With the recent development of information and communication technology-based services using personal information, there are conflicting opinions on the protection and utilization of personal information. While strong regulation is needed for personal...
With the recent development of information and communication technology-based services using personal information, there are conflicting opinions on the protection and utilization of personal information. While strong regulation is needed for personal information protection, protection and utilization can only be interpreted as conflicting concepts since deregulation and the application of voluntary regulation are required for utilization. In response, the government has prepared a foundation for protecting personal information while using it for technological development.
However, such voluntary regulations could lead to the complacent response of the security vulnerable operators. In particular, the minimum protective measures for hacking response by web or mobile applications, which are externally accessible contacts, may not apply. If the government requires the government to apply the voluntary regulation without minimum standards in the event of infringement of personal information, such as personal information leakage, the operators outside the ISMS certification system will be more likely to take care of security.
Therefore, through this thesis, the organization selects the Top 5 security threats, which are classified as causes of personal information leakage incidents, and provides technical protective measures.