{"updated":"2025-01-19T15:43:51.183363+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00216801","sets":["1164:4088:10830:10831"]},"path":["10831"],"owner":"44499","recid":"216801","title":["オンライン授業で行うセキュリティ教育におけるペネトレーションテスト演習の実践と評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-02-28"},"_buckets":{"deposit":"13d65c65-22b4-4676-91e6-bf6571dacaf9"},"_deposit":{"id":"216801","pid":{"type":"depid","value":"216801","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"オンライン授業で行うセキュリティ教育におけるペネトレーションテスト演習の実践と評価","author_link":["560360","560361"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"オンライン授業で行うセキュリティ教育におけるペネトレーションテスト演習の実践と評価"},{"subitem_title":"Practice and Evaluation of a Penetration Testing Exercise in Security Education Conducted Through Online Learning","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"SITE/IOT","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2022-02-28","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"北陸大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hokuriku University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/216801/files/IPSJ-IOT22056045.pdf","label":"IPSJ-IOT22056045.pdf"},"date":[{"dateType":"Available","dateValue":"2024-02-28"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT22056045.pdf","filesize":[{"value":"1.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"587ed6d1-8c31-47ab-870d-1b4bf067992e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"鈴木, 大助"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Daisuke, Suzuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究の目的は,学部生を対象とする情報セキュリティ教育の一環として,ペネトレーションテスト演習をオンライン授業で実施可能な形で提案・実践し,その教育効果を明らかにすることである.ペネトレーションテスト演習は,受講生各自が保有する PC に実験用仮想環境を構築して行うこととし,全体で 90 分授業 3 コマ分とした.講義動画はオンデマンドで公開し,質問対応には学習管理システムやチャットツールを利用した.趣旨説明・法令遵守・実験環境構築で 2 コマ分とし,講義動画は 8 本(合計 77 分)用意した.3 コマ目は,構築した仮想実験環境でポートスキャン・脆弱性検査・脆弱性攻撃からなるペネトレーションテストを行う内容とし,講義動画は 4 本(合計 57 分)用意した.演習の進捗状況アンケートおよび演習のふりかえりアンケートの結果から,受講生の大半が各自の PC に実験用仮想環境を構築し,各種ソフトウェアやコマンドを利用してペネトレーションテスト演習を完遂することができた.また,この体験を通じて攻撃者の視点や攻撃手法を知り,サイバー攻撃の脅威をより身近に感じた結果,情報セキュリティの重要性を意識するようになったこと,情報セキュリティに対して興味・関心を抱いたことが確認された.ペネトレーションテスト演習は,オンライン授業かつ各自の PC に仮想環境を構築して実施するという条件下でも,十分に実践可能であり,情報セキュリティに対する興味関心を喚起できると言える.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"7","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-02-28","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"45","bibliographicVolumeNumber":"2022-IOT-56"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:17:19.013167+00:00","id":216801,"links":{}}