Abstract:
This invention provides an information processing system for controlling, in the management of network resources, with a desired accuracy and at a lower cost, whether to perform operations for the network resources. The information processing system comprises a means that performs a determination as to whether to execute an Application Programming (API) called up by an operating subject and used for controlling the network resources, said determination being performed on the basis of a correspondence among the operating subject, a tenant that is a set consisting of the network resources for which the operating subject has been permitted to perform operations, and the API for which the execution by the operating subject has been permitted. This means then controls the execution of the API on the basis of a result of the determination.
Abstract:
In order to appropriately ensure authenticity of a security inspection execution terminal and provide an environment for executing security inspection, even when address information of the security inspection execution terminal is changed, an address management apparatus includes: an obtaining unit configured to obtain address information related to one or more security inspection execution terminals accessing a security inspection target system for security inspection; and a disclosure processing unit configured to disclose, in response to a request from a network node managing the security inspection target system, to the network node, address information related to the one or more security inspection execution terminals.
Abstract:
Action instruction information includes action procedure information. The action procedure information defines an action procedure of a person including a plurality of action steps. Log information is information with respect to access to an object to be monitored and is acquired from a security apparatus for monitoring the object to be monitored. An action trace unit traces advance of the action step in the action procedure based on the action instruction information and the log information. A trace display unit associates the advance of the action step with access to the security apparatus based on the log information and the advance of the action step traced by the action trace unit and displays them on a display device.
Abstract:
A communication system includes a communication apparatus configured to process a packet, and a controller configured to set the communication apparatus for processing a packet. The controller includes a memory storing instructions, and a processor configured to execute program instructions to determine a forwarding path for a packet addressed to a virtual machine based on an access rule indicating connectivity between virtual machines in accordance with an arrangement of the virtual machine, and set the communication apparatus for processing the packet.
Abstract:
In order to efficiently perform security inspection, an inspection support apparatus includes a reception processing section configured to receive information related to a plurality of activity histories for security inspections performed by a plurality of inspection apparatuses, a specifying section configured to specify a conforming activity history meeting a predetermined correlation condition, from the plurality of activity histories, and a generating section configured to generate information related to the conforming activity history.
Abstract:
A visualization device is communicable with one or a plurality of host servers for hosting a virtual system, and includes an information acquisition unit for collecting configuration information on the virtual system and the host server, a storage unit for storing the configuration information therein, and a drawing unit for expressing a virtual machine and a virtual network configuring the virtual system with different axes based on the configuration information stored in the storage unit, expressing a connection relationship between a virtual machine and a virtual network by linking the lines extending from the respective axes, and grouping virtual machines in units of server on which the virtual machines operate thereby to generate drawing information for expressing the configuration of the virtual system and the host server.
Abstract:
A apparatus management system includes: a forwarding node(s) that supplies identification information that uniquely identifies an individual terminal to a terminal management apparatus that manages the identification information; and the terminal management apparatus that discloses the identification information about a terminal to a corresponding user, requests the user to register himself/herself as a user of the terminal from a second terminal different from the terminal, and holds associates the terminal in association with the user.
Abstract:
In order to appropriately detect flaws in a structure related to security of a system related to at least one of software and hardware, a security inspection apparatus includes an obtaining unit that obtains one or more pieces of configuration information related to configuration of a system to be inspected in security inspection, the system being related to at least one of software and hardware, a determining unit that determines whether or not each of the one or more pieces of configuration information is associated with any of one or more types of security functions set as inspection items for the security inspection, and a generating unit that generates information related to the determination.
Abstract:
Action instruction information includes action procedure information. The action procedure information defines an action procedure of a person including a plurality of action steps. Log information is information with respect to access to an object to be monitored and is acquired from a security apparatus for monitoring the object to be monitored. An action trace unit traces advance of the action step in the action procedure based on the action instruction information and the log information. A trace display unit associates the advance of the action step with access to the security apparatus based on the log information and the advance of the action step traced by the action trace unit and displays them on a display device.
Abstract:
Provided is a more versatile technique that makes it possible to input dummy information in response to an attacker seeking to collect normal information that cannot be replaced with dummy information. In the present invention, a dummy information insertion device inserts dummy information into a second location that is determined using: first location information indicating a first location that contains normal information, from among all normal information in a computer, which cannot be replaced with other information; and insertion condition information that indicates conditions for determining the second location into which dummy information is to be inserted, with such dummy information resembling the normal information that cannot be replaced and not being present in the computer or in a local network connected to the computer.