The Journal of Information Science and Technology Association
(Johono Kagaku to Gijutsu)
Abstract

Vol. 62(2012), No.8

Information security

Frameworks and components of information security

Keiji TAKEDA
Keio University Faculty of Environment and Information Studies
Endo5322 Fujisawa Kanagawa 252-0882 JAPAN

Abstract: Information security and related technology has increasingly became important as use of the Internet and Info-communication technology rapidly grew in late 1990fs. In the early stage of the Internet has developed with mutual trusts of participating organizations then when it became to be used for various important purpose variety of security incidents occurred and various efforts have been taken to solve such security problems. In this paper by introducing various security incident cases, standardized security frameworks and current and future technical approach on information security are explained.

KeywordsF  information security / privacy / personal information / illegal access / information leakage

Cyber security measures by NISC

Hiroshi KIMOTO, Ryoichi SASAKI
Former official of National Information Security Center (NISC), Tokyo Denki University

Abstract: NISC is the center of national Information security policy in Japan. It settles on fundamental strategies, plans measures for governmental agencies and critical infrastructure industries, enlightens the public and conducts international issues. This article introduces to recent measures the following, for governmental agencies.
- Establishing the government-wide framework for information security.
- Publishing the annual report.
- Development of gSecurity by Designh.
- Installing sender authentication technology.
- Enforcement of IT security inoculation and penetration test.
- Forming ministerial CSIRTs.

KeywordsF  NISC / Information Security / Cyber Attack / ISMS / SBD / Sender Authentication Technology / SPF / Spoofing / penetration test / CSIRT

Information security psychology -Information security from the human and psychology sides-

Katsuya UCHIDA
Assistant to CIO at City of Yokohama & Emeritus Professor at Institute of Information Security
4-9-3 Kouenji-kita Suginami-ku Tokyo, 166-0002 JAPAN

Abstract: The information security is not only a technique. Cyber attack using human vulnerabilities has been already carried out before more than a quarter of century.
As information security advanced, the attacks to be called "social engineering" for human vulnerabilities became important to the cyber attack.
The hacker impersonates the victim using the information that he obtained by social engineering technique and performs collection, the manipulation of the confidential information and destruction of the information.
The use of psychology and the behavioral science leads to advance of the information security.

KeywordsF  Information Security / Information Security Psychology / Social Engineering / Psychology / behavioral science

Personal information protection in libraries: Principles and actual cases

Keiichi FUJIKURA
Bunkyo University Koshigaya Library
3337 Minami-Ogishima, Koshigaya, Saitama 343-8511 JAPAN

Abstract: In spite of enforcement of the gAct on the Protection of Personal Informationh, incidents of personal information leakage or loss are not decrease. Incidents occurred not only its theft or loss, also caused by defect of one library system. In addition, the handling of library materials containing personal information such as directories, are different by libraries. In some cases, libraries contradict themselves' role by limiting and withdrawing those materials to prevent accesses to them. In this paper, I describe ways of protecting personal information in library affairs, including the perspective of the gStatement on Intellectual Freedom in Librariesh, which is the fundamental philosophy of libraries.

KeywordsF  Act on the Protection of Personal Information / Statement on intellectual freedom in libraries, revised in 1979 / privacy / information security / right to know

Concept of information security future

Itsuro NISHIMOTO
LAC Co., Ltd.
Hirakawacho mori tower 2-16-1 Hirakawa-cho Chiyoda-ku Tokyo, 102-0093 JAPAN

Abstract: Battle of the expanding domain has been done from prehistoric times. The stage has already been subject to its cyber space. To explain, such as that actually occurs. Then, current security measures is of a peaceful world, we consider the nature of cyber security of the Warring States period.

KeywordsF  information security / cyber security / targeted attack / smart phone security

Series: Introduction to the Web site occasionally uses patent offices(10): Australia

Momoko KIKUTA
NGB Corporation
7-3, Nishi-Shimbashi 1-chome, Minato-ku, Tokyo, JAPAN

Abstract: Australia is the economic superpower of the Oceanian region and possesses economic and industrial strength to the proportion of the developed nation. Due to this scenario, several companies are basing their R&D, production and sales operations in the country. For the sake of a protection of intellectual property rights, Australia has a comprehensive legal framework as well as being a signatory member of the Paris Convention, the PCT and other main intellectual property related treaty. This article, focusing on Australia, introduces the search functions related to the database of the Australia Patent Office. Such search functions are of the level of the databases provided by Japan, U.S.A. and European Patent offices and I hope to provide some helpful information and practical advice through this introduction.

KeywordsF  Australia / Patent / Utility model / Intellectual property / Search, Status
Page Top Copyright (C) 2012 INFOSTA. All rights reserved.