{"created":"2023-07-25T09:07:33.616112+00:00","id":5948,"links":{},"metadata":{"_buckets":{"deposit":"358645be-b3cb-423e-ab57-754950b5864a"},"_deposit":{"created_by":3,"id":"5948","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"5948"},"status":"published"},"_oai":{"id":"oai:toyama.repo.nii.ac.jp:00005948","sets":["663:694:697:698:707"]},"author_link":["20077"],"item_3_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2012-03","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"44","bibliographicPageStart":"41","bibliographicVolumeNumber":"9","bibliographic_titles":[{"bibliographic_title":"富山大学総合情報基盤センター広報"}]}]},"item_3_description_15":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_3_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"昨年(2011年)は日本国内において,サーバ攻撃が多く新聞やニュースに取り上げられた。また,本学においても,サーバが学外から攻撃され,管理者権限が取得される事例も発生した。センターにおいても,インシデントの発生を予防するために,ネットワーク管理体制の強化を行っているが,実際に被害を防ぐには,各サーバの管理者の意識が重要になる。本稿は,サーバを運用する上で,管理者が知っておくべき必要な事項をまとめたものである。","subitem_description_type":"Abstract"}]},"item_3_description_40":{"attribute_name":"資源タイプ(DSpace)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_3_description_6":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"富山大学総合情報基盤センター広報, vol.9, Page 41-44","subitem_description_type":"Other"}]},"item_3_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"20077","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"9000004959662","nameIdentifierScheme":"CiNii ID","nameIdentifierURI":"http://ci.nii.ac.jp/nrid/9000004959662"},{"nameIdentifier":"20372477","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://nrid.nii.ac.jp/nrid/1000020372477"}],"names":[{"name":"Okino, Kouji"}]}]},"item_3_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.15099/00005942","subitem_identifier_reg_type":"JaLC"}]},"item_3_publisher_33":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"富山大学総合情報基盤センター"}]},"item_3_source_id_10":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12062000","subitem_source_identifier_type":"NCID"}]},"item_3_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1349-0796","subitem_source_identifier_type":"ISSN"}]},"item_3_subject_22":{"attribute_name":"国立国会図書館分類","attribute_value_mlt":[{"subitem_subject":"ZM13","subitem_subject_scheme":"NDLC"}]},"item_3_version_type_16":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"沖野, 浩二"}],"nameIdentifiers":[{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-02-17"}],"displaytype":"detail","filename":"ITC2012_41-44.pdf","filesize":[{"value":"260.2 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"ITC2012_41-44.pdf","url":"https://toyama.repo.nii.ac.jp/record/5948/files/ITC2012_41-44.pdf"},"version_id":"d0011170-6933-4ac5-a8c1-b2fb81be13a0"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"サーバ","subitem_subject_scheme":"Other"},{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"},{"subitem_subject":"インシデント","subitem_subject_scheme":"Other"},{"subitem_subject":"ネットワーク","subitem_subject_scheme":"Other"},{"subitem_subject":"管理体制","subitem_subject_scheme":"Other"},{"subitem_subject":"サイバー攻撃","subitem_subject_scheme":"Other"},{"subitem_subject":"不正攻撃","subitem_subject_scheme":"Other"},{"subitem_subject":"情報漏えい","subitem_subject_scheme":"Other"},{"subitem_subject":"管理者権限","subitem_subject_scheme":"Other"},{"subitem_subject":"通信遮断","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"サーバのセキュリティ確保","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"サーバのセキュリティ確保"}]},"item_type_id":"3","owner":"3","path":["707"],"pubdate":{"attribute_name":"公開日","attribute_value":"2012-05-25"},"publish_date":"2012-05-25","publish_status":"0","recid":"5948","relation_version_is_last":true,"title":["サーバのセキュリティ確保"],"weko_creator_id":"3","weko_shared_id":3},"updated":"2023-07-25T12:32:47.034227+00:00"}