Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 22 September 2021

Information Technology for a Safe and Secure Society in Japan

Information Technology for a Safe and Secure Society in Japan

Toward a Cyber-Physical Solution

(p.207) Information Technology for a Safe and Secure Society in Japan
Advances in Cyber Security

Kazuo Takaragi

Fordham University Press

This chapter introduces the topic of information technology for a safe and secure society in Japan and shows an emerging trend toward a cyber-physical solution. It begins by reviewing major security incidents in the United States and Japan, and presenting the Japanese national strategy for information security. It then describes various emerging security technologies in Japan, starting with an overview of the two levels of security technology: the component level, such as finger vein authentication and RFID, and the system and management level, such as a multiple risk communicator. Each of these technologies is discussed in turn. The chapter also covers various issues related to mitigating information leakage.

Keywords:   Japan, cyber security, National Information Security Center, information technology, information security, security technology, information leakage

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .