摘要:
In a network management operation system connected via a communication line to a network having a plurality of object instances to be managed, the management information database stores management information of the containment relationship between object instances in the form of table. When an operator designates some object instances and enters a control command for the designated object instances, the management information of the designated object instances is retrieved from the management information database and a containment tree (management information having a containment structure) corresponding to the containment relationship between the designated object instances is generated, respectively within the network management operation system. In accordance with the generated containment tree, a scope pattern of Common Management Information Service (CMIS) of Open Systems Interconnection (OSI) is automatically generated.
摘要:
In a network management system, information items respectively of connection relationships, containment relationships, and display priority of a plurality of managed object instances (resources) are stored in a memory. According to a predetermined algorithm, there is calculated an evaluated value for display for each of the instances depending on the containment relationship information and display priority to select a limited number of instances representable on a screen. Displayed on the screen is a network layout diagram including icons representing the plural instances thus selected. When the user specifies one of the icons, the specified instance and a number of representable instances selected according to the evaluated values from a group of instances under the specified instance in the containment relationships are displayed in a new network layout diagram on the screen. When a fault occurs in either one of the instances, if an icon of the faulty instance is being displayed on the screen, the color thereof is changed into a second color. If the icon is not displayed on the screen, the color of icons being displayed for instances as high-ranking resources with respect to the faulty instance in the containment relationships is changed into a third color.
摘要:
A network management/display processing system having a network manager and a display unit, which selects data necessary for display from management data collected from a comunication network to be managed, and converts the selected data into a display data including a display identifier which is provided by the network manager. The display unit receives the display data from the network manager and displays on its screen, a management object corresponding to the display identifier contained in the display data. An attribute value for displaying a state of the management object on the screen in a distinct color manner may be attached to the display data and transmitted from the network manager to the display unit.
摘要:
A security system design supporting tool and method are disclosed, in which security requirements (PP) and security specifications (ST) used for designing a product or a system (TOE) based on CC requirements can be prepared efficiently and uniformly even by ordinary designers other than specialists. In a security system design supporting method, registered PPs and past PP/ST generation cases are so structured as to reuse and/or reference as templates, a draft is automatically generated, and the draft thus generated is additionally modified or corrected by partial automatic generation utilizing a database of past generation cases and partial case accumulated in the generation process thereof.
摘要:
A security support and evaluation system in accordance with the present invention accepts from an operator via an input unit 16, a first specification of a system to be evaluated and a second specification of each of the components constituting the system, and then retrieves data from a security countermeasure database 131 stored in an external storage unit 13 and reads out security countermeasures to be executed to each of the components of the specified system to be evaluated, and then displays on a display unit 17, the security countermeasures read out in correspondence with each of the components of the specified system to be evaluated, and then accepts from the operator via the input unit 16, information whether or not each of the security countermeasures is executed, and thereafter evaluates the state of security based on the information and displays evaluation results on the display unit 17.
摘要:
In order to provide an information security policy evaluation system in which information security policies can be efficiently and appropriately defined and operated in an organization, such as a corporation, treated threats operated on a second site are transmitted from a second information processing apparatus on the second site to a first information processing apparatus on a first site, threat information is transmitted from a third site collecting information on threats to the first information processing apparatus on the first site. The first information processing apparatus extracts treated threats which have been effective for threats having occurred actually, and untreated threats, out of the received treated threat and generates an evaluation report in which these are described. Moreover, a compensation amount of insurance against threats is changed based on the generated evaluation report.
摘要:
In an application cooperation apparatus for supporting configuration/reconfiguration of a business process support system, node class object information defining a logical AP object as an object class for each common process item and attribute and defining an inheritance relationship between object classes as a tree structure is provided to define interactively with a user a logical process model having logical AP objects as business components. Next, by referring to logical-physical object correspondence relationship information, an implementation process model for the logical process model is developed to generate execution control scripts in a definition language of this model.
摘要:
A design/evaluation support tool 100 is constructed from a table link use unit 110 identifying linkages between a threat-to-component correspondence table 125, a risk-value table 126, a component contribution rate table 127, and a risk-to-assurance level correspondence table 128, based on their respective duplicate items; and a component assurance level deriving unit 111 deriving an assurance level of each of components that conforms to a risk value of a threat that a security function of each of the components counters by weighting the risk value of the threat by a component rate of contribution based on linkages of the tables.
摘要:
In order to provide an information security policy evaluation system in which information security policies can be efficiently and appropriately defined and operated in an organization, such as a corporation, treated threats operated on a second site 102 are transmitted from a second information processing apparatus 112 on the second site 102 to a first information processing apparatus 111 on a first site 101, threat information is transmitted from a third site 103 collecting information on threats to the first information processing apparatus 111 on the first site 101. The first information processing apparatus 111 extracts treated threats which have been effective for threats having occurred actually, and untreated threats, out of the received treated threat and generates an evaluation report in which these are described. Moreover, a compensation amount of insurance against threats is changed based on the generated evaluation report.
摘要:
When a sender sends a transmission message to a receiver by use of a communication appliance such as telephone, portable telephone, facsimile or electronic mail, the transmission massage is temporarily received by a computer-telephony integration (CTI) server. The CTI server makes reference to a user contact table to thereby specify a contact point of the receiver at present and the kind of a communication appliance capable of being used by the receiver which are registered in advance in the user contact table. Then, the CTI server sends the transmission message to the receiver after automatic media conversion in accordance with the communication appliance and reception condition which are allowed for the receiver to use. A reception condition requested by the sender may be reflected in a part of the reception condition of the receiver.