WORK

Information Security Audit
HM Company
utilizes Digital Forensics to diagnose and improve vulnerabilities in order to overcome the limitations of the company's existing information security.

Diagnostic Method

  • Digital Forensics Analysis on High Risk Positions
  • Scenario-based Diagnosis
  • Hacking Simulations based on Attack Scenarios

Case of the Vulnerability of Information Security System

Traces of bypassing internal information security policy

  • Usage and voluntary export of unauthorized laptop/digital devices
  • Sending confidential files to personal email accounts
  • Internal data leakage by using smartphone tethering
  • Existence of hacking-related tools among unauthorized programs

Traces of bypassing internal information security policy

  • Decrypt password without authorization using bypass program
  • Difficult to track in the decrypted file leakage

Traces of bypassing internal information security policy

  • Access and download business files beyond the individual internal network access limits