...i A
|
|
- つかさ だいほうじ
- 5 years ago
- Views:
Transcription
1
2 ...i A i
3 BIT ISO/IEC ii
4 IT ISO ISO ISO ISO IT iii
5 A 1
6 xdsl Web
7 2. 3 3
8 ( )
9 ( ) % % 10 12% 68% % % ( ) 5
10 2.1.3 BtoB BtoB ECOMNTT 13 ( ) BtoC BtoB , BtoC ECOMNTT 13 ( ) 6
11 W32/SQLSlammer Sapphire 2.6 IPA/ISEC (IPA/ISEC) IPA/ISEC JPCERT/CC 7
12 2.7 IPA/ISEC (IPA/ISEC) CATV ADSL ( )
13
14
15
16 3.1 OS 3.2 Web IP ADSL 12
17 ( ) VPN(Virtual Private Network) (1)
18 (2) IDSIntrusion Detection System 14
19 3.5 SI System Integrator
20 (3) VPN(Virtual Private Network) 3 VPN VPN VPN 3.7 VPN ADSL 3.8 VPN (4) IC PKIPublic Key Infrastructure 16
21 3.9 IC 15% GPKIGovernment Public Key Infrastructure 3.10 (5) 2 RSA DES 17
22 Web Web (1) 18
23 (2) VPN 3.15 ISP(Internet Service Provider) 4 19
24 3.16 (3) ISO/IEC BS7799ISMS Information Security Management System
25 (1) DoS Denial of Service attack 3.19 (2) 2 SI OEM 21
26 (3) 10% 15% 70%
27 VPNVirtual Private Network
28 , , ,836 6, % (2)(5) 1 BS7799 ISMS ISO/IEC % (4) 24
29 % (2)(3) / 6 30% xdslftthcatv ,700 ADSLISP (1)IT N-+I Network Guide (2) (3) (4) ,000 10,000 8,000 6,000 4,000 2,
30 (5) (1) VPN , ,261 90% 72% 7 e-japan 26
31 e-japan 23 8 (2) IDSIntrusion Detection System ISMS ASPApplication Service Provider 27
32 ISMS VPN Web (3) VPN 8 VPN ISPInternet Service Provider VPN xdsl IP-VPN VPN VPN VPN 28
33 VPN ADSL VPN (4) IC PKI PKI GPKI PKI ISMS GPKI 1 IC 29
34 1 PKI PKI (5) OS 2 e-japan ISMS OS 30
35 4.1.2 (1) ,700 SISystem Integration e-japan (2) 31
36 VPNADSL (3)
37 ISMS ISMS (1) 7% SI 33
38 (2) IT ,778 2, ,352 2,
39 (3) OS 35
40 IT IT 2% 4 CSIFBI % 1 64% VPN administration authorizationauthentication 3 e 1 36
41 25,000 20,000 15,000 10, ,
42 4.2.1 CSI 90% 93% IDS IDS , VPN PKI LAN IC VPN ,100 VPN IDS
43 ,
44 % 51.09% 48.91% 66.31% VPN 40
45 IT 1US ,000 25,000 20,000 15,000 10,000 5, , ,400 5,640 1, ,938 30,000 25,000 20,000 15,000 10,000 5, ,400 3,836 6, ,040 10, ,
46 IT 1.96 IT IT IT % 40.0% 30.0% 20.0% 17.1% % 10.0% 0.0% WITSADigital Planet
47 % 27% 25% 58% 29% 60% 79% 89% 90% 90% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% CSIComputer Security Issue & Trend Vol. VIII, No.1 Spring
48 (1) a) Windows Windows 44
49 Macintosh b) WindowsUNIX OS Macintosh (2) ISP 26% 45
50 (3) VPN ISP VPN VPN (4) PKI 70%
51 PKI 2 OS PKI e-japan (5) IC LAN GPKI 47
52 5.1.2 (1) (2) ISP (3) 48
53 SI ISMS (1) (2) (3) 49
54 IT IT IT ISMS
55 (1) (2) (3) 6.2 (1) IT ITSSIT 51
56 (2) 6.3 (1) ISMS (2) IT ISMS ISMS 100 ISO BS7799 ISMS IT (3) e-japan ISMS (4) IT 52
57 Web 53
58 B IT 54
59 IT IT IT IT 1.2 IT IT ISO ISMS Web
60 NITE CCCommon Criteria IPA 2 56
61 TCSECTrusted Computer System Evaluation Criteria TCSEC DC1C2B1B2B3A EC ITSECInformation Technology Security Evaluation CriteriaITSEC CC 1996 CCCommon Criteria ISO ISO/IEC
62 TCSECITSECISO/IEC TCSEC ITSEC CCISO/IEC (IPA/ISEC)IT CC CC MRA MRA 5 CCEAL1EAL4 5 58
63 ISO/IEC ISO/IEC ISO/IEC ISO/IEC CC Introduction and general model 2Security functional requirements 3Security assurance requirements ISO/IEC Protection ProfilePPSecurity TargetSTST PP 2 3 ST PP ST PP PP ST ST PP 2 59
64 3 10 PP ST ISO/IEC JIS X 5070 JIS ISO/IEC
65 2.3 TOE Target of Evaluation PP ISO/IEC NITE 1-4 NITE NITE NITE TOE PP ST 61
66 TOE PP PPProtection Profile TOE 2 STSecurity Target NITE PP TOE ST ST ST TOE TOE ST TOE 2 ST 3 NITE IPA IT 62
67 (1) PPSTTOE (2) IT IT PPSTTOE IT IT IT IT IT 63
68 2.5.4 (1) A IC Protection ProfilePP PP2 2 1PPST B IC Security TargetST ~ C 64
69 Security TargetST Protection Profile PP Target of Evaluation TOE IC Security TargetSTProtection ProfilePP Target of EvaluationTOE 10 NITE 1 1 2, E Target of EvaluationTOE 1 2 3ISO/IEC
70 (2) IT N= N= % 28% N=35 IT 33% 33% N=275 IT N=275 10% N=144 N=275 50% 50% 50% A B C D E PPTOE PPTOE ST 66
71 2.7 A.B.C. BE ABC. ACDE (1) PP ST ST PPSTTOE ST 2 3 (2) PP ST PPSTTOE NITEST PP TOE ISO9000 ISMS 67
72 2.6.2 (1) 2 ST 7 NITE 12 ST (2) (3) (4) EAL EAL3 2 EAL4 IT EAL (1) ISO/IEC ISO/IEC
73 PP ST PPST PP ST PP ST (1) ST 2 3 TOE (2) PP ST PP ST IC ST (1) ST ISO/IEC PP TOE ST ST ST ISO/IEC ST ISO/IEC (2) Linux Sendmail 69
74 ISO/IEC ST 2.8 A B C D E ST 70
75 3. IT ISO ISO ISO ISO9000 ISO 71
76 3.2.2 ISO ISO/IEC ISO e (1) 2 (2) 72
77 (3) ISMS PR (1) (2) EAL4 (3) 73
78 3.3.4 ISO9000 1/
79 NITE 20 ECSEC JEITA NITE 1 JEITA ECSEC ECSEC IT N=275 IT N=80 N=275 IT N=275 10% N= IT 3 75
80 10% 7 10% ST ~2 4.4 ISO ISO9000 ISO
81 , ISO ISO14000 ISO , ISO9000 ISO9000 ISO IT 2 1 A 1 B 77
82 4.5.1 (1) A NITE ECSEC (2) B VPNIC PKI VPNIC PKI VPN9 IC 8 19 PKI 7 5 1/3 78
83 A B A B ISO
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationCopyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More information2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii
2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101
More informationCIA+
ECOM 200511 e ECOM CIA+ Integrity Confidentiality Availability Phishing fishing http://www.nikkeibp.co.jp/ http://www.nikeibp.co.jp/ DoSDenial of Service DoS IT IT ROI 1/2 2/2 DMZ IT TESEC( Common
More informationCopyright
2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More informationuntitled
IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationuntitled
TOE 21 7 22 IT 9053 C0217 TOE bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c
More informationuntitled
