Title :
A study on database vulnerable object analysis and control technology
Author :
Baek, Jong-Il ; Park, Dea-Woo
Author_Institution :
Dept. of IT Applic. Technol., Hoseo Grad. Sch. of Venture, Seoul, South Korea
Abstract :
The vulnerability exists in the database which stores important information, the incident that caused by vulnerability attacking appears as the loss or damage about important asset. In addition, preparation for Personal Information Protection Act which passed at National Assembly, database vulnerability analysis and research is needed for strengthening security. In this paper, the information in the database, weak data defined as Role Base, vulnerability analysis the database by role. For managing scattered vulnerable information and important information, analysis vulnerable objects and perform extraction and control. Research vulnerable object access control management modules and monitoring manage method according to the database access privileges, design and analysis audit records management modules. This study will contribute to enhanced database security and compliance with privacy laws.
Keywords :
DB Security; Data Masking; ESM (Enterprise Security Management); Vulnerable Object;
Conference_Titel :
Information Science and Digital Content Technology (ICIDT), 2012 8th International Conference on
Conference_Location :
Jeju Island, Korea (South)
Print_ISBN :
978-1-4673-1288-2