英文摘要
|
In recent years, as Web 2.0 gains its popularity, the audio and multimedia effects on the web pages are more diverse, interactive, and abundant. Now, the social networks are hot, such as Facebook, Plurk, Twitter, Free Blog, Xuite, smart phones, and emails have their tremendous influences which cannot be neglected. According to the statistic of ComScore company to the end of 2011, there were 794 million people visited Facebook monthly; each person spend 377 minutes, that is more than 6 hours, on social networks. Recently, 165 anti-fraud hotline of National Police Agency has found there were consecutive social network attacking cases. In view of the prosperous of the Internet, the social engineering attacking is derived from the former emails to social networks today. If we do not pay attention to and strengthen the information security management, the information security cases will repeat itself. The influences will be broadened, and the lost and damage is beyond calculation. This research discusses the social engineering attacking related to social networks and compare these information security cases according to case analysis method.
|
参考文献
|
-
Fung, Andrew Ren-Wei,Farn, Kwo-Jean,Lin, Abe C.(2003).A Study on the Certification of the Information Security Management Systems.Computer Standards & Interfaces,25,447-461.
連結:
-
陳金松記者/台北報導(2015)。「香港富商綁架案:比特幣BitCoin 付贖,警『根本無法追蹤』,匯出就石沉大海,警方傻眼忙惡補」,聯合報A3 版,2015 年10 月28 日。
-
洪素卿記者/台北報導 (2012)。「Yes123 調查/320 萬上班族平均每日掛網摸魚1.3 小時」,自由時報,民國98 年11 月23 日。
-
何宗龍記者/台北報導 (2012)。「奧運廣告商拚社群媒體金戰場」,中央社,2012 年4 月19 日。
-
(2005).Information technology-Security techniques-Information security management systems- Requirements.
-
吳佳穎記者/台北報導(2011)。「用小賈斯汀名氣,駭客臉書行騙」,中央社,民國100 年8 月2 日。
-
(2004).Information technology-Security techniques-Information security incident management.
-
林郁平記者/台北報導(2012)。「網路病毒林來瘋,小心doc 檔」,中國時報,民國101 年3 月18 日。
-
InsightXplorer (2010)。「創市際市場研究顧問公司調查社群網站與電子郵件使用狀況」。《網路測量研究》,民國99 年12 月。
-
陳賢義記者/台東報導(2012)。「臉書帳目遇『駭』遭盜刷」”,自由時報,民國101 年4 月16 日。
-
張君豪記者/台北報導(2015)。「木馬駭台灣:10 萬支手機中毒,惡意簡訊盜3 億」,蘋果日報,2015 年10 月13 日。
-
Hadnagy, C.(2010).Social Engineering: The Art of Human Hacking.Indianapolis, US:Wiley.
-
Laribee, Lena(2006).Naval postgraduate school.
-
Luhmann, Niklas(1993).Risk: A Sociological Theory.Walter de Gruyter Publishing.
-
Raman, K.(2008).Ask and you will receive.McAfee Security Journal,Fall,9-12.
-
Schneier, Bruce(2000).Secrets & Lies: Digital Security in a Networked World.Wiley Computer Publishing.
-
方仁威、方建鈞(2011)。社交工程電子郵件攻擊類型之研究。「2011 資訊管理實務」學術研討會,桃園:
-
方仁威、余俊賢(2004)。內部網路遭駭客攻擊方式與防護之研究。國防通信電子及資訊期刊,7
-
方仁威、隨得書(2006)。資安事件管理機制之研究。「2006 年空軍官校航空安全暨危機管理」學術研討會,高雄‧崗山:
-
陳嘉玫(2010)。網路安全的社交工程。科學發展期刊,461
-
樊國楨、方仁威、林明華(2000)。A Study of Defensive Security Mechanism for Information System。網際網路技術學刊,1(1),29-38。
-
潘天佑(2011)。資訊安全概論與實務。台北市:碁峰資訊股份有限公司。
|