2 Katsuya Uchida Katsuya Uchida 3 Katsuya Uchida Katsuya Uchida

Size: px
Start display at page:

Download "2 Katsuya Uchida Katsuya Uchida 3 Katsuya Uchida Katsuya Uchida"

Transcription

1

2 2 Katsuya Uchida Katsuya Uchida 3 Katsuya Uchida Katsuya Uchida

3 4 Katsuya Uchida 5 Katsuya Uchida

4 6 Katsuya Uchida 7 Katsuya Uchida

5 DNA 8 Katsuya Uchida 9 Katsuya Uchida

6 10 Katsuya Uchida Purdue Web Site 11 Katsuya Uchida

7 CS501 Introduction to Computational Science CS502 Compiling and Programming Systems CS503 Operating Systems CS510 Software Engineering CS514 Numerical Analysis CS515 Numerical Linear Algebra CS520 Computational Methods in Analysis CS525 Parallel Computing CS526 Information Security CS530 Introduction to Scientific Visualization CS531 Computational Geometry CS535 Interactive Computer Graphics CS536 Data Communication and Computer Networks CS541 Database Systems CS542 Distributed Database Systems CS543 Introduction to Simulation and Modeling of Computer Systems CS544 Simulation and Modeling of Computer Systems CS555 Cryptography CS565 Programming Languages CS569 Introduction to Robotic Systems CS572 Heuristic Problem-Solving CS574 Advanced Computer Graphics Applications CS580 Algorithm Design, Analysis, and Implementation CS584 Theory of Computation and Computational Complexity CS586 Algorithmic Robotics CS590 Topics in Computer Sciences CS590B CS590D CS590E CS590G CS590M CS590N CS590R CS590U CS603 CS614 CS615 CS626 CS635 CS636 CS638 CS641 CS650 CS655 CS661 CS662 CS668 CS690 CS690M Topics in Computational Molecular Biology Security Aspects in Distributed Systems Topical Lectures in Information Security Capturing, Modeling, Rendering 3D Structures Geometric Modeling and Graphics (tentative) Embedded Systems Design Unknown Course Title Access Control: Theory and Practice Advanced Topics in Distributed Systems Numerical Solution of Ordinary Differential Equations Numerical Solution of Partial Differential Equations Advanced Information Assurance Unknown Course Title Internetworking Multimedia Networking and Operating Systems Multimedia Database Systems Computational Aspects of Parallel Processing Advanced Cryptology Formal Compiling Methods Pattern Recognition and Decision-Making Processes Introduction to Artificial Intelligence Seminar on Topics in Computer Sciences Advanced Dynamic Memory Management 12 Katsuya Uchida CS526 : Information Security Introduction: Role of security, Types of security, Definitions. Classification Schemes, Access Control Formalisms: Information flow, Protection Models Policy: Risk Analysis, Policy Formation, Role of audit and control Formal policy models. Cryptography: Cipher methods, Key management, digital signatures Authentication and Identity System Design principles. TCB and security kernel construction, Verification, Certification issues Midterm Exam System Verification Network Security. Distributed cooperation and commit, Distributed authentication issues. Routing, flooding, spamming. Firewalls Audit Mechanisms Malicious Code: Viruses, Worms, etc. Intrusion Detection and Response Vulnerability Analysis Physical threats, operational security, Legal and Societal Issues Final Exam 13 Katsuya Uchida

