TITLE

Development of a Support Tool for Introducing a Filtering Service into a Personal Computer

AUTHOR(S)
Homma, Yuta; Kawakami, Masatoshi; Sasaki, Ryoichi
PUB. DATE
January 2012
SOURCE
International Proceedings of Economics Development & Research;2012, Vol. 27, p168
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Not only PC users at businesses but also PC users at home are exposed to security threats. Elearning, which makes it possible to study anytime and anywhere, is an effective education method that can be used for information security education. To create scalable and flexible e-learning for such an education, "ELSEC" was developed. The experimental results of previous studies found this system to be useful as instructional content. However, although ELSEC was initially used only for education, it has the capability to support user operations to achieve actual information security. Therefore, we further developed ELSEC as a user operation support tool. As a support tool, it offers an operator support function as well as an e-learning function for introducing a filtering service into personal computers. This paper describes an application experiment to evaluate whether the support tool created by ELSEC is useful.
ACCESSION #
74297192

 

Related Articles

  • Can Indiana Jones steal your data? Parr, Gary L. // Quality;Jun97, Vol. 36 Issue 6, p4 

    Focuses on the security of computer data. Need to have current back up of data; Protection of access to file using password; Computer theft at the Levi Strauss & Co.'s San Francisco headquarters; False sense of security derived from the use of passwords, encryption techniques and backup copies.

  • Stop PC thieves in their tracks. Fryer, Bronwyn // PCWorld;Jun96, Vol. 14 Issue 6, p31 

    Focuses on the value of computer security and off-site data storage systems. Case review on computer theft; Importance of disaster recovery plans.

  • Shattering Stereotypes with IG Skills. Wiler, Vicki // Information Management Journal;Nov/Dec2014, Vol. 48 Issue 6, p4 

    An introduction is presented in which the editor discusses various reports within the issue on topics including the information security in cloud services provider (CSP), the importance of corporate objectives in information technology (IT) skill, and the importance of digital enterprises.

  • Infosecurity trumpets new missions for the field.  // SC Magazine: For IT Security Professionals (UK Edition);Mar/Apr2014, p10 

    The article offers information on the Infosecurity Europe 2014 conference and exhibition to be held at Earls Court in London, England from April 29 to May 1.

  • The Need of Cyber Security for Digital India. Malik, Alok // Dataquest;11/15/2015, Vol. 33 Issue 21, p46 

    The article highlights the need of cyber security for the Indian government's Digital India campaign, and mentions the measures to be undertaken which include information security awareness training and programs, access control mechanism, and risk assessment and treatment.

  • Issue Information.  // Security & Communication Networks;Aug2016, Vol. 9 Issue 12, p1631 

    No abstract is available for this article.

  • pwned. Hoglund, Greg // Information Security;Sep2007, Vol. 10 Issue 8, p24 

    The article discusses rootkits. Rootkits are said to be used by competitive corporations, terrorists and organized crime. According to the article, rootkits can steal information without detection and bypass desktop firewalls and virus scanners. Ways on how to extract and remove rootkits and...

  • Align data protection with business importance. Boles, Jeff // Storage Magazine;Aug2010, Vol. 9 Issue 8, p8 

    The article discusses issues of data protection and protecting use of information. It highlights the challenges posed by two separate markets servicing both aspects whereby solutions providing protection of data are often different from products offering to protect use of such data. It notes the...

  • Defense in Depth. Byres, Eric J. // InTech;Nov/Dec2012, Vol. 59 Issue 6, p38 

    The article discusses the use of the Defense in Depth strategy in improving cybersecurity or computer network security in the industrial automation industry. It addresses the deficiencies of relying on a single defensive solution, such as a single Internet firewall. The characteristics of a...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics