Abstract
Real-time tracing system blocks the used ports such as FTP, messenger, cloud and etc. to detect abnormal symptom such as leakage of internal information inside based on location tracing of the visitors as well as the internal staffs and operates mail backup server for mail management together with TCP packet monitoring as IPS that tracks the positions of moving objects (human and properties) using passive RFID, and I am willing to suggest the study of convergence security system that can prevent the leakage of internal information and trace the person who leaks the information.
Similar content being viewed by others
References
Popov, A. L., Vendik, O. G., & Zubova, N. A. (2010). Magnetic field intensity in near field zone of loop antenna for RFID systems. Technical Physics letters, SP MAIK Nauka/Interperiodica, 36(10), 882–884.
Song, T. S., Kim, T. Y., & Lyou, J. (2008). Conformance evaluation method by successively applying self-running test mode in active RFID tag. Korean Institute of Electronics Engineers, 45(6), 204–212.
Rhee, S.-H., Chun, J. H., & Park, J. A. (2006). Performance improvement in passive tag based RFID reader. Korean Institute of Communication Sciences, 31(11A), 1159–1166.
Cole, P. H. (2003). Fundamentals in radio frequency identification.
MCRF335/360 reader reference design, Microchip Technology Inc. (2001).
De Paz, J. F., Tapia, D. I., Alonso, R. S., Pinzon, C. I., Bajo, J., & Corchado, J. M. (2012). Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks. Knowledge and Information Systems, Springer-Verlag, 34(1), 193–217.
De Vira, G., & Iannaccone, G. (2005). Design criteria for the RF section fo UHF and microwave passive RFID transponders. IEEE Transactions on Microwave Theory and Techniques, 53(9), 2978–2990.
Stolfo, S. J., Bellovin, S. M., Keromytis, A. D., Sinclair, S., Smith, S. W., & Hershkop, S. (2008). Insider attack and cyber security beyond the hacker. Berlin: Springer.
Eom, J. H., Park, S. H., & Chung, T. M. (2010). An architecture of access control model for preventing illegal information leakage by insider. Korea Institute of Information Security and Cryptology, 20(5), 59–67.
Seo, D. H., Beak, J. M., Lee, M. K., Yoon, M. Y., & Cho, D. S. (2010). Secure knowledge management for prevent illegal data leakage by internal users. Korean Society for Internet Information, 11(2), 73–84.
Lee, E. B., & Kim, K. Y. (2010). A study on the separate network based information security. 20(1), 39–46.
Acknowledgments
This work was supported by Kyonggi University’s Graduate Research Assistant Fellowship 2013.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, Ms., Lee, Dh. & Kim, Kn.J. A Study on Convergence Security System for Preventing Leakage of Internal Information. Wireless Pers Commun 73, 175–185 (2013). https://doi.org/10.1007/s11277-013-1228-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-013-1228-3