...i A

Size: px
Start display at page:

Download "...i A"

Transcription

1

2 ...i A i

3 BIT ISO/IEC ii

4 IT ISO ISO ISO ISO IT iii

5 A 1

6 xdsl Web

7 2. 3 3

8 ( )

9 ( ) % % 10 12% 68% % % ( ) 5

10 2.1.3 BtoB BtoB ECOMNTT 13 ( ) BtoC BtoB , BtoC ECOMNTT 13 ( ) 6

11 W32/SQLSlammer Sapphire 2.6 IPA/ISEC (IPA/ISEC) IPA/ISEC JPCERT/CC 7

12 2.7 IPA/ISEC (IPA/ISEC) CATV ADSL ( )

13

14

15

16 3.1 OS 3.2 Web IP ADSL 12

17 ( ) VPN(Virtual Private Network) (1)

18 (2) IDSIntrusion Detection System 14

19 3.5 SI System Integrator

20 (3) VPN(Virtual Private Network) 3 VPN VPN VPN 3.7 VPN ADSL 3.8 VPN (4) IC PKIPublic Key Infrastructure 16

21 3.9 IC 15% GPKIGovernment Public Key Infrastructure 3.10 (5) 2 RSA DES 17

22 Web Web (1) 18

23 (2) VPN 3.15 ISP(Internet Service Provider) 4 19

24 3.16 (3) ISO/IEC BS7799ISMS Information Security Management System

25 (1) DoS Denial of Service attack 3.19 (2) 2 SI OEM 21

26 (3) 10% 15% 70%

27 VPNVirtual Private Network

28 , , ,836 6, % (2)(5) 1 BS7799 ISMS ISO/IEC % (4) 24

29 % (2)(3) / 6 30% xdslftthcatv ,700 ADSLISP (1)IT N-+I Network Guide (2) (3) (4) ,000 10,000 8,000 6,000 4,000 2,

30 (5) (1) VPN , ,261 90% 72% 7 e-japan 26

31 e-japan 23 8 (2) IDSIntrusion Detection System ISMS ASPApplication Service Provider 27

32 ISMS VPN Web (3) VPN 8 VPN ISPInternet Service Provider VPN xdsl IP-VPN VPN VPN VPN 28

33 VPN ADSL VPN (4) IC PKI PKI GPKI PKI ISMS GPKI 1 IC 29

34 1 PKI PKI (5) OS 2 e-japan ISMS OS 30

35 4.1.2 (1) ,700 SISystem Integration e-japan (2) 31

36 VPNADSL (3)

37 ISMS ISMS (1) 7% SI 33

38 (2) IT ,778 2, ,352 2,

39 (3) OS 35

40 IT IT 2% 4 CSIFBI % 1 64% VPN administration authorizationauthentication 3 e 1 36

41 25,000 20,000 15,000 10, ,

42 4.2.1 CSI 90% 93% IDS IDS , VPN PKI LAN IC VPN ,100 VPN IDS

43 ,

44 % 51.09% 48.91% 66.31% VPN 40

45 IT 1US ,000 25,000 20,000 15,000 10,000 5, , ,400 5,640 1, ,938 30,000 25,000 20,000 15,000 10,000 5, ,400 3,836 6, ,040 10, ,

46 IT 1.96 IT IT IT % 40.0% 30.0% 20.0% 17.1% % 10.0% 0.0% WITSADigital Planet

47 % 27% 25% 58% 29% 60% 79% 89% 90% 90% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% CSIComputer Security Issue & Trend Vol. VIII, No.1 Spring

48 (1) a) Windows Windows 44

49 Macintosh b) WindowsUNIX OS Macintosh (2) ISP 26% 45

50 (3) VPN ISP VPN VPN (4) PKI 70%

51 PKI 2 OS PKI e-japan (5) IC LAN GPKI 47

52 5.1.2 (1) (2) ISP (3) 48

53 SI ISMS (1) (2) (3) 49

54 IT IT IT ISMS

55 (1) (2) (3) 6.2 (1) IT ITSSIT 51

56 (2) 6.3 (1) ISMS (2) IT ISMS ISMS 100 ISO BS7799 ISMS IT (3) e-japan ISMS (4) IT 52

57 Web 53

58 B IT 54

59 IT IT IT IT 1.2 IT IT ISO ISMS Web

60 NITE CCCommon Criteria IPA 2 56

61 TCSECTrusted Computer System Evaluation Criteria TCSEC DC1C2B1B2B3A EC ITSECInformation Technology Security Evaluation CriteriaITSEC CC 1996 CCCommon Criteria ISO ISO/IEC

62 TCSECITSECISO/IEC TCSEC ITSEC CCISO/IEC (IPA/ISEC)IT CC CC MRA MRA 5 CCEAL1EAL4 5 58

63 ISO/IEC ISO/IEC ISO/IEC ISO/IEC CC Introduction and general model 2Security functional requirements 3Security assurance requirements ISO/IEC Protection ProfilePPSecurity TargetSTST PP 2 3 ST PP ST PP PP ST ST PP 2 59

64 3 10 PP ST ISO/IEC JIS X 5070 JIS ISO/IEC

65 2.3 TOE Target of Evaluation PP ISO/IEC NITE 1-4 NITE NITE NITE TOE PP ST 61

66 TOE PP PPProtection Profile TOE 2 STSecurity Target NITE PP TOE ST ST ST TOE TOE ST TOE 2 ST 3 NITE IPA IT 62

67 (1) PPSTTOE (2) IT IT PPSTTOE IT IT IT IT IT 63

68 2.5.4 (1) A IC Protection ProfilePP PP2 2 1PPST B IC Security TargetST ~ C 64

69 Security TargetST Protection Profile PP Target of Evaluation TOE IC Security TargetSTProtection ProfilePP Target of EvaluationTOE 10 NITE 1 1 2, E Target of EvaluationTOE 1 2 3ISO/IEC

70 (2) IT N= N= % 28% N=35 IT 33% 33% N=275 IT N=275 10% N=144 N=275 50% 50% 50% A B C D E PPTOE PPTOE ST 66

71 2.7 A.B.C. BE ABC. ACDE (1) PP ST ST PPSTTOE ST 2 3 (2) PP ST PPSTTOE NITEST PP TOE ISO9000 ISMS 67

72 2.6.2 (1) 2 ST 7 NITE 12 ST (2) (3) (4) EAL EAL3 2 EAL4 IT EAL (1) ISO/IEC ISO/IEC

73 PP ST PPST PP ST PP ST (1) ST 2 3 TOE (2) PP ST PP ST IC ST (1) ST ISO/IEC PP TOE ST ST ST ISO/IEC ST ISO/IEC (2) Linux Sendmail 69

74 ISO/IEC ST 2.8 A B C D E ST 70

75 3. IT ISO ISO ISO ISO9000 ISO 71

76 3.2.2 ISO ISO/IEC ISO e (1) 2 (2) 72

77 (3) ISMS PR (1) (2) EAL4 (3) 73

78 3.3.4 ISO9000 1/

79 NITE 20 ECSEC JEITA NITE 1 JEITA ECSEC ECSEC IT N=275 IT N=80 N=275 IT N=275 10% N= IT 3 75

80 10% 7 10% ST ~2 4.4 ISO ISO9000 ISO

81 , ISO ISO14000 ISO , ISO9000 ISO9000 ISO IT 2 1 A 1 B 77

82 4.5.1 (1) A NITE ECSEC (2) B VPNIC PKI VPNIC PKI VPN9 IC 8 19 PKI 7 5 1/3 78

83 A B A B ISO

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.

More information

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1

Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.

More information

2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii

2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101

More information

CIA+

CIA+ ECOM 200511 e ECOM CIA+ Integrity Confidentiality Availability Phishing fishing http://www.nikkeibp.co.jp/ http://www.nikeibp.co.jp/ DoSDenial of Service DoS IT IT ROI 1/2 2/2 DMZ IT TESEC( Common

More information

Copyright

Copyright 2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

untitled

untitled IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS

More information

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

untitled

untitled TOE 21 7 22 IT 9053 C0217 TOE bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c

More information

untitled

untitled TOE TOE PP 20 3 25 (IT 8210) C0220 Hitachi Adaptable Modular Storage 2300 0862/ A-M EAL2 TOE 21 6 29 IT Common Criteria for Information Technology Security Evaluation Version 2.3 Common Methodology for

More information

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights 1 Internet Week 2001 ( ) kuma@isid.co.jp 2 CodeRed 1 3 (EXCEED ) se cu ri ty? 4? 2 5 Web IP Web MP3 6 3 7 1.5Mbps8Mbps 500 MP3 CM VoD 8 4 ADSL (Asymmetric Digital Subscriber Line) () CATV FWA (Fixed Wireless

More information

V ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE

V ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE V ERP Standard Edition 2009/03/16 1.23 V ERP Standard Edition 1 ST...3 1.1 ST...3 1.2 TOE...3 1.3 TOE...3 1.3.1 TOE...3 1.3.2...4 1.3.3 TOE...5 1.3.4 TOE...6 1.3.5 TOE //...8 1.4 TOE...9 1.4.1 TOE...9

More information

1. 2

1. 2 2004 1. 2. 1. 2 Web 3 4 5 6 PDA 7 USB CD DVD 8 9 10 11 LAN 12 13 14 P2P Web USB CD,DVD PDA 15 CD,DVD USB 16 17 18 19 VPN 20 PC 21 LAN 22 23 24 ISO/IEC17799 25 26 27 28 29 DDoS DoS DoS DDoS DoS ( ) ( )

More information

ST作成の手引

ST作成の手引 7 3 1.2 1 ST ST ST ST ST CC TOE TOE TOE IT TOE TOE TOE IT TOE TOE TOE PP PP PP PP PP 2 ISO/IEC 15408( 1999) Evaluation Criteria for IT SecurityCC JIS X5070(2000) ST CC ST ST CC ST ST CC IT CCCommon Criteria

More information

untitled

untitled 17 9 15 IT 5061 C0047 TOE imagio D DataOverwriteSecurity Unit Type C Software TOE V0.04 PP EAL2 TOE TOE 18 3 24 IT Common Criteria for Information Technology Security Evaluation Version 2.1 Common Methodology

More information

2011 4-1 - 2006/3/10 2006/4/21 2006/6/16 1. 9.3.5 2. ST ST 3. 2006/8/4 2007/11/9 ( ) 2008/9/8 ( ) 2011/4/21 1. 2. 3. - 2 - 1... 5 2... 5 2.1 NISD-K304-101... 5 2.2... 6 3... 6 4... 7 5... 7 5.1... 8 5.2...

More information

Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,

Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS, Information Security Management System ISMS ISO/IEC 27001 ISMS () ISMS ISMS 200512 Copyright JIPDEC ISMS, 2005 1 Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,

More information

目次! ISO/IEC の意義! ISO/IEC の運用! 欧米の対応と製品評価状況! ISO/IEC の内容! 日本の取り組み 2

目次! ISO/IEC の意義! ISO/IEC の運用! 欧米の対応と製品評価状況! ISO/IEC の内容! 日本の取り組み 2 ISO/IEC 15408 セミナー ISO/IEC 15408(Common Criteria) 概要 平成 12 年 3 月情報処理振興事業協会 (IPA) セキュリティセンター 1 目次! ISO/IEC 15408 の意義! ISO/IEC 15408 の運用! 欧米の対応と製品評価状況! ISO/IEC 15408 の内容! 日本の取り組み 2 ISO/IEC 15408 の意義 3 セキュリティ評価の必要性

More information

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN 1 Internet Week 2002 20021218() 9:3012:30 () kuma@isid.co.jp ADSLFTTH 24 IP LAN LAN LAN 2 1 ? 3? 4 e-japan 20053000 20051000 2 IP»» 5 CATV DSL FTTH LAN 6 620(20029) CATV 180DSL 422FTTH 12 14 3 MP3CD CM

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

Microsoft Word - 保守運用ガイドライン_080122CSAJ修正.doc

Microsoft Word - 保守運用ガイドライン_080122CSAJ修正.doc i ii 1...1 2...2...3 4...4 5...4...5 7...12 1...1 2...4 3...5...6...6 6...7 7... 11 8 FOSS...13 9...15 10...16 11...17...18...18 14...18 15...19 16 JIS Q 20000...20 iii 1 1 1 1 1 1 2 3 2 4 5 WG 2 4 5 CSAJ/JCSSA

More information

国際連携-2.doc

国際連携-2.doc 13 G2 13 2001 2006 14 3 1998 1999 ECOM 2000 ECOM 4 ECOM () BtoB BtoC2001 5 2001 9 2002 1 BtoB BtoB BtoG( ) BtoB e BtoC 2002 3 ... 1 1... 15 1.1...15 1.1.1...15 1.1.2...16 1.1.3...17 1.2...17 1.2.1...18

More information

Information Security Management System ISMS Copyright JIPDEC ISMS,

Information Security Management System ISMS Copyright JIPDEC ISMS, ISMS Copyright JIPDEC ISMS, 2005 1 Copyright JIPDEC ISMS, 2005 2 Copyright JIPDEC ISMS, 2005 3 Copyright JIPDEC ISMS, 2005 4 ISO JIS JIS ISO JIS JIS JIS ISO JIS JIS 22 23 ISO SC27 ISO SC27 ISO/IEC 17799

More information

今企業が取るべきセキュリティ対策とは策

今企業が取るべきセキュリティ対策とは策 AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.

More information

はじめに

はじめに 27 1. 28 2. 3. 4. 5. 30 31 SCM 2 33 SCM 3 35 6. CMM CMMI ISO 36 7. 8. 37 SCM 38 9. 40 10. 2004 41 43 1.1 45 1.1.1 45 1 SCM 45 2 45 3 47 4 47 9 5 48 6 48 7 CMM Capability Maturity Model 48 1.1.2 49 1 SCM

More information

http://www.ipa.go.jp/security/ Contents 1. NIST 2010 2. NISC 3. CRYPTREC 2008 10 28 Copyrignt 2008, IPA all right reserved. 2 1977 MAC) PKI PKI PKI: (Public Key Infrastructure) 2008 10 28 Copyrignt 2008,

More information

1 基本的考え方

1 基本的考え方 ... 1 1.1. BCP(Business Continuity Plan) 1 1.2. BCP 2 1.3. BCP 6 1.4. 9... 10 2.1. BCP 10 2.2. 11 2.3. 12 2.4. BCP 14 2.5. BCP 15 BCP... 17 3.1. 17 3.3. BCP 19 3.4. 22 3.5. 24 3.6. 25 3.7. 26... 28 4.1.

More information

16

16 2005 16 2005 9 1... 1 1.1... 1 1.1.1... 1 1.1.2... 2 1.1.3... 2 1.2...3 1.2.1... 3 1.2.2... 8 1.2.3... 17 1.3... 19 1.3.1 BtoB EC... 20 1.3.2 BtoC EC... 22 1.3.3... 25 1.4... 25 1.4.1... 25 1.4.2... 28

More information

1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh.......

1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh....... 2001 1 1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh............................................... 3 1.2.2

More information

ECに関わる法的問題検討報告書

ECに関わる法的問題検討報告書 EC EC ECOM BtoB BtoC, 14 3 EC ECOM ( WG ) WG EC EC ( ) EC 1...1 1.1... 1 1.1.1... 3 1.1.2... 9 1.1.3... 13 1.1.4 PtoP Peer to Peer... 18 1.1.5... 23 1.1.6... 29 1.2... 32 1.2.1... 33 1.2.2... 35 1.2.3...

More information

幹部会、幹部懇談会の話題

幹部会、幹部懇談会の話題 生体認証における セキュリティ評価と国際標準化 2016 年 11 月 17 日 産業技術総合研究所 山田朝彦 1 本講演での 生体認証 Biometric verification(1:1) Biometric identification(1:n) は含まない 2 本講演での セキュリティ評価 セキュリティ評価とは 誰 ( 甲 ) のためのか A) 特定の組織 B) 不特定であるが目的 用途を同一とする組織

More information

2

2 1 2 3 14 IT IT IT e-japan IT IT 24 IT IT IT IT CAD CAD Conference 2003 300 Web 41,056 15 Web (3D) 3,569 CIAJ () JEITA CEATEC JAPAN 2002 754 17 e-business Solution Plaza 28 30 4 5 1. 17 1465() 285 185 1

More information

2004 SYN/ACK SYN Flood G01P014-6

2004 SYN/ACK SYN Flood G01P014-6 2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................

More information

untitled

untitled 1 BCP(Business Continuity Plan) 1 BCP 2 BCP 6 9 10 BCP 10 11 BCP 12 BCP 15 BCP 16 BCP 17 17 BCP 18 BCP 19 22 24 25 26 28 28 33 37 BCP 41 BCP BCP BCP BCP BCP BCP(Business Continuity Plan) 1 2 BCPBusiness

