2014³â Ãß°èÇмú´ëȸ
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
S/W °³¹ß ºÐ¼® ´Ü°è¿¡¼ ½Äº° ¹× ÀÎÁõ |
¿µ¹®Á¦¸ñ(English Title) |
Legal System and Regulation Analysis by S/W Development Security |
ÀúÀÚ(Author) |
½Å¼ºÀ±
Áøµ¿¼ö
½Å±¤¼º
ÀÌÇöâ
À̾ç¿ø
Seong-Yoon Shin
Dong-Soo Jin
Kwong-Seong Shin
Hyun-Chang Lee
Yang-Won Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 18 NO. 02 PP. 0211 ~ 0212 (2014. 10) |
Çѱ۳»¿ë (Korean Abstract) |
º» ³í¹®¿¡¼´Â ºÐ¼® ´Ü°èÀÇ ÀÌ·¯ÇÑ ½Äº° ¹× ÀÎÁõÀÇ º¸¾È¿ä°ÇÀ» Á¦½ÃÇÑ´Ù. ù°, °¢ÀÚ °¡Áö°í ÀÖ´Â °³º° ID´Â À¯ÀÏÇÏ°Ô ½Äº°µÇ¾î¾ß ÇÑ´Ù´Â °ÍÀÌ´Ù. µÑ°, Æнº¿öµå´Â ±æÀÌÁ¦ÇÑ ¹× Ç¥ÁØ Á¶ÇÕÀ» Àû¿ëÇØ¾ß Çϸç, ÁÖ±âÀûÀ¸·Î º¯°æÇØ Áà¾ß ÇÑ´Ù´Â °ÍÀÌ´Ù. ¼Â°, ID/PW ÀÌ¿ÜÀÇ º¸´Ù °ÈµÈ ÀÎÁõ ¹æ½ÄÀ» Á¦°øÇØ¾ß Çϸç, ÀÎÁõ ÇÁ·Î¼¼½º´Â Á¤ÀÇµÈ º¸¾È ¿ä°ÇÀ» ¸¸Á·ÇØ¾ß ÇÑ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process. |
Å°¿öµå(Keyword) |
°¨»ç·Î±×(Audit Log)
Á¢¼Ó ·Î±×(Access Log)
Áß¿ä Á¤º¸(Major Information)
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|