Hitoshi Kokumai

7ヶ月前 · 1 分の読書時間 · visibility 0 ·

chat 著者への問い合わせ

thumb_up 関連性 message コメント

Phishing Attack and Episodic Memory

Phishing Attack and Episodic Memory“Expanded Password System<br />
<br />
Bans & Only I can select all of<br />
BL] them correctly<br />
<br />
Broader choices with both images and characters accepted<br />
<br />
i<br />
<br />
 <br />
<br />
 <br />
<br />
 <br />
<br />
 <br />
<br />
Easy 10 manage reletons between accounts and corresponding passwords.<br />
<br />
&<br />
<br />
Torturous login is hstory. Login is now comfortable, relaxing and heaing<br />
<br />
SRO<br />
250<br />
8

"Hacker tries to poison water supply of Florida city" https://www.bbc.com/news/world-us-canada-55989843

Horrifying report indeed!

We hear that many of the attackers get a back door opened to take over the systems. Probably around the top of the list of weapons for opening the backdoor is compromising the passwords of the staff of target organizations. ‘Phishing’ is known to be particularly effective in it.

I wish to see more people recognize this - Our own episodic memory will help us to mitigate the nasty threat of phishing.

It was discussed in these recent posts -

“Detection ofFake Log-In Page”

“Sequel - Detection of Fake Log-In Page”


8055ca62.png

Key References 

Digital Identity for Global Citizens

What We Know for Certain about Authentication Factors

Image-to-Code Conversion by Expanded Password System

Summary and Brief History - Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform


Additional References

Account Recovery with Expanded Password System

External Body Features Viewed as ‘What We Are’

 History, Current Status and Future Scenarios of Expanded Password System

Negative Security Effect of Biometrics Deployed in Cyberspace

Removal of Passwords and Its Security Effect

Availability-First Approach

Update: Questions and Answers - Expanded Password System and Related Issues (30/June/2020)

 < Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes - narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space - "below-one" factor authentication

< Media Articles Published in 2020 >

Digital Identity – Anything Used Correctly Is Useful https://www.valuewalk.com/2020/05/digital-identity-biometrics-use/

‘Easy-to-Remember’ is one thing ‘Hard-to-Forget’ is another https://www.paymentsjournal.com/easy-to-remember-is-one-thing-hard-to-forget-is-another/

Identity Assurance And Teleworking In Pandemic https://www.informationsecuritybuzz.com/articles/identity-assurance-and



thumb_up 関連性 message コメント
コメント

その他の記事 Hitoshi Kokumai

ブログを見る