Refine your search:     
Report No.
 - 
Search Results: Records 1-2 displayed on this page of 2
  • 1

Presentation/Publication Type

Initialising ...

Refine

Journal/Book Title

Initialising ...

Meeting title

Initialising ...

First Author

Initialising ...

Keyword

Initialising ...

Language

Initialising ...

Publication Year

Initialising ...

Held year of conference

Initialising ...

Save select records

JAEA Reports

Construction of thin-client system with hosted desktop infrastructure

Yashiro, Shigeo; Shoji, Makoto; Ueno, Tokio; Ueno, Asuka

JAEA-Testing 2019-001, 28 Pages, 2019/06

JAEA-Testing-2019-001.pdf:3.51MB

Center for Computational Science & e-Systems of Japan Atomic Energy Agency, provides an environment for using PCs with thin client systems to our organization's officers, operation management organization, common business organization, base management department, and offices for each research and development department. Supports the efficient and smooth implementation of our decision-making, core operations and related tasks. This report is the characteristics and construction policy (basic requirements) of the thin client system and hardware newly obtained in the subsequent operation, which were arranged and examined on the introduction of the existing thin client system updated in October 2017. It is a summary of the results, findings, etc. of the occupied thin client system.

JAEA Reports

Materials for the information security education; FY 2013-2017

Ueno, Asuka; Yashiro, Shigeo; Uno, Kiichiro*; Aoki, Kazuhisa

JAEA-Review 2018-006, 115 Pages, 2018/06

JAEA-Review-2018-006.pdf:30.8MB

Cyberattacks causing serious damage are ongoing as seen in the incidents such as personal information leakage from the Japan Pension Service by unauthorized access in 2015, and a massive ransomware infection across the world in 2017. Recently, threats in the cyberspace has been growing, such as sending an order form, shipping notification, while pretending a real company to persuade recipient to open an attached file with embedded unforeseen malware, or to click on a link in the email to malicious website. In these circumstances, the information security countermeasures are important issues at the JAEA. CCSE therefore is striving to promote proactive information security countermeasures with the three aspects of (1) Maintenance of the information security regulations, (2) Countermeasures with information security products having a new protection technology, (3) Implementation of information security education and training for the employees to maintain and improve their ability to respond. This report is a summary of the contents of the information security education by e-learning.

2 (Records 1-2 displayed on this page)
  • 1