Presentation | 2007-07-19 Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand Seiichiro Yatake, Katsuya Uchida, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Developing information technology and hardware technology or changing Internal Control makes System Administrators and Managers consider not only many information technologies to make organizations become more secured but also attackers' motivation and organization's vulnerability. Recently the threat has become diversification, many attackers take advantage of simply "Social Engineering". Social Engineering can be regarded as 'people hacking', basically its hacker jargon for soliciting unwitting participation from a person inside a company rather than breaking into the system. Many attackers take advantage of human's vulnerability or human behavior and look out the important information which is the ways to gain access to valuable resources. This paper discusses about examining the vulnerability which is between human and information systems, and studying access control against Social Engineer's information disclosure demand, especially "security policy" & "access control technology". |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | |
Paper # | ISEC2007-24,SITE2007-18 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2007/7/12(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand |
Sub Title (in English) | |
Keyword(1) | |
1st Author's Name | Seiichiro Yatake |
1st Author's Affiliation | Institute of Information Security() |
2nd Author's Name | Katsuya Uchida |
2nd Author's Affiliation | Institute of Information Security |
Date | 2007-07-19 |
Paper # | ISEC2007-24,SITE2007-18 |
Volume (vol) | vol.107 |
Number (no) | 139 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |