• Title/Summary/Keyword: audit log

Search Result 33, Processing Time 0.021 seconds

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

A Study on Management of Personal Archives : How to Make My Archive (개인기록 관리 방안 연구 '나의 아카이브(My Archive)' 만들기)

  • Choe, Yu Ri;Yim, Jin Hee
    • The Korean Journal of Archival Studies
    • /
    • no.47
    • /
    • pp.5-49
    • /
    • 2016
  • Compared with public archives, personal archives are likely to disappear if creators don't preserve and manage them. So personal archives must be managed by oneself. But it's difficult to manage their archives systematically for people who don't have the expertise in archival science. Besides, there are not enough available informations. So this thesis suggests how to manage personal archives by two steps. First step is figuring out one's own archives through analyzing one's life by top-down approach and organizing them into collection. Second step is conducting archival appraisal by three steps and establishing classification schemes, describing them. Especially, this study adduce description elements using ISAD(G) for personal archives. this study also recommends using blogs on portal to manage one's archives easily. But they don't have the audit train and exporting function. So this thesis emphasizes the necessity of 'customized archive blogs'. At conclusion, this study highlights the necessity of developing education programs and manuals for people who are trying to manage one's own archives.