Presentation 2016-01-21
[Invited Talk] Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications
Yoshiyasu Nishibe, Ken Ito, Masaki Onishi,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations. In this article, I explain the details of the incident happened in Japan Pension Service last year and the incidents caused by suspicious e-mail of targeted attack. In addition, from those incidents, we learn how to defend from targeted attacks, referring to NTT Com's measures about Information security management.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Targeted attacks / Suspicious e-mail / Multi-Layer Defense / Information Security Management
Paper # ICM2015-33,LOIS2015-55
Date of Issue 2016-01-14 (ICM, LOIS)

Conference Information
Committee ICM / LOIS
Conference Date 2016/1/21(2days)
Place (in Japanese) (See Japanese page)
Place (in English) Fukuoka Institute of Technology
Topics (in Japanese) (See Japanese page)
Topics (in English) Practical Use of Lifelog, Office Information System, Business Management, etc.
Chair Shingo Ata(Osaka City Univ.) / Manabu Okamoto(NTT)
Vice Chair Kiyohito Yoshihara(KDDI R&D Labs.) / Manabu Nakagawa(NTT Communications) / Hiroyuki Nishi(Sojo Univ.)
Secretary Kiyohito Yoshihara(Hitachi) / Manabu Nakagawa(NEC) / Hiroyuki Nishi(Tsuda College)
Assistant Masao Murata(Fujitsu) / Yu Ichifuji(NII)

Paper Information
Registration To Technical Committee on Information and Communication Management / Technical Committee on Life Intelligence and Office Information Systems
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) [Invited Talk] Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications
Sub Title (in English)
Keyword(1) Targeted attacks
Keyword(2) Suspicious e-mail
Keyword(3) Multi-Layer Defense
Keyword(4) Information Security Management
1st Author's Name Yoshiyasu Nishibe
1st Author's Affiliation NTT Communications(NTT Com)
2nd Author's Name Ken Ito
2nd Author's Affiliation NTT Communications(NTT Com)
3rd Author's Name Masaki Onishi
3rd Author's Affiliation NTT Communications(NTT Com)
Date 2016-01-21
Paper # ICM2015-33,LOIS2015-55
Volume (vol) vol.115
Number (no) ICM-409,LOIS-410
Page pp.pp.41-46(ICM), pp.41-46(LOIS),
#Pages 6
Date of Issue 2016-01-14 (ICM, LOIS)