HM Company
utilizes Digital Forensics to diagnose and improve vulnerabilities in order to overcome the limitations of the company's existing information security.
Diagnostic Method
- Digital Forensics Analysis on High Risk Positions
- Scenario-based Diagnosis
- Hacking Simulations based on Attack Scenarios
Case of the Vulnerability of Information Security System
Traces of bypassing internal information security policy
- Usage and voluntary export of unauthorized laptop/digital devices
- Sending confidential files to personal email accounts
- Internal data leakage by using smartphone tethering
- Existence of hacking-related tools among unauthorized programs
Traces of bypassing internal information security policy
- Decrypt password without authorization using bypass program
- Difficult to track in the decrypted file leakage
Traces of bypassing internal information security policy
- Access and download business files beyond the individual internal network access limits