Security measures based on human behavior characteristics

被引:0
|
作者
机构
[1] Terada, Takeaki
[2] Katayama, Yoshinori
[3] Torii, Satoru
[4] Tsuda, Hiroshi
来源
| 2016年 / Fujitsu Ltd卷 / 52期
关键词
Crime - Tar - Cybersecurity - Behavioral research - Viruses - User interfaces;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, the number of targeted attacks has been rapidly increasing. Attackers limit their tar- as being malicious and steal data. In addition, large-scale information leakage accidents have occurred due to human errors such as missending of e-mail, and internal fraud. As a measure against missending of e-mail, Fujitsu has developed a tool that warns its users about making a mistake with regards to the recipients or attachments at the time of sending. To deal with tar- geted e-mails, we have extended the tool to alert users to suspicious incoming e-mails based on detection of differences with the header information of e-mails they have received before. Furthermore, we have also developed a technology to detect behavioral characteristics of in - dividuals who are vulnerable to cyber-attacks by examining psychological characteristics and PC operation behavior of people who have experienced virus infection, fraud, or information - users 'security risks, such as user interfaces that warn of e-mail missending and issue alerts for suspicious incoming e-mails, and risk assessment technology based on analysis of psychologi- cal characteristics and PC operation behavior of users.
引用
收藏
相关论文
共 50 条
  • [31] Measures for Security in a Counterinsurgency
    Schroden, Jonathan J.
    JOURNAL OF STRATEGIC STUDIES, 2009, 32 (05) : 715 - 744
  • [32] Security Measures in IOT based 5G Networks
    Dey, A.
    Nandi, S.
    Sarkar, M.
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 561 - 566
  • [33] Verification of security measures for smart substations based on visualized simulation
    Bao, Wei
    Wang, Ke
    Gao, Xiang
    Song, Jie
    Zeng, Ping
    Zhou, Desheng
    Zhu, Haoyu
    Geng, Qi
    2019 5TH INTERNATIONAL CONFERENCE ON ENERGY EQUIPMENT SCIENCE AND ENGINEERING, 2020, 461
  • [34] Value-based argumentation for designing and auditing security measures
    Brigitte Burgemeestre
    Joris Hulstijn
    Yao-Hua Tan
    Ethics and Information Technology, 2013, 15 : 153 - 171
  • [35] Pursuing energy security via technologies and human behavior
    Mathieu, Johanna
    Berger, Sebastian
    Sterl, Sebastian
    Rai, Varun
    Rosenow, Jan
    ONE EARTH, 2023, 6 (09): : 1074 - 1076
  • [36] Application of hardware-based IT security measures in automation networks
    Runde, Markus
    Niemann, K. -H.
    Hausmann, Stefan
    Heiss, Stefan
    AUTOMATION 2012, 2012, 2171 : 391 - 394
  • [37] Security portfolio management based on combined entropic risk measures
    E. M. Bronshtein
    O. V. Kondrat’eva
    Journal of Computer and Systems Sciences International, 2013, 52 : 837 - 841
  • [38] Value-based argumentation for designing and auditing security measures
    Burgemeestre, Brigitte
    Hulstijn, Joris
    Tan, Yao-Hua
    ETHICS AND INFORMATION TECHNOLOGY, 2013, 15 (03) : 153 - 171
  • [39] Game Theory and Human Behavior: Challenges in Security and Sustainability
    Yang, Rong
    Tambe, Milind
    Jain, Manish
    Kwak, Jun-Young
    Pita, James
    Yin, Zhengyu
    ALGORITHMIC DECISION THEORY, 2011, 6992 : 320 - 330
  • [40] Correlating human traits and cyber security behavior intentions
    Gratian, Margaret
    Bandi, Sruthi
    Cukier, Michel
    Dykstra, Josiah
    Ginther, Amy
    COMPUTERS & SECURITY, 2018, 73 : 345 - 358