Font Size Change

HOMEIT SecurityIPA/ISEC:Measures for Information Security Vulnerabilities

PRINT PAGE

IT Security

IPA/ISEC:Measures for Information Security Vulnerabilities

 

Seeking to distribute accurate information about vulnerabilities (security holes), we at the IT Security Center work aggressively to analyze vulnerabilities, establish and promote countermeasures, provide educational materials and couduct research into a range of tools to shore up defenses against vulnerabilities.

Center for vulnerability reports and countermeasures

By appointment of METI, the IPA serves as a center to which people can direct reports on security vulnerabilities for analysis. We work closely with the Japan Computer Emergency Response Team Coordination Center (JPCERT/CC), and related organizations and groups under the framework of the Information Security Early Warning Partnership.

We collect information from the internet about vulnerabilities and the ways nefarious people invent to exploit them. This information is then subject to detailed research and verification, as well as impact evaluation.

May 25,2012 Security Alert for Vulnerability in LAN-W300N/R Series
May 8, 2012 Security Alert for Vulnerability in Multiple JustSystems Products
Apr 9, 2012 Security Alert for Vulnerability in Control Systems

JVN : Providing reliable vulnerability information

When a security vulnerability is discovered, it is reported to the IPA. We publish information such as what the pertinent products' developers are doing to address the situation and any available countermeasures on the Japan Vulnerability Notes portal site( http://jvn.jp/ , http://jvn.jp/en/ ), which we operate jointly with the JPCERT/CC, thereby helping promote defense against vulnerabilities.

Additionally, April 25,2007 saw the launch of a new database of information about vulnerabilities related to software and products used in Japan and how to counter them. Called, JVN iPedia( http://jvndb.jvn.jp/ , http://jvndb.jvn.jp/en/ ).

What is JVN?

JVN iPedia Registration Status >> More Info

Jun 9, 2017 2017 1st Quarter (Jan. – Mar.)
Feb 24, 2017 2016 4th Quarter (Oct. – Dec.)
Nov 11, 2016 2016 3rd Quarter (Jul. – Sep.)

TOPICS

Sep 29, 2015 "10 Major Security Threats 2015" released
Dec 26, 2014 For the Year 2014 "10 Major Security Threats"
Aug 27, 2013 For the Year 2013 "10 Major Security Threats"
Nov 30, 2011 Design and Operational Guide to Cope with "Advanced Persistent Threats"
Jun 20, 2011 "2010 Smart Home Appliance Security Study Report" Released
Feb 22, 2011 "Web Application Firewall Guide" Released
Feb 22, 2011 Approaches for Embedded System Information Security (2010 Revised Edition) Released
Feb 25, 2010 Developer API for JVN iPedia Released
Dec 21, 2009 “MyJVN Security Configuration Checker” released
Nov 30, 2009 “MyJVN Version Checker” released
Nov 30, 2009 OVAL(Open Vulnerability and Assessment Language) Overview
Jun 18, 2009 JVN iPedia Upgraded to New Version
Jan 26, 2009 CVE(Common Vulnerabilities and Exposures) Overview
Jan 15, 2009 Filtered Vulnerability Countermeasure Information Tool “MyJVN” English Version Released
Oct 23, 2008 Filtered Vulnerability Countermeasure Information Tool “MyJVN” Now Available
Oct 23, 2008 CPE(Common Platform Enumeration) Overview
Sep 10, 2008 JVN iPedia Upgraded to New Version
Sep 10, 2008 CWE(Common Weakness Enumeration) Overview
May 21, 2008 English Versions of JVN and JVN iPedia Released

Related documents

Sep 5, 2012
Information Security White Paper 2011 Part 2
“10 Major Security Threats” Released

Jul 10, 2012
Design and Operational Guide to Protect against "Advanced Persistent Threats"(Japanese Page)

Dec 28, 2011
"Web Application Firewall Guide 2nd Edition " Released

Dec 26, 2011
"How to Secure Your Web Site" Released

Aug 23, 2011
Information Security White Paper 2011 Part 2
“10 Major Security Threats” Released

Jun 20, 2011
"2010 Smart Home Appliance Security Study Report" Released

Feb 22, 2011
"Approaches for Embedded System Information Security (2010 Revised Edition)" Released

Sep 21, 2010
"How to Use SQL Calls to Secure Your Web Site" Released

Jun 7, 2010
Information Security White Paper 2010 Part 2
“10 Major Security Threats” Released

Jun 25, 2009
Information Security White Paper 2009 Part 2
“10 Major Security Threats” Released

Jul 29, 2008
Vulnerability Disclosure Guideline for Software Developers Released