【24h】

A System for Computing Human Deception

机译:一种计算人类欺骗的系统

获取原文
获取原文并翻译 | 示例

摘要

The book titled 'The Art of Deception: Controlling the Human Element of Security' by the now famous former hacker by the name of Kevin D. Mitnick and his coauthor William L.Simon presents a detailed study of how, despite all network security programs from firewalls to strong encryption, IT infrastructure are vulnerable to social engineering attacks that easily circumvent all walls and all type of encryption. Either an insider or some one external to the organization would pose as or impersonate a legitimate user of the system and have easy access to the authorized areas in the system. This process may take longer before intrusion and successive intrusions may take longer to be noticed. It is well known and widely practiced approach by organizations to log and record all users' transactions for the purpose of network auditing but it is always late to prevent damages to the IT infrastructure. While it is impossible to fully prevent all these type of schemes, it may be possible to indirectly supervise and profile accesses to the system that may be authorized but illegal. We propose a research in this important area that will target as its goal building a system by which detection of illegitimate attempt at accessing a system or detection of authorized but illegal use of the system can be explored in an automated way.
机译:本书由著名的前黑客凯文·米特尼克(Kevin D.Mitnick)和他的合著者威廉·西蒙(William L.Simon)撰写,名为“欺骗的艺术:控制安全的人为因素”,尽管存在来自防火墙需要强大的加密功能,因此IT基础架构很容易受到社交工程攻击的攻击,这些攻击很容易绕过所有墙和所有类型的加密。内部人员或组织外部的某些人员会冒充或冒充系统的合法用户,并可以轻松访问系统中的授权区域。在入侵之前,此过程可能需要更长的时间,而随后的入侵可能需要更长的时间才能引起注意。组织为网络审计目的而记录和记录所有用户的交易是一种众所周知且被广泛实践的方法,但是要防止损坏IT基础架构总是很晚。尽管不可能完全阻止所有这些类型的方案,但有可能间接监督和配置对可能被授权但非法的系统访问。我们提议在这一重要领域中进行一项研究,以建立一个系统为目标,通过该系统,可以自动探索对非法访问系统的尝试或对系统的授权但非法使用的检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号