A Study on a Scenario-based Information Leakage Risk Response Model Associated with the PC Event Detection Function and Security Control Procedures

Ig Jun Lee, Heung Youl Youm


It is a measure to overcome limitations that occur in the activity of detecting and blocking abnormal information leakage activity by collecting the activity log generated by the security solution to detect the leakage of existing financial information and analyzing it by pattern analysis. First, it monitors real-time execution programs in PC that are used as information leakage path (read from the outside, save to the outside, transfer to the outside, etc.) in the PC. Second, it determines whether it is a normal․controlled exception․control circumvention by interacting with the related security control process at the time the program is executed. Finally, we propose a risk management model that can control the risk of financial information leakage through the process procedure created on the basis of scenario.

Full Text:



Chae, E. J., “A study on the PIMS based methodology for monitoring to prevent leakage of personal information in the banking industry,” Master Thesis, The Graduate School Dongguk University, 2014. 2.

Choi, J. W., “Detection of personal information leakage using database access control system,” 2015. 2.

http://www.gartner.com/newsroom/id/3143521, gartner, 2016.

Kim, J. H. and Lim, J. I., “Composition and Policy Direction of Compensation Insurance Against Customer Information Infringements in Financial Transactions,” The Journal of Society for e-Business Studies, Vol. 19, No. 3, pp. 1-21, 2014.

Kisa, “guideline for risk management,” 2004. 12. 14.

Lee, S. J., “Real time predictive analytic system design and implementation using Bigdata-log,” Master Thesis, He Gradu ate School Korea University, 2016. 2.

Newgen CNI, “Introduction of export approval system,” 2017. 9.

Oh, Y. S., “A Study on the utilization of digital forensic evidence using the DLP (DataLoss Prevention)system,” Master Thesis, The Gra duate School Dongguk University, 2013.

Redston, “guideline for edr solution iron,” 2018.

Ryu, S. T., “A study of detection measures about the personal information leakage through scenario-bas ed integrated security log analysis,” Master Thesis, The Graduate School Korea University, 2016. 2.

Song, J. H., “Evaluation Security of Inside Information Leakage Prevention Solution,” Master Thesis, The Graduate School Daejin University, 2009.

Tocsg, “guideline for Digital Guardi an Platform,” 2018.


  • There are currently no refbacks.