TOE TOE PP 20 3 25 (IT 8210) C0220 Hitachi Adaptable Modular Storage 2300 0862/ A-M EAL2 TOE 21 6 29 IT Common Criteria for Information Technology Security Evaluation Version 2.3 Common Methodology for
More informationIW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights
1 Internet Week 2001 ( ) kuma@isid.co.jp 2 CodeRed 1 3 (EXCEED ) se cu ri ty? 4? 2 5 Web IP Web MP3 6 3 7 1.5Mbps8Mbps 500 MP3 CM VoD 8 4 ADSL (Asymmetric Digital Subscriber Line) () CATV FWA (Fixed Wireless
More informationV ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE
V ERP Standard Edition 2009/03/16 1.23 V ERP Standard Edition 1 ST...3 1.1 ST...3 1.2 TOE...3 1.3 TOE...3 1.3.1 TOE...3 1.3.2...4 1.3.3 TOE...5 1.3.4 TOE...6 1.3.5 TOE //...8 1.4 TOE...9 1.4.1 TOE...9
More information1. 2
2004 1. 2. 1. 2 Web 3 4 5 6 PDA 7 USB CD DVD 8 9 10 11 LAN 12 13 14 P2P Web USB CD,DVD PDA 15 CD,DVD USB 16 17 18 19 VPN 20 PC 21 LAN 22 23 24 ISO/IEC17799 25 26 27 28 29 DDoS DoS DoS DDoS DoS ( ) ( )
More informationST作成の手引
7 3 1.2 1 ST ST ST ST ST CC TOE TOE TOE IT TOE TOE TOE IT TOE TOE TOE PP PP PP PP PP 2 ISO/IEC 15408( 1999) Evaluation Criteria for IT SecurityCC JIS X5070(2000) ST CC ST ST CC ST ST CC IT CCCommon Criteria
More informationuntitled
17 9 15 IT 5061 C0047 TOE imagio D DataOverwriteSecurity Unit Type C Software TOE V0.04 PP EAL2 TOE TOE 18 3 24 IT Common Criteria for Information Technology Security Evaluation Version 2.1 Common Methodology
More information2011 4-1 - 2006/3/10 2006/4/21 2006/6/16 1. 9.3.5 2. ST ST 3. 2006/8/4 2007/11/9 ( ) 2008/9/8 ( ) 2011/4/21 1. 2. 3. - 2 - 1... 5 2... 5 2.1 NISD-K304-101... 5 2.2... 6 3... 6 4... 7 5... 7 5.1... 8 5.2...
More informationInformation Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,
Information Security Management System ISMS ISO/IEC 27001 ISMS () ISMS ISMS 200512 Copyright JIPDEC ISMS, 2005 1 Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,
More information目次! ISO/IEC の意義! ISO/IEC の運用! 欧米の対応と製品評価状況! ISO/IEC の内容! 日本の取り組み 2
ISO/IEC 15408 セミナー ISO/IEC 15408(Common Criteria) 概要 平成 12 年 3 月情報処理振興事業協会 (IPA) セキュリティセンター 1 目次! ISO/IEC 15408 の意義! ISO/IEC 15408 の運用! 欧米の対応と製品評価状況! ISO/IEC 15408 の内容! 日本の取り組み 2 ISO/IEC 15408 の意義 3 セキュリティ評価の必要性
More informationIW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN
1 Internet Week 2002 20021218() 9:3012:30 () kuma@isid.co.jp ADSLFTTH 24 IP LAN LAN LAN 2 1 ? 3? 4 e-japan 20053000 20051000 2 IP»» 5 CATV DSL FTTH LAN 6 620(20029) CATV 180DSL 422FTTH 12 14 3 MP3CD CM
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More informationMicrosoft Word - 保守運用ガイドライン_080122CSAJ修正.doc
