Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.1.225

A Study on Decision Making Process of System Access Management  

Cho, Young-Seok (Korea University)
Im, Jong-In (Korea University)
Lee, Kyung-Ho (Korea University)
Abstract
Recently, the administration and supervision of Information Security Certification and Security Inspection has been enforced but information leakage and security accidents by insiders are increasing consistently. The security accidents by insiders ran to 21% in 2010, by the 2011 Cyber Security Watch Survey. The problem is that immediate recognition is difficult and stopgap measure is mostly adopted without company's external notice apprehensive for cost increase or credit drop in case of internal security accidents. In the paper, we conducted the regression study on security access management then proposed the standard process available for other systems and businesses sites. It can be very useful for many companies to investigate, analyze and improve the problem of security management conveniently.
Keywords
Security Management; Regression Study;
Citations & Related Records
연도 인용수 순위
  • Reference
1 2011 Cyber Security Watch Survey, CERT, Jan. 2011.
2 Ji-hoon Song and Si-jin Lee, "The study of customized internal insider security model based on insider security accident," Korean Society For Internet Information, vol. 12, no. 1, pp. 71-82, Feb. 2011.
3 SECVIZ, http://www.secviz.org/content/the-davix-live-cd
4 Baek-ho Sung, Byung-chul Park, Dong-kyoo Shin, Dong-il Shin, Ki-young Moon and Jae-seoung Lee, "A Study of the EAM based on the xml for e-Commerce," Korea Institute of Infor mation Security and Cryptology, vol. 13, no. 2, Dec. 2003.
5 "E-business and extended ERP," Management and Information technology of MIT, Apr. 2000.
6 Tae-myeong Chung, "A study on gen eralization of security policies for ent erprise security management system," Korea Information Processing Society, vol. 9, no. 6, Jun. 2002.
7 "Priorities for ERP SECURITY," Electrical Wholesaling, Aug. 2013.
8 "JD Edwards, System Foundation," JD Edwards Enterprise software, pp. 743-753, Jun. 1999.
9 Jung-man Son and Sang-wan Lee, "PMI based User Authentication Management for ERP," Korea Industrial And Systems Engineering, no. 56, pp. 108- 111, Oct. 2003.
10 Chi-sung Won, Sang-hwan Leem and Wan-sub Um, "A study on the Inside Security of Enterprise Resource Plan ning," Korea Institute of Industrial Engineers, no. C11-5, pp. 1041-1043, Nov. 2005.
11 David A, Thomas K and Mark H, "ERP Critical Success Factors: An Exploration of the Contextual Factors in Public Sector Institutions," Proceed ings of the 35th Hawaii International Conference on System Sciences, Jan. 2002.
12 Mark Denning, Kate Hill, Bernard Dodd, Jonathan Lingard, Gray Elkingon, EricMatthews, Wendy Hewson and Jonathon R. Tate, "using SAP R/3," QUE, pp. 743-753, Dec. 2003.
13 Sang-hwan Leem, "UML with ERP Security Framework implementation," International Journal of Management Science & Financial Engineering, no. SA01-5, pp. 664-667, May. 2005.
14 Eun Kim, Yun-seok Lee and Min-soo Jung, "A scheme of Permission Tracking based on RBAC and DAC from Digital Forensics Point of view," The Korean Institute of Communications and Information Sciences, pp. 675-676, Jun. 2011.