The design of framework for detecting an insider's leak of confidential information

Eunju Baek, Yeog Kim, Jinwon Sung, Sangjin Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)

    Abstract

    The confidential information such as the technical know-how or the business information of an enterprise is very important because it may make the enterprise do the business or not. The enterprise, therefore, are in control of its confidential or critical information with the support of a lot of time and fund. In spite of their effort, 87% of the leak of confidential information is due to insiders[1]. The cause of the leak of confidential information is the negligent or weak control of employee's E-mail, instant message, P2P and so on. It also comes that insiders leak some information maliciously for the purpose of economical profit or are industrial spy. The frequency of those is increasing more and more[2]. The insiders are very skilled in the equipments or systems of the organization which they belong to and can delete immediately their traces after their improper activities. Therefore, it needs the acquisition of data in conformity with the leak type of confidential information for finding out the evidence. We propose a framework to detect and prevent the leak of confidential information according to the leak type with the forensic sight. And the framework has also the function of the first response and the gathering evidence.

    Original languageEnglish
    Title of host publicatione-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop
    PublisherAssociation for Computing Machinery, Inc
    ISBN (Electronic)9789639799196
    Publication statusPublished - 2008 Jan 21
    Event1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, e-Forensics 2008 - Adelaide, Australia
    Duration: 2008 Jan 212008 Jan 23

    Publication series

    Namee-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop

    Other

    Other1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, e-Forensics 2008
    Country/TerritoryAustralia
    CityAdelaide
    Period08/1/2108/1/23

    Bibliographical note

    Publisher Copyright:
    © 2008 ICST.

    Keywords

    • Digital forensics
    • Insiders
    • Leak of information

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Information Systems

    Fingerprint

    Dive into the research topics of 'The design of framework for detecting an insider's leak of confidential information'. Together they form a unique fingerprint.

    Cite this