i ii 1...1 2...2...3 4...4 5...4...5 7...12 1...1 2...4 3...5...6...6 6...7 7... 11 8 FOSS...13 9...15 10...16 11...17...18...18 14...18 15...19 16 JIS Q 20000...20 iii 1 1 1 1 1 1 2 3 2 4 5 WG 2 4 5 CSAJ/JCSSA
More information国際連携-2.doc
13 G2 13 2001 2006 14 3 1998 1999 ECOM 2000 ECOM 4 ECOM () BtoB BtoC2001 5 2001 9 2002 1 BtoB BtoB BtoG( ) BtoB e BtoC 2002 3 ... 1 1... 15 1.1...15 1.1.1...15 1.1.2...16 1.1.3...17 1.2...17 1.2.1...18
More informationInformation Security Management System ISMS Copyright JIPDEC ISMS,
ISMS Copyright JIPDEC ISMS, 2005 1 Copyright JIPDEC ISMS, 2005 2 Copyright JIPDEC ISMS, 2005 3 Copyright JIPDEC ISMS, 2005 4 ISO JIS JIS ISO JIS JIS JIS ISO JIS JIS 22 23 ISO SC27 ISO SC27 ISO/IEC 17799
More information今企業が取るべきセキュリティ対策とは策
AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.
More informationはじめに
27 1. 28 2. 3. 4. 5. 30 31 SCM 2 33 SCM 3 35 6. CMM CMMI ISO 36 7. 8. 37 SCM 38 9. 40 10. 2004 41 43 1.1 45 1.1.1 45 1 SCM 45 2 45 3 47 4 47 9 5 48 6 48 7 CMM Capability Maturity Model 48 1.1.2 49 1 SCM
More informationhttp://www.ipa.go.jp/security/ Contents 1. NIST 2010 2. NISC 3. CRYPTREC 2008 10 28 Copyrignt 2008, IPA all right reserved. 2 1977 MAC) PKI PKI PKI: (Public Key Infrastructure) 2008 10 28 Copyrignt 2008,
More information1 基本的考え方
... 1 1.1. BCP(Business Continuity Plan) 1 1.2. BCP 2 1.3. BCP 6 1.4. 9... 10 2.1. BCP 10 2.2. 11 2.3. 12 2.4. BCP 14 2.5. BCP 15 BCP... 17 3.1. 17 3.3. BCP 19 3.4. 22 3.5. 24 3.6. 25 3.7. 26... 28 4.1.
More information16
2005 16 2005 9 1... 1 1.1... 1 1.1.1... 1 1.1.2... 2 1.1.3... 2 1.2...3 1.2.1... 3 1.2.2... 8 1.2.3... 17 1.3... 19 1.3.1 BtoB EC... 20 1.3.2 BtoC EC... 22 1.3.3... 25 1.4... 25 1.4.1... 25 1.4.2... 28
More information1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh.......
2001 1 1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh............................................... 3 1.2.2
More informationECに関わる法的問題検討報告書
EC EC ECOM BtoB BtoC, 14 3 EC ECOM ( WG ) WG EC EC ( ) EC 1...1 1.1... 1 1.1.1... 3 1.1.2... 9 1.1.3... 13 1.1.4 PtoP Peer to Peer... 18 1.1.5... 23 1.1.6... 29 1.2... 32 1.2.1... 33 1.2.2... 35 1.2.3...
More information幹部会、幹部懇談会の話題
生体認証における セキュリティ評価と国際標準化 2016 年 11 月 17 日 産業技術総合研究所 山田朝彦 1 本講演での 生体認証 Biometric verification(1:1) Biometric identification(1:n) は含まない 2 本講演での セキュリティ評価 セキュリティ評価とは 誰 ( 甲 ) のためのか A) 特定の組織 B) 不特定であるが目的 用途を同一とする組織
More information2
1 2 3 14 IT IT IT e-japan IT IT 24 IT IT IT IT CAD CAD Conference 2003 300 Web 41,056 15 Web (3D) 3,569 CIAJ () JEITA CEATEC JAPAN 2002 754 17 e-business Solution Plaza 28 30 4 5 1. 17 1465() 285 185 1
More information2004 SYN/ACK SYN Flood G01P014-6
2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................
