橡最終報告書.PDF
|
|
- なごみ かつもと
- 7 years ago
- Views:
Transcription
1
2
3
4
5
6 TOE PP PP...82 PP...83 PP
7
8
9
10
11
12
13
14 9
15 Network Security Technology Dr. Stephen D. Bryen Development Plan for Plant Network Security Technology Mr. Fukuyama Measuring Network Risk Dr. Stephen D. Bryen New Risk Analysis Methodology Development for Network Mr. Koshijima Non-technical Approaches to CIP Dr. Irwin M. Pikus Establishment of Security guideline on plant network Mr. Hinoki Application of ISO/IEC into Plant Network Mr. Miyakawa Security of Networked System Shell companies --and Beyond-- Mr. Pieter van Dijken Security management in the Fibers and Chemical industry Mr. Robert T. George Survey Report Mr. Isomura
16
17 Ethernet 2
18 ERP( Enterprise Resource Planning ) PIMS (Plant Information Management System ) TCP/IP 3
19 4
20 5 Gate Way Firewall WAN PBX Firewall PC -1-2 LAN PHS PC RAS PLC PLC OA R/M LAN OALAN o o o o o o Gate Way o o o o o o EWS A LAN LAN R/M Gate Way B LAN Firewall
21 6
22 7
23 8
24 9
25 10
26 11
27 12
28 13
29 14 Common Criteria Protection Profile
30 15
31 Dr. Irwin M. Pikus Director, Communications and Information Infrastructure Assurance Program, U.S. Department of Commerce, NTIA Dr. Stephen D. Bryen Managing Partner, Aurora Marketing & Business Development Mr. Robert T. George Manager, Benchmarking Programs, DuPont Informatuin Security OrganizationE.I. DuPont de Nemours & Co. Mr. Pieter van Dijken ITS ( Information Security Services ) International B.V. Shell Services 16
32
33 4 5 18
34 19
35 ( 1) ( 2) 1-3 Communications i = j k l i = -3 Communications 2 20
36 6 6 21
37 7 Sicherheit 7 8 The Oxford Encyclopedic English Dictionary 22
38 23
39 (Guideline for the Management of IT Security) (British Standard 7799) 24
40 25
41 () 3 26
42 Future Vision Company Policy Top Management Security Policy Deployment Section Management Section Section Section 4 27
43 28
44 29
45 9 30
46 31
47 32
48 Increasing Increasing threats threats from from espionage espionage and and information information brokers: brokers: Information Information Warfare Warfare Fraud Fraud increasing increasing with with restructuring restructuring & economic economic pressures pressures Increasing sophistication sophistication of of viruses, viruses, hacker hacker groups, groups, involvement involvement organised organised crime crime Information security: Trends in threats Threats to Confidentiality Threats to Integrity Threats to Availability Malicious Espionage, Leaks Fraud, Mischief Sabotage, Vandalism Theft Accidental Oversights, Breaches Safety Safety critical critical systems Errors, systems cause cause Failures concern, concern, Y2K Y2K Breakdowns Theft Theft of of notebooks notebooks Information warfare Security for Critical National Infrastructure sept/oct1999 PSEC copyright Large-Scale Network Security Committee All right reserved 1.Oct Shell Services International Shell Services International 5 33
49 34
50 35
51 36
52 37
53 (1) (2) (3) (4) 38
54 39
55 40
56 41
57 () (3) (4) (3) (3) (3) (3) (3) (3) (X) (3) (X) (2) (X) (6) (X) (4) (1) (2) 42
58 () (3) (3) (3) (3) (3) (3) 43
59 44
60 45
61 46
62 47
63 48
64 49
65 50
66 51
67 52
68 10 PC 10 53
69 11 54
70 E3(Intrude to DCS) F4(Alter Control Parameters) Preliminary Risk Analysis (PRA) Hazard and Operability studies (HAZOP) Failure Mode and Effects Analysis (FMEA/FMECA) 2 Fault Tree Analy sis (FTA) Event Tree Analysis (ETA) ( FTA ETA Dynamic Event Tree Analysis Method (DETAM) Cause-Consequence Analysis (CCA) 1 55
71 2 HAZOP FTA/ETA HAZOP 56
72 FTA/ETA HAZOP FTA/ETA HAZOP FTA/ETA HAZOP FTA/ETA HAZOP a) CAD b) c) d) e) HAZOP d) e)2 2 57
73 2 LAN DCS 2 58
74 HAZOP 2 FTA/ETA FTA/ETA 1) PC Access to the Network PC. 2) DCS 3) DCS 4) 5). 6) 2 FTA/ETA 2 FTA/ETA 59
75 2 FTA/ETA : FTA = = : FTA = = FTA FTA FTA/ETA FTA FTA 60
76 61 2 OS OS OS
77 FT 2 FT ETFT FT FT FT ET+FT FT ET 62
78 FTA/ETA DCS UNIX su FT FT FT FT 63
79 FTA UNIX su 64
80 FT FT 65
81 FTA/ETA FT FTAETA, HAZOP 66
82 FTA ETA, HAZOP FTA FTA 67
83 ISO/IEC PDD63President Decision Directive
84 Common Criteria CC CC (*1) CC CC CC 69
85 1 CC Part1 Part2 Part3 Part1 CC Security TargetST ST Protection ProfilePP Part2 70
86 Part3 Part2 EAL:Evaluation Assurance Level PP PP EAL ST ST ST ST ST PP PP ST ST 71
87 2ISO/IEC (Common Criteria) ST ST PP PP PP ISO/IEC ST PP ST ST PP PP PP PP 72
88 PP PP PP CC
89 Security audit FAU Communication FCO Cryptographic support FCS FDP User data protection FIA Identification and authentication FMT Security Management ex. DB FPR Privacy TOE FPT Protection of the TOE Security Function Resource utilization FRU TOE TOE access FTA TOE FTP TOE Trusted path/channels *1 ISO/IEC/JTC 1/SC 27/WG 3 Common Criteria v.2 International Standard
90 TOE PP PP PP PP PP PP PP 75
91 TOE TOE 6TOE (Target Of Evaluation) TOE LAN LAN 76
92 6TOE (Target Of Evaluation) 77
93 TOE CC ISO/IEC Annex B (*2) PP LAN LAN LAN LAN # LAN LAN LAN LAN LAN TCP/IP + # DCOM LAN # # 78
94 79 TCP/IP LAN 2. # LAN 3. LAN LAN # LAN 2. # 3.
95 80 4. # # 5. LAN LAN # LAN DCOM # #
96 81 # LAN LAN # CPU 2. # # PP # PP
97 82
98 PP PP PP PP TOE PBX 83
99 PP 4. PP PP PP TOE RAS PP 84
100 85
101 86
102 87
103 ISO 88
104 89
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationCopyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1
Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved. 1 ISO/IEC 15408 ISO/IEC 15408 Copyright(C) 2002 Information-technology Promotion Agency, Japan All rights reserved.
More informationCIA+
ECOM 200511 e ECOM CIA+ Integrity Confidentiality Availability Phishing fishing http://www.nikkeibp.co.jp/ http://www.nikeibp.co.jp/ DoSDenial of Service DoS IT IT ROI 1/2 2/2 DMZ IT TESEC( Common
More informationV ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE
V ERP Standard Edition 2009/03/16 1.23 V ERP Standard Edition 1 ST...3 1.1 ST...3 1.2 TOE...3 1.3 TOE...3 1.3.1 TOE...3 1.3.2...4 1.3.3 TOE...5 1.3.4 TOE...6 1.3.5 TOE //...8 1.4 TOE...9 1.4.1 TOE...9
More informationuntitled
TOE 21 7 22 IT 9053 C0217 TOE bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c bizhub C652 / bizhub C552 / ineo + 652 / ineo + 552 / VarioLink 6522c / VarioLink 5522c
More information2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii
2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationuntitled
TOE TOE PP 20 3 25 (IT 8210) C0220 Hitachi Adaptable Modular Storage 2300 0862/ A-M EAL2 TOE 21 6 29 IT Common Criteria for Information Technology Security Evaluation Version 2.3 Common Methodology for
More information2: CCMB
2: 2009 7 3.1 3 CCMB-2009-07-002 21 12 1.0 IPA IT Common Criteria( CC ) Common Criteria for Information Technology Security Evaluation Part2: Security functional components Version 3.1 Revision 3 Final
More information今企業が取るべきセキュリティ対策とは策
AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.