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

2003/07/ /08/ /09/ /09/ /09/ /10/ /11/ /11/ ASE ASE

2003/07/ /08/ /09/ /09/ /09/ /10/ /11/ /11/ ASE ASE Di3510 Di3510f Multi Function Peripheral Security Kit 1.18 2004 6 4 1 / 85 2003/07/31 1.00 2003/08/28 1.01 2003/09/02 1.02 2003/09/05 1.03 2003/09/12 1.04 2003/10/06 1.05 2003/11/12 1.06 2003/11/28 1.07

More information

Windows Macintosh 3 3 4 = 3 4 = 4 5 6 Windows Macintosh 7 8 9 Windows Macintosh 0 Windows Macintosh 3 4 5 Windows Macintosh Windows Macintosh 3 4 5 = Windows Macintosh 3 4 3 4 5 3 4 5 3 5 4 5 6 3 4 3 5

More information

5005-toku3.indd

5005-toku3.indd 3 1 CMMICMM Capability Maturity Model ISO : International Organization for Standardization IEC : International Electrotechnical CommissionJTC1 : Joint Technical Committee 1SC7 : Sub Committee 7 SC7 WG

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

Testing XML Performance

Testing XML Performance - DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information

1 47 200 300 1 1 25172005 1

1 47 200 300 1 1 25172005 1 8... 1... 24... 55 3... 75... 93 17 2005 1 47 200 300 1 1 25172005 1 8 pdf 1 2 9 1812 6 3 1832 11 7 1836 1 2 2 4 9 1997 2 2 101813 1 1 9 5 4 7 3 12 3 4 7 10 6 3 10 6 3 12 5 3 A 10 5 B 4 C 10 7 D 3 E 5

More information

目  次 (案)

目  次 (案) ... 1... 1...2...3...3...11...13...17...18...18...20...42...42...43...54...54...56... 2005 4 2004 3 3 JEITA 1 JEITA JEITA JEITA 2 17 2 9 15 9 12 24 10 29 11 30 (12 27 3 3 13 3 12 28 10 22 11 14 3 19 12

More information

資料9 表紙.doc

資料9 表紙.doc 2003 (%) (%) 1 2 3 4 5 6 1997 1998 1999 2000 2001 2002 ( ) 1,155 1,694 2,706 4,708 5,593 6,942 (%) 68.2 80.0 88.6 95.8 97.6 98.4 (%) 12.3 19.2 31.8 44.8 68.0 79.1 (%) 6.4 11.0 19.1 34.0 60.5 81.4 5 300

More information

2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN

More information

平成17年度 マスターセンター補助事業

平成17年度 マスターセンター補助事業 - 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - IC IC - 29 - IT

More information

11夏特集号初校.indd

11夏特集号初校.indd 1 2 3 5 50 40 7 6 3 ABC 3 5 A 5% B C 100 3 1 2 3 A 5% 5% 5% B 10% 5% 0% C 20% 10% 15% A 15.8% 15.0% 0.8% B 15.5% 15.0% 0.5% C 12.2% 15.0% 2.8% 2,000 1,500 1,000 500 0 10% 5% 3% 1% 01 5 10 15 20 25 30

More information

橡最終報告書.PDF

橡最終報告書.PDF ... 1... 1... 4... 6... 9...11...11...12...12...12... 13...14... 14...16...17...17...18...18...19...22...23...24...24...27...29...29...31 ...33...34...34...34...36...36...36...36...36...39...40...40...41...45...45...45...45...45...46...46...47...49...49...49...50...51...53...53...54...55...56...56...57...57

More information

untitled

untitled 7/67/1073,42911 15,020158,393 7/127/184,6674,913 2927 71.3 894 21.8 287 7.0 n=4108) 132 3.2 62 1.5 934 22.7 786 19.1 629 15.3 801 19.5 407 9.9 357 8.7 (n=4108) 35 35 30 25 20 15 10 153 3.7 1 0.02 23 0.6

More information

01.表紙.PDF

01.表紙.PDF IC CRM IT 3 i ii iii iv v vi vii viii .......................................... .................................... -0.3% t-co 2 217-4.0% +5.0 +44.6% +10.0% +5.6% 267 51.9 264 +21.8 500 2002 458 1998

