JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Decision Making Model for Selecting Financial Company Server Privilege Account Operations
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Decision Making Model for Selecting Financial Company Server Privilege Account Operations
Lee, Suk-Won; Lee, Kyung-Ho;
  PDF(new window)
 Abstract
The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as `NH Bank Cyber Attack`. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).
 Keywords
Server Privilege Account;AHP;Information Security;Decision Making;
 Language
Korean
 Cited by
 References
1.
Ye Jin, Jang, "Overview of NH Bank Cyber Attack ", AP. "http://news.donga.com/3/all/20110503/36898474/1#," 3. Mar. 2011.

2.
Sang Jin, Jang, "NH Bank Computer Network Password Was '1' and '0000'. ", The Cho-sun Ilbo, "http://news.cho-sun.com/site/data/html_dir/2011/04/20/2011042002347.html," 20 .April. 2011.

3.
Financial Services Commission, "Enforcement Bylaws of Regulation On Supervision of Electronic Financial Activities," Sep. 2009.

4.
Financial Services Commission, "Regulation On Supervision of Electronic Financial Activities," June. 2010.

5.
Sang-hyun Lee, "Identity and Access management of information systems research on how to strengthen," Dongguk University , Aug. 2012

6.
Byung-eon Park, "An integrated approach for identity and access management for efficient administrative work," Jonornal of The Korea Institute of information Security & Cryptology, v.25, no.1, pp.165-172, Feb. 2015 crossref(new window)

7.
Young-seok Cho, "A Study on Decision Making Process of System Access Management," Jonornal of The Korea Institute of information Security & Cryptology, v.25, no.1, pp.225-235, Feb. 2015. crossref(new window)

8.
Yang-hyun, Kwon, "Study on access control model for the environment of smart grid system," Pusan National University, Feb. 2013.

9.
Sang-Pil Shin, "An analytic hierarchy process (AHP) approach to selection of implementation mode of mobile office system," Seoul National Univetsity of Science and Technology, July. 2013.

10.
Seokung Yoon, "Factor analysis of VoIP Security Checklists using AHP," Jonornal of The Korea Institute of information Security & Cry-ptology, v.22, no.5, pp.1115-1122, OCT. 2010.

11.
Dong-wook Kim, "A Study on Information Security Policy in the era of Smart Society," Jonornal of The Korea Institute of information Security & Cryptology, v.22, no.4, pp.883-899, Aug. 2012.

12.
Kihoon Sung, "A Study on Threat factors of Information Security in Social Network Service by Analytic Hierarchy Process," Jonornal of The Korea Institute of information Security & Cryptology, v.20, no.6, pp.261-270, Dec. 2010.

13.
Yong-Wook Chung, "The weight analysis research in developing a similarity classification problem of malicious code based on attributes," Jonornal of The Korea Institute of information Security & Cryptology, v.23, no.3, pp.501-514, June. 2013. crossref(new window)

14.
Young-Jin Shin, "A Study of Priority or Policy Implement of Personal Infomation Security in Public Sector: Focsed on Personal Information Security Index," Jonornal of The Korea Institut of information Security & Cryptology, v.22, no.2, pp.379-390, Apr. 2012.

15.
Saaty T. L., "The Analytic Hierarchy rocess," McGraw-Hill, New York, 1980.

16.
Hodong Kim , "A Study on Password Management for Improving Efficiency about Information Security Check Serice," Konkuk University, Jan. 2009.

17.
Gwansik Yoon, "Design and implemenation of an access control system in martwork environment," Ajou University, Jan, 2013.

18.
Yonghan Lee, "A flexible access control model for complex business applications," Korea University, Jun. 2012.

19.
Sunho Jo, "A Study on the Selection Method of Water Supply System in Apartment House in using AHP", Dong-Eui University, Feb, 2014