Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.10.2482

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database  

Jang, Seung-Ju (Department of Computer Engineering, Dongeui University)
Abstract
This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.
Keywords
MS-SQL; Database; Vulnerability; Account Vulnerability;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 KISA, "Database security audit log Specification for Personal Information protection", Korea Information Security Agency, 2008.
2 Seung-Ju Jang, Sung-Jin Kim "A Study of the Specific IP Vulnerability for the Oracle System", The Comprehensive Winter Conference of Korea Information and Communications Society, pp.392-394, 2014.
3 Yu-Kyung Kim, Seung-Cheol Sin, Jun-Seon Ahn, Wook-Sae Lee, Eun-Young Lee, Hwan-Su Han "Case study of software security vulnerabilities database", Journal of Information Science, Vol.28, No.2, pp.20-31, 2010. 02.
4 Joon-Seon Ahn, Ji-Ho Bang, Eun-Young Lee "Quantitative Scoring Criteria on the Importance of Software Weaknesses", Institute of Information Security, Vol.22, No.6, pp.1407-1417, 2012. 12.   과학기술학회마을
5 DB Vulnerability Analysis Summary, DBGuide Establish a comprehensive information database operations (www.DBGuide.net)
6 Web server deployment guide security checks, The Korea Communications Commission, National Internet Development Agency of Korea.
7 Hyun-A Park, Dong-Hoon Lee, Taik-Yeong Chung "Comperhensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database", Institute of Information Security, Vol.22, No.3, pp.621-635, 2012.
8 Dong-Jin Kin, Sung-Je Cho "An Analysis of Domestic and Foreign Security Vulnerability Management Systems based on a National Vulnerability Database", Internet and lnformation Security, Vol.1, No.2, pp.130-147, 2010.
9 Ji-Hong Kim, Huy-Kang Kim "Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis", Institute of Information Security Vol.22, No.5, pp.1079-1090, 2010. 10.   과학기술학회마을
10 Ji-Ho Bang, Rhan Ha "Research on Major Weakness Rules for Secure Software Development", J-KICS Vol.38 No.10, pp.831-840, 2013. 10.   과학기술학회마을   DOI
11 Jin-Seok Park, Hee-Soo Kang, Seung-Joo Kim "How to Combine Secure Software Development Lifecycle into Common Criteria", Institute of Information Security, Vol.24, No.1, pp.171-182, 2014. 02.   과학기술학회마을   DOI