A Study on Scanning and Masking Vulnerable DB Object

For infringements by hacking databases for storing personal information, penalties and correctional orders are imposed. For enforcing the act of personal information protection enacted by the korea’s national assembly, it is necessary to analyze database vulnerability and to study how to enhance security. This study aims to examine the limit of the personal information database security system and to design DB scansoftware and a method for analyzing vulnerable objects. Another aim is to establish security levels of the scan result, to create a vulnerable object scanrule of the DB for constructing a vulnerable object information protection system of the DB, and to construct a hardware and software access control system. It is still another aim to examine the scan result of the vulnerable object access control system to analyze creation of database masking.