Skip to main content
Log in

Research on financial institutional network partition design for anti-hacking

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

Enforced from February 18th, 2013, the network separation system has been promoted as a solution to block the leak of important information in public institution or in private, which has been increased continuously. Under pretext of continuity, the entire finance system has operated the integrated network of intranet and Internet before the network separation system. Such operational environment led more internal and external threats due to development of APT or malwares and carelessness of insider, and the government has prepared the high level security solution called the network separation. Through the network separation, based on the guideline of financial authority, the intranet and the Internet have been separated to protect the corporate and private information from the malware infection or hacking through the external Internet. In this thesis, through the concept of network separation and the case of establishment of network separation in the financial field, the structure is to be evaluated, and through the safety of system, efficiency of management, and safety operation solution of data system, the optimized network separation system in the financial field is to be designed. Furthermore, the network separation system is categorized into the establishment of network separation solution, establishment of network connection solution, establishment of network, and establishment of infrastructure for information protection to be evaluated. Therefore, the system establishment and connection through detailed analysis of regulation are required, and the assurance of security and performance and safety of the network separation system through the integration of conventional security system and new establishment and process are studied.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. The Korea Communications Commission: Guidelines on Information Protection Measures. The Korea Internet & Security Agency (2013)

  2. Jin, H.-J.: Attack and defense modeling and security analysis in the partitioned network environment by secure USB method. Korea Aerospace University Master Degree Thesis (2014)

  3. Sim, W.-J.: A study on considerations for effective network partition. Soongsil University Master Degree Thesis (2014)

  4. Domestic Network Partition Status. http://www.sharedit.co.kr/%EA%B5%AD%EB%82%B4-%EB%A7%9D%EB%B6%84%EB%A6%AC-%EA%B4%80%EB%A0%A8-%ED%98%84%ED%99%A9_20140617/

  5. Lee, S.-H.: A Study on Separate Plan of Efficient Information System Network in Partitioned Network Environment. Soongsil University Master Degree Thesis (2011)

  6. IDG Korea: Challenges and Scheme for the Introduction of the Network Separation (2014)

  7. Lim, B.-H.: A study of hybrid network partition system for oppse to hacking attack using malicious code in intra network. Soongsil University Master Degree Thesis (2013)

  8. Ko, J.-S.: A study on the revitalization of the task of information security information under IT environment. Hanseo University Doctoral Degree Thesis (2007)

  9. Protection Scheme for Network Partition. http://nakyungpapa.tistory.com/284

  10. Network Connection Solution. http://www.secuace.co.kr/cms.do?id=000000002u&tab=000000002w

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Byeong-Soo Jung.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bang, SW., Jung, BS. & Lee, SC. Research on financial institutional network partition design for anti-hacking. J Comput Virol Hack Tech 13, 257–263 (2017). https://doi.org/10.1007/s11416-017-0297-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-017-0297-3

Keywords

Navigation