suguru.PDF

Size: px
Start display at page:

Download "suguru.PDF"

Transcription

1 ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Internet: Global and Ubiquitous Infrastructure for Communication Society Internet Technology CATV Cable Modem TCP/IP ATM Optical Fiber Copper Cable WDM/SDH ThinkQuest2002 Suguru Yamaguchi (c) ISDN Communication Technology WWW Computer literacy, Non stop business on the Internet in domestic & international arena What is illegal offline remains illegal online Illegal and harmful content on the InternetCOMMUNICATION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

2 Computer Security Incidents. / / ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Statistics@JPCERT/CC 3,000 2,500 2,000 1,500 96/10-96/12 97/04-97/06 97/10-97/12 98/04-98/06 98/10-98/12 99/04-99/06 99/10-99/12 00/04-00/06 00/10-00/12 01/04-01/06 01/10-01/12 1, Q Q1 Number of Reports Est ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Statistics@CERT/CC! ,000 ATTACKS 13,300 BLOCKED Protection 24,700 SUCCEED Detection 988 DETECTED 23,712 UNDETECTED Reaction 267 REPORTED 721 NOT REPORTED Number of Reports Est (3Q) ThinkQuest2002 Suguru Yamaguchi (c) GAO/AIMD Defense Information Security ThinkQuest2002 Suguru Yamaguchi (c)

3 ! Port Scanning & Probe. Port scanning shellcode SPAM Denial of Services (DoS) DoS ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) CodeRed 15 ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Buffer Overflow Attack wuftp, Netscape Enterprise Server, Microsoft IIS,. (boundary check) Internet Worm (1988) Buffer Overflow Attack Buffer ( ) Boundary Check ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

4 OS Solaris sadmindbuffer overflow Worm sadimind Solaris Worm Windows IIS IIS IIS ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) DDoS Distributed DoS Attack DoS 20002: YahooCNN ebay, Amazon DDoS trinoo DDoS FBI ISP DDoS Zombie trigger ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) DoS Growth of Internet Users in Japan CodeRed DoS DoS? DoS DoS Nimda? WIDE Project ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

5 DDoS Host Network link Lessons from our reports (rootkit ) () ( ) ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) DoS Computer Literacy Scripty kids?»»»» ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) TFM2K CodeRed, Nimda ISP DDoS Agent MTA SPAM ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

6 ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) (audit) Integrity management ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) CISO (Chief Information and Security Officer) CISO HRM (Human Resource Management) and other RM Public Relations and Publicity activities. ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

7 ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) RFC 2196 Site Security Handbook (threat) ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) GAO report [AIMD ] Executive guide Information Security Management -- Learning from Leading Organizations (accountable) ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

8 ThinkQuest2002 Suguru Yamaguchi (c) / (risk assessment) : {Tn} : P(Tn) : V(Tn) V(Tn)P(Tn) ThinkQuest2002 Suguru Yamaguchi (c) (1). / / ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) (2) : Web..»». (3) (passive attack) (eavesdropping, wire tapping) (traffic analysis) (active attack) (packet stream modification) (Denial of Service) (masquerading) (unauthorized access),, replay attack. ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

9 (4).. ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) ,,,,... 1 ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) (1) ThinkQuest2002 Suguru Yamaguchi (c)

10 (2) Incident Response, response ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) JPCERT/CC ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Firewall VPN NAT Proxy clearing house WWW etc. Firewall VPN Proxy NAT ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

11 Firewall(1) Firewall (2) "Choke & Gate" style Choke Filtering Gate Services Access Control Firewall-segment DMZ (Demilitarized Zone) DNS httpd sendmail Firewall ( ) filtering gateway external gateway Filtering Gateway socks VPN (Virtual Private Network) VPN VPN FireWall A B C VPN FireWall D ThinkQuest2002 Suguru Yamaguchi (c) TCP TCP SMTP(mail), NNTP(news) UDP DNS, phone FTP FTP PASV FTP Ncftp control control FTP client data FTP server FTP client data FTP server Firewall Firewall 11

12 FTP Proxy HTTP HTTP control data WWW client Proxy Server Firewall WWW Serve WWW VPN SSH ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) (authentication) (entity) Entity: ( ) ID (bio -metrics) ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

13 UNIX Password System 8 (/etc/passwd) weak password) 2 Reusable Password replay attack One Time Password ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Challenge-Response System challenge response Challenge Response System (2) challenge response response Message Digest (e.g. S/KEY) response SecureID ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Message Digest 16 Secure Hashing Algorithm MD4, MD5, SHA1 S/KEY MD n+1 (k) MD n (k) Pass-phrase Seed pass-phrase Seed pass-phrase UNIX Password sult k: pass-phrase seed 13

14 S/KEY S/KEY Challenge-Reply system MD n (k) Challenge: n-1 Seed Reply: MD n-1 (k) Dictionary Mapping 16 User ID suguru Count and Seed 29 vax15 One Time Password cat sun gaur tuft noun soon host: vax S/KEY database suguru: 30 vax15 tang fun fish moon smug gray Token Card ( SecurID (by Security Dynamics) SafeWord (by Secure Computing) Challenge/Response X9.9 SecureNetKey (by AssureNet) Challenge/Response ( ) ThinkQuest2002 Suguru Yamaguchi (c) ( public key) ( secret key) Digital Signature WWW HTTP HTTPS HTTPSSSL(Secure Socket Layer) / TLS (Transport Layer Security) ThinkQuest2002 Suguru Yamaguchi (c)

15 SSL Secure Socket Layer 2 DES, Triple DES, RC2, RC4 MD5, SHA1 RSA SSL - 1 X.509 ID ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) SSL - 2 Biometrics ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Biometrics (2) biometrics Token card password system (authentication) (authorization) PKIX ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

16 SSH1 & SSH2 SSH1(MITM BSD r command full compatible port forwarding SSH ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) DES/RSA SSH SSH Protocol Architecture draft-ietf-secsh-architecture-07.txt encryption, integrity, compression host authentication user authentication ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) ssh2 /home/suguru/.ssh2/id_dsa_1024_a /home/suguru/.ssh2/id_dsa_1024_a.pub passphrase SSH passphrase Port Forwarding SSH SSH client/ssh server SSH firewall outbound ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

17 Port Forwarding SSH client Application Server SSH server Application Server SSH BSD r command rlogin rsh SSH CVS SSH Port Forwarding firewall friendly ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) PGP (Pretty Good Privacy) S/MIME Ssh ThinkQuest2002 Suguru Yamaguchi (c) Monitoring Monitoring IDS (Intrusion Detection System) Footprint IDS ThinkQuest2002 Suguru Yamaguchi (c)

18 : ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) ,,,... /, (JPCERT/CC),...,,, etc...!? ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) (1) (2) JPCERT/CC ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

19 (), ),,,,, /,,,,... JPCERT/CC ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) JPCERT/CC Japan Computer Emergency Response Team Coordination Center FIRST CSIRT CSIRT Computer Security Incident Response Team Morris worm CERT/CC (Computer Emergency Response Team Coordination Center) CERTCC-KR ( ) AusCERT ( ) CERT -Renater ( ) ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) FIRST Forum of Incident Response and Security Teams 1990CERT/CC CSIRT (Incident Response) JPCERT/CC (Web/FTP) ML ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

20 NORTH A S I A 4 0 AMERICA PACIFIC 30 TROPICOFCANCER TROPICOFCANCER OCEAN P A C I F I C 10 AFRICA EQUATOR INDIAN O C E A N SOUTH OCEAN AMERICA TROPICOFCAPRICORN TROPOFCAPRICORN 20 AUSTRALIA GREENLAND O C E A N GREENLAND E U R O P E EQUATOR JPCERT/CC : ( ) : JPCERT/CC Structure of JPCERT/CC JPCERT/CC board committee steering committee secretariat 12 full-time staff (9 engineers) Two way communications advisory Vendors Leaders from the Public and Private Sectors Internet Service Providers ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) Security Response Process (1) FIRST member A T L A N T I C JPCERT/CC Incident Response JPNIC (Whois DB ) ISPs & Vendors Private Sector Constituency Bulletin Alerts Knowledge Base Patches Web / Coordination Research Development IPA/ISEC ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c) (2) ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

21 JPCERT/CC JPCERT/CC Our Contact Hotline: Fax: WWW: Mailing List: ThinkQuest2002 Suguru Yamaguchi (c) ThinkQuest2002 Suguru Yamaguchi (c)

2-20030509.PDF

2-20030509.PDF JPCERT/CC 1 Firewall 2 Security Incident 3 Cgi-bin Cross Site Scripting (CSS) 4 Statistics@JPCERT/CC 3,000 2,500 2,000 1,500 1,000 500 0 1996Q4 1997 1998 1999 2000 2001 2002 Number of Reports 5 2002 JPCERT/CC

More information

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN 1 Internet Week 2002 20021218() 9:3012:30 () kuma@isid.co.jp ADSLFTTH 24 IP LAN LAN LAN 2 1 ? 3? 4 e-japan 20053000 20051000 2 IP»» 5 CATV DSL FTTH LAN 6 620(20029) CATV 180DSL 422FTTH 12 14 3 MP3CD CM

More information

今企業が取るべきセキュリティ対策とは策

今企業が取るべきセキュリティ対策とは策 AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.

More information

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights 1 Internet Week 2001 ( ) kuma@isid.co.jp 2 CodeRed 1 3 (EXCEED ) se cu ri ty? 4? 2 5 Web IP Web MP3 6 3 7 1.5Mbps8Mbps 500 MP3 CM VoD 8 4 ADSL (Asymmetric Digital Subscriber Line) () CATV FWA (Fixed Wireless

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

橡C22.PDF

橡C22.PDF Internet Week 99 Tutorial C22 1999 12 16 ( ) 1 FIREWALL Firewall TCP/IP DNS 2 Firewall Firewall ( ) FTP FTP data connection port 20 port data connection ncftp, FFF, ws_ftp, Fetch 3 PORT 3 Firewall FTP

More information

橡sirahasi.PDF

橡sirahasi.PDF Internet Week 2000 T5 IPsec VPN 2000/12/18 1 Virtual Private Network 2 IPsec 3 IPsec VPN 4 IPsec VPN 2 1 Virtual Private Network 3 Ethernet, WAN PPTP(PPP) IPSec SSL/TLS SOCKS V5 SSH, SSL-Telnet, PET PGP,

More information

1. 2. ( ) Secure Secure Shell ssh 5. (xinetd TCP wrappers) 6. (IPsec) 7. Firewall 2

1. 2. ( ) Secure Secure Shell ssh 5. (xinetd TCP wrappers) 6. (IPsec) 7. Firewall 2 (6 20 ) ISP 3 3 SPAM MP3 1 1. 2. ( ) 3. 4. Secure Secure Shell ssh 5. (xinetd TCP wrappers) 6. (IPsec) 7. Firewall 2 1. 2. ( ) 3. 4. Secure 5. (xinetd TCP wrappers) (i) (ii) ( ) (iii) 6. (IPsec) 7. Firewall

More information

2004 SYN/ACK SYN Flood G01P014-6

2004 SYN/ACK SYN Flood G01P014-6 2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................

More information

集中講義 インターネットテクノロジー 第5回

集中講義 インターネットテクノロジー 第5回 5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of

More information

1. 2

1. 2 2004 1. 2. 1. 2 Web 3 4 5 6 PDA 7 USB CD DVD 8 9 10 11 LAN 12 13 14 P2P Web USB CD,DVD PDA 15 CD,DVD USB 16 17 18 19 VPN 20 PC 21 LAN 22 23 24 ISO/IEC17799 25 26 27 28 29 DDoS DoS DoS DDoS DoS ( ) ( )

More information

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre 3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination

More information

Copyright

Copyright 2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright

More information

Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8

Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8 2001/1/11 Web Simplified Techniques for Econometric Plannings & Simulations for WWW Fujiwara Takamichi 97-5075 N-23 Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3.

More information

- 1 -

- 1 - Distributed via http://www.cyberpolice.go.jp/ - 1 - - 2 - etc IDS - 3 - - 4 - 1.3% 1.4% 2.4% 3.3% 6.2% 6.4% 14.6% 9.1% 27.6% 16.4% 11.3% - 5 - 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% - 6 - 1.8% 1.8%

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

Testing XML Performance

Testing XML Performance - DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER

More information

Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Boulder, US Detroit, US TJ Watson, US Tokyo, JP Tokyo, JP Atlanta,

Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Boulder, US Detroit, US TJ Watson, US Tokyo, JP Tokyo, JP Atlanta, IBM IBM Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Boulder, US Detroit, US TJ Watson, US Tokyo, JP Tokyo, JP Atlanta, US Atlanta, US Haifa, IL New Delhi, IN Brisbane,

More information

YMS-VPN1_User_Manual

YMS-VPN1_User_Manual YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows

More information

untitled

untitled 200 7 19 JPCERT [2007 2 4 6 ] IPA JPCERT JPCERT/CC 2007 2 4 6 1 2 1. 2007 2 1 2007 4 1 6 30 IPA 46 95 141 2004 7 8 501 940 1,441 3 2 (1) 3 2004 7 8 1 2007 2 1.98 1 2005/1Q 2005/2Q 2005/3Q 2005/4Q 2006/1Q

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション Panasonic Solution Technologies Co.,Ltd. 1 2 3 4 Stratus ftserver FaultTolerant Server PanaStation (Desktop) Windows Windows IA Server Linux IBM eserver pseries UNIX Server PanaStation AIX Server Solaris

More information

perimeter gateway

perimeter gateway Internet Week 2005 T9 CISSP Proxy VPN perimeter gateway OK?? F/+VPN Web MAIL/DNS PC PC PC PC PC NW NW F/W+VPN DMZ F/W NW NW RAS NW DMZ DMZ De-Militarized Zone = DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ DMZ

More information

untitled

untitled IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS

More information

Japan Computer Emergency Response Team Coordination Center インシデントレスポンス概論 JPCERT コーディネーションセンター山賀正人 2003/11/ JPCERT/CC

Japan Computer Emergency Response Team Coordination Center インシデントレスポンス概論 JPCERT コーディネーションセンター山賀正人 2003/11/ JPCERT/CC インシデントレスポンス概論 JPCERT コーディネーションセンター山賀正人 office@jpcert.or.jp インシデントレスポンスとは Computer Security Incident ( 以降 インシデントと略 ) コンピュータセキュリティに関係する人為的事象で 意図的および偶発的なもの 弱点探索 リソースの不正使用 サービス運用妨害行為など 不正アクセス ( 行為 ) は狭義に規定された

More information

system02.dvi

system02.dvi 2003 2 2003 4 24 13:15-14:45 : IP DNS SSH SCP 1 HTTP 2 FTP TelnetGopher HTTP HTTP 2 IP 2.1 IP PC1 1 IPv4 IP 8 4 32 192.168.6.18 42 (2 32 ) IP IP LAN LAN LAN ABC 3 (Table 1) 2.2 LAN Table 1 10.0.0.010.255.255.255

More information

2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP

2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP, TCP, IP 2,, IP, IP. IP, ICMP, TCP, UDP, TELNET, FTP, HTTP TCP IP 1.,.. 2 OSI,,,,,,,,, TCP/IP,, IP, ICMP, ARP, TCP, UDP, FTP, TELNET, ssh,,,,,,,, IP,,, 3 OSI OSI(Open Systems Interconnection: ). 1 OSI 7. ( 1) 4 ( 4),,,,.,.,..,,... 1 2 1: OSI OSI,,,,,,,,, 4 TCP/IP TCP/IP,

More information

wide93.dvi

wide93.dvi 5 161 1 1.1 DDT WG DDT WG 1. \DDT" 2. DDT WG DDT WG 1.2 x ( IP) y ( X.25) x y \x overy" x y 1.1 IP X.25 IP IP IPX Appletalk OSI IP \encapsulation" \encapsulation header" \decapsulation" 163 164 1993 WIDE

More information

IP IP DHCP..

IP IP DHCP.. NICE 2008 4 14 1 NICE 2 1.1.................... 2 2 3 2.1........................................ 3 2.2....................................... 5 2.3.................................... 6 2.4...................................

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

はじめに

はじめに 23 1.1 1.2 1.2.1 1.2.2 24 26 26 26 29 31 33 34 1.3 36 1.3.1 1.3.2 1.3.3 1.3.4 EXPN/VRFY 36 VRFY EXPN 36 37 38 38 45 46 46 DoS 51 Flood DoS 51 7 51 52 DDoS 53 1.4 58 1.4.1 1.4.2 1.4.3 1.4.4 1.4.5 1.4.6

More information

2011 I/ 2 1

2011 I/ 2 1 2011 I/ 2 1 ISO 7 layer reference model TCP/IP ISO 7 layer reference model 5 7 2011 I/ 2 2 2011 I/ 2 3 OSI 7 Layer Reference Model 2011 I/ 2 4 Harry Nyquist (1924) Maximum data rate = 2H log 2 V (bits/s)

More information

LAN

LAN LAN 2003 6 4 LAN Hotel LAN LAN IEEE802.11a IEEE802.11b 802.11b 11Mbps Copyright (c) 2003 NPO Page 3 FREESPOT FREESPOT HOTSPOT NTT ( ) MZONE ( )NTT Mobile ( ) Yahoo! BB ( ) MapFanWeb http://www.mapfan.com/musen/

More information

Mac OS X Server Windows NTからの移行

Mac OS X Server Windows NTからの移行 Mac OS X Server Windows NT 10.4 apple Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. Mac OS X Server Apple 1 Infinite Loop Cupertino CA 95014-2084 U.S.A. www.apple.com 163-1480 3 20

More information

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: alex@ee.tokushima-u.ac.jp Id: itrc20th-20061005.tex,v

More information

1.... 1 2.... 2 2.1.... 2 2.2.... 4 2.3.... 7 3.... 9 3.1.... 9 3.1.1.... 10 3.1.2.... 11 3.1.3.... 13 3.1.4.... 15 3.1.5.... 16 3.1.6.... 17 3.2.... 18 3.2.1.... 19 3.2.2.... 20 3.2.3.... 20 3.2.4....

More information

2

2 0. 92a --------------------------------------------------------- ---------------------------------------------------- 1. 1-1. 1-2. 1-3. 2. 2-5. 1 2 a ---------------------------------------------------------

More information

橡C12電子メール最新技術動向revisd.PDF

橡C12電子メール最新技術動向revisd.PDF Internet Week 99 Internet Week 99 1999 Naoaki Watanabe,Japan Network Information Center 1... 1 2... 1 3... 2 4... 5 5... 7 6 IMAP4... 10 7 S/MIME PGP... 14 8... 18 9... 19 IMAP4 Happy99 OutLook Exchange

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved. Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise

More information

Tya-net Thirteen Rules of Use Tya-net Don't violate the intended use of Tya-net. Tya-net Don't let anyone know your passwords. Use strong passwords. M

Tya-net Thirteen Rules of Use Tya-net Don't violate the intended use of Tya-net. Tya-net Don't let anyone know your passwords. Use strong passwords. M (Tya-net) Tya-net Thirteen Rules of Use Tya-net Don't violate the intended use of Tya-net. Tya-net Don't let anyone know your passwords. Use strong passwords. Make regular backup of critical data. Don't

More information

Si-R30取扱説明書

Si-R30取扱説明書 IP 317 318 IP 319 322 327 332 335 337 339 339 340 342 DNS ProxyDNS 344 DNS 344 DNS 348 DNS 349 DNS 350 DHCP 352 DHCP 353 DHCP 355 NAT 35 NAT 359 30 34 ID 38 371 374 CBCP 375 CBCP 377 379 380 TA 382 URL

More information

...i A

...i A ...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20

More information

XMLを基盤とするビジネスプロトコルの動向

XMLを基盤とするビジネスプロトコルの動向 XML Trends of XML-Based Business Protocols ebxml Web XML ebxml UN/CEFACT EDIFACTOASIS XML Web W3C World Wide Web Consortium Abstract XML-based technologies such as the Electronic Business XML Initiative

More information

スライド 1

スライド 1 IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

ネットワークセキュリティー

ネットワークセキュリティー (1) (a) ( ) (b) ( ) (c) ( ) (2) (CPU ) (3) (4) 1 One for All, All for One (Intentionally) (Accidentally) (aka Quality, e.g., Proxy, Redirection) 2 QoS Quality of Service (QoS) Quality of Service End-to-End

More information

IPSJ SIG Technical Report Vol.2013-OS-127 No.2 Vol.2013-EMB-31 No /12/ SNS(Social Networking Service) SNS Friend News System Friend

IPSJ SIG Technical Report Vol.2013-OS-127 No.2 Vol.2013-EMB-31 No /12/ SNS(Social Networking Service) SNS Friend News System Friend 1 1 1 1 1 1 SNS(Social Networking Service) SNS Friend News System Friend News System SNS Friend News System 1. [1] 2013 6 Microsoft Facebook SNS(Social Networking Service) [2] Facebook SNS LAN SNS Friend

More information

guide.PDF

guide.PDF ExpressMail Ver2.0 Copyright ( ) 1998/12/25 REV.1 1 ExpressMail Ver2.0 ExpressMail Ver2.0 ExpressMail Ver2.0 WindowsNT SMTP/POP3/IMAP4 (1) SMTP sendmail 8.8.5 DLL (2) POP3 RFC1939 APOP (3) IMAP4 RFC2060

More information

C17.pdf

C17.pdf 1999 12 16 Internet Week 99 Internet Week 99 1999 Naoto Matsumoto, Japan Network Information Center 1 HTTP TELNET 2 3 VPN 4 5 6 7 2 Security VPN 1 WWW 3 3.1 3 3 Authentication Authorization Control Defense

More information

Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta,

Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta, IBM IBM Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta, US Atlanta, US Heredia, CO Haifa, IL New Delhi,

More information

C02.pdf

C02.pdf / 1999 12 14 Internet Week 99 Internet Week 99 1999 Yu Inamura, Japan Network Information Center 1 2 2000 1. 2. 3. 4. 1976 5. 1993 2.1 N!! N 2.2 1976 Shannon ConfusionDiffusion 2 SPN Substitution Permutation

More information

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student

1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari student LAN 0000000000 6/6, 6/13, 6/20 1 Linux UNIX-PC LAN. UNIX. LAN. UNIX. 1.1 UNIX LAN. 1.2 Linux PC Linux. 1.3 studenta odd kumabari studentb even kumabari studentc odd kumabari studentd even kumabari 1: LAN

More information

ルータ(IPv6)掲示用池田.PDF

ルータ(IPv6)掲示用池田.PDF JEITA IPv6 - IPv6-1 1. 2. IPv6 3. 4. IPv6 5. IPv6 6. 7. 2 1 1. 2. IPv6 3. 4. IPv6 5. IPv6 6. 7. 3 (1) 4 2 (2) IP(Internet Protocol - - A A 5 (3) IPv6 AP AP TCP IP TCP IP 6 3 TCP/IP(v6) TELNET FTP TFTP

More information

johokiso-internet

johokiso-internet 1 2 (Internet) : ( internet) : IP (The Internet) = Web? Internet, 1960 ARPAnet (Advanced Research Project Agency) : 1988 1989 + 1992 IIJ () 3 4 = (etc.) + = 1 () A B: A3 defaut: A2 A1 A3 B1 defaut: A2

More information

GTSC Security Response Team Microsoft Asia Limited ( ) 2

GTSC Security Response Team Microsoft Asia Limited ( ) 2 GTSC Security Response Team Microsoft Asia Limited ( ) 2 Agenda 3 No Yes or 4 OS etc HFNetChk Microsoft Baseline Security Analyzer (MBSA) 5 HFNetChk shavlik HFNetChk 6 HFNetChk HFNetChk XML DB XML DB http://download.microsoft

More information

shio_20041004.PDF

shio_20041004.PDF JPNIC JPCERT/CC 2004 Web 2004 10 4 Web Web Web WASC Web Application Security Consortium 7 Web Security Threat Classification Web URL 2 ...?? It depends!? It depends!??? 3 ? It depends!...

More information

Contents 2008/5/20 5 2 2008/5/20 5 3 2 (FN: false negative) (FP: false positive) 2008/5/20 5 4 Spam DoS 2008/5/20 5 5 (1) IP From IP / Tempfailing 2008/5/20 5 6 (2) IP IP or 2008/5/20 5 7 (3) IP PTR MTA

More information

1 基本的考え方

1 基本的考え方 ... 1 1.1. BCP(Business Continuity Plan) 1 1.2. BCP 2 1.3. BCP 6 1.4. 9... 10 2.1. BCP 10 2.2. 11 2.3. 12 2.4. BCP 14 2.5. BCP 15 BCP... 17 3.1. 17 3.3. BCP 19 3.4. 22 3.5. 24 3.6. 25 3.7. 26... 28 4.1.

More information

. No.1 Copyright: Takahiro Kiu No.1 (UMIN Cente

. No.1 Copyright: Takahiro Kiu No.1 (UMIN Cente . No.1 No.1 No.2 No.3 No.4 No.5 No.6 , No.7 No.8 Research http://www.umin.ac.jp/research/ Education http://www.umin.ac.jp/education/ Multipurpose http://www.umin.ac.jp/multi-purpose/ AC - Academic societies

More information

untitled

untitled Worldspan go! 4.x (UCI) Administrator Guide go! 4.x (UCI) Version 2.1.4 : 31 August 2007 1. WORLDSPAN GO! VERSION 4.X (UCI)... 3 2. WORLDSPAN GO! VERSION 4.X (UCI)... 4 3.... 6 4. WORLDSPAN GO! VERSION

More information

untitled

untitled 1 BCP(Business Continuity Plan) 1 BCP 2 BCP 6 9 10 BCP 10 11 BCP 12 BCP 15 BCP 16 BCP 17 17 BCP 18 BCP 19 22 24 25 26 28 28 33 37 BCP 41 BCP BCP BCP BCP BCP BCP(Business Continuity Plan) 1 2 BCPBusiness

More information

BIG‑IP Access Policy Manager | F5 Datasheet

BIG‑IP Access Policy Manager | F5 Datasheet 2 3 5 7 8 Secure Web Gateway 10 12 BIG-IP APM 13 F5 Global Services 13 13 BIG-IP Access Policy Manager (APM) LAN BIG-IP APM IT LAN 1 Web OAM XenApp Exchange Web Web Web Web Web web BIG-IP APM LAN IT /

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

dvi

dvi { SSH { 3 3 1 telnet ID ( ) ID ( 1) SSH(Secure SHell) (ID ) SSH SSH SSH login : userid password : himitsu login : userid psaaword: himitsu login : userid password : himitsu 1. Host 11 7 UNIX ( sakura)

More information

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策 IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: hidemitsu.izawa@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp / /2015.10

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

Lync Server 2010 Lync Server Topology Builder BIG-IP LTM Topology Builder IP Lync 2010 BIG IP BIG-IP VE Virtual Edition BIG-IP SSL/TLS BIG-IP Edge Web

Lync Server 2010 Lync Server Topology Builder BIG-IP LTM Topology Builder IP Lync 2010 BIG IP BIG-IP VE Virtual Edition BIG-IP SSL/TLS BIG-IP Edge Web 1.1 Microsoft Lync Server 2010 BIG-IP LTM 2 4 5 BIG-IP : Lync 6 BIG-IP : Lync 7 BIG-IP : - 8 BIG-IP : - 9 A: BIG-IP Microsoft Lync Server 2010 Microsoft Lync Server 2010 Office Communications Server BIG-IP

More information

Anti-Spam Seminar (IAjapan)

Anti-Spam Seminar (IAjapan) [ ] 2011.03.08 Internet Ini(a(ve Japan Inc. (IIJ) Shuji SAKURABA ( ) 1 Agenda JEAG 2 - I IIJ 2008.06.02 2011.01.02 (135 ) See Also: Internet Infrastructure Review McColo 3 - II 2010.09.27 2011.01.02 (14

More information

2

2 m.uehata@sii.co.jp 2 SII 1881 1892 1937 1959 3 SEIKO 1881 1955 1964 1974 1984 1992 1994 1998 1998 2002 2002 4 SII 1960 1970 1980 1990 CMOS IC LCD LCM 2000 COF 1937 VLSI FIB 5 < > SA EOA CAE < > 6 Network

More information

Mac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用)

Mac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用) Mac OS X Server QuickTime Streaming Server 5.0 Mac OS X Server 10.3 apple Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. QuickTime Streaming Server Apple Apple Computer, Inc. Apple

More information

¥Í¥Ã¥È¥ï¡¼¥¯¥×¥í¥°¥é¥ß¥ó¥°ÆÃÏÀ

¥Í¥Ã¥È¥ï¡¼¥¯¥×¥í¥°¥é¥ß¥ó¥°ÆÃÏÀ 2 : TCP/IP : HTTP HTTP/2 1 / 22 httpget.txt: http.rb: ruby http get Java http ( ) HttpURLConnection 2 / 22 wireshark httpget.txt httpget cookie.txt ( ) telnet telnet localhost 80 GET /index.html HTTP/1.1

More information

橡C16.PDF

橡C16.PDF Linux (Linux Business Initiative ( ) ) 1998 12 17 InternetWeek 98 ( ) Internet Week98 1998 Motoharu Kubo, Japan Network Information Center Linux 1. 2. 3. 4. 5. 6. 7. 8. 9. Q&A Linux( ) BP Software Design

More information

電子メールのセキュリティ

電子メールのセキュリティ S/MIME 1...1 1.1... 1 1.2... 2 1.3... 2 2...3 2.1... 3 2.2... 4 2.3... 4 3...5 3.1... 5 3.2... 6 3.3... 8 3.4... 10 4...12 4.1 PGP... 12 4.2 (CA)... 13 5 CRL...15 5.1 ( ID )... 15 5.2 CRL(Certificate Revocation

More information

FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client Edge Client Edge Client Edge Client LAN Edge Client VPN Wi

FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client Edge Client Edge Client Edge Client LAN Edge Client VPN Wi Security FirePass SSL VPN FirePass SSL VPN Virtual Edition VE) 1 Web E 11 12 icontrol SSL VPN API 12 FirePass FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client

More information

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi

Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi PCoIP TER0806003 TER0806003 Issue 2 0 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradici Teradici Teradici

More information

1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh.......

1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh....... 2001 1 1 OS 3 1.1 OS.................................................... 3 1.2 OS................................................... 3 1.2.1 Macintosh............................................... 3 1.2.2

More information

第1章 調査の概要

第1章 調査の概要 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 (A) PS REG (B) ( (C) MS MR C C 1 2 (D)Instant Message (E) 20 21 22 InterSafe FireWall Internet Internet InterSafe InterSafe STOP InterSafe FireWall Internet

More information

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi 3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.

