Skip to main content
Log in

Vulnerability of information disclosure in data transfer section for constructing a safe smart work infrastructure

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

As the communication infrastructure has extended and the number of a smartphone’ users has been rapidly increasing, many companies want to introduce Smart Work. But this means that people have chances to produce or handle their company’s data. If an administrator doesn’t consider a ‘security’ element, the Smart Work will be terrible security threats not a chance. For constructing a safe Smart Work infrastructure, this paper selects major domestic and external web[mobile] sites which provide cloud, VoIP[mVoIP], messenger, E-mail services and examines whether data are encrypted or not in data transfer section.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24

Similar content being viewed by others

References

  1. National Information Planning Group 2012 Information statistics (2012) National Information Society Agency

  2. Guide of Smart Work for Enterprise (2011) National Information Society Agency

  3. Survey on the Wireless Internet Usage, http://isis.kisa.or.kr, Korea Internet Security Agency, 12. 2012

  4. Heo GI, Kang JW, Park WH (2013) Countermeasures of privacy disclosure vulnerability in data transfer section. Korea Society of IT Services

  5. Kim AC, Kim S, Park WH, Lee DH (2013) Fraud and financial crime detection model using malware forensics. Multimedia Tools Appl, Springer

  6. Kim Y-H, Park WH (2012) A study on cyber threat prediction based on intrusion detection event for APT attack detection. Multimedia Tools Appl, Springer

  7. Park WH, Lee DH, Kim KN. A study on improvement of the evidence collection module in windows forensic. Inf Sci Appl (ICISA) 2011 International Conference, pp 1–4, 2012

  8. Sherif MH, Rhrouchni A, Gaid AY, Farazmandnia F (1998) SET and SSL: electronic payments on the Internet. ISCC ’98. Proceedings. Third IEEE Symposium, pp. 353–358

  9. Thomas S (2000) SSL and TLS essential. Wiley, New York

  10. Freier AO (1996) The SSL protocol version 3.0. Internet draft

  11. Wireshark, http://www.wireshark.org/about.html

  12. Convergence Security R&D Team (2010) Handbook of Cipher. Korea Internet Security Agency

  13. Convergence Security R&D Team (2010) Guide of cipher algorithm and key length. Korea Internet Security Agency

  14. Convergence Security R&D Team (2009) Handbook of securiy server. Korea Internet Security Agency

  15. Korea Internet Security Agency, Introduction to SEED Algorithm, http://seed.kisa.or.kr/iwt/ko/sup/EgovSeedInfo.do, March 2013

  16. Korea Ministry of Government Legislation, http://www.law.go.kr/lsInfoP.do?lsiSeq=123210&efYd=20120818#0000, March 2013

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Won Hyung Park.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Heo, G.I., Park, Y.J. & Park, W.H. Vulnerability of information disclosure in data transfer section for constructing a safe smart work infrastructure. Multimed Tools Appl 74, 8831–8847 (2015). https://doi.org/10.1007/s11042-013-1627-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1627-1

Keywords

Navigation