Presentation 2007-07-19
Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand
Seiichiro Yatake, Katsuya Uchida,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Developing information technology and hardware technology or changing Internal Control makes System Administrators and Managers consider not only many information technologies to make organizations become more secured but also attackers' motivation and organization's vulnerability. Recently the threat has become diversification, many attackers take advantage of simply "Social Engineering". Social Engineering can be regarded as 'people hacking', basically its hacker jargon for soliciting unwitting participation from a person inside a company rather than breaking into the system. Many attackers take advantage of human's vulnerability or human behavior and look out the important information which is the ways to gain access to valuable resources. This paper discusses about examining the vulnerability which is between human and information systems, and studying access control against Social Engineer's information disclosure demand, especially "security policy" & "access control technology".
Keyword(in Japanese) (See Japanese page)
Keyword(in English)
Paper # ISEC2007-24,SITE2007-18
Date of Issue

Conference Information
Committee ISEC
Conference Date 2007/7/12(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand
Sub Title (in English)
Keyword(1)
1st Author's Name Seiichiro Yatake
1st Author's Affiliation Institute of Information Security()
2nd Author's Name Katsuya Uchida
2nd Author's Affiliation Institute of Information Security
Date 2007-07-19
Paper # ISEC2007-24,SITE2007-18
Volume (vol) vol.107
Number (no) 140
Page pp.pp.-
#Pages 6
Date of Issue