Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 25, Issue 6 - Dec 2015
Volume 25, Issue 5 - Oct 2015
Volume 25, Issue 4 - Aug 2015
Volume 25, Issue 3 - Jun 2015
Volume 25, Issue 2 - Apr 2015
Volume 25, Issue 1 - Feb 2015
Selecting the target year
A Simple Power Analysis Attack on ARIA Key Expansion Based on Hamming Weight Leakage
Park, Aesun ; Han, Dong-Guk ; Choi, Jun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1319~1326
DOI : 10.13089/JKIISC.2015.25.6.1319
The symmetric key encryption algorithms, such as the AES or the ARIA, generate round keys by the key expansion mechanism. While the algorithm is executed, key expansion mechanism emits information about the secret key by the power consumption. The vulnerability exists that can reduce significantly the candidate of the secret key by the simple power analysis attack using a small number of the power traces. Therefore, we'll have to study about the attack and the countermeasure to prevent information leakage. While a simple power analysis attack on the AES key expansion has been studied since 2002, ARIA is insufficient. This paper presents a simple power analysis attack on 8-bit implementations of the ARIA-128 key expansion. The presented attack efficiently utilizes this information leakage to substantially reduce the key space that needs to be considered in a brute-force search for the secret key. We show that ARIA is vulnerable to a SPA attack based on hamming weight leakage.
An Analysis of Agility of the Cryptography API Next Generation in Microsoft: Based on Implementation Example of Applying Cryptography Algorithm HAS-160 in South Korea
Lee, Kyungroul ; You, Ilsun ; Yim, Kangbin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1327~1339
DOI : 10.13089/JKIISC.2015.25.6.1327
This paper surveys structures, features and programming techniques of CNG that is substitution of CAPI in Microsoft, and implements hash provider for support HAS-160 that is one of the Korean hash algorithm. After that, we analysis agility from different perspective based on implemented results, and propose customizing stratagem. Analyzed results of basic concepts and implemented HAS-160 hash provider are expected applying measure for Korean cryptography algorithm in Vista environment. Consequently, we will research secure distribution way due to it is not apply on CNG.
Androfilter: Android Malware Filter using Valid Market Data
Yang, Wonwoo ; Kim, Jihye ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1341~1351
DOI : 10.13089/JKIISC.2015.25.6.1341
As the popularization of smartphone increases the number of various applications, the number of malicious applications also grows rapidly through the third party App Market or black market. This paper suggests an investigation filter, Androfilter, that detects the fabrication of APK file effectively. Whereas the most of antivirus software uses a separate server to collect, analyze, and update malicious applications, Androfilter assumes Google Play as the trusted party and verifies integrity of an application through a simple query to Google Play. Experiment results show that Androfilter blocks brand new malicious applications that have not been reported yet as well as known malicious applications.
State Information Based Recommendation Algorithm for Minimizing the Malicious User's Influence
Noh, Taewan ; Oh, Hayoung ; Noh, Giseop ; Kim, Chong-Kwon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1353~1360
DOI : 10.13089/JKIISC.2015.25.6.1353
With the extreme development of Internet, recently most users refer the sites with the various Recommendation Systems (RSs) when they want to buy some stuff, movie and music. However, the possibilities of the Sybils with the malicious behaviors may exists in these RSs sites in which Sybils intentionally increase or decrease the rating values. The RSs cannot play an accurate role of the proper recommendations to the general normal users. In this paper, we divide the given rating values into the stable or unstable states and propose a system information based recommendation algorithm that minimizes the malicious user's influence. To evaluate the performance of the proposed scheme, we directly crawl the real trace data from the famous movie site and analyze the performance. After that, we showed proposed scheme performs well compared to existing algorithms.
A Study on Mobile Game Security Threats by Analyzing Malicious Behavior of Auto Program of Clash of Clans
Heo, Geon Il ; Heo, Cheong Il ; Kim, Huy Kang ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1361~1376
DOI : 10.13089/JKIISC.2015.25.6.1361
Recently, the size of the mobile game market and the number of mobile game users are growing. Also, as the mobile game's life cycle is increasing at the same time, auto program issue reappears which has been appeared in PC online games. Gamers usually tend to ignore warning messages from antivirus programs and even worse they delete antivirus program to execute auto programs. Therefore, mobile game users are easily compromised if the auto program performs malicious behaviors not only for the original features. In this paper, we analyze whether seven auto programs of "clash of clans" which has a lot more users for a long time perform malicious behaviors or not. We forecast the possible security threats in near future and proposed countermeasures based on this analysis. By analyzing auto programs of highly popular mobile game of today, we can acquire the knowledge on auto program's recent trend such as their development platform, operating mode, etc. This analysis will help security analysts predict auto program's evolving trends and block potential threats in advance.
The Automatic Collection and Analysis System of Cloud Artifact
Kim, Mingyu ; Jeong, Doowon ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1377~1383
DOI : 10.13089/JKIISC.2015.25.6.1377
As the cloud services users' increase, there are important files created by individual in cloud storage. Thus, investigation of cloud artifact should be conducted. There are two methods of analyzing cloud service, one is that investigates cloud server provider (CSP), and another is that investigates client. In this paper, we presents an automated framework to detect the altered artifact and developes a tool that detects the cloud artifact. We also developed Cloud Artifact Tool that can investigate client computer. Cloud Artifact Tool provides feature of collection and analysis for the services such as Google Drive, Dropbox, Evernote, NDrive, DaumCloud, Ucloud, LG Cloud, T Cloud and iCloud.
A research on detection techniques of Proxy DLL malware disguised as a Windows library : Focus on the case of Winnti
Koo, JunSeok ; Kim, Huy Kang ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1385~1397
DOI : 10.13089/JKIISC.2015.25.6.1385
The Proxy DLL is a mechanism using a normal characteristics of Windows. Specific malware is executed via this mechanism after intrusion into a system which is targeted. If a intrusion of malware is successful, malware should be executed at least once. For execution, malware is disguised as a Windows Library. The malware of Winnti group is a good case for this. Winnti is a group of Chinese hacking groups identified by research in the fall of 2011 at Kaspersky Lab. Winnti group activities was negatively over the years to target the online video game industry, in this process by making a number of malware infected the online gaming company. In this paper, we perform research on detection techniques of Proxy DLL malware which is disguised as a Windows library through Winnti group case. The experiments that are undertaken to target real malware of Winnti show reliability of detection techniques.
Real time predictive analytic system design and implementation using Bigdata-log
Lee, Sang-jun ; Lee, Dong-hoon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1399~1410
DOI : 10.13089/JKIISC.2015.25.6.1399
Gartner is requiring companies to considerably change their survival paradigms insisting that companies need to understand and provide again the upcoming era of data competition. With the revealing of successful business cases through statistic algorithm-based predictive analytics, also, the conversion into preemptive countermeasure through predictive analysis from follow-up action through data analysis in the past is becoming a necessity of leading enterprises. This trend is influencing security analysis and log analysis and in reality, the cases regarding the application of the big data analysis framework to large-scale log analysis and intelligent and long-term security analysis are being reported file by file. But all the functions and techniques required for a big data log analysis system cannot be accommodated in a Hadoop-based big data platform, so independent platform-based big data log analysis products are still being provided to the market. This paper aims to suggest a framework, which is equipped with a real-time and non-real-time predictive analysis engine for these independent big data log analysis systems and can cope with cyber attack preemptively.
Techniques study of IMS/SIP based Lawful Interception in 3G networks
Lee, Myoung-rak ; Pyo, Sang-Ho ; In, Hoh Peter ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1411~1420
DOI : 10.13089/JKIISC.2015.25.6.1411
Lawful interception(LI) standard of telephone networks has technical limitations to lawfully intercept IMS/SIP-based mobile communication network subscriber who using Android and iPhone device. In addition, the technical standards related to legal interception of the IMS/SIP of the wireless network is insufficient compared to the systematic study of the development of a wireless network infrastructure. The architecture proposed in the standard of ETSI(European Telecommunications Standards Institute) for the seamless LI is insufficient to overcome the limitations of traditional voice-centric LI techniques. This paper proposes an IMS/SIP-based architecture to perform LI under 3G networks that focuses on mobility-supported environments with merging cellular networks and the Internet. We implemented the simulation to verify the efficiency of the proposed architecture, and the experimental results show that our method achieves higher lawful interception rate than that of existing interception methods.
Development of Windows forensic tool for verifying a set of data
Kim, Min-Seo ; Lee, Sang-jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1421~1433
DOI : 10.13089/JKIISC.2015.25.6.1421
For an accurate analysis through the forensic of digital devices and computer, it is a very important validation of the reliability of digital forensic tools. To verify the reliability of the tool, it is necessary to research and development of the data set to be input to the tool. In many-used Windows operating system of the computer, there is a Window forensic artifacts associated with time and system behavior. In this paper, we developed a set of data in the Windows operating system to be able to analyze all of the two Windows artifacts and we conducted a test with published digital forensic tools. Therefore, the developed data set presents the use of the following method. First, artefacts education for growing ability can be analyzed acts standards. Secondly, the purpose of tool tests for verifying the reliability of digital forensics. Lastly, recyclability for new artifact analysis.
Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID
Shin, Jae-ho ; Kim, In-seok ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1435~1447
DOI : 10.13089/JKIISC.2015.25.6.1435
Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.
A lightweight detection mechanism of control flow modification for IoT devices
Pak, Dohyun ; Lee, JongHyup ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1449~1453
DOI : 10.13089/JKIISC.2015.25.6.1449
Constrained IoT devices cannot achieve full coverage of software attestation even though the integrity of software is critical. The limited modification attacks on control flow of software aim at the shadow area uncovered in software attestation processes. In this paper, we propose a light-weight protection system that detects modification by injecting markers to program code.
Advanced protocol against MITM attacks in Industrial Control System
Ko, Moo-seong ; Oh, Sang-kyo ; Lee, Kyung-ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1455~1463
DOI : 10.13089/JKIISC.2015.25.6.1455
If the industrial control system is infected by malicious worm such as Stuxnet, national disaster could be caused inevitably. Therefore, most of the industrial control system defence is focused on intrusion detection in network to protect against these threats. Conventional method is effective to monitor network traffic and detect anomalous patterns, but normal traffic pattern attacks using MITM technique are difficult to be detected. This study analyzes the PROFINET/DCP protocol and weaknesses with the data collected in real industrial control system. And add the authentication data field to secure the protocol, find out the applicability. Improved protocol may prevent the national disaster and defend against MITM attacks.
A research on improving client based detection feature by using server log analysis in FPS games
Kim, Seon Min ; Kim, Huy Kang ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1465~1475
DOI : 10.13089/JKIISC.2015.25.6.1465
Cheating detection models in the online games can be divided into two parts. The one is on client based model, which is designed to detect malicious programs not to be run while playing the games. The other one is server based model, which distinguishes the difference between benign users and cheaters by the server log analysis. The client based model provides various features to prevent games from cheating, For instance, Anti-reversing, memory manipulation and so on. However, being deployed and operated on the client side is a huge weak point as cheaters can analyze and bypass the detection features. That Is why the server based model is an emerging way to detect cheating users in online games. But the simple log data such as FPS's one can be hard to find validate difference between two of them. In this paper, In order to compensate for the disadvantages of the two detection model above, We use the existing game security solution log as well as the server one to bring high performance as well as detection ratio compared to the existing detection models in the market.