More informationuntitled
1 BCP(Business Continuity Plan) 1 BCP 2 BCP 6 9 10 BCP 10 11 BCP 12 BCP 15 BCP 16 BCP 17 17 BCP 18 BCP 19 22 24 25 26 28 28 33 37 BCP 41 BCP BCP BCP BCP BCP BCP(Business Continuity Plan) 1 2 BCPBusiness
More informationAirMac ネットワーク for Windows
AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac
More information2003/07/ /08/ /09/ /09/ /09/ /10/ /11/ /11/ ASE ASE
Di3510 Di3510f Multi Function Peripheral Security Kit 1.18 2004 6 4 1 / 85 2003/07/31 1.00 2003/08/28 1.01 2003/09/02 1.02 2003/09/05 1.03 2003/09/12 1.04 2003/10/06 1.05 2003/11/12 1.06 2003/11/28 1.07
More informationWindows Macintosh 3 3 4 = 3 4 = 4 5 6 Windows Macintosh 7 8 9 Windows Macintosh 0 Windows Macintosh 3 4 5 Windows Macintosh Windows Macintosh 3 4 5 = Windows Macintosh 3 4 3 4 5 3 4 5 3 5 4 5 6 3 4 3 5
More information5005-toku3.indd
3 1 CMMICMM Capability Maturity Model ISO : International Organization for Standardization IEC : International Electrotechnical CommissionJTC1 : Joint Technical Committee 1SC7 : Sub Committee 7 SC7 WG
More informationAirMac ネットワーク構成の手引き
AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17
More informationTesting XML Performance
- DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER
More informationuntitled
22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29
More information1 47 200 300 1 1 25172005 1
8... 1... 24... 55 3... 75... 93 17 2005 1 47 200 300 1 1 25172005 1 8 pdf 1 2 9 1812 6 3 1832 11 7 1836 1 2 2 4 9 1997 2 2 101813 1 1 9 5 4 7 3 12 3 4 7 10 6 3 10 6 3 12 5 3 A 10 5 B 4 C 10 7 D 3 E 5
More information目 次 (案)
... 1... 1...2...3...3...11...13...17...18...18...20...42...42...43...54...54...56... 2005 4 2004 3 3 JEITA 1 JEITA JEITA JEITA 2 17 2 9 15 9 12 24 10 29 11 30 (12 27 3 3 13 3 12 28 10 22 11 14 3 19 12
More information資料9 表紙.doc
2003 (%) (%) 1 2 3 4 5 6 1997 1998 1999 2000 2001 2002 ( ) 1,155 1,694 2,706 4,708 5,593 6,942 (%) 68.2 80.0 88.6 95.8 97.6 98.4 (%) 12.3 19.2 31.8 44.8 68.0 79.1 (%) 6.4 11.0 19.1 34.0 60.5 81.4 5 300
More information2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN
More information平成17年度 マスターセンター補助事業
- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - IC IC - 29 - IT
More information11夏特集号初校.indd
1 2 3 5 50 40 7 6 3 ABC 3 5 A 5% B C 100 3 1 2 3 A 5% 5% 5% B 10% 5% 0% C 20% 10% 15% A 15.8% 15.0% 0.8% B 15.5% 15.0% 0.5% C 12.2% 15.0% 2.8% 2,000 1,500 1,000 500 0 10% 5% 3% 1% 01 5 10 15 20 25 30
More information橡最終報告書.PDF
... 1... 1... 4... 6... 9...11...11...12...12...12... 13...14... 14...16...17...17...18...18...19...22...23...24...24...27...29...29...31 ...33...34...34...34...36...36...36...36...36...39...40...40...41...45...45...45...45...45...46...46...47...49...49...49...50...51...53...53...54...55...56...56...57...57