8 14 Katsuya Uchida 15 Katsuya Uchida

9 16 Katsuya Uchida 17 Katsuya Uchida

10 18 Katsuya Uchida. MSISTM 19 Katsuya Uchida

11 . MSISTM 20 Katsuya Uchida 21 Katsuya Uchida

12 22 Katsuya Uchida 23 Katsuya Uchida

13 Firewalls, Perimeter Protection and VPNs IP Stimulus/Response and Fragmentation Complex IP Transports and Services TCPdump, WINdump, Ethereal and Other Sniffers Business Needs vs. Security Static Packet Filtering Stateful Packet Filtering and Inspection Proxies In-depth Coverage of Popular Firewall Products Implementing Security with Cisco Routers Intrusion Detection Centralized Logging Firewall Log File Analysis Log File Alerting IPSec, SSL, and SSH Designing a Secure Perimeter "Cool Tools Network and Host Based Auditing 24 Katsuya Uchida Intrusion Detection In-Depth TCP/IP for Intrusion Detection Intrusion Detection Using Snort TCPdump Review Introduction TCP/IP Communication Model Modes of Operation Fragmentation Writing Snort Rules ICMP Configuring Snort as an IDS Stimulus and Response Output Analysis Microsoft Networking and Security Domain Name System Routing IPsec Advanced Topics Network Traffic Analysis Using tcpdump IDS Signatures and Analysis Introduction to TCPdump Intrusion Detection Architecture Writing TCPdump Filters TCPdump Filters A Close Look at the Famous Mitnick Attack Analysis of TCPdump Output Intrusion Detection Analysis Advanced Analysis Examining Datagram Fields with Common Errors and How to Avoid Them TCPdump Traffic and Externals Analysis 25 Katsuya Uchida

14 Hacker Techniques, Exploits and Incident Handling Incident Handling Step-by-Step Computer Crime Investigation Preparation Maintaining Access Identification Covering the Tracks Containment Eradication Recovery Special Actions for Responding to Different Types of Incidents Incident Record Keeping Incident Follow-Up Putting It All Together Computer and Network Hacker Exploits Hacker Tools Workshop Reconnaissance Hands-on Installation and Analysis Scanning General Exploits Intrusion Detection System Evasion Network-Level Attacks Gathering and Parsing Packets DNS Injection Operating System and Application-Level Attacks Web Application Attacks Denial of Service Attacks Other Attack Tools and Techniques 26 Katsuya Uchida Auditing Networks, Perimeters and Systems Auditing Principles and Concepts Auditing Networks with Nmap and Other Tools - Hands-on Auditor's Role in Relation to Introduction Benefits of Various Auditing Standards Getting Started With Nmap and Certifications Mapping Your Network Basic Auditing and Assessing Strategies Analyzing The Results The Six-Step Audit Process Follow-on Activities Auditing the Perimeter Advanced Systems Audit: Windows NT/ Handson Overview Auditing to Create a Secure Configuration Detailed Audit of a Router Auditing to Maintain a Secure Configuration Testing the Firewall Auditing to Determine What Went Wrong Testing the Firewall Rulebase Testing Third Party Software Reviewing Logs and Alerts The Tools Used War Dialing War Driving Forensics Auditing Web Based Applications - Hands-on Advanced Systems Audit: Unix - Hands-on Auditing to Create a Secure Configuration Auditing to Maintain a Secure Configuration Auditing to Determine What Went Wrong Forensics 27 Katsuya Uchida

15 System Forensics, Investigations, and Response Forensic and Investigative Essentials - Hands-on Windows 2000/XP Forensics - Hands-On Incident Response and Forensics Windows Live System Examination Forensic Theory on Any Operating Systems Windows 2000 Imaging Hands-On Forensic Lab Configuration Searching for clues Registry and Information Malicious Programs Low-Level Analysis Basic Forensic Principles Illustrated with Linux - Frameworks and Best Practices: Managerial and Hands On Legal Issues Essential Forensic Tools A Framework for Forensics Concepts How to Collect and Protect Evidence - The Disk Image Legal Permissions and Restrictions on Internal Investigations of Incidents Heart of the Crime in Linux Internet Service Providers Filesystem Forensics Law Enforcement Network Forensics Analyzing a Real World Compromise Evidence Integrity The Coroner's Toolkit, TASK, and Autopsy - Advanced Forensic - Hands-on Hands-On TCT Toolkit Kernel Module Forensics TASK Toolkit Malware Dissection and Analysis Creating Timelines Advanced /proc directory breakdown Autopsy Forensic Browser Process Wiretapping The Forensic Challenge The Forensic Challenge 28 Katsuya Uchida 29 Katsuya Uchida

16 30 Katsuya Uchida 31 Katsuya Uchida

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing

More information

CSX トレーニング環境 2019/Jan Version9 [LAB Vol1] 要素 特定 Identify 防御 Protect 検知 Detect 対応 Response 復旧 Recover 上級 14.Web アプリケーションのテスト (Testing Web Applications)

CSX トレーニング環境 2019/Jan Version9 [LAB Vol1] 要素 特定 Identify 防御 Protect 検知 Detect 対応 Response 復旧 Recover 上級 14.Web アプリケーションのテスト (Testing Web Applications) CSX トレーニング環境 2019/Jan Version9 [LAB Vol1] 14.Web アプリケーションのテスト (Testing Web Applications) 12. ブラウザ攻撃 (Browser Attacks) 15. マルウェアの解析 (Malware Analysis) 13.Secure Copy による原状復帰 (Restoring Data with Secure

More information

Cisco ASA Firepower ASA Firepower

Cisco ASA Firepower ASA Firepower Cisco ASA Firepower ASA Firepower 1 2 3 4 1 1-1 Cisco ASA Cisco ASA Firepower Cisco ASA with Firepower Services Cisco Adaptive Security Device Manager ASDM MEMO Cisco ASA with Firepower Services Application

More information

今企業が取るべきセキュリティ対策とは策

今企業が取るべきセキュリティ対策とは策 AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.

More information

Design and Implementation of Centralized Financial Management system 厦门大学博硕士论文摘要库

Design and Implementation of Centralized Financial Management system 厦门大学博硕士论文摘要库 Design and Implementation of Centralized Financial Management system 2011 4 Internet JSP MVC JSPMVC Abstract Abstract With computer technology, network technology and information technology, more and

More information

Elastic stack Jun Ohtani 1

Elastic stack Jun Ohtani 1 Elastic stack Jun Ohtani 2017/12/06 @johtani 1 about Me, Jun Ohtani / Technical Advocate lucene-gosen ElasticSearch Server http://blog.johtani.info Elasticsearch, founded in 2012 Products: Elasticsearch,

More information

2-20030509.PDF

2-20030509.PDF JPCERT/CC 1 Firewall 2 Security Incident 3 Cgi-bin Cross Site Scripting (CSS) 4 Statistics@JPCERT/CC 3,000 2,500 2,000 1,500 1,000 500 0 1996Q4 1997 1998 1999 2000 2001 2002 Number of Reports 5 2002 JPCERT/CC

More information

- Principles for a Telecommunications management network 2.0 2001 11 27 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE 2 JT-M3010 ...19...20...20...20...20...21...22...23...24 3 JT-M3010 ...26...28...29...34...34...35...35...37...37...37...37...37

More information

SRX IDP Full IDP Stateful Inspection 8 Detection mechanisms including Stateful Signatures and Protocol Anomalies Reassemble, normalize, eliminate ambi

SRX IDP Full IDP Stateful Inspection 8 Detection mechanisms including Stateful Signatures and Protocol Anomalies Reassemble, normalize, eliminate ambi IDP (INTRUSION DETECTION AND PREVENTION) SRX IDP Full IDP Stateful Inspection 8 Detection mechanisms including Stateful Signatures and Protocol Anomalies Reassemble, normalize, eliminate ambiguity Track

More information

PDFŠp…f†[…^

PDFŠp…f†[…^ DIGITAL IMAGING SYSTEM DICOM Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview NEMA Part 4 Service Class Specifications Part 3 Information Object

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

2

2 Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/

More information

Taro12-認定-部門-ASG101-06

Taro12-認定-部門-ASG101-06 JIS Q 17025(ISO/IEC 17025(IDT)) JIS Q17025(ISO/IEC 17025(IDT)) --- --- JNLA JCSS ISO/IEC 17025 JIS Q 17025 IAJapan ILAC APLAC JIS Q17011 ISO/IEC 17011 MRA ILACAPLAC MRA IAJapan (3) JNLAJCSS (4) testing

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

ISMSクラウドセキュリティ認証の概要

ISMSクラウドセキュリティ認証の概要 Copyright JIPDEC ISMS, 2016 1 ISMS ISO/IEC 27017:2015 Copyright JIPDEC ISMS, 2016 2 JIS Q 27001(ISO/IEC 27001) ISO/IEC 27017 ISMS ISO/IEC 27017 ISO/IEC 27002 Copyright JIPDEC ISMS, 2016 3 ISO/IEC 27017:2015

