【24h】

A System for Computing Human Deception

机译:一种计算人类欺骗的系统

获取原文

摘要

The book titled 'The Art of Deception: Controlling the Human Element of Security' by the now famous former hacker by the name of Kevin D. Mitnick and his coauthor William L.Simon presents a detailed study of how, despite all network security programsfrom firewalls to strong encryption, IT infrastructure are vulnerable to social engineering attacks that easily circumvent all walls and all type of encryption. Either an insider or some one external to the organization would pose as or impersonate a legitimate user of the system and have easy access to the authorized areas in the system. This process may take longer before intrusion and successive intrusions may take longer to be noticed. It is well known and widely practiced approach by organizationsto log and record all users' transactions for the purpose of network auditing but it is always late to prevent damages to the IT infrastructure. While it is impossible to fully prevent all these type of schemes, it may be possible to indirectly superviseand profile accesses to the system that may be authorized but illegal. We propose a research in this important area that will target as its goal building a system by which detection of illegitimate attempt at accessing a system or detection of authorized but illegal use of the system can be explored in an automated way.
机译:由Kevin D. Mitnick和他的Coauthor William L.Simon的名称,标题为“欺骗艺术:控制人类的安全性的人的人力资源”,尽管防火墙,但是,尽管是防火墙的所有网络安全计划,但是如何详细研究。为了强烈加密,IT基础架构容易受到社会工程攻击,可轻松绕过所有墙壁和所有类型的加密。 insider或组织外部的某个外部会造成或冒充系统的合法用户,并且可以轻松访问系统中的授权区域。在入侵之前可能需要更长时间的过程可能需要更长时间才能注意到要注意。它是众所周知的和广泛实践的方法,通过Organutionsto日志来记录所有用户的交易,以便网络审计的目的,但始终迟到,以防止IT基础架构损坏。虽然不可能完全防止所有这些类型的方案,但是可以间接超级监督程序访问可能被授权但非法的系统。我们提出了在这个重要领域的研究,该领域将作为其目标构建一个系统,通过该系统可以以自动化方式探讨检测访问系统或检测系统的非法尝试或检测系统的检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号