DOI QR코드

DOI QR Code

Security Vulnerability and Security Measures of Kakao Bank in Industrial Environment

산업환경에서 카카오 뱅크가 가지는 보안취약점 및 보안대책

  • Received : 2019.04.24
  • Accepted : 2019.06.20
  • Published : 2019.06.30

Abstract

The Kakao bank can be conveniently used if there are only smartphones, identity cards, and bank accounts. However, a few days before the inauguration of Kakao Bank, the company opened an account for receiving loans from other people. In order to avoid such cases, the financial transactions will be detected if the SDS is withdrawn at a short interval of time. The detection system of FDS has four functions which are monitoring and auditing, collection, analysis, and response. There are security problems of the cocoa banks in various directions. The Kakao bank has a way to respond to the problem using FDS.: Keywords : Cocoa bank, security issues, information protection, FDS

Acknowledgement

Supported by : Baekseok University

References

  1. Xiang, D., Kakefu, M., Mutsumi, S., & Otsuki, M. (2014). T-type IGBT module with new voltage class authentic RB-IGBT for DC-1000V solar inverter application. 2014 International Power Electronics and Application Conference and Exposition
  2. Ghazisaeedi, M. (2012). Trustworthiness of product review blogs: A source trustworthiness scale validation. African Journal Of Business Management, 6(25). DOI : 10.5897/ajbm12.079
  3. Kumar, A. R., Kumar, C. H., Rajan, J. S., & Singh, K. P. (2011). Characteristics of paper oil insulation by PDC/FDS method. 2011 International Conference on Power and Energy Systems. DOI : 10.1109/icpes.2011.6156692
  4. Xiang, D., Kakefu, M., Mutsumi, S., & Otsuki, M. (2014). T-type IGBT module with new voltage class authentic RB-IGBT for DC-1000V solar inverter application. 2014 International Power Electronics and Application Conference and Exposition. DOI : 10.1109/peac.2014.7038068
  5. Yeh, K., Lo, N., Chen, L., & Lin, P. (2015). A fraud detection system for real-time messaging communication on Android Facebook messenger. 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE). DOI : 10.1109/gcce.2015.7398737
  6. Namboodiri, V., & Gao, L. (2010). Energy - Efficient VoIP over Wireless LANs. IEEE Transactions on Mobile Computing, 9(4), 566-581. DOI : 10.1109/tmc.2009.150 https://doi.org/10.1109/tmc.2009.150
  7. Kolovsky, M. Z. (1999). Dynamic characteristics and efficiency of vibration protection systems. Foundations of Engineering Mechanics Nonlinear Dynamics of Active and Passive Systems of Vibration Protection, 13-59. DOI : 10.1007/978-3-540-49143-9_1
  8. Descriptive Modeling (Clustering, Outlier Detection). (n.d.). Advances in Information Security Privacy Preserving Data Mining, 85-111. DOI : 10.1007/978-0-387-29489-6_7
  9. Sze, K., Lam, K., & Qiu, G. (n.d.). Scene cut detection using the colored pattern appearance model. Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429). DOI : 10.1109/icip.2003.1246857
  10. M., K. (2011). Intrusion Detection System and Artificial Intelligent. Intrusion Detection Systems. DOI : 10.5772/15271
  11. Makris, M., Koumaras, H., Konstantopoulou, A., Konidis, S., & Kostakis, S. (2008). Customer Acceptance of Internet Banking Services in Greece. Advances in Banking Technology and Management, 53-69. DOI : 10.4018/978-1-59904-675-4.ch004
  12. Manral, V. (2007). Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH). DOI : 10.17487/rfc4835
  13. Mahdi, M. D., Rezaul, K. M., & Rahman, M. A. (2010). Credit Fraud Detection in the Banking Sector in UK: A Focus on E-Business. 2010 Fourth International Conference on Digital Society. DOI : 10.1109/icds.2010.45
  14. Case-Based Reasoning (CBR): Final Report. (2006). PsycEXTRA Dataset. DOI : 10.1037/e508702010-001
  15. Liang, L., & Gao, J. (2015). An analysis of asset quality of listed banks based on factor analysis. 2015 12th International Conference on Service Systems and Service Management (ICSSSM). DOI : 10.1109/icsssm.2015.7170161