More information

Japan Patent Office JPO JPO (INPIT) (INPIT) : : IPDL IPDL 7,100 7,100 AIPN AIPN INPIT INPIT IPDL 1. DB FI F PAJ (Patent Abstracts of Japan) 2. DB 3. DB FI/F AIPN (Advanced Industrial Property Network)

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

shio SA.ppt[読み取り専用]

shio SA.ppt[読み取り専用] 2005 213 Rootkit 2 ...... GPG EFS Windows 3 Rootkit + ifconfig, ps, ls, login Tripwire lkm-rootkit NT Rootkit, AFX Rootkit OS 4 HD... NTFS ADS Alternate Data Stream... NTFS HD HD...

More information

2008 A T1H () T1H II ,4,5 36 T1H II ,4,5 37 T1H ( ) 37 T1H T1H

2008 A T1H () T1H II ,4,5 36 T1H II ,4,5 37 T1H ( ) 37 T1H T1H 2008 A syll mksyltex Ver 2.10(2009-04-15) by higaki@tu.chiba-u.ac.jp 2008 A T1H308001 2.0 2 2 5 T1Y016003 2.0 2 5 5 T1Y016004 2.0 2 5 6 T1Y016005 2.0 2 5 UEDA EDILSON SHINDI 6 T1Y016001 2.0 2 5 7 T1Y016006

More information

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved. Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise

More information

189 2015 1 80

189 2015 1 80 189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87

More information

GUIDE_2013_H1

GUIDE_2013_H1 http: //www.interop.jp/ More Clouds, More Ways, More Innovations CONFERENCE PROGRAM GUIDE NW-0110:00-17:00 NW-0210:00-17:00 NW-0310:00-17:00 NH-0110:00-17:00 NH-0210:00-17:00 NH-0310:00-17:00 NC-0212:50-14:20

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

Oracle Application Server 10g(9

Oracle Application Server 10g(9 Oracle Application Server 10g (9.0.4) for Microsoft Windows J2EE Oracle Application Server 10g (9.0.4) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...24...24

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

IFAC International Auditing Practice Committee Issued by the International Federation of Accountants

IFAC International Auditing Practice Committee Issued by the International Federation of Accountants IFAC International Auditing Practice Committee Issued by the International Federation of Accountants Accounting estimate Accounting system Adverse opinion Agreed-upon procedures engagement Analytical

More information

スライド 1

スライド 1 ライフサイクルプロセスに関する国際標準とソフトウェアファクトリ ISO/IEC 15288, ISO/IEC 12207, INCOSE Handbook and IEEE Std 1517 松本吉弘 工学博士 ; IEEE Life Fellow 京都高度技術研究所 All Rights Reserved Yoshihiro Matsumoto; 2007 1 対象とした国際標準 IEEE Std

More information

PMI2005北米大会報告書

PMI2005北米大会報告書 2 3 Metro Toronto Convention Center Toronto, Canada PMI PMI SIG Meeting Paper Presentation PM PM PMI 4 5 8-15 Sep. 2005, Metro Toronto Convention Center, Toronto, Canada 6 7 CEO PM 180,000 PMI BMW PMI

More information

untitled

untitled - 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - ..... - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - -- - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - - 29

More information

Research on productivity improvement of business operations for manufacturing, distribution and health-care industries. The research on product and facility life cycle design and management is performed

More information

PowerPoint

PowerPoint 2011 12 6PTC Live TechForum TOKYO manji@rd.denso.co.jp 1/ 52 1949 12 16 1,874 ( ) 1 9,457 3 1,315 ( ) 38,318 123,165 ( ) 2011 3 31 Gr. Gr. Gr. Gr. Gr. PF 2/ 52 1 2 3 4PMT 5 Integrity 6 7 8 1/2 3/ 52 OEM

More information

Japanese.PDF

Japanese.PDF 2002 11 2 3 Part I 4 5 6 3.1WTO/TBT 2 3 6 3.2ISO/IEC 7 3.3 7 3.4 7 3.5 8 3.6 8 9 4.1 9 4.2 9 4.3 10 12 Part II 13 1.1 13 1.2 13 1.3 14 1.4 14 1.5 14 2 14 3 15 3.1 15 3.2 16 3.3 17 3.4 17 3.5 18 3.6 18

More information

Testing XML Performance

Testing XML Performance - DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER

More information

Configuring_01

Configuring_01 Symantec Backup Exec Dell EqualLogic Microsoft Exchange Server SQL Server IT / / 24 365 Symantec Backup Exec Advanced Disk-based Backup Option (ADBO) Dell Equal- Logic Microsoft Exchange Server 2003 2007

More information

Oracle Application Server 10g( )インストール手順書

Oracle Application Server 10g( )インストール手順書 Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...25...25

More information

<Documents Title Here>

<Documents Title Here> Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone

More information

プロダクトガイド・表1

プロダクトガイド・表1 ystem S o l u t i o n s Storage Solutions HP Solutions e-business Solutions Mechanical Computer-Aided Design Authoring Software to Create Better Product Documentation Contents Secure File Transfer Solution

More information

Firewall IDS IP IP 1 HTTP 74% Quick Search 32 bit DDMP 4 23.02 Mbps URL Filtering 59.3 Mbps i

Firewall IDS IP IP 1 HTTP 74% Quick Search 32 bit DDMP 4 23.02 Mbps URL Filtering 59.3 Mbps i 16 Pipelined Signature Matching for Malicious Access Detection 1050371 2005 3 11 Firewall IDS IP IP 1 HTTP 74% Quick Search 32 bit DDMP 4 23.02 Mbps URL Filtering 59.3 Mbps i Abstract Pipelined Signature

More information

2004 SYN/ACK SYN Flood G01P014-6

2004 SYN/ACK SYN Flood G01P014-6 2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................

More information

SSO Sales/Tech combined webinar template

SSO Sales/Tech combined webinar template HP Web e-speak web HP Agenda page 2 Search Engine Google Web Site www.hp.com Search Engine Yahoo Web page 3 Web Web Web page 4 CHAPTER 1 Do It Yourself CHAPTER 2 Do It For Me PC,, ITS... etc.) page 5 E-service

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

Web Microsoft 2008 R2 Database Database!! Database 04 08

Web   Microsoft 2008 R2 Database Database!! Database 04 08 Database Database Web http://www.microsoft.com/japan/sqlserver/2008/r2/solution/comparison/default.mspx Microsoft 2008 R2 Database Database!! 03 2009 6 1 Database 04 08 vs. Database 12 2008 R2 5 14! 5!

More information

Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta,

Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta, IBM IBM Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta, US Atlanta, US Heredia, CO Haifa, IL New Delhi,

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

nakayama15icm01_l7filter.pptx

nakayama15icm01_l7filter.pptx Layer-7 SDN SDN NFV 50 % 3 MVNO 1 2 ICM @ 2015/01/16 2 1 1 2 2 1 2 2 ICM @ 2015/01/16 3 2 Service Dependent Management (SDM) SDM Simple Management of Access-Restriction Translator Gateway (SMART-GW) ICM

More information

ITSM.PDF

ITSM.PDF HP IT - ITIL / HP ITSM - - ITSM Revision-1.1 2004 Hewlett-Packard Development Company, L.P. HP IT - Current Global Deployment : 140,000 : 72Billion US$ (2002 ) Applications 5,000 Databases 7,928 PC Managed

More information

4_3.dvi

4_3.dvi Vol. 49 No. 4 1680 1691 (Apr. 2008) Malware 1, 2 1 2 DDoS Herder Malware Malware Malware A Development of the Malware Dynamic Behavior Analyzing System and BOTNET Monitoring Keiichi Horiai, 1, 2 Takafumi

More information

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**

More information

The Nature of Human Intelligence Corporate Creativity- How Innovation and Improvement Actually Happen Creativity and Innovation Principia Managementa The Medici Effect: Breakthough Insights the Intersection

More information

IPSJ SIG Technical Report Vol.2015-MUS-107 No /5/23 HARK-Binaural Raspberry Pi 2 1,a) ( ) HARK 2 HARK-Binaural A/D Raspberry Pi 2 1.

IPSJ SIG Technical Report Vol.2015-MUS-107 No /5/23 HARK-Binaural Raspberry Pi 2 1,a) ( ) HARK 2 HARK-Binaural A/D Raspberry Pi 2 1. HARK-Binaural Raspberry Pi 2 1,a) 1 1 1 2 3 () HARK 2 HARK-Binaural A/D Raspberry Pi 2 1. [1,2] [2 5] () HARK (Honda Research Institute Japan audition for robots with Kyoto University) *1 GUI ( 1) Python

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

本文/YAZ172P

本文/YAZ172P 2004 2005 2006 2007 Committee of Sponsoring Organizations of Treadway Commission COSO 1992 Internal Control-Integrated Framework COSO 1 1 COSO 2009 7 27 2009 9 11 21 1956 1980 1986 MBA 1980 2006 1990 1993

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

fx-9860G Manager PLUS_J

fx-9860G Manager PLUS_J fx-9860g J fx-9860g Manager PLUS http://edu.casio.jp k 1 k III 2 3 1. 2. 4 3. 4. 5 1. 2. 3. 4. 5. 1. 6 7 k 8 k 9 k 10 k 11 k k k 12 k k k 1 2 3 4 5 6 1 2 3 4 5 6 13 k 1 2 3 1 2 3 1 2 3 1 2 3 14 k a j.+-(),m1

More information

Copyright

Copyright 2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright

More information

スライド 1

スライド 1 FISMA 1 1 2 3 4 1 ISO/IEC 27001) (27003,27004,27007 3416 2010 2 ) IPA 5 6 7 http://csrc.nist.gov/groups/sma/fisma/index.html 8 9 (2003-2008) 2008) 10 SP 800-53 FISMA SP 800-53 GISRA FISMA 2002/12/17 SP

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

スライド 1

スライド 1 NIST SP800 BCPContingency Contingency Planning 200621 1. IPAIPA 2. BCP/BCM 3. NIST SP800 FISMA 4. SP800-53 5. SP800-34 IT Contingency Planning Guide for Information Technology Systems IT January 2004 2

More information

Oracle Application Server 10g(9

Oracle Application Server 10g(9 Oracle Application Server 10g(10.1.2) for Microsoft Windows Infrastructure Oracle Application Server 10g(10.1.2) for Microsoft Windows Infrastructure...2...3...4...5...7...7...7 OS...10...12...13...15...29...29

More information

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi 3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

集中講義 インターネットテクノロジー 第5回

集中講義 インターネットテクノロジー 第5回 5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

,,, J-SOX ISMS PCIDSS,, IM/VoIP/VoD Copyright 2008 Juniper Networks, Inc. 2

,,, J-SOX ISMS PCIDSS,, IM/VoIP/VoD Copyright 2008 Juniper Networks, Inc.   2 NAC Advanced Technologies Business Development Manager Toru Konno toruk@juniper.net v1.81 Copyright 2008 Juniper Networks, Inc. www.juniper.co.jp 1 ,,, J-SOX ISMS PCIDSS,, IM/VoIP/VoD Copyright 2008 Juniper

More information

Oracle Database 10gのOracle Data Guard

Oracle Database 10gのOracle Data Guard Oracle Database 10g Oracle Data Guard 2004 Oracle Data Guard... 3... 3... 3 Oracle Data Guard... 4 Oracle Data Guard... 4 Oracle Data Guard... 4 Oracle Data Guard... 5 Oracle Data Guard... 6 Oracle Data

More information

wpEnterpriseSvr.doc

wpEnterpriseSvr.doc COBOLJava.NETWeb IT COBOL Micro Focus Enterprise Server Enterprise Server COBOL Enterprise Server COBOL Enterprise Server COBOL COBOL COBOL Java.NET IT Micro Focus COBOLJ2EE.NET Web COBOL Enterprise Server