More information

untitled

untitled NPO JNSA 3,500() 2003122 ISBN4-8443-1858-6 Copyright (c) 2003-2004 NPO Page 2 個人情報の社会状況 DMがよく届く 不正アクセス ウイルス 内部からの漏洩 電話勧誘が多い 外部 (インターネット) からの漏洩 サービス利用 名簿業者など 個人情報の提供 事業者 個人情報の売買 漏洩 情報主体 (本人) 何から行なえば良いか

More information

Linux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish

Linux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish Linux Activities for Promoting Desktop Linux Utilization Jun Iio iiojun@mri.co.jp 100-8141 2-3-6 Research Center for Information Technology, Mitsubishi Research Institute, Inc. 2-3-6 Otemachi, Chiyoda-ku,

More information

,255 7, ,355 4,452 3,420 3,736 8,206 4, , ,992 6, ,646 4,

,255 7, ,355 4,452 3,420 3,736 8,206 4, , ,992 6, ,646 4, 30 8 IT 28 1,260 3 1 11. 1101. 1102. 1103. 1 3 1,368.3 3 1,109.8 p.5,p.7 2 9,646 4,291 14.5% 10,p.11 3 3,521 8 p.13 45-49 40-44 50-54 019 5 3 1 2,891 3 6 1 3 95 1 1101 1102 1103 1101 1102 1103 1 6,255

More information

IT 製品のセキュリティ認証の新たな枠組みの動向と展望

IT 製品のセキュリティ認証の新たな枠組みの動向と展望 vol.9 2015 技術動向レポート 情報研究通信部 情報セキュリティ評価室 室長 金子浩之 マネジャー大堀雅勝 IT 分野の製品を対象としたCommon Criteria(CC) に基づくITセキュリティ評価 認証制度は セキュリティ要求の共通化や認証に係る期間短縮 トータルコストの低減を目標に より合理的な仕組みへの転換を図りつつある 本稿ではCC 認証の国際相互承認に関する制度改革に向けた取組みを解説する

More information

モバイルプリペイド決済の実現モデルの調査研究

モバイルプリペイド決済の実現モデルの調査研究 ECOM 2005 Gift 1...1 2...4 2.1... 4 2.2... 5 2.2.1... 5 2.2.2... 7 2.2.3... 8 2.2.4... 9 2.3... 10 2.3.1... 10 2.3.2... 12 2.3.3... 14 3... 16 3.1... 17 3.1.2... 18 3.1.3... 20 3.1.4... 21 3.1.5... 23

More information

IT IT IT

IT IT IT HOKUDEN INFORMATION SYSTEM SERVICE H u m a n i t y I n n o v a t i o n S i n c e r i t y & S e c u r i t y S a t i s f a c t i o n IT IT IT Business Data Center Network HISS Humanity Innovation Sincerity

More information

実教の教科書_H24+

実教の教科書_H24+ 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Information Technology Multimedia&Communication 18 19 20 21 22 23 13,650 14,700 21,000 12,600 21,000 9,450 21,000 14,700 21,000 12,600 21,000 9,450 21,000 14,700

More information

untitled

untitled IT 15 5 30 57 17 4 5 47 1 1 Q&A 2 17 11 4 6 11 12 13 14 16 19 20 23 10 26 11 29 12 33 13 34 14 34 15 35 16 35 17 36 18 37 19 38 20 39 21 43 22 43 23 43 24 43 25 44 26 44 27 44 28 44 29 44 30 45 48 51 53

More information

-. 1. 2. 3. 4.. 1. 2. 3. ITIT BPRM&A.. 1. 2. 3. 4.. 1. ABLM&A 2...

-. 1. 2. 3. 4.. 1. 2. 3. ITIT BPRM&A.. 1. 2. 3. 4.. 1. ABLM&A 2... FAX 0333580037 13 10 13 10 B1141 112644 612649 18,000 180,000 200,000 212645 712650 312646 412647 812651 912652 10 512648 1012653 DVD-ROM 12654 - FAX 160-8520 19 TEL03-3358-2891 FAX03-3358-0037 160-8520

More information

平成14年度 電子商取引に関する市場規模・実態調査

平成14年度 電子商取引に関する市場規模・実態調査 IT ECOM 10 BtoB BtoC( ) BtoB BtoC 2002 5 2007 BtoB BtoG e BtoC EC 538 3,332 103 51 / 52 BtoBBtoC BtoB BtoC Web 1.... 1 1.1.... 1 1.2.... 2 1.2.1.... 2 1.2.2. BtoB... 2 1.2.3. BtoC... 4 1.3.... 6 1.3.1....

