{"updated":"2025-01-19T19:31:33.144557+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00206131","sets":["1164:4088:10109:10209"]},"path":["10209"],"owner":"44499","recid":"206131","title":["セキュリティインシデント実例を元にした各種ガイドラインの対策評価と,効果的なセキュリティ対策の提言"],"pubdate":{"attribute_name":"公開日","attribute_value":"2020-07-03"},"_buckets":{"deposit":"af332289-0402-4027-841e-f4c7a195dcc9"},"_deposit":{"id":"206131","pid":{"type":"depid","value":"206131","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"セキュリティインシデント実例を元にした各種ガイドラインの対策評価と,効果的なセキュリティ対策の提言","author_link":["511855","511853","511856","511858","511854","511857"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"セキュリティインシデント実例を元にした各種ガイドラインの対策評価と,効果的なセキュリティ対策の提言"},{"subitem_title":"Evaluate security countermeasure from security incident and security guidelines","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ・教育","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2020-07-03","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"トレンドマイクロ株式会社"},{"subitem_text_value":"トレンドマイクロ株式会社"},{"subitem_text_value":"立命館大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Trend Micro Incorporated","subitem_text_language":"en"},{"subitem_text_value":"Trend Micro Incorporated","subitem_text_language":"en"},{"subitem_text_value":"Ritsumeikan University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/206131/files/IPSJ-IOT20050004.pdf","label":"IPSJ-IOT20050004.pdf"},"date":[{"dateType":"Available","dateValue":"2022-07-03"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT20050004.pdf","filesize":[{"value":"1.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"c35b378a-49d5-42ad-948e-8b3497c44640","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2020 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"田中, 啓介"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"東, 結香"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上原, 哲太郎"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Keisuke, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuka, Higashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tetsutaro, Uehara","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究では,セキュリティ対策に十分な費用を割くことが難しい組織が,効果的な対策を選定できることを目的とし,各種セキュリティガイドライン内で提言されている対策項目が,実際に発生したセキュリティインシデントの事例で有効であるかどうかの評価を行った.評価は,当該対策が施されていればセキュリティインシデント発生を防げていたかどうか,及び当該対策を施す難易度を踏まえて実施した.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"This research is for company who can't select and apply better security countermeasure because of expense. We picked up security countermeasures from security guideline and evaluate them with recent security incident. We also consider difficulty of each security countermeasures.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2020-07-03","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"2020-IOT-50"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:08:13.333654+00:00","id":206131,"links":{}}