查詢結果分析
來源資料
頁籤選單縮合
題 名 | 安全電子郵件反制攔截機制之研究=The Mechanism for Anti-Interception Secure Emails |
---|---|
作 者 | 謝和興; 張克章; 陳正鎔; | 書刊名 | 國防管理學院學報 |
卷 期 | 21:1 2000.05[民89.05] |
頁 次 | 頁30-40 |
分類號 | 312.76 |
關鍵詞 | 電子迴文單; 入侵者入侵之代價; 風險評估; E-mail receipt; Loss of adversary effort; LAE; Risk assessment; RA; |
語 文 | 中文(Chinese) |
中文摘要 | 最近有許多有關電子郵件安全方面之研究大多著重在營造一個私人訊息隱密的環境,但更重要的應該是嘗試如何去偵測,或甚至於實施一個有限度的逆襲。但是逆襲的行為屬於鬼客的行為,在法律上是不被允許的,但不包括資訊作戰,因為戰爭的目的是在於毀滅敵人; 本論文主是乃是著重於機制策略的規劃觸運用而不在討論密碼學的演算,這是一個以策略目標來實施事業單位收發室與收發室之間的工作流程控制,這是一個象徵資訊戰中攻擊與防禦的多元性複合程序,以建立一個安全的環境。 本機制是一種電子郵件的偵測概念、一個工具及一個策略。許多現成的技術被運用在這個機制中,我們將討論在這系統中的每一個功能,並明証明它們可以以現有簡單的技術為之,最後,我們發展的『電子迴文單』代表著「防禦不只是防禦,也是攻擊;攻擊是最佳的防禦」的戰術觀念。本機制的功能目標包括如下: 1. 檢查敏感性電子文件是否被攔截。 2. 自動檢驗收件者的身份或截取並寄回攔截者的資訊(包括通行碼或安全密碼等)。 3. 當文件被攔截時自行銷毀並於攔截者之電腦中植入後門病毒。 4. 提供資訊戰相關的情報資料。 |
英文摘要 | Recently many of studies to the E-mail security system almost only provide to create a privacy secrete environment; but it is more important to detect, or even perform a little limited counterattack. Because of counterattack belongs to cracker action, it is illegal in law but excludes Information Warfare (IW), the purpose of war is destroy enemy. This paper is major in strategic mechanism excludes about algorithm of cryptography, this is a workflow system of mailroom service controls performance with strategic goals. This is based on a complex process consists of many components which represent both defense and attack in IW, the state of decision making a secure environment. This mechanism is a kind of E-mail detection concept, a tool, and a strategy. Many of ready-made technologies are used; we will discuss about every functions of this system, and prove the system done just by current simply technology. Finally, we develop "E-mail receipt" represent defense is not only defense but also attack, the best defense approach is attack. In this article, the targets of our mechanism include: 1. To check sensitivity electronic document being intercepted. 2. Automatically check receiver's ID or steal interceptor's information (password or security code) mail back to sender. 3. To execute self-destroy and plant Back Door virus when our document being intercepted. 4. To provide information for IW. |
本系統中英文摘要資訊取自各篇刊載內容。