Security measures based on human behavior characteristics

被引:0
|
作者
机构
[1] Terada, Takeaki
[2] Katayama, Yoshinori
[3] Torii, Satoru
[4] Tsuda, Hiroshi
来源
| 2016年 / Fujitsu Ltd卷 / 52期
关键词
Crime - Tar - Cybersecurity - Behavioral research - Viruses - User interfaces;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, the number of targeted attacks has been rapidly increasing. Attackers limit their tar- as being malicious and steal data. In addition, large-scale information leakage accidents have occurred due to human errors such as missending of e-mail, and internal fraud. As a measure against missending of e-mail, Fujitsu has developed a tool that warns its users about making a mistake with regards to the recipients or attachments at the time of sending. To deal with tar- geted e-mails, we have extended the tool to alert users to suspicious incoming e-mails based on detection of differences with the header information of e-mails they have received before. Furthermore, we have also developed a technology to detect behavioral characteristics of in - dividuals who are vulnerable to cyber-attacks by examining psychological characteristics and PC operation behavior of people who have experienced virus infection, fraud, or information - users 'security risks, such as user interfaces that warn of e-mail missending and issue alerts for suspicious incoming e-mails, and risk assessment technology based on analysis of psychologi- cal characteristics and PC operation behavior of users.
引用
收藏
相关论文
共 50 条
  • [21] Concepts and characteristics of security margin based on dynamic security region
    Wang, Guozheng
    Jing, Yiran
    Guo, Jianbo
    Guo, Qinglai
    Ma, Shicong
    Wang, Tiezhu
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2022, 143
  • [23] OT Security: Ten measures for security
    Vallazza, Raphael
    ATP MAGAZINE, 2022, (09): : 34 - 35
  • [24] Development of new measures to assess household nutrition security, and choice in dietary characteristics
    Calloway, Eric E.
    Carpenter, Leah R.
    Gargano, Tony
    Sharp, Julia L.
    Yaroch, Amy L.
    APPETITE, 2022, 179
  • [25] Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation
    Sugiura, Masashi
    Suwa, Hirohiko
    Ohta, Toshizumi
    HUMAN-COMPUTER INTERACTION: DESIGN AND EVALUATION, PT I, 2015, 9169 : 82 - 95
  • [26] Security measures lacking
    不详
    COMMUNICATIONS NEWS, 2006, 43 (03): : 9 - 9
  • [27] Security portfolio management based on combined entropic risk measures
    Bronshtein, E. M.
    Kondrat'eva, O. V.
    JOURNAL OF COMPUTER AND SYSTEMS SCIENCES INTERNATIONAL, 2013, 52 (05) : 837 - 841
  • [28] BASIC SECURITY MEASURES
    PORTER, N
    DATA PROCESSING, 1982, 24 (07): : 14 - 14
  • [29] PHYSICAL SECURITY MEASURES
    FULTON, WK
    RESEARCH MANAGEMENT, 1964, 7 (05): : 327 - 336
  • [30] Security measures on tap
    Reed, C
    GEOTIMES, 2001, 46 (12): : 26 - 27