DOI QR코드

DOI QR Code

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control

데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현

  • 이병엽 (배재대학교 전자상거래학과) ;
  • 박준호 (충북대학교 전기전자컴퓨터공학부) ;
  • 김미경 (충북대학교 전기전자컴퓨터공학부) ;
  • 유재수 (충북대학교 전기전자컴퓨터공학부)
  • Received : 2010.11.16
  • Accepted : 2010.01.05
  • Published : 2011.02.28

Abstract

Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

Keywords

Database Security;Regulatory Compliance

Acknowledgement

Supported by : 충북BIT연구중심대학육성사업단, 한국연구재단

References

  1. http://datalossdb.org/reports Publicly Reported Data Breaches by DataLossDB 2005-2008
  2. Report on IT Security priorities for 2009 by Forrester Research
  3. http://download.oracle.com/docs/cd/E11882_01/network.112/e10746/asointro.htm#i1008719 Advanced Security Administrator's Guide.
  4. http://download.oracle.com/docs/cd/E11882_01/server.112/e10576/dvintro.htm#CEGBCJCB Database Vault Administrator's Guide.
  5. http://download.oracle.com/docs/cd/E14472_01/doc.102/e14459/avadm_intro.htm#sthref30 Audit Vault Administrator's Guide.
  6. http://law.go.kr/LSW/lsSc.do?menuId=0&p1=&query=%EC%A0%95%EB%B3%B4%ED%86%B5%EC%8B%A0%EB%A7%9D+%EC%9D%B4%EC%9A%A9%EC%B4%89%EC%A7%84+%EB%B0%8F+%EC%A0%95%EB%B3%B4%EB%B3%B4%ED%98%B8+%EB%93%B1%EC%97%90+%EA%B4%80%ED%95%9C+%EB%B2%95%EB%A5%A0&x=3&y=9 정보통신망 이용촉진 및 정보보호 등에 관한 법률/시행령,/시행규칙
  7. http://www.kisa.or.kr/jsp/public/laws/laws3.jsp 개인정보의 기술적 관리적 보호조치 기준 해설서
  8. http://olv.moazine.com/rviewer/index.asp
  9. http://blog.daum.net/kcc1335/1890
  10. http://datalossdb.org
  11. 사이버 테러대응센터, http://www.netan.go.kr/