More informationuntitled
7/67/1073,42911 15,020158,393 7/127/184,6674,913 2927 71.3 894 21.8 287 7.0 n=4108) 132 3.2 62 1.5 934 22.7 786 19.1 629 15.3 801 19.5 407 9.9 357 8.7 (n=4108) 35 35 30 25 20 15 10 153 3.7 1 0.02 23 0.6
More information01.表紙.PDF
IC CRM IT 3 i ii iii iv v vi vii viii .......................................... .................................... -0.3% t-co 2 217-4.0% +5.0 +44.6% +10.0% +5.6% 267 51.9 264 +21.8 500 2002 458 1998
More informationuntitled
NPO JNSA 3,500() 2003122 ISBN4-8443-1858-6 Copyright (c) 2003-2004 NPO Page 2 個人情報の社会状況 DMがよく届く 不正アクセス ウイルス 内部からの漏洩 電話勧誘が多い 外部 (インターネット) からの漏洩 サービス利用 名簿業者など 個人情報の提供 事業者 個人情報の売買 漏洩 情報主体 (本人) 何から行なえば良いか
More informationLinux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish
Linux Activities for Promoting Desktop Linux Utilization Jun Iio iiojun@mri.co.jp 100-8141 2-3-6 Research Center for Information Technology, Mitsubishi Research Institute, Inc. 2-3-6 Otemachi, Chiyoda-ku,
More information,255 7, ,355 4,452 3,420 3,736 8,206 4, , ,992 6, ,646 4,
30 8 IT 28 1,260 3 1 11. 1101. 1102. 1103. 1 3 1,368.3 3 1,109.8 p.5,p.7 2 9,646 4,291 14.5% 10,p.11 3 3,521 8 p.13 45-49 40-44 50-54 019 5 3 1 2,891 3 6 1 3 95 1 1101 1102 1103 1101 1102 1103 1 6,255
More informationIT 製品のセキュリティ認証の新たな枠組みの動向と展望
vol.9 2015 技術動向レポート 情報研究通信部 情報セキュリティ評価室 室長 金子浩之 マネジャー大堀雅勝 IT 分野の製品を対象としたCommon Criteria(CC) に基づくITセキュリティ評価 認証制度は セキュリティ要求の共通化や認証に係る期間短縮 トータルコストの低減を目標に より合理的な仕組みへの転換を図りつつある 本稿ではCC 認証の国際相互承認に関する制度改革に向けた取組みを解説する
More informationモバイルプリペイド決済の実現モデルの調査研究
ECOM 2005 Gift 1...1 2...4 2.1... 4 2.2... 5 2.2.1... 5 2.2.2... 7 2.2.3... 8 2.2.4... 9 2.3... 10 2.3.1... 10 2.3.2... 12 2.3.3... 14 3... 16 3.1... 17 3.1.2... 18 3.1.3... 20 3.1.4... 21 3.1.5... 23
More informationIT IT IT
HOKUDEN INFORMATION SYSTEM SERVICE H u m a n i t y I n n o v a t i o n S i n c e r i t y & S e c u r i t y S a t i s f a c t i o n IT IT IT Business Data Center Network HISS Humanity Innovation Sincerity
More information実教の教科書_H24+
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Information Technology Multimedia&Communication 18 19 20 21 22 23 13,650 14,700 21,000 12,600 21,000 9,450 21,000 14,700 21,000 12,600 21,000 9,450 21,000 14,700
More informationuntitled
IT 15 5 30 57 17 4 5 47 1 1 Q&A 2 17 11 4 6 11 12 13 14 16 19 20 23 10 26 11 29 12 33 13 34 14 34 15 35 16 35 17 36 18 37 19 38 20 39 21 43 22 43 23 43 24 43 25 44 26 44 27 44 28 44 29 44 30 45 48 51 53
More information-. 1. 2. 3. 4.. 1. 2. 3. ITIT BPRM&A.. 1. 2. 3. 4.. 1. ABLM&A 2...