More informationISMSクラウドセキュリティ認証の概要
Copyright JIPDEC ISMS, 2016 1 ISMS ISO/IEC 27017:2015 Copyright JIPDEC ISMS, 2016 2 JIS Q 27001(ISO/IEC 27001) ISO/IEC 27017 ISMS ISO/IEC 27017 ISO/IEC 27002 Copyright JIPDEC ISMS, 2016 3 ISO/IEC 27017:2015
More information...i A
...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20
More informationスライド 1
IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS
More informationZurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Boulder, US Detroit, US TJ Watson, US Tokyo, JP Tokyo, JP Atlanta,
IBM IBM Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Boulder, US Detroit, US TJ Watson, US Tokyo, JP Tokyo, JP Atlanta, US Atlanta, US Haifa, IL New Delhi, IN Brisbane,
More informationuntitled
17 9 15 IT 5061 C0047 TOE imagio D DataOverwriteSecurity Unit Type C Software TOE V0.04 PP EAL2 TOE TOE 18 3 24 IT Common Criteria for Information Technology Security Evaluation Version 2.1 Common Methodology
More informationInformation Security Management System ISMS Copyright JIPDEC ISMS,
ISMS Copyright JIPDEC ISMS, 2005 1 Copyright JIPDEC ISMS, 2005 2 Copyright JIPDEC ISMS, 2005 3 Copyright JIPDEC ISMS, 2005 4 ISO JIS JIS ISO JIS JIS JIS ISO JIS JIS 22 23 ISO SC27 ISO SC27 ISO/IEC 17799
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More informationスライド 1
VMware CIT Japan 006 6 CIT Agenda VMWARE Pfizer Japan Inc. 953 648 6 09 -5-00 Discovery Approaches 7,000,000 Compounds Screened,000 Screening Hits Candidates 6 Candidates Product 700 MR* MR Medical Representative
More informationST作成の手引
7 3 1.2 1 ST ST ST ST ST CC TOE TOE TOE IT TOE TOE TOE IT TOE TOE TOE PP PP PP PP PP 2 ISO/IEC 15408( 1999) Evaluation Criteria for IT SecurityCC JIS X5070(2000) ST CC ST ST CC ST ST CC IT CCCommon Criteria
More informationZurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta,
IBM IBM Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta, US Atlanta, US Heredia, CO Haifa, IL New Delhi,
More informationguideline_1_0.dvi
Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10
More information2
1 2 3 14 IT IT IT e-japan IT IT 24 IT IT IT IT CAD CAD Conference 2003 300 Web 41,056 15 Web (3D) 3,569 CIAJ () JEITA CEATEC JAPAN 2002 754 17 e-business Solution Plaza 28 30 4 5 1. 17 1465() 285 185 1
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More informationA book
Hitachi Multi Payment Network communications server 3000-3-493-40 P-1B43-6111 Hitachi Multi Payment Network communications server Base 01-03( OS HP-UX 11.0 HP-UX 11i) P-1B43-6311 Hitachi Multi Payment
More information9_18.dvi
Vol. 49 No. 9 3180 3190 (Sep. 2008) 1, 2 3 1 1 1, 2 4 5 6 1 MRC 1 23 MRC Development and Applications of Multiple Risk Communicator Ryoichi Sasaki, 1, 2 Yuu Hidaka, 3 Takashi Moriya, 1 Katsuhiro Taniyama,
More informationnew-trusted-os.PDF
security 101 TCSEC BLS (B level security) / US DoD CMWEC (Compartmented Mode Workstation) / TAC4 for US NAVY Post Bell-La Padula model 2002 Slide 1 1986 ( ) International R&D 1990 ( ) 1993 2 1996 1997
More informationJIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25
JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing
More informationuntitled
- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - ..... - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - -- - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - - 29
More information目次! ISO/IEC の意義! ISO/IEC の運用! 欧米の対応と製品評価状況! ISO/IEC の内容! 日本の取り組み 2
ISO/IEC 15408 セミナー ISO/IEC 15408(Common Criteria) 概要 平成 12 年 3 月情報処理振興事業協会 (IPA) セキュリティセンター 1 目次! ISO/IEC 15408 の意義! ISO/IEC 15408 の運用! 欧米の対応と製品評価状況! ISO/IEC 15408 の内容! 日本の取り組み 2 ISO/IEC 15408 の意義 3 セキュリティ評価の必要性
More informationuntitled
IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS
More informationrzat10pdf.ps
IBM i 7.2 IBM Navigator for i IBM IBM i 7.2 IBM Navigator for i IBM 9 IBM i 7.2 ( 5770-SS1) RISC CISC IBM IBM i Version 7.2 Connecting to your system Connecting to IBM Navigator for i Copyright IBM Corporation
More informationCopyright
2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright
More information03-3817-5670FAX 03-3815-8199 IEC IPA SEC (JIS X (JIS X IEC IEC IEC SIL(Safety Integrity Level)SIL SIL SILSIL IEC AD A B C D IEC ETC ETC V TV HDD GB GB HDD AECL LINAC e X x FTAFault Free Analysis SAFEWAREN
More informationnew-trusted-os3.PDF
security 101 Identity Management Provisioning IPA 2002 Slide 1 security 101 TCSEC BLS (B level security) / US DoD CMWEC (Compartmented Mode Workstation) / TAC4 for US NAVY Post Bell-La Padula model Identity
More informationWeb Microsoft 2008 R2 Database Database!! Database 04 08
Database Database Web http://www.microsoft.com/japan/sqlserver/2008/r2/solution/comparison/default.mspx Microsoft 2008 R2 Database Database!! 03 2009 6 1 Database 04 08 vs. Database 12 2008 R2 5 14! 5!
More informationOracle Identity Managementの概要およびアーキテクチャ
Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application
More information73-5 大友
373 73 5 20 9 373 377 Journal of the Japanese Association for Petroleum Technology Vol. 73, No. 5 Sept., 2008 pp. 373 377 Lecture HSQE * ** Received July 31, 2008 accepted September 11, 2008 Implementation
More information内部監査で検討すべき10のIT項目
Insights on governance, risk and compliance 10 IT IT ...2...4...6...8...10 IT...12...14 IT...16...18...20...22...24 iii Insights on governance, risk and compliance IT IT??? IT 10 IT 10 IT Insights on governance,
More informationInformation Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,
Information Security Management System ISMS ISO/IEC 27001 ISMS () ISMS ISMS 200512 Copyright JIPDEC ISMS, 2005 1 Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,
More information参考資料 1 既存のセキュリティ 要求基準について ISO/IEC 27017:2015 ( クラウドサービスのための情報セキュリティ管理策の実践の規範 )
参考資料 1 既存のセキュリティ 要求基準について ISO/IEC 27017:2015 ( クラウドサービスのための情報セキュリティ管理策の実践の規範 ) 参考情報 Ⅰ: ISO/IEC 27017:2015 項番 / 管理策 5. 情報セキュリティのための方針群 (Information security policies) 昨年度検討との関連 5.1.1 情報セキュリティのための方針群 (Policies
More information量販店向けPOSシステムサービス:TeamCloud/M
POS TeamCloud/M POS System Service for Mass Merchandisers: TeamCloud/M 近藤卓雅 河添直樹 森誠司 山本一樹 米山淳一 あらまし ICT POS Point Of Sale 2012 2 POSPOS TeamCloud/M Abstract Fujitsu Frontech s Retail Outsourcing Services
More informationuntitled
1 BCP(Business Continuity Plan) 1 BCP 2 BCP 6 9 10 BCP 10 11 BCP 12 BCP 15 BCP 16 BCP 17 17 BCP 18 BCP 19 22 24 25 26 28 28 33 37 BCP 41 BCP BCP BCP BCP BCP BCP(Business Continuity Plan) 1 2 BCPBusiness
More informationPDFŠp…f†[…^
DIGITAL IMAGING SYSTEM DICOM Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview NEMA Part 4 Service Class Specifications Part 3 Information Object
More information参考1 第2回自動車ワーキンググループ議事録(未定稿)
19 9 25 15 30 17 30 10 1012 2 WG 9 10 1 WG 1 CO2 CO2 CO2 WG 1 CO2 CO2 CO2 1/2 1/2 CO2 2 2 CO2 2 WG CO2 1 2 3 7 3 3 3 WG CO CO 10 1.5 50 50 2 1 1 CO 2 CO 4 CO CO 2 2 p.4 7 7 1 7 1 1 5 p.7 2 1 1 1.5 2 1
More information1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh.......
