Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.6.1607

Decision Making Model for Selecting Financial Company Server Privilege Account Operations  

Lee, Suk-Won (Korea University)
Lee, Kyung-Ho (Korea University)
Abstract
The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as 'NH Bank Cyber Attack'. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).
Keywords
Server Privilege Account; AHP; Information Security; Decision Making;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Ye Jin, Jang, "Overview of NH Bank Cyber Attack ", AP. "http://news.donga.com/3/all/20110503/36898474/1#," 3. Mar. 2011.
2 Sang Jin, Jang, "NH Bank Computer Network Password Was '1' and '0000'. ", The Cho-sun Ilbo, "http://news.cho-sun.com/site/data/html_dir/2011/04/20/2011042002347.html," 20 .April. 2011.
3 Financial Services Commission, "Enforcement Bylaws of Regulation On Supervision of Electronic Financial Activities," Sep. 2009.
4 Financial Services Commission, "Regulation On Supervision of Electronic Financial Activities," June. 2010.
5 Sang-hyun Lee, "Identity and Access management of information systems research on how to strengthen," Dongguk University , Aug. 2012
6 Byung-eon Park, "An integrated approach for identity and access management for efficient administrative work," Jonornal of The Korea Institute of information Security & Cryptology, v.25, no.1, pp.165-172, Feb. 2015   DOI
7 Young-seok Cho, "A Study on Decision Making Process of System Access Management," Jonornal of The Korea Institute of information Security & Cryptology, v.25, no.1, pp.225-235, Feb. 2015.   DOI
8 Yang-hyun, Kwon, "Study on access control model for the environment of smart grid system," Pusan National University, Feb. 2013.
9 Sang-Pil Shin, "An analytic hierarchy process (AHP) approach to selection of implementation mode of mobile office system," Seoul National Univetsity of Science and Technology, July. 2013.
10 Seokung Yoon, "Factor analysis of VoIP Security Checklists using AHP," Jonornal of The Korea Institute of information Security & Cry-ptology, v.22, no.5, pp.1115-1122, OCT. 2010.
11 Dong-wook Kim, "A Study on Information Security Policy in the era of Smart Society," Jonornal of The Korea Institute of information Security & Cryptology, v.22, no.4, pp.883-899, Aug. 2012.
12 Kihoon Sung, "A Study on Threat factors of Information Security in Social Network Service by Analytic Hierarchy Process," Jonornal of The Korea Institute of information Security & Cryptology, v.20, no.6, pp.261-270, Dec. 2010.
13 Yong-Wook Chung, "The weight analysis research in developing a similarity classification problem of malicious code based on attributes," Jonornal of The Korea Institute of information Security & Cryptology, v.23, no.3, pp.501-514, June. 2013.   DOI
14 Young-Jin Shin, "A Study of Priority or Policy Implement of Personal Infomation Security in Public Sector: Focsed on Personal Information Security Index," Jonornal of The Korea Institut of information Security & Cryptology, v.22, no.2, pp.379-390, Apr. 2012.
15 Saaty T. L., "The Analytic Hierarchy rocess," McGraw-Hill, New York, 1980.
16 Hodong Kim , "A Study on Password Management for Improving Efficiency about Information Security Check Serice," Konkuk University, Jan. 2009.
17 Gwansik Yoon, "Design and implemenation of an access control system in martwork environment," Ajou University, Jan, 2013.
18 Sunho Jo, "A Study on the Selection Method of Water Supply System in Apartment House in using AHP", Dong-Eui University, Feb, 2014
19 Yonghan Lee, "A flexible access control model for complex business applications," Korea University, Jun. 2012.