Concept proposal of multi-layer defense security countermeasures based on dynamic reconfiguration multi-perimeter lines

4Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the rapid progress of the Internet, security incidents are increasing and are becoming more sophisticated. Current trends in security incidents include not only cyber security threats such as viruses, malware, and unauthorized access, but also methods of stealing information, such as phishing, shoulder hacking, and electromagnetic wave eavesdropping. Thus, security incidents tend to diversify, and it is therefore important to consider physical countermeasures and psychological countermeasures other than the cyber security countermeasures typically taken. In this paper, in addition to the current cyber security countermeasures, we propose new multi-layer defense security countermeasures taking into consideration non-cyber security countermeasures that reflect physical viewpoints and psychological viewpoints. Specifically, we propose the concept of multi-layer defense security countermeasures based on dynamic reconfiguration multi-perimeter lines. Furthermore, a desktop simulation is performed with TPO (time, place, occasion) conditions in the office as specific perimeter lines, and the effectiveness of the concept is clarified. This contributes to the construction of a new paradigm of information security management in the digital transformation era.

Cite

CITATION STYLE

APA

Tanimoto, S., Takahashi, Y., Takeishi, A., Wangyal, S., Dechen, T., Sato, H., & Kanai, A. (2020). Concept proposal of multi-layer defense security countermeasures based on dynamic reconfiguration multi-perimeter lines. In Advances in Intelligent Systems and Computing (Vol. 1036, pp. 413–422). Springer Verlag. https://doi.org/10.1007/978-3-030-29029-0_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free