Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment

    , , , , , , ,
Vol. 29, No. 4, pp. 859-866, Aug. 2019
10.13089/JKIISC.2019.29.4.859, Full Text:
Keywords:
Abstract

Cybersecurity attack targeting a specific user is rising in number, even enterprises are trying to strengthen theircybersecurity. Network segmentation environment where public network and private network are separated could blockinformation coming from the outside, however, it is unable to control outside information for business efficiency andproductivity. Even if enterprises try to enhance security policies and introduce the network segmentation system and asolution incorporating CDR technology to remove unnecessary data contained in files, it is still exposed to security threats. Therefore, we suggest a system that uses file format conversion to transmit a secure file in the network separationenvironment. The secure file is converted into an image file from a document, as it reflects attack patterns of insertingmalicious code into the document file. Additionally, this paper proposes a system in the environment which functions that adocument file can keep information for incident response, considering forensic readiness.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
한재혁, 윤영인, 허지민, 이재연, 홍석준, 이상진, 최정인, "Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment," Journal of The Korea Institute of Information Security and Cryptology, vol. 29, no. 4, pp. 859-866, 2019. DOI: 10.13089/JKIISC.2019.29.4.859.

[ACM Style]
한재혁, 윤영인, 허지민, 이재연, 홍석준, 이상진, and 최정인. 2019. Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment. Journal of The Korea Institute of Information Security and Cryptology, 29, 4, (2019), 859-866. DOI: 10.13089/JKIISC.2019.29.4.859.