:::

詳目顯示

回上一頁
題名:基植管理循環為基礎之社交工程事件鑑識分析研究
書刊名:前瞻科技與管理
作者:高大宇曾俊傑王旭正
作者(外文):Kao, Da-yuZeng, Jyun-jimWang, Shiuh-jeng
出版日期:2011
卷期:1:1
頁次:頁85-98
主題關鍵詞:數位證據無罪推定紀錄分析管理循環社交工程Digital evidencePresumption of innocenceLog analysisPDCASocial engineering
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:20
許多資訊駭客沈浸於靜悄悄地入侵電腦系統,意圖竊取資料、破壞資訊隱私。資安事件調查的紀錄檔案是追查事件來源的最初指標,驗證稽核紀錄的可信度為評斷是非或論罪科刑的重要參考依據。本文透過計畫(Plan)、執行(Do)、檢查(Check)及行動(Act)等管理循環,從「被動資安防護」、「主動滲透測試」、「逆向追查紀錄」、「對象查訪驗證」及「使用習慣養成」等5面向檢討社交工程的資安演練事件。本文不僅歸納一些追蹤犯罪者的指引作法,也展示避免犯下錯誤結論的發現事實作法。藉由本文研究,處理資安事件的反應者,將能夠採用有效分析稽核紀錄的策略,降低資安鑑識事件過程的不當處置作為。
Dozens of hackers are dedicated to silently invading computer system. They are making efforts directed toward destroying computer privacy and data. The auditing log is the initial source of tracing information security. To explore the fact, verifying reliability of related auditing record becomes an essential part of judging right from wrong. This paper proposes an iterative Plan-Do-Check-Act (PDCA) management process against external data intrusion incidents. A Social Engineering drill of 5-phase testing analysis is exhibited to strengthen computer defense system: Passive Data Security Protection, Proactive Penetration Testing, Reverse Record Tracking, Target Verification and User Habits. It not only summarizes some active follow-up guidelines to trace offenders but also demonstrates an accurate fact finding to prevent from erroneous conclusions. In response to the study in Social Engineering, the incident responders can have effective strategies of analyzing auditing record and reduce the possibilities of judicial misconduct in the forensic analysis of cybercrime event.
會議論文
1.Akhter, F.(2008)。E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime。2008 IEEE The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems。Yilan, Taiwan。304-319。  new window
2.Chen, W. S.(2010)。Cyber Security Management and Loss Estimation Using Copulas。2010 International Security Technology and Management Conference。Taipei:Jhonghua Association of Security Technology and Management。  new window
3.Inou, D.、Yoshioka, K.、Eto, M.(2008)。Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity。2008 IEEE International Conference on Communications。Beijing。  new window
4.Kao, D.Y.、Wang, S.J.、Huang, F.F.Y.(2010)。An Interactive Process of MDFA Strategy in Countering Cyber Hacking Activity。2010 International Security Technology and Management Conference。Taipei, Taiwan。  new window
5.Lin, C.、Li, Z.、Gao, G.(2009)。Automated Analysis of Multi-source Logs for Network Forensics。2009 First International Workshop on Education Technology and Computer Science。Wuhan, Hubei:IEEE。  new window
6.Lin, C.H.、Yang, C.H.(2010)。Implementation of Network Forensics Basedon Honeypot。2010 International Security Technology and Management Conference。Taipei, Taiwan。  new window
圖書
1.Blunden, B.(2009)。The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System。Plano, TX:Wordware。  new window
2.Carvey, H.(2009)。Windows Forensic Analysis DVD Toolkit。Syngress Publishing Inc.。  new window
3.Casey, E.(2009)。Handbook of Digital Forensics and Investigation。Burlington, VT:Academic Press。  new window
4.EC-Council(2009)。Computer Forensics: Hard Disk and Operating Systems。Clifton Park, NY:Cengage Learning。  new window
5.Hadnag, C.(2010)。Social Engineering: The Art of Human Hacking。Indianapolis, IN:Wiley。  new window
6.Ligh, M.,、Adair, S.、Hartstein, B.、Richard, M.(2010)。Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code。Indianapolis, IN, US:Wiley。  new window
7.Kocsis, R. N.(2007)。Criminal Profiling: International Theory, Research, and Practice。Totowa, NJ, US:Humana Press。  new window
其他
1.Kak, A.(2010)。Mounting Targeted Attacks with Trojans and Social Engineering -- Cyber Espionage。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE