IS MAC Address Restriction Absolutely Effective?

Size: px
Start display at page:

Download "IS MAC Address Restriction Absolutely Effective?"

Transcription

1 IS MAC Address Restriction Absolutely Effective? Review the security of corporate wireless LAN with NetAttest EPS Soliton Systems K.K. SMKT1510-A

2 Table of Contents Chapter 1 Is MAC Address Restriction Absolutely Effective?... 3 MAC address filtering is actually dangerous... 3 Obviously delayed wireless LAN security measures... 4 IEEE 802.1X authentication is required... 5 Chapter 2 IEEE802.1X Authentication Is Straightforward... 7 Risk of information leakage from brought-in smartphones... 7 EAP-TLS with high authentication strength should be used... 8 Expertise from system integrators and network integrators is brought together to easily build EAP-TLS... 9 Chapter 3 Security Holes Are Hidden during Distribution of Electronic Certificates The private key is like your signature and the public key is like the certificate of signature Hidden security holes of certificate distribution Consider a system free from security holes NetAttest EPS saves work for the administrator and enhances the network security without sacrificing convenience

3 Is MAC Address Restriction Absolutely Effective? Chapter 1 Is MAC Address Restriction Absolutely Effective? Security measures for corporate wireless LAN environment are urgently required due to development of smartphones and cloud computing. A risk of continuing to use vulnerable technologies such as MAC address filtering or PSK authentication is a particular concern. What security measures for wireless LAN are truly required? This white paper proposes a concept of required wireless LAN security, while introducing the functions of NetAttest EPS, an authentication server appliance provided from Soliton Systems. MAC address filtering is actually dangerous MAC address filtering uses MAC addresses allocated to network equipment to restrict network access. MAC address filtering is regarded as a wireless LAN security function in home routers and other devices and is sometimes called MAC address authentication as if it was an authentication method. So, many people might believe that MAC address filtering is a security function that is not complete but has some effect. However, it has been revealed that MAC address filtering has almost no effect in terms of security against recent cyberattacks targeting companies. This does not mean that MAC address filtering has a limited effect or is better than nothing. In some cases, users have a false sense of security by setting up MAC address filtering and this allows attackers to know that the network security is not strictly managed. One of the reasons why MAC address filtering is dangerous is ease of impersonation. Because MAC addresses are not encrypted on the network, outsiders can clearly identify them by capturing packets from the wireless LAN. Tools to change MAC addresses are distributed on the Internet and easily available. In other words, malicious attackers can effortlessly get past the security system just by using these tools to spoof the MAC address. Figure 1 MAC Addresses Are Not Encrypted on the Network Capture tool Mac address filtering 3

4 As a matter of course, attackers must decrypt encrypted communication or perform other tasks after getting past the security system. However, other security measures are probably insufficient if you feel safe by implementing MAC address filtering as part of security measures. The attackers catch you unguarded and find out whether WEP or another encryption method that can be easily decrypted is used or whether a simple password is repeatedly used. As recent targeted cyberattacks suggest, attacking their M.O. is increasingly sophisticated. Now is the time you must implement truly effective security measures for corporate wireless LAN rather than measures that attackers can exploit. Obviously delayed security measures for wireless LAN What security measures are essentially required for corporate wireless LAN? Let's look back current corporate wireless LAN in terms of changes in the surrounding environment, risks, required measures, and other aspects. Figure 2 Environmental and Technological Changes in Current Corporate Wireless LAN Environmental change Explosive spread of smartphones and tablet PCs Technological changes The security of wireless LAN that was trusted in the past is outdated. Mac address filtering Not encrypted on the network. Information can be easily acquired by capturing packets. Exposed risk Using your personal smartphone or tablet in the office poses the same risk as when inserting a USB thumb drive into the PC and bringing it out. In office Explosive spread of smartphones and tablet PCs allows employees to use their personal devices in the company. Stealth SSID Analyzed by capturing wireless packets. The WEP key may be acquired to get transmitted data. The SSID may be acquired from the client to obtain the SSID of the access point. When the PSK is acquired, information can be easily acquired. If this happens, the PSK registered in all the devices must be changed. One of the most significant environmental changes is the rapid spread of smartphones and tablet PCs. Although the danger of bringing in personal PCs and of copying data to USB thumb drives has been pointed out for a long time, the number of companies that prohibit these actions has at last started to increase. However, employees can still use their personal smartphones in the office without any restrictions. While people warn their coworkers not to insert a USB thumb drive into a corporate PC, almost nobody pays attention to the use of personal smartphones. Even though smartphones are exposed to the same risk of information leakage, in-house system or policies have not yet been established. Likewise, technological risks have also been significantly changing. Although use of 4

5 Is MAC Address Restriction Absolutely Effective? MAC address filtering, WEP encryption, stealth SSID (SSID broadcast OFF, rejection of "any connection"), or WPA2-PSK for communication was a typical security measures for wireless LAN in the past, they can no longer ensure sufficient security. While WEP is now beside the question, anyone can acquire SSID information from wireless clients even if stealth SSIDs are used. Even WPA2-PSK, which is generally believed to be more robust, has a security hole. Being a shared key, the PSK (preshared key) can be easily redisplayed and checked on the device where it is set. Once attackers acquire the PSK, they can decrypt information in real time by capturing wireless communication. WPA2-PSK also has an operational problem. That is, WPA2-PSK does not support so-called blacklist registration. Letting out the PSK is like losing your house key. It would be necessary to change the PSK in all the devices where it is registered. This would be also a huge operational load if your company has more than 100 employees. These are certainly a fatal vulnerability for every company. In this way, security measures for corporate wireless LAN are obviously delayed both systematically and technologically while the environment for using smartphones and the cloud is being established. IEEE 802.1X authentication is required Then, what measures should we specifically take? The answer is that security measures based on IEEE 802.1X authentication are required for corporate wireless LAN. In fact, IEEE 802.1X authentication has started spreading due to concerns over the above-mentioned MAC address and shared key authentication. IEEE 802.1X authentication is a method to block all communication from unauthenticated clients and only allow authenticated users to establish communication. The components include the 802.1X-enabled LAN switch and RADIUS authentication server and an authentication protocol called EAP (Extended Authentication Protocol) is employed. There is EAP-PEAP authentication using ID and password and EAP-TLS using electronic certificates, for instance. Specific authentication methods and their characteristics are shown in the table below. In this table, EAP-TLS is desirable for corporate wireless LAN as it supports user and device authentication and can control connection from unauthorized devices. Because PEAP authentication cannot control personal smartphones, certificates are gaining attention. In fact, TLS authentication is being adopted in more and more cases. The encryption method used is WPA or WPA2. 5

6 Figure 3 Comparison between Wireless LAN Authentication Methods Authentication 認 証 方 method 式 Shared 共 通 のWPA encryption 暗 号 化 キー key + +MACアドレスフィルタ address filter ID ID パスワード and password (EAP-PEAP (EAP-PEAP authentication) 認 証 ) Digital デジタル certificate 証 明 書 (EAP-TLS (EAP-TLS authentication) 認 証 ) 強 度 Extremely 極 めて 弱 weak Weak 弱 to ~ medium 中 Strong 強 Authentication 認 証 strength Advantages 長 所 and disadvantages 短 所 - The MACアドレスはパケットから address can be 盗 み 見 れ stolen 偽 装 も from 容 易 ( the 不 正 packet アクセスに and 気 づけ easily spoofed. (Unauthorized access ない) will not be noticed.) - The MACアドレス address 収 集 削 must 除 運 用 be が collected 必 要 and deleted. - If パスワードを you know 知 the っていれば password, 私 物 you 端 末 can でもネットワーク connect to 接 the 続 ができてしまう network from your personal device. - Setup that the user must perform ユーザー 側 is の easy. 設 定 が 簡 単 Legitimate ID and password Legitimate device - User ユーザー and 認 device 証 + 端 authentication 末 認 証 が 可 能 (control ( 不 許 可 of 端 connection 末 の 接 続 制 from 御 ) unauthorized devices) is supported. - Digital デジタル certificates 証 明 書 の 配 布 must が 必 be 要 distributed. Reject Legitimate user Personal device Cannot be controled Can be controlled. 適 Suitable してい environment る 環 境 Home 家 庭 用 wireless 無 線 ルータ router Single 単 一 拠 base 点 小 and 規 模 small オフィス office Conventional IT environment where 従 来 の スマホを smartphones 考 慮 are しない not taken IT 環 境 into consideration LAN 企 業 in / company 官 公 庁 のLAN or public office LAN that contains personal data such 医 療 as NWなど medical 個 network 人 情 報 をもつLAN IEEE 802.1X authentication does not seem to be widely spread. However, as use of wireless LAN has spread among companies, the guidebook published by the Ministry of Internal Affairs and Communications of Japan on January 30, 2013, "For Companies and Other Organizations to Safely Implement and Operate Wireless LAN," describes the disadvantages of PSK authentication and the advantages of IEEE 802.1X authentication in terms of the authentication methods as follows. "PSK authentication can be easily adopted because an authentication server is not required and for other reasons. However, because the devices that connect to the same access point share a passphrase, the attacker may connect to the network through impersonation if the passphrase leaks. In addition, since PSK authentication does not provide a system to automatically distribute the passphrase to individual devices, management and operation such as specification or update of passphrase becomes cumbersome if the number of connected devices increases." (pg. 12 in the guidebook) "Although IEEE 802.1X authentication requires an authentication server, you can prevent unauthorized devices from connecting to the wireless LAN because network connection is permitted after the device is authenticated. It is basically desirable to use IEEE 802.1X authentication, which supports device authentication, though the authentication method must be considered, taking the number of devices that use the wireless LAN, the characteristics of operation, and other factors into consideration." (pg. 12 in the guidebook) Given the current situation, it is certainly required to implement security measures using IEEE 802.1X authentication for corporate wireless LAN. 6

7 Is MAC Address Restriction Absolutely Effective? Chapter 2 IEEE802.1X Authentication Is Straightforward Security measures for the corporate wireless LAN environment are urgently required. Some technologies such as MAC address filtering are almost wholly ineffective in protecting corporate information. However, they are mistaken as effective security measures and continuously adopted in the wireless LAN environment in small and medium-sized enterprises, branch offices, local bases, and other locations. It is now required to build an IEEE 802.1X authentication server. How should companies address this challenge? Risk of information leakage from brought-in smartphones As described in the previous chapter, MAC address filtering on wireless LAN is wholly insufficient as a security measure to protect corporate information. MAC address filtering is almost no deterrent to attackers who try to launch a cyberattack. What is even worse is that using MAC address filtering may reveal that the company is careless. Furthermore, as anyone can obtain tools for attack these days, even stealth SSID and WPA2-PSK cannot provide sufficient protection against malicious attacks. In this context, it is strongly required to implement security measures for wireless LAN based on IEEE 802.1X authentication. Let's look at the importance of building an IEEE 802.1X authentication system, the required functions, and how to build it, using NetAttest EPS from Soliton Systems as an example. First, let's review IEEE 802.1X authentication a little bit. IEEE 802.1X authentication is a so-called client authentication method. This method blocks all communication from unauthenticated clients and only allows authenticated users and devices to establish communication. Figure 4 IEEE802.1X Authentication Configuration IEEE802.1X authentication server Impregnable wireless LAN client IEEE802.1X supplicant Wireless LAN AP IEEE802.1X authenticator PC for management The components of IEEE 802.1X authentication are the following three: authentication software on the client (device), the access point that supports IEEE 802.1X authentication, and the RADIUS (Remote Authentication Dial-In User Service) authentication server. The authentication protocol is EAP (Extended Authentication Protocol) and the main 7

8 authentication methods are the following two: EAP-PEAP authentication that uses an ID and password and EAP-TLS authentication that uses an electronic certificate. A major difference between them is whether the electronic certificate is installed on the client. (The electronic certificate is used on the server with both authentication methods.) For example, with EAP-PEAP, an ID and password are used for authentication on the client. An advantage is easy setup as each user shares the ID and password and an electronic certificate is not required on the client. However, there is a disadvantage that anyone who knows the password can connect to the network from office PCs or even from his/her personal device. Information leakage risk caused by connecting a personal smartphone... This does not cause a big problem in an environment where the internal network can be connected to only from office PCs. However, recently, there is a higher risk that internal information can be brought out by connecting a personal smartphone to the wireless LAN. If the ID and password are leaked, they could be used for unauthorized access from a device other than office PCs. EAP-TLS with high authentication strength should be used In this context, EAP-TLS is required to avoid the information leakage risk. With EAP-TLS, an electronic certificate is installed on the client to reject connection from unauthorized devices. Access from a PC or smartphone on which an electronic certificate is not installed is rejected in the first place. Therefore, EAP-TLS realizes stronger authentication than EAP-PEAP. However, EAP-TLS has management issues such as the distribution of an electronic certificate to each client. The time and effort for building and operation is one of the reasons why companies have not widely adopted EAP-TLS although the authentication method ensures robust security. [Seven elements required to build and operate an EAP-TLS system] (1) LAN switch and access point that support IEEE 802.1X (2) RADIUS authentication server (3) CA (certificate authority) server (4) DHCP server to issue correct IP addresses (5) System to distribute the certificates and link with the user database 8

9 Is MAC Address Restriction Absolutely Effective? (6) System to back up information on each server (7) Procedures and expertise for designing, operating, and troubleshooting these systems It is perhaps not extremely cumbersome to just establish an authentication infrastructure for client authentication. However, it is necessary to set up a private CA, link with the internal Active Directory (AD) or LDAP, and build the system to distribute the certificates to clients and other systems in order to properly operate the authentication infrastructure. In some cases, you must consider whether the AD link is allowed, fault tolerant design, management tools, and other matters. Considerations about the authentication server in the corporate system are summarized as below. [Consideration of scalability] (1) Can the server be used for SSL-VPN authentication, authentication in the browser dedicated to business operations, web single sign on authentication, remote desktop authentication, and other authentications as well? (2) Can the authentication method be easily modified? (For example, can one-time password be easily applied in addition to the certificate?) [Consideration of multi-functional device support] (1) Can the digital certificates be distributed to multiple OSs? [Consideration of operation workload] (1) Can the digital certificates be easily and safely distributed according to your environment? (2) Can users who have not used the system for a certain period be easily organized? (3) Can the server be easily linked with the internal AD or ID management system? [Consideration of reliability] (1) Can safe operation be realized? (2) How about the domestic support system? NetAttest EPS can easily realize EAP-TLS and address these various challenges that companies face by itself. Expertise from system integrators and network integrators is brought together to easily build EAP-TLS NetAttest EPS is an all-in-one authentication appliance product that is equipped with the RADIUS authentication function, private CA function, certificate distribution and management function, and other features. This is the core product of the NetAttest series, which has been implemented in more than 10,000 systems in total. The main characteristic is easy implementation and operation without requiring special knowledge or technology. For example, you must perform the following six steps to build an EAP-TLS-enabled authentication infrastructure. 9

10 [Normal procedure for building an EAP-TLS-enabled authentication infrastructure] 1. Preparation of hardware 2. Installation of OS 3. Building of private CA 4. Installation of RADIUS 5. Setup of RADIUS 6. Setup of users With NetAttest EPS, you must perform only the following three steps. The required man-hours are less than half of the above procedure. [Procedure for building an EAP-TLS-enabled authentication infrastructure using NetAttest EPS] 1. Installation of NetAttest EPS 2. Initial setup wizard 3. Setup of users How can NetAttest EPS reduce man-hours? This is largely because Soliton Systems has the skills and expertise required of system integrators (building and operation of servers) and network integrators (building and operation of network). Generally, network integrators are often in charge of building the wireless LAN environment while system integrators are in charge of AD link, RADIUS server, CA server, and other servers in many cases. This role-sharing inevitably causes delay if the skills and expertise for both tasks are required. This leads to an increase in man-hours. Therefore, Soliton Systems reflects the expertise for each task to the appliance so that both network integrators and system integrators can complete the job. NetAttest EPS, which Soliton Systems completed as a result, realizes quick implementation without requiring special knowledge. 10

11 Is MAC Address Restriction Absolutely Effective? Figure 5 Elements of Building and Operation of Server and Network when Building a Wireless LAN Authentication Environment Building of wireless LAN authentication environment Typical case When using NetAttest EPS Network integrator System integrator Building of wireless LAN or other network - Linkage with Active Directory - Building of RADIUS and CA servers Difficulty of linkage - Coordination among staff and verification of linkage - Separation at failure - Increase in processes and time Users without special knowledge can quickly build the environment. In addition, NetAttest EPS is an all-in-one product that provides the functions required to build an IEEE 802.1X authentication server such as abundant RADIUS authentication functions, intuitive Web UI, easy AD link, settings backup/restoration function, support for redundant configuration, and many proven records of linking with devices from Wi-Fi and VPN manufacturers. You can easily implement a safe authentication infrastructure based on IEEE 802.1X simply by implementing NetAttest EPS. 11

12 Chapter 3 Security Holes Are Hidden during Distribution of Electronic Certificates The electronic certificate authentication for which a different certificate is installed on each client ensures the robust security required for the corporate wireless LAN unlike PSK (preshared key) authentication, where multiple users share the same password, or MAC address authentication, the address of which can be easily spoofed. However, using certificates does not always ensure robust security. For example, a certificate can be illegally obtained to spoof a legitimate device depending on the distribution method. A certificate itself could be stolen and exploited as an outsider finds out and exploits the password. So, what should we be careful about in order to fundamentally raise the security level using certificates? This chapter describes how to identify and avoid hidden security holes when using certificates, introducing the functions of NetAttest EPS, an authentication server appliance provided from Soliton Systems. The private key is like your signature and the public key is like the certificate of signature First, let's quickly review electronic certificates. Quite a few people might think that an electronic certificate is difficult to manage and takes time and cost. However, electronic certificates are not very complicated once you understand the mechanism. Rather, it is essential to understand what the certificate is to properly handle it. [What is an electronic certificate?] An electronic certificate is a data set to prove the identity and other properties of a user by applying public key encryption. Public key encryption needs a private key and a public key and uses a security infrastructure called PKI (public key infrastructure) to validate (authenticate) the identity. In a nutshell, you can think that the private key is your signature (personal signature) and the public key is the certificate of signature. Only signature does not prove you are who you claim to be in fact. You need to get the certificate of signature from notary public or other organization and pair it with your signature to truly identify yourself. Likewise, with PKI, each user has a private key (signature) to prove their identity. In addition, the user gets the public key (certificate of signature) from the certificate authority (notary public) and pairs it with the private key for identification. Figure 6 Electronic Certificates Can Be Easily Understood by Regarding the Private Key as the Signature and the Public Key as the Certificate of Signature Example ex. PKI (Public Key Infrastructure) Personal signature 印 鑑 Resident 市 民 Certificate of signature Issue 発 行 Check 確 認 Notary 市 役 public 所 User 利 用 者 Electronic certificate (public key) 秘 Private 密 鍵 key Issue 発 行 Check 確 認 Certificate 認 証 局 authority (CA) (CA) 12 Show the validity 第 of 三 identity 者 に 身 分 to の third 正 当 性 parties を 示 す Officer 職 員 Like デジタル digitized 化 した 身 分 ID 証 card 明 書 の ようなもの システム System administrator 管 理 者 (RA) (RA)

13 Is MAC Address Restriction Absolutely Effective? Here, "pairing the private key and the public key" means that the data encrypted by one of them can be encrypted only by using the paired key. For actual authentication, the servers that manage the user's device and certificate exchange this key pair between them. Hidden security holes of certificate distribution To use this public key encryption method, you must first install the public key (certificate) and private key in the user's device. As those who have used Internet banking or administrative services using electronic certificates probably understand, safe communication cannot be established without somehow importing the public key and private key into the client PC. The PKCS#12 file is mainly used to import the certificate into the client PC. The PKCS#12 file is a file that contains a pair of public key (certificate) and private key. The problem here is that the PKCS#12 file itself can be copied. In addition, if it is allowed to export the private key, the private key can be also copied. In other words, if the certificate is distributed via or CD-ROM, a malicious person who obtains that or CD-ROM can easily make an illegal copy. This situation allows anyone to impersonate other person. This is the hidden security hole of certificate distribution. Figure 7 Challenges of Digital Certificate Distribution The 証 明 PKCS#12 書 をPCに 取 り file 込 むには is mainly 公 開 used 鍵 証 to 明 書 import と 秘 密 the 鍵 がペアで certificate 格 納 されたPKCS#12ファイルが into the client PC. The PKCS#12 主 に 使 用 されています file is a file that contains a pair of public key certificate and private key. When importing this pair into the client, これをクライアントへ you can (manually) 取 り 込 む 場 合 prohibit 秘 密 鍵 export をエクスポートを of the private 禁 止 にする key. 設 However, 定 ( 手 動 )が the 可 PKCS#12 能 です しかし PKCS#12ファ file itself can be copied. イル 自 体 So, はコピー the 可 file 能 なため メールやCD can be illegally copied 等 でこれを while 送 付 it する is sent 場 合 by 不 , 正 コピーができてしまうといった CD-ROM or other 課 means. 題 がありました + Public 公 開 key 鍵 Private 秘 密 鍵 key PKCS#12ファイル file CD-ROM 等 or other media ファイルコピー Copy the file 会 Company 社 PC PC 私 Personal 物 スマホ smartphone Challenges of digital certificate デジタル 証 distribution 明 書 配 布 方 method 法 の 課 題 Is 秘 the 密 file 鍵 付 that きファイルをメールで contains the private key 送 sent 付? by ? 現 Does 地 の the 管 理 local 者 がファイルで administrator 配 distribute 布? the file? Certificate authority (CA) iphone configuration utility Unique Overseas office Group company Equipped with wired NIC Manual 証 明 setup 書 WiFiの of certificate 手 動 設 and 定 WiFi (administrator ( 管 理 者 or or 利 user) 用 者 ) Registration method OS 毎 に 異 なる that differs depending 登 録 方 法 on the OS Consideration of how to 秘 prohibit 密 鍵 の 取 export 出 し 禁 of 止 private 方 法 の key 検 討 13

14 In fact, an attack exploiting this security hole was revealed in Japan in 2014 and caused a panic. In this incident, the attacker targeted an Internet banking service for corporations and stole the electronic certificate that contained the private key that was permitted to be exported. In the wake of this attack, it is recommended to prohibit export of the private key that each bank uses for Internet banking for corporations and provide high protection for the private key in principle. Consider a system free from security holes A desirable solution is adoption of a system free from these security holes. However, recent cyberattacks are sophisticated. You cannot fundamentally eliminate attacks simply by prohibiting export of private key. In fact, in a recent Internet banking fraud, the attacker acquired the private key with the following M.O. M.O. to steal electronic certificate imported with the export setting disabled - Delete the electronic certificate from the target device using a malicious program. The user asks the bank to reissue the certificate. The malicious program copies the certificate when the user imports the reissued certificate. The copied certificate is sent to the attacker's server. Reference: "Warning in August 2014," IPA Figure 8 Danger of Issuing Certificate Using a File with the Private Key 証 明 書 不 正 コピーの 手 口 M.O. to illegally copy the certificate 2. Procedure for reissuing 2. 電 子 証 the 明 書 の electronic 再 発 行 手 certificate 続 き Certificate authority 3. Send a reissued electronic 3. certificate 再 発 行 された file that 秘 contains 密 鍵 付 きthe private 電 子 証 key. 明 書 ファイルを 送 信 File that contains the private key Obtain the file and the private key. 1. The virus deletes the 1. ウイルスが 勝 手 に electronic certificate. 電 子 証 明 書 を 削 除 Illegally 端 末 内 copy に 一 次 and 保 管 send されるthe P12 file temporarily P12ファイルを stored 不 正 in コピー& the device. 送 信 When 電 子 証 明 you 書 をexchange PKCS#12ファイル electronic を 利 certificates 用 し 受 け 渡 す using 場 合 は a PKCS#12 不 正 取 得 される file, there リスクが is always 拭 えない a risk that it may be illegally acquired. This attack targeted an unguarded point while the user felt safe by prohibiting export. Reactive measures are powerless to protect against increasingly advanced cyberattacks. 14

15 Is MAC Address Restriction Absolutely Effective? To address this situation, NetAttest EPS from Soliton does not use the PKCS#12 file itself. Specifically, the user's client device generates the private key and the generated private key never leaves the device by any communication path. Figure 9 Issue of Certificate in NetAttest Where a File Containing the Private Key Is Not Used Log ユーザーページログイン in to the user page. ABCD Corp. certificate authority ABCD Corp. 認 証 局 秘 Automatically 密 鍵 をエクスポート generate 禁 止 certificate with export of the の private 状 態 で 自 key 動 prohibited 生 成 秘 Private 密 鍵 key The application ここまで 申 請 procedure ends here. After notification of approval 承 認 通 知 後 Login permitted ログイン 許 可 Enter application information 申 and 請 require 情 報 入 力 certificate. 証 明 書 要 求 The コンピュータ computer 名 ドメイン name, domain 名 name, Win ID Win 名 等 ID も 自 name, 動 送 付 and other properties are also automatically sent. Approval and issue notification 承 認 発 行 通 知 メール Check 管 理 者 who ページにて requests the certificate from which device 誰 が どの on the 端 administrator 末 から page, 要 求 しているのかを make an approval, 確 認 しand issue 承 認 the 公 開 public 鍵 発 行 key. Private 秘 密 key 鍵 Certificate 証 明 書 ( 公 (public 開 鍵 ) key) Log ユーザーページログイン in to the user page Enroll 証 明 書 the エンロール certificate. 発 Invalidation 行 済 一 覧 より from 失 効 the 処 理 issued certification list The private key never leaves the device by any communication path. You can acquire 秘 密 鍵 は 端 末 外 the 通 信 certificate 経 路 に 一 only 切 出 さない using the 申 applied 請 端 末 でのみ device. 証 明 書 取 得 が 可 能 **When KeyManager you acquire による 証 the 明 書 certificate 取 得 の 場 合 も with 秘 密 the 鍵 は Key 申 請 Manager, 時 に 端 末 内 で the 自 動 private 生 成 します key 通 is 信 automatically 経 路 に 秘 密 鍵 が 流 generated れることはありません within the device at the time of application. The private key never leaks to any communication path. The private key in the device is generated at the time of application with export prohibited to prevent physical theft. A certificate was typically abled to be generated and distributed in this way only in a closed network environment such as LAN, NetAttest EPS can safely distribute a certificate even through the Internet by linking with the proxy server that supports mobile application named NetAttest EPS-ap. Distribution of certificates and settings can be automated not only with PCs but also with multi-functional devices using ios, Android, or Mac OS. 15

16 NetAttest EPS saves work for the administrator and enhances the network security without sacrificing convenience Enhancing security reduces convenience and significantly increases operation man-hours, often resulting in a trade-off situation. Therefore, it is noteworthy that NetAttest EPS has a private key generation and certificate distribution system that does not sacrifice convenience at all but significantly saves a lot of work for the administrator. NetAttest EPS is also an integrated authentication infrastructure that supports a variety of functions in addition to distribution of certificates. In terms of the corporate network, not only distribution of certificates but also that of wireless client (WiFi) settings is vital. To support the enterprise environment, distributed placement across multiple offices, redundancy of equipment, backup/restoration function, and other features are also required. In addition, as workstyles are changing, it is necessary to realize remote work and mobile work. NetAttest EPS is equipped with functions to flexibly address these needs. As it is urgent to review security measures for corporate wireless LAN, it is recommended to consider NetAttest EPS as a prominent candidate in building an integrated authentication infrastructure that supports IEEE 802.1X authentication. 16

17 Is MAC Address Restriction Absolutely Effective? Soliton White Paper 2015 Is MAC Address Restriction Absolutely Effective? Review the security of corporate wireless LAN with NetAttest EPS SMKT1510-A Published on October 26, 2015 Published by Soliton Systems K.K. Contact It is prohibited to reprint, reproduce, and enter the document in an electronic media, etc., without permission. 17

Grant Request Form. Request Form. (For continued projects)

Grant Request Form. Request Form. (For continued projects) Grant Request Form Request Form (For continued projects) NOTE: Check list of the needed documents Following documents should be prepared in Japanese. Continuing grant projects from FY2015(or FY2014) don

More information

Procedures to file a request to the JPO for Patent Prosecution Highway Pilot Program between the JPO and the HPO

Procedures to file a request to the JPO for Patent Prosecution Highway Pilot Program between the JPO and the HPO Procedures to file a request to the JPO for Patent Prosecution Highway Pilot Program between the JPO and the HPO 1. to the JPO When an applicant files a request for an accelerated examination under the

More information

Request for Taxpayer Identification Number and Certification 納 税 者 番 号 および 宣 誓 の 依 頼 書

Request for Taxpayer Identification Number and Certification 納 税 者 番 号 および 宣 誓 の 依 頼 書 Substitute Form 代 替 様 式 W-9 Print or type Request for Taxpayer Identification Number and Certification 納 税 者 番 号 および 宣 誓 の 依 頼 書 英 字 活 字 体 またはタイプでご 記 入 下 さい 1 Name (as shown on your income tax return),

More information

JAPAN PATENT OFFICE AS DESIGNATED (OR ELECTED) OFFICE CONTENTS

JAPAN PATENT OFFICE AS DESIGNATED (OR ELECTED) OFFICE CONTENTS Page 1 JP JAPAN PATENT OFFICE AS DESIGNATED (OR ELECTED) OFFICE CONTENTS THE ENTRY INTO THE NATIONAL PHASE SUMMARY THE PROCEDURE IN THE NATIONAL PHASE ANNEXES Fees... Annex JP.I Form No. 53: Transmittal

More information

TS-3GA-32.341(Rel10)v10.0.0 Telecommunication management; File Transfer (FT) Integration Reference Point (IRP); Requirements

TS-3GA-32.341(Rel10)v10.0.0 Telecommunication management; File Transfer (FT) Integration Reference Point (IRP); Requirements TS-3GA-32.341(Rel10)v10.0.0 Telecommunication management; File Transfer (FT) Integration Reference Point (IRP); Requirements 2011 年 6 月 22 日 制 定 一 般 社 団 法 人 情 報 通 信 技 術 委 員 会 THE TELECOMMUNICATION TECHNOLOGY

More information

California Subject Examinations for Teachers

California Subject Examinations for Teachers California Subject Examinations for Teachers TEST GUIDE JAPANESE SUBTEST I Sample Questions and Responses and Scoring Information Copyright 2015 Pearson Education, Inc. or its affiliate(s). All rights

More information

Quality of. Leadership. Quality Students of Faculty. Infrastructure

Quality of. Leadership. Quality Students of Faculty. Infrastructure 217 218 Quality of Quality of Leadership Quality of Quality of Quality Students of Faculty Quality of Infrastructure 219 220 Quantitative Factor Quantitative Analysis Meta Synthesis Informal Interviews

More information

Local production for local consumption( 地 産 地 消 ) Worksheet 1. Task: Do you agree with this idea? Explain the reasons why you think so.

Local production for local consumption( 地 産 地 消 ) Worksheet 1. Task: Do you agree with this idea? Explain the reasons why you think so. Worksheet 1 Task: Do you agree with this idea? Explain the reasons why you think so. Name Worksheet A: Local Farmer I am a local farmer. I agree with this idea. Our products will always be fresh because

More information

Information Security Policies in the Telecommunications Field

Information Security Policies in the Telecommunications Field Inmation Security Policies in the Telecommunications Field ~ Toward the Construction Safe and Secure Network Foundations~ Ministry Internal Affairs and Communications, JAPAN September 29th 2004 0 1 Contents

More information

Application Guidelines for International Graduate Programs in Engineering

Application Guidelines for International Graduate Programs in Engineering Global 30: Future Global Leadership (FGL) 2016 Academic Year (April 2016 Enrollment) Application Guidelines for International Graduate Programs in Engineering International Mechanical and Aerospace Engineering

More information

英 語 上 級 者 への 道 ~Listen and Speak 第 4 回 ヨーロッパからの 新 しい 考 え. Script

英 語 上 級 者 への 道 ~Listen and Speak 第 4 回 ヨーロッパからの 新 しい 考 え. Script 英 語 上 級 者 への 道 ~Listen and Speak 第 4 回 ヨーロッパからの 新 しい 考 え Script Dialogue for Introduction E: Hello, listeners. Another New Year is upon us! As always, people around the world are hopeful for positive change.

More information

Graduate School of Engineering. Master s Program, 2016 (October entrance)

Graduate School of Engineering. Master s Program, 2016 (October entrance) Application Procedure for Foreign Student Admission to Graduate School of Engineering Master s Program, 2016 (October entrance) Tottori University 4-101 Koyama-Minami, Tottori, 680-8552 Japan Phone: +81-857-31-6761

More information

JF Standard for Japanese-Language Education 2010

JF Standard for Japanese-Language Education 2010 JF Standard for Japanese-Language Education 2010 JF Standard for Japanese-Language Education 2010 The Japan Foundation JF STANDARD FOR JAPANESE-LANGUAGE EDUCATION 2010 Table of Contents Introduction...

More information

Introduction to the revised Child Care and Family Care Leave Law

Introduction to the revised Child Care and Family Care Leave Law Introduction to the revised Child Care and Family Care Leave Law Ministry of Health, Labour and Welfare in 10,000s Number of births (in 10,000s) The falling birthrate and the start of population decline

More information

2, The "Leading Initiative for Excellent Young Researchers" application screen (Home)

2, The Leading Initiative for Excellent Young Researchers application screen (Home) 0, Before you apply for Leading Initiative for Excellent Young Researchers, please refer to "Application Guidelines" and "Notes for Researchers on e-rad System and Forms 3 through 6". (Please access the

More information

Introducing DIGNIO and WEB DIGNIO Targeting Male Executives in Japan

Introducing DIGNIO and WEB DIGNIO Targeting Male Executives in Japan and MEDIA DATA 2010 Introducing DIGNIO and WEB DIGNIO Targeting Male Executives in Japan The top management layer of Japan s leading companies read the fashion & the lifestyle magazine DIGNIO. DIGNIO is

More information

Special Program of Engineering Science 21 st Century. for Graduate Courses in English. Graduate School of Engineering Science, OSAKA UNIVERSITY

Special Program of Engineering Science 21 st Century. for Graduate Courses in English. Graduate School of Engineering Science, OSAKA UNIVERSITY Special Program of Engineering Science 21 st Century for Graduate Courses in English Graduate School of Engineering Science, OSAKA UNIVERSITY Enrollment in October 2013 Application Guide for Foreign Students

More information

Melonbooks DL Howto How to register, purchase and enjoy Doujin contents that are sold in Melonbooks DL and shut-out disgusting excuse of reproduction.

Melonbooks DL Howto How to register, purchase and enjoy Doujin contents that are sold in Melonbooks DL and shut-out disgusting excuse of reproduction. Melonbooks DL Howto How to register, purchase and enjoy Doujin contents that are sold in Melonbooks DL and shut-out disgusting excuse of reproduction. Table of Contents 1 Prerequisites...3 1.1 Japanese

More information

Unwillingness to Use Social Networking Services for Autonomous Language Learning among Japanese EFL Students

Unwillingness to Use Social Networking Services for Autonomous Language Learning among Japanese EFL Students 55 Unwillingness to Use Social Networking Services for Autonomous Language Learning among Japanese EFL Students ABE Emika, UEDA Mami, SUGINO Toshiko 自 律 学 習 のためのSNS 利 用 に 対 する 日 本 人 大 学 生 の 消 極 的 態 度 阿

More information

Graduate Program in Japanese Language and Culture (Master s Program) Application Instructions

Graduate Program in Japanese Language and Culture (Master s Program) Application Instructions Graduate Program in Japanese Language and Culture (Master s Program) Application Instructions For FY 2016 1. Objectives This program is designed to provide teachers of the Japanese-language working abroad

More information

育 デジ (Iku-Digi) Promoting further evolution of digital promotion

育 デジ (Iku-Digi) Promoting further evolution of digital promotion 育 デジ (Iku-Digi) Promoting further evolution of digital promotion Abstract Digital promotion has established its presence and become a commodity in the pharmaceutical industry. In the last few years, use

More information

グローバル 人 材 育 成 言 語 教 育 プログラム. Global Linkage Initiative Program 2015 GLIP 履 修 ガイド. 夏 学 期 集 中 英 語 プログラム Summer Intensive English が 始 まります

グローバル 人 材 育 成 言 語 教 育 プログラム. Global Linkage Initiative Program 2015 GLIP 履 修 ガイド. 夏 学 期 集 中 英 語 プログラム Summer Intensive English が 始 まります グローバル 人 材 育 成 言 語 教 育 プログラム Global Linkage Initiative Program 2015 GLIP 履 修 ガイド 2015 年 度 より 英 語 C(Career English)の 履 修 要 件 が 変 わります 夏 学 期 集 中 英 語 プログラム Summer Intensive English が 始 まります 英 語 による 講 義 科 目

More information

2016 Hosei University Graduate Schools Business School of Innovation Management Global MBA Program Credited Auditor Admission Guideline

2016 Hosei University Graduate Schools Business School of Innovation Management Global MBA Program Credited Auditor Admission Guideline 2016 Hosei University Graduate Schools Business School of Innovation Management Global MBA Program Credited Auditor Admission Guideline In accordance with the stipulations of Article 47 of the Hosei Business

More information

2016 July 5. August 16

2016 July 5. August 16 2016 July 5 August 16 Application Process Applicant ICU documents to be sent by applicant documents to be sent by ICU Application and related documents A copy of remittance receipt for the application

More information

この 外 国 弁 護 士 による 法 律 事 務 の 取 扱 いに 関 する 特 別 措 置 法 施 行 規 則 の 翻 訳 は 平

この 外 国 弁 護 士 による 法 律 事 務 の 取 扱 いに 関 する 特 別 措 置 法 施 行 規 則 の 翻 訳 は 平 この 外 国 弁 護 士 による 法 律 事 務 の 取 扱 いに 関 する 特 別 措 置 法 施 行 規 則 の 翻 訳 は 平 成 十 六 年 法 務 省 令 第 6 号 までの 改 正 ( 平 成 16 年 4 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻

More information

Document and entity information

Document and entity information Company information Company information FASF member mark Document name Document and entity information Aug 2015 第 3 四 半 期 決 算 短 信 日 本 基 準 ( 連 結 ) Filing date 20150710 Company name TRANSACTION CO., Ltd.

More information

世 界 のデブリ 関 連 規 制 の 動 向 Current situation of the international space debris mitigation standards

世 界 のデブリ 関 連 規 制 の 動 向 Current situation of the international space debris mitigation standards 第 6 回 スペースデブリワークショップ 講 演 資 料 集 93 B1 世 界 のデブリ 関 連 規 制 の 動 向 Current situation of the international space debris mitigation standards 加 藤 明 ( 宇 宙 航 空 研 究 開 発 機 構 ) Akira Kato (JAXA) スペースデブリの 発 生 の 防 止 と

More information

How To Run A Server On A Microsoft Cloud Server (For A Small Amount Of Money)

How To Run A Server On A Microsoft Cloud Server (For A Small Amount Of Money) 1SoftLayer 2WindowsServer2003 0 2013 8 t-sasaki@bit-surf.co.jp t-sasaki@bit-isle.co.jp BOE SoftLayer ID desktomo --- --- IT ISPDC CC ADSL3 SIer DC 5 ERP 2015 1 IT IT idc IT 200 140-0002 2-2-28 T 8F TEL

More information

(2) 合 衆 国 では, 人 口 の 増 加 のほぼ 三 分 一 が 移 民 [ 移 住 ]によってもたらさている

(2) 合 衆 国 では, 人 口 の 増 加 のほぼ 三 分 一 が 移 民 [ 移 住 ]によってもたらさている ReviewExercises 夏 期 髙 3SAα Global population reached 6.1 billion people in 2000, an increase of 77 million over 1999. The increase is equivalent in size to the population of three Tokyos, the world's most

More information

宇 宙 機 および 衛 星 のワイヤレス 化 を 支 えるマイクロ 波 半 導 体 デバイス 集 積 回 路 技 術 と 無 線 電 力 伝 送

宇 宙 機 および 衛 星 のワイヤレス 化 を 支 えるマイクロ 波 半 導 体 デバイス 集 積 回 路 技 術 と 無 線 電 力 伝 送 第 27 回 マイクロエレクトロニクスワークショップ2014 The 27 th Micro-Electronics Workshop2014 宇 宙 機 および 衛 星 のワイヤレス 化 を 支 えるマイクロ 波 半 導 体 デバイス 集 積 回 路 技 術 と 無 線 電 力 伝 送 Microwave Semiconductor Device / Integrated Circuit Technology

More information

OKI-T/3-W40 Series Adjustable Output 3-Amp DOSA-SMT DC/DC Converters

OKI-T/3-W40 Series Adjustable Output 3-Amp DOSA-SMT DC/DC Converters www.murata-ps.com OKI-T/3-W40 Series Typical unit FEATURES Non-isolated SMT POL DC/DC power module 16-40Vdc input voltage range Programmable output voltage from 0.7525-5.5Vdc 3 Amp output current models

More information

2015 ASPIRE Forum Student Workshop Student Reports 参 加 学 生 報 告 書

2015 ASPIRE Forum Student Workshop Student Reports 参 加 学 生 報 告 書 2015 ASPIRE Forum Student Workshop Student Reports 参 加 学 生 報 告 書 2015 ASPIRE Forum Student Workshop 開 催 期 間 :2015 年 7 月 18 日 ( 土 )~25 日 ( 土 ) 主 催 場 所 : 中 国 香 港 科 技 大 学 参 加 者 : R.K 理 工 学 研 究 科 修 士 学 生 T.S

More information

Cost Accounting 1. B r e a k e v e n A n a l y s i s. S t r a t e g y I m p l e m e n t a t i o n B a l a n c e d S c o r e c a r d s

Cost Accounting 1. B r e a k e v e n A n a l y s i s. S t r a t e g y I m p l e m e n t a t i o n B a l a n c e d S c o r e c a r d s Cost Accounting 1 B r e a k e v e n A n a l y s i s S t r a t e g y I m p l e m e n t a t i o n B a l a n c e d S c o r e c a r d s S t r a t e g y M o n i t o r i n g R e s p o n s i b i l i t y S e g

More information

Frontier of Private Higher Education Research in East Asia

Frontier of Private Higher Education Research in East Asia Frontier of Private Higher Education Research in East Asia 東 アジアにおける 高 等 教 育 研 究 のフロンティア RIIHE Research Series 私 学 高 等 教 育 研 究 所 研 究 叢 書 3 Research Institute for Independent Higher Education (RIIHE) 日

More information

Graphical Abstract. An efficient procedure for preparation of 2- monoalkyl or 2-monoaryl-3- ethoxycyclobutanones

Graphical Abstract. An efficient procedure for preparation of 2- monoalkyl or 2-monoaryl-3- ethoxycyclobutanones Title Author(s) An efficient procedure for preparat ethoxycyclobutanones Matsuo, Jun-ichi; Okuno, Ryosuke; T Ishibashi, Hiroyuki Citation Tetrahedron Letters, 51(29): 3736-3 Issue Date 2010-07-21 Type

More information

Industrial Safety and Health Act ( Act No. 57 of 1972)

Industrial Safety and Health Act ( Act No. 57 of 1972) この 労 働 安 全 衛 生 法 の 翻 訳 は 平 成 十 八 年 法 律 第 二 十 五 号 までの 改 正 ( 平 成 18 年 4 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本

More information

Groundwater Temperature Survey for Geothermal Heat Pump Application in Tropical Asia

Groundwater Temperature Survey for Geothermal Heat Pump Application in Tropical Asia Bulletin of the Geological Groundwater Survey of Temperature Japan, vol.60 Survey (9/10), for p.459-467, GHP Application 2009 in Tropical Asia (Yasukawa et al.) Groundwater Temperature Survey for Geothermal

More information

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux2013 新 製 品 (ベースサブスクリプション) 更 新 :2015 年 4 22

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux2013 新 製 品 (ベースサブスクリプション) 更 新 :2015 年 4 22 Red Hat Enterprise Linux2013 新 製 品 (ベースサブスクリプション) 更 新 :2015 年 4 22 薄 紫 :3 年 型 番 :5 年 型 番 字 : 新 規 追 加 変 更 新 規 新 規 SKU 製 品 名 ソケット ゲストOS サポート 期 間 標 準 価 格 備 考 Server RH00001 Red Hat Enterprise Linux for Virtual

More information

ࢪ 㛤 ᅜ ࠉ Ẽ ኚ ᨻ ሗ 㞟 ㄆㄪᰝ ࢪ 㛤 ᅜ Ẽ ኚ ᨻ ሗ 㞟 ㄆㄪᰝ ࠉ ሗ ሗ ᖹᡂ ᖺ ᖹᡂ 㸦 ᖺ㸧 ᖺ ᨻἲ ᨻἲ ᅜ㝿༠ຊᶵᵓ㸦-,&$㸧 ࠉ ᅜ㝿༠ຊᶵᵓ 㝈 ࢫ ࠉᮏࠉᕤࠉႠࠉ ࠉᘧࠉ ࠉ ቃ JR 14-039 ࠉ ࠉసᴗ㸹 ᕝ

ࢪ 㛤 ᅜ ࠉ Ẽ ኚ ᨻ ሗ 㞟 ㄆㄪᰝ ࢪ 㛤 ᅜ Ẽ ኚ ᨻ ሗ 㞟 ㄆㄪᰝ ࠉ ሗ ሗ ᖹᡂ ᖺ ᖹᡂ 㸦 ᖺ㸧 ᖺ ᨻἲ ᨻἲ ᅜ㝿༠ຊᶵᵓ㸦-,&$㸧 ࠉ ᅜ㝿༠ຊᶵᵓ 㝈 ࢫ ࠉᮏࠉᕤࠉႠࠉ ࠉᘧࠉ ࠉ ቃ JR 14-039 ࠉ ࠉసᴗ㸹 ᕝ JR 14-039 JR 14-039 アジア 開 発 途 上 国 気 候 変 動 政 策 情 報 収 集 確 認 調 査 最 終 報 告 書 最 終 報 告 書 目 次 頁 第 1 章 調 査 の 背 景 と 目 的... 1 1.1 調 査 の 背 景... 1 1.2 調 査 の 目 的... 1 1.3 調 査 対 象 地 域... 2 1.4 調 査 内 容... 2 第 2 章 文 献

More information

AUTOMOBILE LIABILITY SECURITY ACT

AUTOMOBILE LIABILITY SECURITY ACT AUTOMOBILE LIABILITY SECURITY ACT & RELATED CABINET ORDER, MINISTERIAL ORDINANCE AND NOTIFICATION Including: Policy Conditions for Automobile Liability Insurance As of May 2, 2011 Translated and published

More information

Linc English: A Web-Based, Multimedia English Language Curriculum Implementation and Effectiveness Report

Linc English: A Web-Based, Multimedia English Language Curriculum Implementation and Effectiveness Report 報 告 Linc English: A Web-Based, Multimedia English Language Curriculum Implementation and Effectiveness Report Yuka Tachibana 1 )* 1 )Center for the Advancement of Higher Education, Tohoku University 概

More information

2009 年 3 月 26 日 2 泊 3 日 スーザン 田 辺 先 生 引 率 のセーレム 市 の 高 校 生 が 当 会 の 会 員 宅 や 会 員 友 人 宅 にホームステイをしました 以 下 は 彼 らの 感 想 文 です

2009 年 3 月 26 日 2 泊 3 日 スーザン 田 辺 先 生 引 率 のセーレム 市 の 高 校 生 が 当 会 の 会 員 宅 や 会 員 友 人 宅 にホームステイをしました 以 下 は 彼 らの 感 想 文 です 84 号 別 冊 2009 年 3 月 26 日 2 泊 3 日 スーザン 田 辺 先 生 引 率 のセーレム 市 の 高 校 生 が 当 会 の 会 員 宅 や 会 員 友 人 宅 にホームステイをしました 以 下 は 彼 らの 感 想 文 です Suzan Tanabe Once more, the Kawagoe Salem Friendship Association brought joy

More information

Financial Modeling & Valuation Training

Financial Modeling & Valuation Training Financial Modeling & Valuation Training CFA Society Japan is proud to present our Financial Modeling & Valuation Training courses held in conjunction with Wall St. Training. The Financial Modeling & Valuation

More information

Integrating Elements of Local Identity into Communication Activities

Integrating Elements of Local Identity into Communication Activities >> 松 山 東 雲 女 子 大 学 - Matsuyama Shinonome College Title Joint Research:Integrating Elements Communication Activities Author(s) 門 田, リンダ K.; 川 口, ローラ Citation 松 山 東 雲 女 子 大 学 人 文 科 学 部 紀 要. vol.24, no.,

More information

Japan s Civil-Military Coordination in U.N. Peacekeeping Operations

Japan s Civil-Military Coordination in U.N. Peacekeeping Operations Japan s Civil-Military Coordination in U.N. Peacekeeping Operations Hideki Tsuchimoto (Deputy Director-General, Secretariat International Peace Cooperation Headquarters, Cabinet Office) Now I would like

More information

Kumiko Sakamoto, Ms., Acad, Social Science, Japan: Women and men in changing societies: Gender division of labor in rural southeast Tanzania [A2]

Kumiko Sakamoto, Ms., Acad, Social Science, Japan: Women and men in changing societies: Gender division of labor in rural southeast Tanzania [A2] Kumiko Sakamoto, Ms., Acad, Social Science, Japan: Women and men in changing societies: Gender division of labor in rural southeast Tanzania [A2] Contents Summary Introduction: Production and reproduction

More information

Sector Strategies 2013 年 度 報 告 書

Sector Strategies 2013 年 度 報 告 書 Sector Strategies 2013 年 度 報 告 書 2013 年 5 月 1. 報 告 書 1.1. 気 候 の 変 化 と AB32 実 施 状 況 気 候 変 化 と AB32 の 実 施 委 員 会 は 5 月 16 日 に 公 聴 会 を 行 い 気 候 の 変 化 が 州 にもた らすリスクとその 対 策 の 進 捗 状 況 について 議 論 を 行 った カリフォルニア 州

More information

Grade 9 Language and Literature (English) Course Description

Grade 9 Language and Literature (English) Course Description Grade 9 Language and Literature (English) Course Description Unit 1 - The Shape of Things We Say (Love and War poetry) Global Context: Personal and cultural expression Key Concept: Communication Related

More information

Stormy Energy Future and Sustainable Nuclear Power

Stormy Energy Future and Sustainable Nuclear Power Stormy Energy Future and Sustainable Nuclear Power 2016-4-13 JAIF Annual Conference Former Executive Director, IEA President, the Sasakawa Peace Foundation Nobuo TANAKA Sustainable Nuclear Power Japan

More information

平 成 26 年 度 生 入 学 選 考 試 験 英 語 [ 特 待 生 入 試 ]

平 成 26 年 度 生 入 学 選 考 試 験 英 語 [ 特 待 生 入 試 ] 平 成 26 年 度 生 入 学 選 考 試 験 英 語 [ 特 待 生 入 試 ] [ 関 西 健 康 科 学 専 門 学 校 入 学 試 験 過 去 問 題 1] 1. 見 出 し 語 と 同 じ 音 節 に 主 アクセントがある 語 を 選 びなさい (1) dis-or-der (1in-ci-dent2mon-o-logue3re-in-force4in-ter-pret) (2) e-co-nom-ic

More information

Panasonic AC-DC Power Supply Design Support Service

Panasonic AC-DC Power Supply Design Support Service Panasonic AC-DC Power Supply Design Support Service The best solution to design your AC-DC power supply (how to design a switching power supply, order a transformer, prevent EMI, etc.) Panasonic s IPD

More information

Let s ask Tomoko and Kyle to the party. A. accept B. except C. invite D. include

Let s ask Tomoko and Kyle to the party. A. accept B. except C. invite D. include 英 語 2014 年 度 入 学 試 験 (A 日 程 1 月 25 日 ) 60 分 英 語 試 験 問 題 学 芸 学 部 : 日 本 語 日 本 文 学 科 英 語 文 化 コミュニケーション 学 科 子 ども 教 育 学 科 メディア 情 報 学 科 生 活 デザイン 学 科 人 間 社 会 学 部 : 社 会 マネジメント 学 科 人 間 心 理 学 科 栄 養 科 学 部 : 健 康 栄

More information

Data Mining for Risk Management in Hospital Information Systems

Data Mining for Risk Management in Hospital Information Systems Data Mining for Risk Management in Hospital Information Systems Shusaku Tsumoto and Shoji Hirano Department of Medical Informatics, Shimane University, School of Medicine, 89-1 Enya-cho, Izumo 693-8501

More information

EDB-Report. 最 新 Web 脆 弱 性 トレンドレポート(2014.11) 2014.11.01~2014.11.30 Exploit-DB(http://exploit-db.com)より 公 開 されている 内 容 に 基 づいた 脆 弱 性 トレンド 情 報 です

EDB-Report. 最 新 Web 脆 弱 性 トレンドレポート(2014.11) 2014.11.01~2014.11.30 Exploit-DB(http://exploit-db.com)より 公 開 されている 内 容 に 基 づいた 脆 弱 性 トレンド 情 報 です 04. 最 新 Web トレンドレポート(04.) 04..0~04..30 Exploit-DB(http://exploit-db.com)より 公 開 されている 内 容 に 基 づいた トレンド 情 報 です サマリー ペンタセキュリティシステムズ 株 式 会 社 R&Dセンター データセキュリティチーム 04 年 月 は Exploit-DBより 公 開 されている の 中 SQLインジェクション(SQL

More information

Offenders Rehabilitation Act (Act No. 88 of June 15, 2007)

Offenders Rehabilitation Act (Act No. 88 of June 15, 2007) この 更 生 保 護 法 ( 平 成 20 年 6 月 1 日 施 行 ) の 翻 訳 は 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 20 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語 の 法 令 自 体 であり 翻 訳 はあくまでその 理 解 を 助 けるための

More information

Christ Episcopal Church Sei Ko Kai

Christ Episcopal Church Sei Ko Kai Christ Episcopal Church Sei Ko Kai 2140 Pierce Street, San Francisco, California 94115 January-February, 2003 Greeting the New Year Dearest Friends in Christ, The Christmas Season is ending, and now we

More information

Electricity Business Act ( Act No. 170 of July 11, 1964)

Electricity Business Act ( Act No. 170 of July 11, 1964) この 電 気 事 業 法 の 翻 訳 は 平 成 十 七 年 法 律 第 八 十 七 号 までの 改 正 ( 平 成 18 年 5 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語 の

More information

Advanced Training Program for Teachers of the Japanese-Language Application Instructions For FY 2016

Advanced Training Program for Teachers of the Japanese-Language Application Instructions For FY 2016 Advanced Training Program for Teachers of the Japanese-Language Application Instructions For FY 2016 1. Objectives The Advanced Training Program at the Japan Foundation Japanese-Language Institute, Urawa

More information

さくらインターネット 研 究 所 上 級 研 究 員 日 本 Vyattaユーザー 会 運 営 委 員 松 本 直 人

さくらインターネット 研 究 所 上 級 研 究 員 日 本 Vyattaユーザー 会 運 営 委 員 松 本 直 人 2011 年 08 月 18 日 さくらインターネット 研 究 所 上 級 研 究 員 日 本 Vyattaユーザー 会 運 営 委 員 松 本 直 人 (C)Copyright 1996-2010 SAKURA Internet Inc. 現 在 起 こっているコト 従 来 のコンピューティング クラウド コンピューティング パブリック プライベートの 区 別 なくクラウドへ 移 行 中 仮 想

More information

Online Grading System User Guide. Content

Online Grading System User Guide. Content User Guide (Translation of " 成 績 WEB 入 力 システム 操 作 マニュアル") Content 0Login page...1 1 Login 1 2 Logout 2 1Password Initialization.3 2Menu.4 3Student Database...5 1 Student Search 5 2 Search Results 6 4Registered

More information

Discover the power of reading for university learners of Japanese in New Zealand. Mitsue Tabata-Sandom Victoria University of Wellington

Discover the power of reading for university learners of Japanese in New Zealand. Mitsue Tabata-Sandom Victoria University of Wellington Discover the power of reading for university learners of Japanese in New Zealand Mitsue Tabata-Sandom Victoria University of Wellington The power of reading The power of reading is claimed by Krashen (2004).

More information

医 学 生 物 学 一 般 問 題 ( 問 題 用 紙 1 枚 解 答 用 紙 2 枚 )

医 学 生 物 学 一 般 問 題 ( 問 題 用 紙 1 枚 解 答 用 紙 2 枚 ) 平 成 26 年 度 大 学 院 医 学 研 究 科 博 士 課 程 入 学 試 験 (1 回 目 ) 医 学 生 物 学 一 般 問 題 ( 問 題 用 紙 1 枚 解 答 用 紙 2 枚 ) 以 下 の 問 題 1 問 題 4のうち 二 つの 問 題 を 選 択 して 解 答 しなさい 一 つの 問 題 につき1 枚 の 解 答 用 紙 を 使 用 しなさい 紙 面 不 足 の 場 合 は 裏

More information

自 計 式 農 家 経 済 簿 記 とその 理 論

自 計 式 農 家 経 済 簿 記 とその 理 論 SSN- 0915-9258 統 計 資 料 シリーズ:No. 71 農 家 経 済 調 査 データベース 編 成 報 告 書 Vol. 8 自 計 式 農 家 経 済 簿 記 とその 理 論 英 語 版 附 解 題 大 槻 正 男 著 京 都 大 学 農 学 部 農 業 簿 記 研 究 施 設 刊 行 一 橋 大 学 経 済 研 究 所 附 属 社 会 科 学 統 計 情 報 研 究 センター 2013

More information

Security Threats. Information Security White Paper 2009 Part 2. Attacking Techniques Become More and More Sophisticated

Security Threats. Information Security White Paper 2009 Part 2. Attacking Techniques Become More and More Sophisticated Information Security White Paper 2009 Part 2 10 M a j o r Security Threats Attacking Techniques Become More and More Sophisticated & Appendix D Information Security Overview for FY 2008 (10 Topics) June

More information

Instructions for how to fill out the Arai Auto Auction

Instructions for how to fill out the Arai Auto Auction Instructions for how to fill out the Arai Auto Auction Motorcycle Auction Entry Form (Digital Format Use) As of March, 2013 Note: Please fill in the form in Japanese language only. Other languages, including

More information

第 9 回 仮 想 政 府 セミナー Introduction Shared Servicesを 考 える ~Old but New Challenge~ 東 京 大 学 公 共 政 策 大 学 院 奥 村 裕 一 2014 年 2 月 21 日

第 9 回 仮 想 政 府 セミナー Introduction Shared Servicesを 考 える ~Old but New Challenge~ 東 京 大 学 公 共 政 策 大 学 院 奥 村 裕 一 2014 年 2 月 21 日 第 9 回 仮 想 政 府 セミナー Introduction Shared Servicesを 考 える ~Old but New Challenge~ 東 京 大 学 公 共 政 策 大 学 院 奥 村 裕 一 2014 年 2 月 21 日 シェアードサービス(SS) ~Definition( 定 義 )~ 複 数 部 門 で 行 っている 同 類 の 業 務 を 一 つの 部 門 に 集 約

More information

PwCグローバルインフラセミナー 前 半 の 部 世 界 のインフラ PPP 市 場 の 現 状 と 展 望 概 要 版

PwCグローバルインフラセミナー 前 半 の 部 世 界 のインフラ PPP 市 場 の 現 状 と 展 望 概 要 版 www.pwc.com/jp グローバルインフラセミナー 前 半 の 部 世 界 のインフラ PPP 市 場 の 現 状 と 展 望 概 要 版 Japan Contents Overview of Asian Infrastructure Market Asian Infrastructure Market by Country China India Indonesia Australia Malaysia/Thailand/Philippines/Vietnam

More information

In-class student presentations are a common method of oral evaluation in communicationfocused

In-class student presentations are a common method of oral evaluation in communicationfocused JALT2011 Conference Proceedings 416 Integrating Video Assessment Into an Oral Presentation Course Joel P. Rian Don Hinkelman Geordie McGarty Sapporo Gakuin University Reference Data: Rian, J.P., Hinkelman,

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

NSPU510CS Built-in ESD Protection Device RoHS Compliant

NSPU510CS Built-in ESD Protection Device RoHS Compliant NICHIA CORPORATION SPECIFICATIONS FOR UV LED NSPU510CS Built-in ESD Protection Device RoHS Compliant SPECIFICATIONS (1) Absolute Maximum Ratings Item Symbol Absolute Maximum Rating Unit Forward Current

More information

Even at an early age, students have their own ideas about school,

Even at an early age, students have their own ideas about school, 46 The Language Teacher READERS FORUM Self-regulated learning: Goal setting and self-monitoring Marc Bloom Takanawa Junior/Senior High School Even at an early age, students have their own ideas about school,

More information

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22 レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22 薄 紫 :3 年 型 番 :5 年 型 番 字 : 新 規 追 加 変 更 当 価 格 表 は 予 告 なしに 変 更 する 場 合 がございますので ご 了 承 ください 価 格 は 全 て 税 抜 きでの 掲 載 となっております 新 規

More information

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security

More information

Why today? What s next?

Why today? What s next? Closing PhUSE Single Day Events, Tokyo, 31 st Oct 2014 Why today? What & why PhUSE? What s next? Link to Prezi http://prezi.com/p77zfstdrzfs/present/?auth_key=4d37wvn&follow=cdxkkrg_3vlu&kw=present p77zfstdrzfs&rc=ref

More information

JPShiKen.COM 全 日 本 最 新 の IT 認 定 試 験 問 題 集

JPShiKen.COM 全 日 本 最 新 の IT 認 定 試 験 問 題 集 JPShiKen.COM 全 日 本 最 新 の IT 認 定 試 験 問 題 集 最 新 の IT 認 定 試 験 資 料 のプロバイダ 参 考 書 評 判 研 究 更 新 試 験 高 品 質 学 習 質 問 と 回 答 番 号 教 科 書 難 易 度 体 験 講 座 初 心 者 種 類 教 本 ふりーく 方 法 割 引 復 習 日 記 合 格 点 学 校 教 材 ス クール 認 定 書 籍 攻

More information

Quality Risk Management as a Tool for Improving Compliance and E ciency

Quality Risk Management as a Tool for Improving Compliance and E ciency PDA Journal of GMP and Validation in Japan Vol. 9, No. 2 (2007) 技 術 報 告 Quality Risk Management as a Tool for Improving Compliance and E ciency Prasad Kanneganti, Ph. D Quality Operations Pˆzer Asia Paciˆc

More information

Course Material English in 30 Seconds (Nan un-do)

Course Material English in 30 Seconds (Nan un-do) English 4A Spring 2011 Sumiyo Nishiguchi Syllabus Course Title English 4A Instructor Sumiyo Nishiguchi Class Location B101 Time Monday 1pm-2:30pm Email nishiguchi@rs.tus.ac.jp Course Website https://letus.ed.tus.ac.jp/course/

More information

Teacher Training and Certificate System

Teacher Training and Certificate System Teacher Training and Certificate System 1. Teacher Training Teacher training in Japan started with the establishment of normal schools (schools for teacher training) in 1872. In 1886, a higher normal school

More information

DC DC φ φ DC φ φ AC φ φ φ φ φ φ φ 24V DC Class2 This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1 ) this device may not cause harmful interference,and

More information

How To Teach English At Kumon

How To Teach English At Kumon English Education at Kumon 1 Running Head: ENGLISH EDUCATION AT KUMON English Education at KUMON ~ A Case Study of Two Children and their Mothers ~ by Yukiko Kawabata A graduation thesis submitted to the

More information

Direct Marketing Production Printing & Value-Added Services: A strategy for growth

Direct Marketing Production Printing & Value-Added Services: A strategy for growth 2015 年 12 月 Direct Marketing Production Printing & Value-Added Services: A strategy for growth 完 成 のご 案 内 ダイレクトマーケティングにおける 印 刷 物 & 付 加 価 値 サービス : 成 長 への 戦 略 とは? 印 刷 物 を 活 用 したダイレクトマーケティングが 成 長 しており デジタル

More information

Wi-Fi SD. Sky Share S10 User Manual

Wi-Fi SD. Sky Share S10 User Manual Wi-Fi SD Sky Share S10 User Manual Table of Contents 1. Introduction... 3 2. Spec and System Requirements... 4 3. Start Sky Share S10... 5 4. iphone App... 7 5. ipad App... 13 6. Android App... 15 7. Web

More information

Public Financial Assistance for Formal Education in Japan

Public Financial Assistance for Formal Education in Japan Public Financial Assistance for Formal Education in Japan In Japan, households bear a particularly high proportion of the costs of pre-primary and tertiary education compared with other OECD countries

More information

LEAVING CERTIFICATE 2011 MARKING SCHEME JAPANESE HIGHER LEVEL

LEAVING CERTIFICATE 2011 MARKING SCHEME JAPANESE HIGHER LEVEL Coimisiún na Scrúduithe Stáit State Examinations Commission LEAVING CERTIFICATE 2011 MARKING SCHEME JAPANESE HIGHER LEVEL LISTENING COMPREHENSION Part A: 21 marks (1/ if answered in Japanese, romaji or

More information

Six degrees of messaging

Six degrees of messaging UNIT 5 5 10 15 20 Six degrees of messaging Study of instant messaging shows worldwide personal links. Yet more evidence has turned up to show that we are only six steps removed from almost anyone else

More information

Miyagi Prefecture Earthquake Disaster Recovery Plan

Miyagi Prefecture Earthquake Disaster Recovery Plan Miyagi Prefecture Earthquake Disaster Recovery Plan ~ The bond between Miyagi, Tohoku and Japan - from Recovery to Prosperity ~ Musubimaru ( Tourist PR character of Miyagi prefecture ) MIYAGI

More information

Green Solution with Simegy

Green Solution with Simegy 要 旨 オフィス 環 境 における 複 合 機 やプリンターの 消 費 電 力 の 見 える 化 や 消 費 電 力 の 削 減 のためのグリーン ソリューションが 近 年 強 く 求 められている 富 士 ゼ ロックスは 複 合 機 やプリンターを 管 理 / 活 用 するた めの ApeosWare Management Suite のようなソフ トウェアに 対 して ゼロックスの Simegy

More information

Corporate Amazon Gift Certificate Instruction for Downloading the GC File

Corporate Amazon Gift Certificate Instruction for Downloading the GC File Corporate Amazon Gift Certificate Instruction for Downloading the GC File August 2010 (rev1) Amazon Gift Cards Japan KK Thank you very much for ordering Corporate Amazon Gift Certificate. We deliver Corporate

More information

NS9L153AMT-H3 Pb-free Reflow Soldering Application Built-in ESD Protection Device RoHS Compliant

NS9L153AMT-H3 Pb-free Reflow Soldering Application Built-in ESD Protection Device RoHS Compliant NICHIA CORPORATION SPECIFICATIONS FOR WARM WHITE LED NS9L153AMT-H3 Pb-free Reflow Soldering Application Built-in ESD Protection Device RoHS Compliant SPECIFICATIONS (1) Absolute Maximum Ratings Item Symbol

More information

Current Situation of Research Nurse Education and Future Perspectives in Japan

Current Situation of Research Nurse Education and Future Perspectives in Japan Current Situation of Research Nurse Education and Future Perspectives in Japan Eriko Aotani Clinical Trials Coordinating Center The Kitasato Institute 1 Who are involved in Clinical Trials? Patients. Others

More information

JASIN SYLLABUS. Spring 2016. http://www.nagasaki-gaigo.ac.jp/jasin/classes VIA VERITAS VITA. Nagasaki University of Foreign Studies

JASIN SYLLABUS. Spring 2016. http://www.nagasaki-gaigo.ac.jp/jasin/classes VIA VERITAS VITA. Nagasaki University of Foreign Studies JASIN SYLLABUS Spring 2016 http://www.nagasaki-gaigo.ac.jp/jasin/classes VIA VERITAS VITA Nagasaki University of Foreign Studies International Center 2016.3.25 JASIN List ( B s: Spring 2016) Japanese Language

More information

ENGLISH TRANSLATION. Data Coding and Transmission Specification for Digital Broadcasting ARIB STANDARD. ARIB STD-B24 Version 5.

ENGLISH TRANSLATION. Data Coding and Transmission Specification for Digital Broadcasting ARIB STANDARD. ARIB STD-B24 Version 5. ARIB STD-B24 ENGLISH TRANSLATION Data Coding and Transmission Specification for Digital Broadcasting ARIB STANDARD ARIB STD-B24 Version 5.2 VOLUME 1 Established October 26, 1999 Version 1.0 Revised March

More information

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users

More information

A Large-Scale Self-Organizing Map for Metagenome Studies for Surveillance of Microbial Community Structures

A Large-Scale Self-Organizing Map for Metagenome Studies for Surveillance of Microbial Community Structures Chapter 1 Earth Science A Large-Scale Self-Organizing Map for Metagenome Studies for Surveillance of Microbial Community Structures Project Representative Toshimichi Ikemura Nagahama Institute of Bio-Science

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.

More information

Study on the Diagnostics and Projection of Ecosystem Change Associated with Global Change

Study on the Diagnostics and Projection of Ecosystem Change Associated with Global Change Chapter 1 Earth Science Study on the Diagnostics and Projection of Ecosystem Change Associated with Global Change Project Representative Sanae Chiba Authors Eiji Watanabe Maki Noguchi Aita Akio Ishida

More information

MPLS Configration 事 例

MPLS Configration 事 例 MPLS Configration 事 例 JANOG6 MPLSパネル グローバルワン 株 式 会 社 06/16/2000 JANOG6 MPLS Pannel 1 MPLS Configration なにが 必 要?(Ciscoしかわかりません) IOSは12.0(7) T 以 上 がいい PEは3600, 4500, 7200, and 7500 PはCisco LS1010, 7200,

More information

7 myths about cars and free trade agreements

7 myths about cars and free trade agreements ECIPE PRESENTATION» 7 myths about cars and free trade agreements Hosuk Lee-Makiyama Co-Director, European Centre for International Political Economy (ECIPE) Myth #1 作 り 話 #1 Mythe #1 Foreign imports are

More information