More information

Microsoft Word - sugiyama.doc

Microsoft Word - sugiyama.doc backtrack ( ) sugiyama[atmark]yamanashi.ac.jp 1. Web Linux ssh firewall firewall ( 1) Linux backtrack Debian,OpenSUSE,FreeBSD PC-UNIX PC backtrack CD USB 2. backtrack Linux ( 2) CD USB VMware 3 USB Vmware

More information

1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar

1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar DNS Web Web Request Policy Framework 1,a) 2 1 2011 11 30, 2012 6 1 Web Web Drive-by download Gumblar Web Web JavaScript Web Web Request Policy Framework Request Policy Framework Web Gumblar DNS Proposal

More information

untitled

untitled Studies in Human Geography 32 Geoenvironmental Sciences, Graduate School of Life and Environmental Sciences, University of Tsukuba, Japan ArcGIS Geography Network ArcGIS ArcGIS ArcGIS Geography Network

More information

403-0702_‚Ofl¼

403-0702_‚Ofl¼ HP-UX HP System Insight Manager Whitepaper ..................................................................................2..............................................................2 SIM....................................................................................2.............................................................3................................................................................3

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

MAAB でのプレゼンテーション に関する提案

MAAB でのプレゼンテーション に関する提案 J-MAAB 2005 10 27 (1) OBD (2) (3) (4) OEM (5) MAAB J-MAAB 1. MBD (Model-Based Development) MBD Process 2. MAAB MAAB 3. J (Japan) -MAAB J-MAAB 4. J-MAAB WG WG 5. MBD Virtual World *SILS Rapid *HILS Real

More information

Mac OS X Server Windows NTからの移行

Mac OS X Server Windows NTからの移行 Mac OS X Server Windows NT 10.4 apple Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. Mac OS X Server Apple 1 Infinite Loop Cupertino CA 95014-2084 U.S.A. www.apple.com 163-1480 3 20

More information

生物の運動を目指して

生物の運動を目指して Fukuda Lab., Nagoya University Fukuda Lab., Nagoya University Robotics Generation Fukuda Lab., Nagoya University The Fourth The Third Generation The Second Generation(Service) The First Generation(Manufacturing)

More information

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

陶 磁 器 デ ー タ ベ ー ス ソ リ ュ ー シ ョ ン 図1 中世 陶 磁 器 デ ー タベ ー ス 109 A Database Solution for Ceramic Data OGINO Shigeharu Abstract This paper describes various aspects of the development of a database

More information

IP IPv4-IPv6

IP IPv4-IPv6 IPv6 Mobility IETF 2006 6 9 14:00-15:30 Interop Tokyo 2006 IIJ Nautilus6 IP IPv4-IPv6 L2 L3 Mobile IPv6 HIP L3.5 Shim6(?) L4 SCTP IPv6 Mobile IPv6/NEMO BS IETF RFC3775 - Mobile IPv6 RFC3963 - NEMO Basic

More information

¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó

¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó 1 2011 5 11 lumeta internet mapping http://www.lumeta.com http://www.cheswick.com/ches/map/ 2 / 43 ( ) 3 / 43 (Kenjiro Cho) WIDE 1984 ( ) OS 1993 1996 ( ) (QoS ) 2001 ( ) 2004 ( ) QoS 4 / 43 (Internet

More information

PowerPoint Presentation

PowerPoint Presentation インターネット Web アクセスを安全に お問い合わせ先 本資料や F5 製品に関するお問い合わせは以下までお気軽にご連絡ください メールでのお問い合わせは : http://www.f5networks.co.jp/inquiry/ お電話でのお問い合せは : 03-5114-3850 [ インサイドセールス ] 10:00 ~ 18:00 ( 土日祝日を除く ) 社員のインターネット利用 安全ですか?