More information

1. 2. 3. 4. BBTower

1. 2. 3. 4. BBTower 2002 626 1. 2. 3. 4. BBTower 1. JPIX JPIX 2. idc DRM Digital Rights Management) Hub Hub FR DSLFTTH DRM . BBTower BBTower - IRI - AGC - IX, - Meet Me Room - - 3.5GIP ASP ASP IX IX ADSL Network Meet

More information

WEB

WEB 1 2 2 2 4 5 6 8 8 12 15 18 20 21 22 22 25 33 52 57 57 61 67 68 70 73 WEB 75 79 81 84 86 88 90 93 95 97 99 101 104 107 107 112 119 120 120 120 121 123 129 135 135 135 136 136 136 137 137 144 144 144 145

More information

5 ISMS 5 4 PC PC USB PDA 2

5 ISMS 5 4 PC PC USB PDA 2 3 3 1 2 1 1 2 4 1 2 1 1 1 5 ISMS 5 4 PC PC USB PDA 2 16 1 16 1 4 3 PC USB 4 5 1 6 6 506 507 507 6 5000 JIS 7 3 3 8 1 4 Web 2 15 16 9 1 OK 2 10 20 3 10 4 19 100 1 0 100 1000 1 11 3 10 50 A B C 3 4 10 50

More information

集中講義 インターネットテクノロジー 第5回

集中講義 インターネットテクノロジー 第5回 5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of

More information

AGENDA

AGENDA AGENDA IPA JPCERT ) A B C D F,,,,, H14.2 IPA/JNSA (CSR: Corporate Social Responsibility) ISMS ISO17799 BS7799 JISQ15001 ISO15408 Step1 Step2 ISMS Step3 Step4 Step5 Step6 Act Plan Check Do Management

More information

証明書検証サーバ

証明書検証サーバ (Certificate Validation Server) 2007/11/1 Version 1.09 (Certificate Validation Server) 1 2006/4/27 0.930 2 2007/5/8 0.940 / 3 2007/5/15 0.950 Solaris TOE Linux TOE ST 4 2007/5/23 0.960 ASE ( : ASE001-01)

More information

スライド 1

スライド 1 FISMA 1 1 2 3 4 1 ISO/IEC 27001) (27003,27004,27007 3416 2010 2 ) IPA 5 6 7 http://csrc.nist.gov/groups/sma/fisma/index.html 8 9 (2003-2008) 2008) 10 SP 800-53 FISMA SP 800-53 GISRA FISMA 2002/12/17 SP

More information

untitled

untitled i ii iii EC 1-1 1 (1) (2) 3,0005,000 3 1 Web 2 Web 1-1 3 (3) (4) 18111812 (5) (1) (2) Web 4 1-2 1 (3) (4) 1812191 (5) 5 1.1 Web 2-1 6 (1) 2-1 387 2-2 7 (2) Web 57% Web 28% 2-3 (3) 43% 56% 2 50%1 26% 2-2

More information

untitled

untitled Copyright 2008 IPAAll Rights Reserved 1 1. 2. 3. Copyright 2008 IPAAll Rights Reserved 2 IT IT IT Copyright 2008 IPAAll Rights Reserved http://www.jitec.jp/1_00topic/topic_20071225_shinseido.html 3 URL

More information

20 15 14.6 15.3 14.9 15.7 16.0 15.7 13.4 14.5 13.7 14.2 10 10 13 16 19 22 1 70,000 60,000 50,000 40,000 30,000 20,000 10,000 0 2,500 59,862 56,384 2,000 42,662 44,211 40,639 37,323 1,500 33,408 34,472

More information

I? 3 1 3 1.1?................................. 3 1.2?............................... 3 1.3!................................... 3 2 4 2.1........................................ 4 2.2.......................................

