Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)

Vol. 24, No. 5, pp. 961-968, Oct. 2014
10.13089/JKIISC.2014.24.5.961, Full Text:
Keywords: Personal Information, PC security solution, log analysis
Abstract

In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
H. T. Chae and S. Lee, "Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)," Journal of The Korea Institute of Information Security and Cryptology, vol. 24, no. 5, pp. 961-968, 2014. DOI: 10.13089/JKIISC.2014.24.5.961.

[ACM Style]
Hyun Tak Chae and Sang-Jin Lee. 2014. Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information). Journal of The Korea Institute of Information Security and Cryptology, 24, 5, (2014), 961-968. DOI: 10.13089/JKIISC.2014.24.5.961.