Abstract
As the communication infrastructure has extended and the number of a smartphone’ users has been rapidly increasing, many companies want to introduce Smart Work. But this means that people have chances to produce or handle their company’s data. If an administrator doesn’t consider a ‘security’ element, the Smart Work will be terrible security threats not a chance. For constructing a safe Smart Work infrastructure, this paper selects major domestic and external web[mobile] sites which provide cloud, VoIP[mVoIP], messenger, E-mail services and examines whether data are encrypted or not in data transfer section.
Similar content being viewed by others
References
National Information Planning Group 2012 Information statistics (2012) National Information Society Agency
Guide of Smart Work for Enterprise (2011) National Information Society Agency
Survey on the Wireless Internet Usage, http://isis.kisa.or.kr, Korea Internet Security Agency, 12. 2012
Heo GI, Kang JW, Park WH (2013) Countermeasures of privacy disclosure vulnerability in data transfer section. Korea Society of IT Services
Kim AC, Kim S, Park WH, Lee DH (2013) Fraud and financial crime detection model using malware forensics. Multimedia Tools Appl, Springer
Kim Y-H, Park WH (2012) A study on cyber threat prediction based on intrusion detection event for APT attack detection. Multimedia Tools Appl, Springer
Park WH, Lee DH, Kim KN. A study on improvement of the evidence collection module in windows forensic. Inf Sci Appl (ICISA) 2011 International Conference, pp 1–4, 2012
Sherif MH, Rhrouchni A, Gaid AY, Farazmandnia F (1998) SET and SSL: electronic payments on the Internet. ISCC ’98. Proceedings. Third IEEE Symposium, pp. 353–358
Thomas S (2000) SSL and TLS essential. Wiley, New York
Freier AO (1996) The SSL protocol version 3.0. Internet draft
Wireshark, http://www.wireshark.org/about.html
Convergence Security R&D Team (2010) Handbook of Cipher. Korea Internet Security Agency
Convergence Security R&D Team (2010) Guide of cipher algorithm and key length. Korea Internet Security Agency
Convergence Security R&D Team (2009) Handbook of securiy server. Korea Internet Security Agency
Korea Internet Security Agency, Introduction to SEED Algorithm, http://seed.kisa.or.kr/iwt/ko/sup/EgovSeedInfo.do, March 2013
Korea Ministry of Government Legislation, http://www.law.go.kr/lsInfoP.do?lsiSeq=123210&efYd=20120818#0000, March 2013
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Heo, G.I., Park, Y.J. & Park, W.H. Vulnerability of information disclosure in data transfer section for constructing a safe smart work infrastructure. Multimed Tools Appl 74, 8831–8847 (2015). https://doi.org/10.1007/s11042-013-1627-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1627-1