FAX 0333580037 13 10 13 10 B1141 112644 612649 18,000 180,000 200,000 212645 712650 312646 412647 812651 912652 10 512648 1012653 DVD-ROM 12654 - FAX 160-8520 19 TEL03-3358-2891 FAX03-3358-0037 160-8520
More information平成14年度 電子商取引に関する市場規模・実態調査
IT ECOM 10 BtoB BtoC( ) BtoB BtoC 2002 5 2007 BtoB BtoG e BtoC EC 538 3,332 103 51 / 52 BtoBBtoC BtoB BtoC Web 1.... 1 1.1.... 1 1.2.... 2 1.2.1.... 2 1.2.2. BtoB... 2 1.2.3. BtoC... 4 1.3.... 6 1.3.1....
More information1. 2. 3. 4. BBTower
2002 626 1. 2. 3. 4. BBTower 1. JPIX JPIX 2. idc DRM Digital Rights Management) Hub Hub FR DSLFTTH DRM . BBTower BBTower - IRI - AGC - IX, - Meet Me Room - - 3.5GIP ASP ASP IX IX ADSL Network Meet
More informationWEB
1 2 2 2 4 5 6 8 8 12 15 18 20 21 22 22 25 33 52 57 57 61 67 68 70 73 WEB 75 79 81 84 86 88 90 93 95 97 99 101 104 107 107 112 119 120 120 120 121 123 129 135 135 135 136 136 136 137 137 144 144 144 145
More information5 ISMS 5 4 PC PC USB PDA 2
3 3 1 2 1 1 2 4 1 2 1 1 1 5 ISMS 5 4 PC PC USB PDA 2 16 1 16 1 4 3 PC USB 4 5 1 6 6 506 507 507 6 5000 JIS 7 3 3 8 1 4 Web 2 15 16 9 1 OK 2 10 20 3 10 4 19 100 1 0 100 1000 1 11 3 10 50 A B C 3 4 10 50
More information集中講義 インターネットテクノロジー 第5回
5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of
More informationAGENDA
AGENDA IPA JPCERT ) A B C D F,,,,, H14.2 IPA/JNSA (CSR: Corporate Social Responsibility) ISMS ISO17799 BS7799 JISQ15001 ISO15408 Step1 Step2 ISMS Step3 Step4 Step5 Step6 Act Plan Check Do Management
More information証明書検証サーバ
(Certificate Validation Server) 2007/11/1 Version 1.09 (Certificate Validation Server) 1 2006/4/27 0.930 2 2007/5/8 0.940 / 3 2007/5/15 0.950 Solaris TOE Linux TOE ST 4 2007/5/23 0.960 ASE ( : ASE001-01)
More informationスライド 1
FISMA 1 1 2 3 4 1 ISO/IEC 27001) (27003,27004,27007 3416 2010 2 ) IPA 5 6 7 http://csrc.nist.gov/groups/sma/fisma/index.html 8 9 (2003-2008) 2008) 10 SP 800-53 FISMA SP 800-53 GISRA FISMA 2002/12/17 SP
More informationuntitled
i ii iii EC 1-1 1 (1) (2) 3,0005,000 3 1 Web 2 Web 1-1 3 (3) (4) 18111812 (5) (1) (2) Web 4 1-2 1 (3) (4) 1812191 (5) 5 1.1 Web 2-1 6 (1) 2-1 387 2-2 7 (2) Web 57% Web 28% 2-3 (3) 43% 56% 2 50%1 26% 2-2
More informationuntitled
Copyright 2008 IPAAll Rights Reserved 1 1. 2. 3. Copyright 2008 IPAAll Rights Reserved 2 IT IT IT Copyright 2008 IPAAll Rights Reserved http://www.jitec.jp/1_00topic/topic_20071225_shinseido.html 3 URL
More information20 15 14.6 15.3 14.9 15.7 16.0 15.7 13.4 14.5 13.7 14.2 10 10 13 16 19 22 1 70,000 60,000 50,000 40,000 30,000 20,000 10,000 0 2,500 59,862 56,384 2,000 42,662 44,211 40,639 37,323 1,500 33,408 34,472
More informationI? 3 1 3 1.1?................................. 3 1.2?............................... 3 1.3!................................... 3 2 4 2.1........................................ 4 2.2.......................................
