摘要:
The content of operations is identified and an alert is generated to an operation having a high risk of information leakage.An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.
摘要:
In an integrated management system for providing a network system having a plurality of computers with a security function and managing a plurality of target products, implementation of the management system itself is facilitated by providing the management system with setting information templates prepared for respective target products, a management program for managing setting information files of target products actually used in a target network, an edit program for editing setting information files, and an install program for installing setting information files created by using the management program and the edit program in respective target devices.
摘要:
A security support and evaluation system in accordance with the present invention accepts from an operator via an input unit 16, a first specification of a system to be evaluated and a second specification of each of the components constituting the system, and then retrieves data from a security countermeasure database 131 stored in an external storage unit 13 and reads out security countermeasures to be executed to each of the components of the specified system to be evaluated, and then displays on a display unit 17, the security countermeasures read out in correspondence with each of the components of the specified system to be evaluated, and then accepts from the operator via the input unit 16, information whether or not each of the security countermeasures is executed, and thereafter evaluates the state of security based on the information and displays evaluation results on the display unit 17.
摘要:
A server system has stored therein a plurality of electronic transaction procedures corresponding to elements or combinations thereof including means of payment settlement of a purchased commodity, amount of deal, contents of the purchased commodity, financial institutions for making the settlement and so on. The server system selects one of the electronic transaction procedures corresponding to elements or a combination thereof, including means of payment settlement of a commodity to be purchased when a purchase-side client system requests a seller to sell the commodity. The electronic transaction procedure is distributed to the offer-side client, the purchase-side client and the settlement-side client through a communication network. Each of the offer-side client, the purchase-side client and the settlement-side client executes electronic transaction processes according to the distributed electronic transaction procedure. Either all of the selected electronic transaction procedure is distributed from the server system to the client systems at a time or parts of the electronic transaction procedure are successively distributed to the client systems from the server system.
摘要:
A server system has stored therein a plurality of electronic transaction procedures corresponding to elements or combinations thereof including unit of payment settlement of a purchased commodity, amount of deal, contents of the purchased commodity, financial institutions for making the settlement and so on. The server system selects one of the electronic transaction procedures corresponding to elements or a combination thereof, including unit of payment settlement of a commodity to be purchased when a purchase-side client system requests a seller to sell the commodity. The electronic transaction procedure is distributed to the offer-side client, the purchase-side client and the settlement-side client through a communication network. Each of the offer-side client, the purchase-side client and the settlement-side client executes electronic transaction processes according to the distributed electronic transaction procedure. Either all of the selected electronic transaction procedure is distributed from the server system to the client systems at a time or parts of the electronic transaction procedure are successively distributed to the client systems from the server system.
摘要:
The content of operations is identified and an alert is generated to an operation having a high risk of information leakage.An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.
摘要:
A virtual computer (VM) is allocated in such a manner that the excess or deficiency of a hardware resource of a physical computer does not occur preferably. A VM allocation apparatus that is configured to allocate a plurality of virtual computers (VM) to a plurality of physical computers is constructed. The VM allocation apparatus stores the VM load information that is information that indicates a resource load value of a VM for each of a plurality of time sections for every VM. The VM allocation apparatus selects at least two VMs in which a difference of resource load values is largest for every time section based on the VM load information and allocates the at least two VMs that have been selected to the same physical computer.
摘要:
A network management system which includes a plurality of network devices operating in a coordinated manner and a management server managing the network devices. The management server includes apparatus for defining policy information and for generating setup information using policy information to generate setup information for each network device. The system generates setup information for each network device, distributes setup information to each network device, installs setup information to each network device, enables settings, collects setup information for each network device, and organizes and checks for consistency in the collected information.
摘要:
In a network system in which each of multiple networks, each containing computers and relay computers, is connected to another network via multiple relay computers which belong to the network concerned, and the communication between two computers belonging to different networks is performed on a communication path via multiple relay computers, there is provided a management computer for collectively managing logs which are dispersively and separately recorded in the multiple respective relay computers.
摘要:
A method of conducting a connectionless communication in a network communication system including a client, a server, and a plurality of proxy servers which are disposed on a transmission path between the client and server. The communication is accomplished by use of specification of a communication address thereof and a port number dynamically assigned by the computer. (a) The server transmits own communication address and own port number to the client. (b) The client transmits own communication address and own port number as well as the communication address and port number of the server to a first adjacent proxy server computer. (c) The N-th (N≧1) proxy server transmits own communication address and own server side port number as well as the communication address and the port number of the server to an (N+1)-st proxy server. (d) step (e) is repeatedly executed by incrementally increasing N until the (N+1)-th proxy server becomes a terminal proxy server. (e) The terminal proxy server transmits its own communication address and its server and client side port numbers to the N-th proxy server. (f) The N-th proxy server sends own communication address and own client side port number and the communication address and the server side port number of the terminal proxy server to the (N−1)-th proxy server when N≧2 or the client when N=1. (g) step (f) is repeatedly executed by incrementally increasing N until N becomes one. (h) The client transmits a communication address and a server side port number of the proxy server to the server. (i) The connectionless communication is commenced after all computers acquire a communication address and an associated port number of each of the computers adjacent thereto.