A Study on User Authentication with Smartphone Accelerometer Sensor
Seo, Jun-seok ; Moon, Jong-sub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1477~1484
DOI : 10.13089/JKIISC.2015.25.6.1477
With the growth of financial industry with smartphone, interest on user authentication using smartphone has been arisen in these days. There are various type of biometric user authentication techniques, but gait recognition using accelerometer sensor in smartphone does not seem to develop remarkably. This paper suggests the method of user authentication using accelerometer sensor embedded in smartphone. Specifically, calibrate the sensor data from smartphone with 3D-transformation, extract features from transformed data and do principle component analysis, and learn model with using gaussian mixture model. Next, authenticate user data with confidence interval of GMM model. As result, proposed method is capable of user authentication with accelerometer sensor on smartphone as a high degree of accuracy(about 96%) even in the situation that environment control and limitation are minimum on the research.
An effective detection method for hiding data in compound-document files
Kim, EunKwang ; Jeon, SangJun ; Han, JaeHyeok ; Lee, MinWook ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1485~1494
DOI : 10.13089/JKIISC.2015.25.6.1485
Traditionally, data hiding has been done mainly in such a way that insert the data into the large-capacity multimedia files. However, the document files of the previous versions of Microsoft Office 2003 have been used as cover files as their structure are so similar to a File System that it is easy to hide data in them. If you open a compound-document file which has a secret message hidden in it with MS Office application, it is hard for users who don't know whether a secret message is hidden in the compound-document file to detect the secret message. This paper presents an analysis of Compound-File Binary Format features exploited in order to hide data and algorithms to detect the data hidden with these exploits. Studying methods used to hide data in unused area, unallocated area, reserved area and inserted streams led us to develop an algorithm to aid in the detection and examination of hidden data.
The analysis of data structure to digital forensic of dashboard camera
An, Hwihang ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1495~1502
DOI : 10.13089/JKIISC.2015.25.6.1495
Dashboard camera is important system to store the variable data that not only video but also non-visual information that state of vehicle such as accelerometer, speed, direction. Non-visual information include variable data that can't visualization, so it used important evidence to figure out the situation in accident. It could be missed to non-visual information what can be prove the case in the just digital video forensic procedure. In this paper, We proposal the digital forensic analysis procedure for dashboard camera to all data in dashboard camera extract and analysis data for investigating traffic accident case. And I analyze to some products in with this digital forensic analysis procedure.
Advanced Mandatory Authentication Architecture Designed for Internet Bank
Hong, Ki-seok ; Lee, Kyung-ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1503~1514
DOI : 10.13089/JKIISC.2015.25.6.1503
Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.
WLAN Security Access Protocol for Rapid Initial Link Setup Process
Kim, Min-Hee ; Park, Chang-Seop ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1515~1523
DOI : 10.13089/JKIISC.2015.25.6.1515
It has been prevalent to be serviced through WLAN(Wireless Local Area Network) as a variety of mobile devices have been introduced. If the number of mobile devices increases rapidly for the network access in a limited range of ESS(Extended Service Set), a lengthy connection delays are induced due to the initial link setup process of the IEEE 802.11i which is WLAN security standard. In this paper, we propose a new initial link setup protocol which can be executed in the ESS area of WLAN.
A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique
Jeong, Seong Hoon ; Kim, Hana ; Shin, Youngsang ; Lee, Taejin ; Kim, Huy Kang ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1525~1540
DOI : 10.13089/JKIISC.2015.25.6.1525
Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.
Security Design for Information protection System using BSIMM
Park, Jung-Sup ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1541~1547
DOI : 10.13089/JKIISC.2015.25.6.1541
In the recent IT industry, security has established itself as the factor to be considered the most in the software development. It goes without saying that security is the critical factor for the development of information security products. In the evaluation of the information security products, the security is assured by the security architecture requirement (ADV_ARC). However, the Absence of the systematic software security architecture process makes it difficult to guarantee the security quality consistently even though they are evaluated based on common criteria. In this paper, we propose a way to ensure a consistent security quality applying the software security framework in BSIMM.
