Prevention Mechanism of Information Deceit

نویسندگان

  • Rana Majumdar
  • Abhishek Singhal
  • Abhay Bansal
  • Y. T. Yu
  • M. F. Lau
چکیده

Data security and extracting intelligence from data in the form of information is the area where every organization is concerned about it. Network security is concerned with who connects to and what goes across a network. Net users have to provide personal credentials like passwords or wireless keys, and the network must protect with firewalls and intrusion detection system. Information security on the other hand, is a somewhat more general concept of being sure information systems have confidentiality, integrity, and availability. This can include network security as well as cryptography, access control, physical security, and more. It covers everything from the earliest security mechanism to latest DMZ zones. Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques . This paper described various techniques related to social engineering attack; the countermeasures for a social engineering attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effective Contrivances and Strategies in Prevention of Victimizing the Woman Practitioners Field Study: Qom City

One of the main concerns of any society is the attention paid to the employment of women and preventing victimization of them.In the present study,meanwhile investigating and adapting criminological and victimological theories,by establishing a logical relationship among them,the subject is discussed.The present research is descriptive-analytic in terms of research method and in terms of inform...

متن کامل

Toward a Resolution of the Paradox of Aggressive Displays: I. Optimal Deceit in the Communication of Fighting Ability

One inference from game theory models of animal conflict is that adversaries should not inform one another about concealed components of their fighting ability. This poses a paradox for the customary ethological account of aggressive displays in that it is usually assumed that the primary function of such behavior is to make such information available. To resolve the paradox, I propose that the...

متن کامل

Towards Deception Detection in a Language-Driven Game

There are many real-world scenarios where agents must reliably detect deceit to make decisions. When deceitful statements are made, other statements or actions may make it possible to uncover the deceit. We describe a goal reasoning agent architecture that supports deceit detection by hypothesizing about an agent’s actions, uses new observations to revise past beliefs, and recognizes the plans ...

متن کامل

Communication with Detectable Deceit

We analyze a model of communication with an extreme conflict of interest in which deceit is detectable with positive probability. The sender observes (possibly imprecise) information about his type, and can send any message to the receiver at no cost. If he lies---either by claiming more precise information or a false type---his message ends up incoherent with positive probability. In any infor...

متن کامل

Modelling and Simulation of Selling and Deceit for the Trust and Tracing Game

Deceit is commonplace in trade. Understanding deceit is vital for detecting deceit, and for the design of governance mechanisms in trading to discourage deceit. This paper presents a number of observed regularities related to trust that are gained from human simulation games in supply networks. These regularities form the basis of models for deceit and sellers capable of cheating as presented i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012