2001 1 1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh............................................... 3 1.2.2
More informationPart 1 IT CPU IT IT 1998 Windows NT Server 4.0, Terminal Server Edition 1 Windows Based Terminal WBT Windows CE 1 100Mbps 1Gbps LAN OS 1 PC 1 OS 2
Microsoft Flexible Workstyle &BYOD Part 1 Part 2 Part 3 Windows Server 2012 Windows Server 2012 R2 RDS Part 1 IT CPU IT IT 1998 Windows NT Server 4.0, Terminal Server Edition 1 Windows Based Terminal WBT
More informationAirMac ネットワーク for Windows
AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac
More information社員一人一人が気付き!考える!セキュリティ〜企業情報監理(セキュリティ)法〜
() 1 (1) (2) (3) (4) 2 3 4 (1) CIA+A m (2) CIA 5 (3) (4) (5) 6 7 8 9 10 11 12 J-Sox H12.9.20 H15.4.5 H15.6.27 < > H17.6.29 13 J-Sox 2006.6.7 14 15 16 (Integrity) (Confidentiality) (Availability) (Accountability)
More information<8C8B8D872E706466>
Tips for Personal Safety in Japan (English & Japanese) AFS Intercultural Programs, Japan AFS Table of Contents Copyright Fire and Disaster Management
More information" " " " IS 97BOK 1.2.10 2 1.3.7 1 1.7.3 1 2.3.2 2 2.3.4 IS 2 3.1.1 3 3.1.2 ) 3 3.1.3 3 3.1.4 3 1987 IS 97BOK 2.1.1 2.1.3 2.1.4 IS 2.1.5 IS IS 2.7 2.10.4 3.12 3.12.1 3.12.4 3.12.5 3.12.6 3.12.8 3.12.10
More information2003/07/ /08/ /09/ /09/ /09/ /10/ /11/ /11/ ASE ASE
Di3510 Di3510f Multi Function Peripheral Security Kit 1.18 2004 6 4 1 / 85 2003/07/31 1.00 2003/08/28 1.01 2003/09/02 1.02 2003/09/05 1.03 2003/09/12 1.04 2003/10/06 1.05 2003/11/12 1.06 2003/11/28 1.07
More information[1987][2000] Awareness
* 1 11 7 1 1999 1 2005 NISC 10 2005 2009 3 1* 1 [1987][2000] 1 2 2006 3 3 Awareness 1 2 3 http://www.ristex.jp/examin/infosociety/gobernance/pdf/fin_hayashikou.pdf 2 4 2 3 4 5 6 2 3 2.1 1 4 1 [1975][1991][2006]
More informationResearch on Academic Degrees and University Evaluation The Chronicle of Higher Education Chronicle Analytical Perspectives Research Centers Directory Research Centers Directory Administrative Policies
More informationInfoprint 250 GA
Infoprint 250 GA88-0164-00 Infoprint 250 GA88-0164-00 ! viii 2000 5 Copyright International Business Machines Corporation 2000. All rights reserved. ii Infoprint 250 ...III... VI...VII... VIII... VIII...IX
More informationP&ID P&I P&I (1) P&ID (2) (3) _3.doc 2/30
3.1 3.1.1 (1) (2) ( ) (3) (4) 3.1.2 P&I P&I (Piping & Instrument) _3.doc 1/30 P&ID P&I P&I (1) P&ID (2) (3) 3.1.3 _3.doc 2/30 (1) (2) (3) (4) P&ID 3.1.4 (1) (2) 3.2 _3.doc 3/30 3.2.1 (1) (2) (3) _3.doc
More informationMSD Human Resources Global Compliance Organization Office of Ethics Global Safety and the EnvironmentGlobal Compliance Organization Office of Ethics O
Be well III MSD Human Resources Global Compliance Organization Office of Ethics Global Safety and the EnvironmentGlobal Compliance Organization Office of Ethics Office of Ethics Office of Ethics OFFICE
More informationAirMac ネットワーク構成の手引き
AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17
More informationIoT JNSA IoT Security WG IoT Security Working Group (
IoT JNSA IoT Security WG IoT Security Working Group ( 2017123 JNSA IoT Security Working Group JNSA IoT Security Working Group IoT Copyright (c) 2017 NPO 2 JNSA IoT Security Working Group Copyright (c)
More informationOracle Database 10gのOracle Data Guard
Oracle Database 10g Oracle Data Guard 2004 Oracle Data Guard... 3... 3... 3 Oracle Data Guard... 4 Oracle Data Guard... 4 Oracle Data Guard... 4 Oracle Data Guard... 5 Oracle Data Guard... 6 Oracle Data
More informationスライド 1
FISMA 1 1 2 3 4 1 ISO/IEC 27001) (27003,27004,27007 3416 2010 2 ) IPA 5 6 7 http://csrc.nist.gov/groups/sma/fisma/index.html 8 9 (2003-2008) 2008) 10 SP 800-53 FISMA SP 800-53 GISRA FISMA 2002/12/17 SP
More informationESA_UI_1110.PDF
ESA SAP SAP SAP Web AS SAP SAP : ESA ESA : CAF ESA SAP SAP SAP : ESA ESA : CAF ESA SAP SAP SAP Office???? SAP Japan Co., Ltd. 2004, Title of Presentation / Speaker Name / 4 SAP SAP : ESA ESA : CAF ESA
More informationCC v2.3 パート2: セキュリティ機能要件
2 : 2005 8 2.3 CCMB-2005-08-002 IPA まえがき はじめに本書は IT セキュリティ評価及び認証制度 において 認証機関が公開する評価基準 の規格として公開している Common Criteria( 以下 CC という ) を翻訳した文書である 注 :1. 原文の CC で記載してある段落番号については 本書では段落番号が付与されていない このため 段落番号については
More information本文/YAZ172P
2004 2005 2006 2007 Committee of Sponsoring Organizations of Treadway Commission COSO 1992 Internal Control-Integrated Framework COSO 1 1 COSO 2009 7 27 2009 9 11 21 1956 1980 1986 MBA 1980 2006 1990 1993
More informationuntitled
2009 Kazuhiro FUKUYO, YAMAGUCHI UNIVERSITY. All rights reserved. (industrial marketing) BtoB marketing BtoC marketing 6O SWOT 6O Occupants Organization Object Objectives Occasion Operation Philip Kotler
More information3論説_高橋.indd
2001 89 2006 543 5 6 2001 7 2006 59 5 8 2007: 60 Kingsoft Office 2007 1) 29 1999 2001 Tschang and Xue 2003 Li and Gao 2003 Wong and Wong 2004Yang et al. 2005 Shi et al. 2005 Wu and Miyazaki 2006 IT Li
More information1 基本的考え方
... 1 1.1. BCP(Business Continuity Plan) 1 1.2. BCP 2 1.3. BCP 6 1.4. 9... 10 2.1. BCP 10 2.2. 11 2.3. 12 2.4. BCP 14 2.5. BCP 15 BCP... 17 3.1. 17 3.3. BCP 19 3.4. 22 3.5. 24 3.6. 25 3.7. 26... 28 4.1.