More information

- 2 -

- 2 - - 2 - - 3 - (1) (2) (3) (1) - 4 - ~ - 5 - (2) - 6 - (1) (1) - 7 - - 8 - (i) (ii) (iii) (ii) (iii) (ii) 10 - 9 - (3) - 10 - (3) - 11 - - 12 - (1) - 13 - - 14 - (2) - 15 - - 16 - (3) - 17 - - 18 - (4) -

More information

2 1980 8 4 4 4 4 4 3 4 2 4 4 2 4 6 0 0 6 4 2 4 1 2 2 1 4 4 4 2 3 3 3 4 3 4 4 4 4 2 5 5 2 4 4 4 0 3 3 0 9 10 10 9 1 1

2 1980 8 4 4 4 4 4 3 4 2 4 4 2 4 6 0 0 6 4 2 4 1 2 2 1 4 4 4 2 3 3 3 4 3 4 4 4 4 2 5 5 2 4 4 4 0 3 3 0 9 10 10 9 1 1 1 1979 6 24 3 4 4 4 4 3 4 4 2 3 4 4 6 0 0 6 2 4 4 4 3 0 0 3 3 3 4 3 2 4 3? 4 3 4 3 4 4 4 4 3 3 4 4 4 4 2 1 1 2 15 4 4 15 0 1 2 1980 8 4 4 4 4 4 3 4 2 4 4 2 4 6 0 0 6 4 2 4 1 2 2 1 4 4 4 2 3 3 3 4 3 4 4

More information

1 (1) (2)

1 (1) (2) 1 2 (1) (2) (3) 3-78 - 1 (1) (2) - 79 - i) ii) iii) (3) (4) (5) (6) - 80 - (7) (8) (9) (10) 2 (1) (2) (3) (4) i) - 81 - ii) (a) (b) 3 (1) (2) - 82 - - 83 - - 84 - - 85 - - 86 - (1) (2) (3) (4) (5) (6)

More information

橡jisq1500.PDF

橡jisq1500.PDF JIS Q 15001 JIS Q 15001 105-0011 - - 03-3432-9387 Fax 03-3432-9417 E-mail info-privacy@jipdec.or.jp JIS Q 15001 107-8440 - - 03-3583-8002 Fax 03-3583-0462 JIS Q 15001 : 1999 Requirements for compliance

More information

統合運用管理ソフトウェア FUJITSU Software Systemwalker 総合カタログ

統合運用管理ソフトウェア FUJITSU Software Systemwalker 総合カタログ FUJITSU Software Systemwalker FUJITSU Software Systemwalker ICT ICTICT ICT ICT FUJITSU Software SystemwalkerICTICT ICT ICT ICT ICT 1 Systemwalker ICT ICT ICT ICT ICT Systemwalker ICT ICT ICT ICT ICT ICT

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

1885 18 1949 24 1952 27 1985 60 1999 11 NTT 63 1869 2 . -. -. -.. -. -. -.. -. -. 3 78 51 48-68 71 . -. -. -.. -. -. + + 100Kbps ADSL 100Kbps ITU Internet Reports 2003: Birth of Broadband(20039) 400 400

More information

平成15年度先進的情報技術活用モデルシステムの開発

平成15年度先進的情報技術活用モデルシステムの開発 2 3 IT SI (1) (2) (3) (4) 24 (1)(4) 61 FM CATV IT 500 320 8,000 16 12 4 1 5 CT NTT ADSL ()( MIL )(DICOM ) () MIL (Web) / Web 2 6 (Web)CT 3 7 ( ) 24 4 8 DICOM CT () 9 5 CMC() () () ()NTT-ME 10 ( ) () CT

More information

1. 増大する脅威 2

1. 増大する脅威 2 IT セキュリティ評価 認証制度の 整備と今後の運用 2001 年 3 月 16 日 経済産業省商務情報政策局 情報セキュリティ政策室 1 1. 増大する脅威 2 サイバー空間における新たな脅威 ( イメージ ) PC サーバーサーバー PC ルーター インターネット ルーター インターネットは通信経路を誰も管理していない 人 ハード / ソフト 通信経路 ハード / ソフト 人 発信者 利用者による虚偽や不正ハード

More information

02 01 02

02 01 02 02 01 02 Introduction 03 04 03 Usability 04 Usability & Technology Usability & Technology Technology 05 Color Scan 06 Paperless Paperless Fax Paperless 07 bizhub Document Output Copy & Print 08 Document

More information

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing

More information