Study on the Association between Personal Information Protection Legislation and Information Security Product
Kim, Min-Jeong ; Lee, Jung Won ; Yoo, Jinho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1549~1560
DOI : 10.13089/JKIISC.2015.25.6.1549
For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.
Research Trends in Information Security Economics: Focused on the Articles Presented at WEIS
Kang, Mi-Hwa ; Kim, Tae-Sung ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1561~1570
DOI : 10.13089/JKIISC.2015.25.6.1561
Even though much investment to prevent or mitigate damage from information security breaches have been considered, researches on economically rational information security decision-making such as investment, management, etc. are not introduced in Korea. This study analyzes research themes and methodologies of articles presented at the Workshop on the Economics of Information Security (WEIS) for 2002 - 2014. Results of the study can suggest future research topics for researchers, and help make rational information security decision-making for practitioners.
Study on Selection Methodology of Applicable Prospective Civil Information Security Technologies in Defense Cyberwarfare Sector
Lee, Ho-gyun ; Lim, Jong-in ; Lee, Kyung-ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1571~1582
DOI : 10.13089/JKIISC.2015.25.6.1571
This paper suggests a methodology for linking technology classification of nongovernmental information security field and technology classification of cyber-warfare in national defense field. Based on this methodology, Multi-Attribute Utility Theory(MAUT) is applied for the purpose of selecting promising nongovernmental technology that is worthy of later introduction or development. After studying the result of the survey regarding the research progression plan of the selected promising technology, the following three facts are discovered: Firstly, the greater the social spillover effect, the greater the need for the government lead R&D. Secondly, among the spillover effects, the social aspect has the highest correlation with respect to the need for the government lead R&D, while the economical aspect and the technological aspect come in the second and the third place, respectively. Finally, according to the correlation analysis, the defense application and the technological importance do not affect the subject of investment or the subject of development. This indicates that even though the R&D for technology with high social spillover effect should be lead by the government, the subject of the investment or the development cannot be determined solely by factors such as military application and technological importance.
An empirical study on the performance factors of the BSC perspectives on government support regional innovation clusters in the management consulting
Park, Soon-mo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1583~1593
DOI : 10.13089/JKIISC.2015.25.6.1583
This study applied the BSC performance consulting experience and diverse variable factors and whether there any differences in terms of satisfaction and the relationship between the support for the government consulting firm specializing in human resources by the resident of the innovation cluster area was investigated through empirical research. According to the study, a new high in recent local government support Consulting Consulting satisfaction by professionals residing in the area that applies to industrial clusters leads to practical consultancy, which was being evaluated as a significant boon to real performance of the company.
Effective Risk Level Assessment Using Three-Dimensional Vector Visualization
Lee, Ju-young ; Cho, In-hyun ; Lee, Jae-hee ; Lee, Kyung-ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1595~1606
DOI : 10.13089/JKIISC.2015.25.6.1595
Risk analysis is utilized in devising measures to manage information security risk to an acceptable level. In this risk management decision-making, the visualization of risk is important. However, the pre-existing risk visualization method is limited in visualizing risk factors three-dimensionally. In this paper, we propose an improved risk visualization method which can facilitate the identification of risk from the perspective of confidentiality, integrity, and availability respectively or synthetically. The proposed method is applied to an enterprise's risk analysis in order to verify how effective it is. We argue that through the proposed method risk levels can be expressed three-dimensionally, which can be used effectively for information security decision-making process for internal controls.
Decision Making Model for Selecting Financial Company Server Privilege Account Operations
Lee, Suk-Won ; Lee, Kyung-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 25, issue 6, 2015, Pages 1607~1620
DOI : 10.13089/JKIISC.2015.25.6.1607
The server privilege account must be operated through law and regulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as 'NH Bank Cyber Attack'. In this paper, the current operation status on financial company privilege accounts is being analysed to elicit problems and improvement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analysis will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).