{"id":8291,"date":"2022-06-01T18:01:00","date_gmt":"2022-06-01T09:01:00","guid":{"rendered":"https:\/\/www.filingbox.com\/blog\/filingbox-opened-a-new-cybersecurity-paradigm-called-storage-protection-in-itu-t\/"},"modified":"2022-12-06T22:38:34","modified_gmt":"2022-12-06T13:38:34","slug":"filingbox-opened-a-new-cybersecurity-paradigm-called-storage-protection-in-itu-t","status":"publish","type":"post","link":"https:\/\/www.filingbox.com\/ko\/blog\/filingbox-opened-a-new-cybersecurity-paradigm-called-storage-protection-in-itu-t\/","title":{"rendered":"FilingBox opened a new cybersecurity paradigm called &#8216;storage protection&#8217; in ITU-T."},"content":{"rendered":"\n<p>FilingBox proposed the new work item to the ITU-T which is the international technology standard organization under the U.N. New proposal was selected as X.spmoh (storage protection framework against malware running on the host)<\/p>\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"102\" height=\"112\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image-2.png\" alt=\"\" class=\"wp-image-6610\"\/><\/figure>\n<p>Existing network protection and end-point protection technologies are not enough to protect data because they work as black list-based detection mechanisms. If a new variant comes in, they couldn&#8217;t detect it well.<\/p>\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"962\" height=\"380\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image.png\" alt=\"\" class=\"wp-image-6606\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image.png 962w, https:\/\/www.filingbox.com\/wp-content\/uploads\/image-300x119.png 300w, https:\/\/www.filingbox.com\/wp-content\/uploads\/image-768x303.png 768w\" sizes=\"(max-width: 962px) 100vw, 962px\" \/><\/figure>\n<p>But storage protection is different because it protects data with a white list based detecting mechanism. Storage protection knows what application will access what file already. So it makes only the preregistered applications can read, modify and delete files and others can not modify, delete or read files except by creating files. <\/p>\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"962\" height=\"380\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image-1.png\" alt=\"\" class=\"wp-image-6608\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image-1.png 962w, https:\/\/www.filingbox.com\/wp-content\/uploads\/image-1-300x119.png 300w, https:\/\/www.filingbox.com\/wp-content\/uploads\/image-1-768x303.png 768w\" sizes=\"(max-width: 962px) 100vw, 962px\" \/><\/figure>\n<p>Now FIlingBox&#8217;s framework became the draft recommendation in ITU-T SG17 for preventing ransomware and data breach malware. For more infor, check out ITU-T website. <a href=\"https:\/\/www.itu.int\/itu-t\/workprog\/wp_item.aspx?isn=18345\">https:\/\/www.itu.int\/itu-t\/workprog\/wp_item.aspx?isn=18345<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>FilingBox proposed the new work item to the ITU-T which is the international technology standard organization under the U.N. New proposal was selected as X.spmoh (storage protection framework against malware running on the host) Existing network protection and end-point protection technologies are not enough to protect data because they work as black list-based detection mechanisms. [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":7500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[48,35],"tags":[],"class_list":["post-8291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-filingbox-insights-ko-2","category-industry-news-ko"],"jetpack_featured_media_url":"https:\/\/www.filingbox.com\/wp-content\/uploads\/4567.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/posts\/8291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/comments?post=8291"}],"version-history":[{"count":7,"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/posts\/8291\/revisions"}],"predecessor-version":[{"id":8446,"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/posts\/8291\/revisions\/8446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/media\/7500"}],"wp:attachment":[{"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/media?parent=8291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/categories?post=8291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filingbox.com\/ko\/wp-json\/wp\/v2\/tags?post=8291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}