퓨터정보계열 컴퓨터보안전공)
  • Received : 2023.09.28
  • Accepted : 2023.10.30
  • Published : 2023.10.30

Abstract

Demand for NFT is expanding along with Blockchain. And cyber security threats are also increasing. Therefore, this study derives security level inspection items by analyzing status related to NFT security such as NFT features, security threats, and compliance for the purpose of strengthening NFT security. Based on this, the relative importance was confirmed by applying it to the AHP model. As a result of the empirical analysis, the priority order of importance was found in the order of Security management system establishment and operation, encryption, and risk management, etc. The significance of this study is to reduce NFT security incidents and improve the NFT security management level of related companies by deriving NFT-related security level check items and demonstrating the research model. And If you perform considering relative importance of the NFT check items, the security level can be identified early.

블록체인과 함께 NFT(Non-Fungible Token) 수요가 확대됨에 따라 사이버상의 보안 위협도 증가하고 있다. 따라서 본 연구는 NFT 보안 강화를 목적으로 NFT 특징, 보안 위협, 컴플라이언스 등 NFT 보안 관련 현황 분석을 통해서 보안 점검 항목을 도출하였고 이를 바탕으로 AHP 모형에 적용, 상대적 중요도를 확인하였다. 실증 분석 결과 관리체계 수립 및 운영, 암호화, 위험관리 등으로 중요도 우선 순위가 나타났다. 본 연구의 의의는 NFT 관련보안 수준 점검 항목을 도출하고 모형을 실증함으로써 NFT 보안 사고 감소 및 관련 회사들의 보안 관리 수준을 보다 더 향상시킬 수 있다. 그리고 NFT 점검 항목의 상대적인 중요도를 고려하여 보안 점검을 수행한다면 조기에 보안 수준을 식별할 수 있을 것이다.

Keywords

References

  1. Maeil Business Newspaper, "Last year, NFT transaction volume exceeded 30 trillion won.", https://www.mk.co.kr/economy/view.php?sc=50000001&year=2022&no=43422
  2. Chosunilbo, "NFT market takes a hit due to FTX bankruptcy.", https://biz.chosun.com/stock/finance/2022/12/06/536WXBQFN5DF3HQUUEAKIHWBZI/
  3. ITworld, https://www.itworld.co.kr/numbers/82002/249538
  4. Korea JoongAng Daily, "Can NFTs be hacked too?", https://www.joongang.co.kr/article/25102934#home
  5. Money Today, "2 billion stolen in 3 hours", https://news.mt.co.kr/mtview.php?no=2022022113592917335
  6. H. K. Kim, "A Study on Legal Issues in NFT Content Transactions," Sungkyunkwan Law Review, Vol. 33, No. 3, pp. 394-395, Sep. 2021.
  7. H. J. Song, S. H. Jeong, and K. B. Kim, "Utilizing Hash Algorithms for NFT Data File Integrity Checks," Journal of Digital Contents Society, Vol. 24, No. 7, pp. 1531-1532, Jul. 2023.
  8. KISA, "Metaverse and NFT, Cybersecurity Threat Outlook and Analysis", https://www.kisa.or.kr/20301/form?postSeq=12&lang_type=KO
  9. Lee&Ko, "Current issues and laws in digital finance", https://www.leeko.com/upload/news/newsLetter/900/20221018104428442.pdf
  10. Satty T. L., "Axiomatic foundation of the Analytic Hierarchy Process," Management Sci., Vol. 32, No. 7, 1986, pp. 841-850. https://doi.org/10.1287/mnsc.32.7.841
  11. S. H. Jung, C. M. Lee, "A Study on the Analysis of Security Threats of NFT Transaction in Korea," Korean Journal of Industrial Security, Vol. 12, No. 1, pp. 302-307, Dec. 2022. https://doi.org/10.33388/kais.2022.12.1.293
  12. D. Y. Lee, Y. J. Kim, and J. W. Yoon, "A Study Information Security Governance requirement of domestic NFT marketplace," Journal of Information Technology Service, Vol. 24, No. 7, pp. 634-636, Nov. 2021.