More information

4 14 21 37 39 47 56 64 75 77 86 95 103 112 123 137 153 2 163 173 185 203 213 217 227 228 233 241 242 244 246 248 250 253 254 256 257 259 3 14 12 4 10 2 16 46 1 15 1 15 15 15 5 10 11 6 12 13 14 15 15 16

More information

Vol.54 No (June 2013) GSRAv2 1,a) 1,b) 1,c) 1,d) , IPsec-VPN SSL-VPN OpenVPN PacketiX VPN GSRA Group-based Secure Remote

Vol.54 No (June 2013) GSRAv2 1,a) 1,b) 1,c) 1,d) , IPsec-VPN SSL-VPN OpenVPN PacketiX VPN GSRA Group-based Secure Remote GSRAv2 1,a) 1,b) 1,c) 1,d) 2012 9 21, 2013 3 1 IPsec-VPN SSL-VPN OpenVPN PacketiX VPN GSRA Group-based Secure Remote Access NAT GSRA GSRA NAT GSRAv2 GSRAv2 NAT VPN Proposal and Evaluation of GSRAv2 that

More information

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR / SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices

More information

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake

More information

Introduction to Information and Communication Technology (a)

Introduction to Information and Communication Technology (a) Introduction to Information and Communication Technology (a) 5 th week: 1.4 Transmission, exchange and evaluation of information Kazumasa Yamamoto Dept. Computer Science & Engineering Introduction to ICT(a)

More information

専攻科シラバス 一般科目

専攻科シラバス 一般科目 (Practical English) () 12 2 2 TOEIC TEST TOEIC 1. TOEIC TEST 2. B () 2 Unit 1 Shopping 2 Unit 2 Entertaiment Weather 2 Unit 3 Eating out 2 Unit 4 Travel 2 Unit 5 Health 2 2 Unit 6 Housing Media 2 Unit

More information

fiš„v8.dvi

fiš„v8.dvi (2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp

More information

untitled

untitled SUBJECT: Applied Biosystems Data Collection Software v2.0 v3.0 Windows 2000 OS : 30 45 Cancel Data Collection - Applied Biosystems Sequencing Analysis Software v5.2 - Applied Biosystems SeqScape Software

More information

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

スライド 1

スライド 1 2010.2.18 CSS Nite in Ginza Vol.44 JIS X 8341-3 60 1 2004 vs 2010 2010 2 18 2010.2.18 CSS Nite in Ginza Vol.44 3 2004 10 Web Web JIS X 8341-3 W3C / WCAG 2010.2.18 CSS Nite in Ginza Vol.44 2010.2.18 CSS

More information

Oracle Enterprise Manager概説 リリース2.2

Oracle Enterprise Manager概説 リリース2.2 Oracle Enterprise Manager 2.2 2000 11 : J02261-01 Oracle Enterprise Manager 2.2 : J02261-01 Oracle Enterprise Manager Concepts Guide, Release 2.2 A85250-01 Copyright 1996, 2000, Oracle Corporation. All

More information

Oracle Identity Managementの概要およびアーキテクチャ

Oracle Identity Managementの概要およびアーキテクチャ Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application

More information

Oracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Packインストレーション・ガイド リリース2.2

Oracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Packインストレーション・ガイド リリース2.2 Oracle Enterprise Manager Oracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Pack 2.2 2000 11 : J02263-01 Oracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Pack 2.2

More information

CP_SBA_Catalog2012_ indd

CP_SBA_Catalog2012_ indd Check Point 2 3 4 5 6 7 8 9 10 11 www.checkpoint.co.jp 2003-2012 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point 2200, Check

More information

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325 社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL

More information

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe

More information

<Insert Picture Here> Oracle Business Intelligence 2006/6/27

<Insert Picture Here> Oracle Business Intelligence 2006/6/27 Oracle Business Intelligence 2006/6/27 Oracle Business Intelligence Suite Enterprise Edition Oracle Warehouse Builder 10g Release 2 Agenda BI FY07 3 Oracle Business Intelligence 2007

More information

ESA_UI_1110.PDF

ESA_UI_1110.PDF ESA SAP SAP SAP Web AS SAP SAP : ESA ESA : CAF ESA SAP SAP SAP : ESA ESA : CAF ESA SAP SAP SAP Office???? SAP Japan Co., Ltd. 2004, Title of Presentation / Speaker Name / 4 SAP SAP : ESA ESA : CAF ESA

More information