본문 바로가기
  • Home

A Study of Definition of Security Requirements on Encryption and Audit Logging

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2014, 19(9), pp.85-91
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science

SeongYoon Shin ORD ID 1 KangHo-Lee 2

1군산대학교
2한국복지대학교

Accredited

ABSTRACT

Encryption is a method to convert information to no-sense code in order to prevent data frombeing lost or altered by use of illegal means. Audit logging creates audit log of users’ activities,exceptions, and information security events, and then conserves it for a certain period forinvestigation and access-control auditing. Our paper suggests that confidentiality and integrity ofinformation should be guaranteed when transmitting and storing important information inencryption. Encryption should consider both one-way encryption and two-way one and thatencryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application accesslog and major information. In this paper, we take a real example of encryption and log audit forsafe data transmission and periodic check.

Citation status

* References for papers published after 2023 are currently being built.