More information- 2 -
- 2 - - 3 - (1) (2) (3) (1) - 4 - ~ - 5 - (2) - 6 - (1) (1) - 7 - - 8 - (i) (ii) (iii) (ii) (iii) (ii) 10 - 9 - (3) - 10 - (3) - 11 - - 12 - (1) - 13 - - 14 - (2) - 15 - - 16 - (3) - 17 - - 18 - (4) -
More information2 1980 8 4 4 4 4 4 3 4 2 4 4 2 4 6 0 0 6 4 2 4 1 2 2 1 4 4 4 2 3 3 3 4 3 4 4 4 4 2 5 5 2 4 4 4 0 3 3 0 9 10 10 9 1 1
1 1979 6 24 3 4 4 4 4 3 4 4 2 3 4 4 6 0 0 6 2 4 4 4 3 0 0 3 3 3 4 3 2 4 3? 4 3 4 3 4 4 4 4 3 3 4 4 4 4 2 1 1 2 15 4 4 15 0 1 2 1980 8 4 4 4 4 4 3 4 2 4 4 2 4 6 0 0 6 4 2 4 1 2 2 1 4 4 4 2 3 3 3 4 3 4 4
More information1 (1) (2)
1 2 (1) (2) (3) 3-78 - 1 (1) (2) - 79 - i) ii) iii) (3) (4) (5) (6) - 80 - (7) (8) (9) (10) 2 (1) (2) (3) (4) i) - 81 - ii) (a) (b) 3 (1) (2) - 82 - - 83 - - 84 - - 85 - - 86 - (1) (2) (3) (4) (5) (6)
More information橡jisq1500.PDF
JIS Q 15001 JIS Q 15001 105-0011 - - 03-3432-9387 Fax 03-3432-9417 E-mail info-privacy@jipdec.or.jp JIS Q 15001 107-8440 - - 03-3583-8002 Fax 03-3583-0462 JIS Q 15001 : 1999 Requirements for compliance
More information統合運用管理ソフトウェア FUJITSU Software Systemwalker 総合カタログ
FUJITSU Software Systemwalker FUJITSU Software Systemwalker ICT ICTICT ICT ICT FUJITSU Software SystemwalkerICTICT ICT ICT ICT ICT 1 Systemwalker ICT ICT ICT ICT ICT Systemwalker ICT ICT ICT ICT ICT ICT
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information1885 18 1949 24 1952 27 1985 60 1999 11 NTT 63 1869 2 . -. -. -.. -. -. -.. -. -. 3 78 51 48-68 71 . -. -. -.. -. -. + + 100Kbps ADSL 100Kbps ITU Internet Reports 2003: Birth of Broadband(20039) 400 400
More information平成15年度先進的情報技術活用モデルシステムの開発
2 3 IT SI (1) (2) (3) (4) 24 (1)(4) 61 FM CATV IT 500 320 8,000 16 12 4 1 5 CT NTT ADSL ()( MIL )(DICOM ) () MIL (Web) / Web 2 6 (Web)CT 3 7 ( ) 24 4 8 DICOM CT () 9 5 CMC() () () ()NTT-ME 10 ( ) () CT
More information1. 増大する脅威 2
IT セキュリティ評価 認証制度の 整備と今後の運用 2001 年 3 月 16 日 経済産業省商務情報政策局 情報セキュリティ政策室 1 1. 増大する脅威 2 サイバー空間における新たな脅威 ( イメージ ) PC サーバーサーバー PC ルーター インターネット ルーター インターネットは通信経路を誰も管理していない 人 ハード / ソフト 通信経路 ハード / ソフト 人 発信者 利用者による虚偽や不正ハード
More information02 01 02
02 01 02 Introduction 03 04 03 Usability 04 Usability & Technology Usability & Technology Technology 05 Color Scan 06 Paperless Paperless Fax Paperless 07 bizhub Document Output Copy & Print 08 Document
More informationJIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25
JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing
More information