Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.5.961

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)  

Chae, Hyun Tak (Korea Graduate School of Information Security)
Lee, Sang-Jin (Korea Graduate School of Information Security)
Abstract
In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.
Keywords
Personal information; PC security solution; log analysis;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Yonhapnews, http://www.yonhapnews.co.kr/economy/2013/12/11/0301000000AKR20131211074400002.HTML
2 Yonhapnews, http://www.yonhapnews.co.kr/economy/2014/02/13/0301000000AKR20140213044400002.HTML
3 NIS, industry confidential protection center Industry and security information knowledge spill statistics, http://service 4.nis.go.kr/servlet/page?cmd=preserv ation&menu=AAA00#.U4k8c3lZp9A
4 Huy Kang Kim, "Need for log analysis," Information Security 21C Contribution, pp.1, Feb. 2003.
5 Financial Supervisory Service, "Financial company information technology sector protection work best practices," pp.10, Oct. 2011.
6 Song-young Kim, Joseph Kim, Jong-in Lim, Kyung-ho Lee, "A study on the security policy improvement using the big data," journal of the korea institute of information security &Cryptology VOL.23, NO.5, Oct. 2013.   과학기술학회마을   DOI
7 Digital Daily, http://www.ddaily.co.kr/news/article.html?no=120963
8 Financial Supervisory Service, "Financial company information technology sector protection work best practices," pp.51, Oct. 2011.
9 Korea Federation of Banks, "Comprehensive plan to prevent recurrence of personal financial information disclosure," pp.2, July. 2014.