Browse > Article
http://dx.doi.org/10.5392/JKCA.2011.11.2.061

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control  

Lee, Byoung-Yup (배재대학교 전자상거래학과)
Park, Jun-Ho (충북대학교 전기전자컴퓨터공학부)
Kim, Mi-Kyoung (충북대학교 전기전자컴퓨터공학부)
Yoo, Jae-Soo (충북대학교 전기전자컴퓨터공학부)
Publication Information
Abstract
Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.
Keywords
Database Security; Regulatory Compliance;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://datalossdb.org/reports Publicly Reported Data Breaches by DataLossDB 2005-2008
2 Report on IT Security priorities for 2009 by Forrester Research
3 http://download.oracle.com/docs/cd/E11882_01/network.112/e10746/asointro.htm#i1008719 Advanced Security Administrator's Guide.
4 http://download.oracle.com/docs/cd/E11882_01/server.112/e10576/dvintro.htm#CEGBCJCB Database Vault Administrator's Guide.
5 http://download.oracle.com/docs/cd/E14472_01/doc.102/e14459/avadm_intro.htm#sthref30 Audit Vault Administrator's Guide.
6 http://law.go.kr/LSW/lsSc.do?menuId=0&p1=&query=%EC%A0%95%EB%B3%B4%ED%86%B5%EC%8B%A0%EB%A7%9D+%EC%9D%B4%EC%9A%A9%EC%B4%89%EC%A7%84+%EB%B0%8F+%EC%A0%95%EB%B3%B4%EB%B3%B4%ED%98%B8+%EB%93%B1%EC%97%90+%EA%B4%80%ED%95%9C+%EB%B2%95%EB%A5%A0&x=3&y=9 정보통신망 이용촉진 및 정보보호 등에 관한 법률/시행령,/시행규칙
7 http://www.kisa.or.kr/jsp/public/laws/laws3.jsp 개인정보의 기술적 관리적 보호조치 기준 해설서
8 http://olv.moazine.com/rviewer/index.asp
9 http://blog.daum.net/kcc1335/1890
10 http://datalossdb.org
11 사이버 테러대응센터, http://www.netan.go.kr/