More informationITSM.PDF
HP IT - ITIL / HP ITSM - - ITSM Revision-1.1 2004 Hewlett-Packard Development Company, L.P. HP IT - Current Global Deployment : 140,000 : 72Billion US$ (2002 ) Applications 5,000 Databases 7,928 PC Managed
More informationuntitled
(1) IT 20 2 IPA IPA 20 8 ESQR 1 21 3 ESCR 2 ESPR 3 ESMR 4 20 (ESQR) ESQR 9 IPA ver.1.0 5 20 7 21 4 ver.1.03 52,835 301 / 2,000 SEC 2,327 ( 21 3 ) 15 20 2 2 6 IPA IT ISO/IEC29155 ISBSG 7 20 NIST Planning
More informationACR-C 保証継続報告書 独立行政法人情報処理推進機構原紙理事長藤江一正押印済変更 TOE 申請受付日 ( 受付番号 ) 平成 24 年 1 月 12 日 (IT 継続 2077) 認証番号 C0312 申請者コニカミノルタビジネステクノロジーズ株式会社 TOEの名称日本語名 :bi
保証継続報告書 独立行政法人情報処理推進機構原紙理事長藤江一正押印済変更 TOE 申請受付日 ( 受付番号 ) 平成 24 年 1 月 12 日 (IT 継続 2077) 認証番号 C0312 申請者コニカミノルタビジネステクノロジーズ株式会社 TOEの名称日本語名 :bizhub C652 / bizhub C652DS / bizhub C552 / bizhub C552DS / bizhub
More information,,, J-SOX ISMS PCIDSS,, IM/VoIP/VoD Copyright 2008 Juniper Networks, Inc. 2
NAC Advanced Technologies Business Development Manager Toru Konno toruk@juniper.net v1.81 Copyright 2008 Juniper Networks, Inc. www.juniper.co.jp 1 ,,, J-SOX ISMS PCIDSS,, IM/VoIP/VoD Copyright 2008 Juniper
More informationuntitled
http://www.ecompliance.co.jp 1.0 2006/05/26 Copyright(C) 2006 ecompliance Ltd. All Rights Reserved. Page 1 1.... 4 2.... 4 3.... 4 3.1... 4 3.2... 4 3.3... 4 3.4... 4 4.... 4 4.1... 4 4.2... 5 4.3... 5
More information意外と簡単!? Oracle Database 11g -バックアップ・リカバリ編-
Oracle Direct Seminar !?Oracle Database 11g -- Agenda Oracle Direct Concierge SQL Server MySQL PostgreSQL Access Oracle Database Oracle Developer/2000 Web Oracle Database Oracle Database
More information研究レポート表紙.PDF
No.118 November 2001 ISO ISO takeishi@fri.fujitsu.co.jp ISO14001 CEAR A4823 1. ISO14000 ISO14000 ISO14001 2. ISO ISO. ISO14001 ISO9000 OHSAS18001 18002 ISO14001 ISO IEC13335 ISO10006. ISO ISO14001 ISO9000
More information21 10 15 21 2001 21 180-1 - 1997 2001 1999 11 2001 10 15 10 21 2000 12 21-2 - 2000 12 21 21 2001 13-3 - 100 10 21-4 - 20 21 30-5 - 2003 10 1997 21-6 - 1900 1999 ( 21 2001-8 - 1996 2001 1986 2001 2001
More informationSi-R180 ご利用にあたって
P3NK-2472-01Z0 GeoStream Si-R 180 LAN 2007 7 Microsoft Corporation All rights reserved, Copyright 2007 2 ...2...5...5...5...5...6...7...8...8...11...11 LAN...11...11...12...12...12...12...12...13 ISO/IEC15408...14
More informationProfile 39% 9,311 33% 7,846 28% 6,853 2
1 Profile 39% 9,311 33% 7,846 28% 6,853 2 Message 3 Vision 4 5 Executive Summary 6 7 Management Systems 8 9 Management Systems 10 11 Design for Environment 12 3R 3R 3R 3R 13 14 Design for Environment P
More information403-0702_‚Ofl¼
HP-UX HP System Insight Manager Whitepaper ..................................................................................2..............................................................2 SIM....................................................................................2.............................................................3................................................................................3
More information5005-toku3.indd
3 1 CMMICMM Capability Maturity Model ISO : International Organization for Standardization IEC : International Electrotechnical CommissionJTC1 : Joint Technical Committee 1SC7 : Sub Committee 7 SC7 WG
More informationuntitled
The Impact of Digitization on Music Production: From a Perspective of Modularity 51 2 pp. 87-108 2003 12 I 21 3 Information and Communication Technology, ICT 0 1 1 20 1 199820012000 1 MP3 CD 2 3 II CD
