摘要:
An information processor, which controls an incident response device to perform an incident response toward a communication device, realizes the following functions: detecting an incident occurrence in the communication device; storing response information which is information indicative of the incident response that the incident response unit should perform, and target information which is information to identify the communication device, with corresponding policy information regarding a response policy to an incident; outputting a list of the policy information when the incident occurrence is detected; receiving a selection of the policy information; retrieving the response information and the target information corresponding to the selected policy information, from the memory; and sending the incident response unit a command to perform the incident response based on the retrieved response information toward the communication device identified based on the retrieved target information.
摘要:
The content of operations is identified and an alert is generated to an operation having a high risk of information leakage.An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.
摘要:
The present invention efficiently displays in a tree structure form a file operation history. A file storage identifier, an operation identifier, and a count are stored as additional meta-information in an alternate data stream with respect to each file stored in a client terminal file system. The operation identifier manages a number of operations (operation generations). The count manages copy frequencies. This meta-information is also sent to a management apparatus, and used for displaying the file operation history in a tree structure form.
摘要:
A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent manipulation, and, if the determination is a positive result, performs security processing which is processing related to security of data to be transmitted. If the data is data within a group to which the user belongs and a destination of the data is a server or a storage device outside the group, the determination is a positive result.
摘要:
The present invention efficiently displays in a tree structure form a file operation history. A file storage identifier, an operation identifier, and a count are stored as additional meta-information in an alternate data stream with respect to each file stored in a client terminal file system. The operation identifier manages a number of operations (operation generations). The count manages copy frequencies. This meta-information is also sent to a management apparatus, and used for displaying the file operation history in a tree structure form.
摘要:
This information processing limitation system includes an information processing server computer 103 which provides an information processing service, and a terminal computer 101 which is coupled to the information processing server computer 103 and utilizes that information processing service. The terminal computer 101, when utilizing the information processing service, limits the utilization of the information processing service on the basis of a security state which is required for the utilization of the information processing service.
摘要:
An embodiment of this invention detects an improper operation to a file in a computer of a monitoring target in a computer system including a plurality of computers connected via a network. The monitoring target computer receives a file. The computer receives acquisition source information on the file transmitted from a different computer. The computer refers to information on improper operation requirements to determine whether transmission of the file meets the improper operation requirements or not, based on a combination of the acquisition source of the file indicated by the acquisition source information and a transmission destination of the file and if the improper operation requirements are met, it determines that the transmission of the file is an improper operation.
摘要:
A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent manipulation, and, if the determination is a positive result, performs security processing which is processing related to security of data to be transmitted. If the data is data within a group to which the user belongs and a destination of the data is a server or a storage device outside the group, the determination is a positive result.
摘要:
The content of operations is identified and an alert is generated to an operation having a high risk of information leakage.An agent monitors, for example, operations performed with respect to a dialogue displayed on a client PC. If a file is selected by an operation performed with respect to the displayed dialogue, the agent assigns an identifier indicating a source for the file to the file. If the file is sent as an attached file, the agent identifies an output destination for the attached file as well as the source for the attached file; and if the output destination for the attached file is an external Web server and the source for the attached file is a mail server, the agent generates an alert by determining that an unauthorized operation has been executed; and then sends the generated alert to a management server.
摘要:
In an integrated management system for providing a network system having a plurality of computers with a security function and managing a plurality of target products, implementation of the management system itself is facilitated by providing the management system with setting information templates prepared for respective target products, a management program for managing setting information files of target products actually used in a target network, an edit program for editing setting information files, and an install program for installing setting information files created by using the management program and the edit program in respective target devices.