More information

<Documents Title Here>

<Documents Title Here> Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone

More information

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR / SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices

More information

untitled

untitled FLASHWAVE 2040 M1 2005 FLASHWAVE 2040 M1 AC AC AC FG () AC AC AC AC - i - FLASHWAVE 2040 M1 AC AC AC AC AC AC100V(50Hz/60Hz) AC - ii - FLASHWAVE 2040 M1 AC AC - iii - FLASHWAVE 2040 M1 VCCI This equipment

More information

ScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gat

ScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gat ScreenOS 5.0 1 2 ScreenOS 5.0 ScreenOS 5.0 Deep Inspection VLAN NetScreen-25/-50/-204/-208 HA NetScreen-25 HA Lite NetScreen-25 NetScreen-50) ALG(Application Layer Gateway NAT Destination NetScreen-Security

More information

Windows と Linux のセキュリティ: 噂の真相

Windows と Linux のセキュリティ: 噂の真相 Windows Linux : Windows NT (JWNTUG) Event Planning Working Group 1: Linux Windows 2: Apache IIS 3: Netscape / Mozilla,, Opera IE 4: Microsoft fix JWNTUG JWNTUG at your own risk 1: Linux Windows (1) Eiji

More information

worm hoihoi

worm hoihoi true@sfc.wide.ad.jp / (IDS, Honeypot), Web / : Darknet AS65531 10.0.0.0/8 Prefix longest match next hop AS Internet Customer A 10.1.0.0/16 AS 65531 10.0.0.0/8 Customer B 10.2.0.0/16 ( ) The Team Cymru

More information

Si-R180 ご利用にあたって

Si-R180 ご利用にあたって P3NK-2472-01Z0 GeoStream Si-R 180 LAN 2007 7 Microsoft Corporation All rights reserved, Copyright 2007 2 ...2...5...5...5...5...6...7...8...8...11...11 LAN...11...11...12...12...12...12...12...13 ISO/IEC15408...14

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

Cisco Aironet 1130AG アクセス ポイント クイック スタート ガイド

Cisco Aironet 1130AG アクセス ポイント クイック スタート ガイド CONTENTS 1 IP 2 3 6 7 9 12 15 17 18 IP 20 CLI IP 21 Telnet CLI 23 24 28 802.11G 802.11A 34 38 Express Security 40 Express Security 41 SSID 42 47 LED 48 50 SSID50 WEP 50 51 52 MODE 52 Web 53 55 1 56 IP

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

Dec , IS p. 1/60

Dec , IS p. 1/60 Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60

More information

Broadband Internet I / 1 1 I / 1 2

Broadband Internet I / 1 1 I / 1 2 Broadband Internet I / 1 1 I / 1 2 I / 1 3 PSTN: Network as service infrastructure Circuit switch I / 1 4 Internet: End-to-End model Core routers Core routers I / 1 5 Internet I / 1 6 TCP/IP Application

More information

橡c03tcp詳説(3/24修正版).PDF

橡c03tcp詳説(3/24修正版).PDF 1 1 2 TCP 1 3 TCP 9 4 TCP 15 5 21 6 TCP 25 7 27 TCP 1 TCP Windows98 Linux Solaris TCP(Transmission Control Protocol) IP TCP UDP UDP TCP UDP TCP 1 TCP RFC793 RFC2581 TCP 4-1 - DataLink header IP header

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

Oracle Identity Managementの概要およびアーキテクチャ

Oracle Identity Managementの概要およびアーキテクチャ Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

IT講習会

IT講習会 2002 CAVIN SR 2002/10/12-14 2 2002/10/12-14 3 http://www.npa npa.go..go.jp/police_j.htm 2002/10/12-14 4 1 2 3 4 5 6 7 2002/10/12-14 5 2002/10/12-14 6 2002/10/12-14 7 1 2 3 4 5 6 7 2002/10/12-14 8 IT IT

More information

i TCP/IP NIC Intel 3com NIC TCP/IP *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP *1 3

i TCP/IP NIC Intel 3com NIC TCP/IP *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP *1 3 i TCP/IP NIC Intel 3com NIC TCP/IP 78 90 500 *1 20 IPv4 IPv6 IPv6 TCP/IP TCP/IP 79 80 *1 3 ii IPv4 IPv4 *2 *3 IPv6 5 IPv6 UDP UDP IP UDP IP TCP/IP IPv6 IPv4 TCP/IP IPv6 TCP/IP TCP/IP TCP/IP TCP/IP IPv6

More information

VNSTProductDes3.0-1_jp.pdf

VNSTProductDes3.0-1_jp.pdf Visual Nexus Secure Transport 2005/10/18 Visual Nexus http:// www.visualnexus.com/jp/support.htm Visual Nexus Secure Transport 2005/02/25 1 2005/10/18 Ver3.0-1 2005 10 18 108-0075 21119 2 Visual Nexus

More information