The Security Audit Methodology of Internal Information Leakage Using Digital Forensics Technology in Mobile Instant Messenger

2020 ◽  
Vol 10 (3) ◽  
pp. 93-107
Author(s):  
GwangHyun Ahn ◽  
◽  
Wonhyung Park
Author(s):  
Xia-Meng Si

As the development of mobile internet bring convenient for people, the openness and variety of services make its security issues more complicated than those of traditional network. Firewall and intrusion detection focuses on external aggression, and cannot prevent revealing of internal information. As supplementary, security audit technology can monitor internal users' activity, forbid abnormal behavior of internal users. The author introduces related works about mobile internet security audit, comb through matured products on the market, and analyze current security status and architecture of mobile internet security. Based on the research results of traditional network security audit, the author provides a functional framework and universal model of mobile internet security auditing, as well as introduce an application scenario.


With the size of the enterprise network is growing, more and more computer terminals, internal information leakage and security threats emerging security incidents and daily management to bring a lot of pressure. Business users need a tracking system to address these security issues.A technique and framework for checking and following the exercises of a client of a PC. Affiliations are set up between the conditions of certain PC framework parameters and explicit exercises. The present movement of the client is then definite by the framework dependent on the present condition of the PC framework. As the condition of the PC framework changes, changes in the client's action are checked and followed. The exercises are followed related to time in order to record the time spent on every movement.Through this project we are developing the understanding of the working and the basics of the Linux operating system. We are analysing the need of monitoring the system and solving the issues related to security, unauthorised access and other threats. Through this tool we are trying to address these issues.


2020 ◽  
Vol 7 (1) ◽  
pp. 57-62
Author(s):  
Vladislav A. Voevodin ◽  
◽  
Maria S. Markina ◽  
Pavel V. Markin ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document