- Volume 11 Issue 2
DOI QR Code
Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control
데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현
- Received : 2010.11.16
- Accepted : 2010.01.05
- Published : 2011.02.28
Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.
Database Security;Regulatory Compliance
Supported by : 충북BIT연구중심대학육성사업단, 한국연구재단
- http://datalossdb.org/reports Publicly Reported Data Breaches by DataLossDB 2005-2008
- Report on IT Security priorities for 2009 by Forrester Research
- http://download.oracle.com/docs/cd/E11882_01/network.112/e10746/asointro.htm#i1008719 Advanced Security Administrator's Guide.
- http://download.oracle.com/docs/cd/E11882_01/server.112/e10576/dvintro.htm#CEGBCJCB Database Vault Administrator's Guide.
- http://download.oracle.com/docs/cd/E14472_01/doc.102/e14459/avadm_intro.htm#sthref30 Audit Vault Administrator's Guide.
- http://law.go.kr/LSW/lsSc.do?menuId=0&p1=&query=%EC%A0%95%EB%B3%B4%ED%86%B5%EC%8B%A0%EB%A7%9D+%EC%9D%B4%EC%9A%A9%EC%B4%89%EC%A7%84+%EB%B0%8F+%EC%A0%95%EB%B3%B4%EB%B3%B4%ED%98%B8+%EB%93%B1%EC%97%90+%EA%B4%80%ED%95%9C+%EB%B2%95%EB%A5%A0&x=3&y=9 정보통신망 이용촉진 및 정보보호 등에 관한 법률/시행령,/시행규칙
- http://www.kisa.or.kr/jsp/public/laws/laws3.jsp 개인정보의 기술적 관리적 보호조치 기준 해설서
- 사이버 테러대응센터, http://www.netan.go.kr/