More information(2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2]
/ 1995 Grid Access Model 1. (1) 22 1998 12 11 2000-1- (2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP 2.1 1995 4 (3) [1] [2] IPP [2] IPP IPP [1] [2]
More informationuntitled
IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More information本組/魚田勝臣、他
Business Review of the Senshu University No. 94, 1-15, 2012 IT PDCA PDCA 1 1 FORTRAN, COBOL ICT EDPS Electronic Data Processing SystemMIS Management Information SystemDSS Decision Support SystemSIS Strategic
More informationuntitled
SaaS/PaaS ASP SaaS ASIS 2011 C-3 2011 7 5 ( ) SaaS/PaaS ASP/SaaS IaaS/PaaS ASP/SaaS / / SaaS PaaS IaaS Housing Service On-premise OS/ OS/ OS/ OS/ IT A B C D E F G H I J K A B C D E F G H I J K C G J D
More informationfusion.PDF
IP-VPN VPN Internet Protocol Virtual Private Network 2001.12. 4 Fusion Communications Corp. 1 2001.12. 4 Fusion Communications Corp. 2 2001.12. 4 Fusion Communications Corp. 3 2001.12. 4 Fusion Communications
More information2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN
More informationルータ(IPv6)掲示用池田.PDF
JEITA IPv6 - IPv6-1 1. 2. IPv6 3. 4. IPv6 5. IPv6 6. 7. 2 1 1. 2. IPv6 3. 4. IPv6 5. IPv6 6. 7. 3 (1) 4 2 (2) IP(Internet Protocol - - A A 5 (3) IPv6 AP AP TCP IP TCP IP 6 3 TCP/IP(v6) TELNET FTP TFTP
More informationContents FY2011 Highlight Financial Data Business Outline Of ZOZOTOWN To Overseas Customers Business Outline Of Affiliated Companies About Us Appendix : Notice of the 14th Annual General Meeting of
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More informationuntitled
18 16 ... 3 1... 7 2...10 3...14 4...46 1 96 56 16 3 19 17 2 2004 49.9 0.9 74.5 1.6% 2003 85 71 136 2009 2004 2007 2000 27.82004 533 155 29.1 2007 10 552 2004 709 43.3 49.918 186 141 18 2008 120 18 etc.
More information光学基金報告会資料 最終版.ppt
2012 5 17 AIJ 2012/5/17 Oval Risk-Management Services Inc., All Rights Reserved 1 2012/5/17 Oval Risk-Management Services Inc., All Rights Reserved 2 22 No.93 2011 November 3 86 63 1 49 9 18 56
More informationT - Telecommunication and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Part 1: Overview and Intro
T - Telecommunication and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Part 1: Overview and Introduction (DTR/TIPHON-01004-1 V0.1.5) 1.0 2001 8 30 THE
More information証明書検証サーバ
(Certificate Validation Server) 2007/11/1 Version 1.09 (Certificate Validation Server) 1 2006/4/27 0.930 2 2007/5/8 0.940 / 3 2007/5/15 0.950 Solaris TOE Linux TOE ST 4 2007/5/23 0.960 ASE ( : ASE001-01)
More informationuntitled
DICOM Digital Imaging and Communications in Medicine DICOM DICOM Digital Imaging and Communications in Medicine ACRNEMA CD-R DICOM 1 HIS Server PC HL7 RIS WEB Image/Report Viewer WEB RIS Server DICOM DICOM
More informationIT IT IT
HOKUDEN INFORMATION SYSTEM SERVICE H u m a n i t y I n n o v a t i o n S i n c e r i t y & S e c u r i t y S a t i s f a c t i o n IT IT IT Business Data Center Network HISS Humanity Innovation Sincerity
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More information海外投資と経営
(1)(2) (3)(4)(5) J.S.Schwendiman 19 19 J.S.Schwendiman, International Strategic Planning: Still in Its Infancy? Worldwide P & I Planning, Sept.-Oct. 1971. 25 A B Etc, C D ABC 1982 143 26 20 1994 27 ()
More information橡食品班論文[1].PDF
3 1 3 2 3 2000 BSE = ISO9000 14000 1) HACCP 2) 3) 4 4 5) 2 6) 7) 5 8) 9) 6 1899 2001 10 15 10 60 70 11 7 30 20 20 12 13 14 8 10 1964 1973 9 3 2 1974 EC 24 EC 1974 9 10 15 16 10 11 12 13 14 15 16 17 18
More information