Browse > Article
http://dx.doi.org/10.12673/jant.2014.18.5.494

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic  

Cheon, Jun-Young (Center for Information Security Technologies (CIST), Korea University)
Lee, Sang-Jin (Center for Information Security Technologies (CIST), Korea University)
Abstract
Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.
Keywords
Digital forensics; Personal Information audit; Selection of high-risk subjects; Information leakage prevention; High-risk subjects selection system;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 C. S. Jung and Y. C. Kim, "A study on system tracing user activities in the windows operating system", Journal of the Korea Institute of Information Security & Cryptology, Vol. 21, No. 8, pp. 101-114, Aug. 2011.   과학기술학회마을
2 Korea Internet Security Agency (KISA), Information Security Statistics [Internet]. Available: http://isis.kisa.or.kr/sub07/?pageId=070500
3 The Board of Audit and Inspection of Korea(BAI) [Internet]. Available: http://www.bai.go.kr/HPBKAudResultOpenAction.do?method=detailData&SEQ_NO=1642&PAGE=1&CYBER_PUHE_YN=Y&AUD_YEAR_NO=2014081&TASK_TYPE=KP1
4 Microsoft.[MS-SHLLIK] Shell Link (.LNK) Binary File Format. [Internet]. Available: http://msdn.microsoft.com/en-us/library/dd871305.aspx
5 H. Carvey, Windows Registry Forensics: Advanced Digital Foernsic Analysis of the Windows Registry, Burlington, NJ: Syngressmedia, 2011
6 T. H. Kang and J. I, Lim "A study on consigned party management system enhancement for personal information protection," Journal of The Korea Institute of Information Security & Cryptology, Vol 23, No. 4, pp. 781-797, Aug. 2013.   과학기술학회마을   DOI
7 C. H. Lee, "Study on digital investigation model for privacy acts in Korea", Journal of the Korea Navigation Institute, Vol. 15, No. 6, pp. 1212-1219, Dec. 2011.   과학기술학회마을