摘要 |
<p><P>PROBLEM TO BE SOLVED: To make a physical security system and a cyber security system as two independent systems cooperate each other to achieve a more efficient and robust security system. <P>SOLUTION: An operation log of a fraudulently accessed electronic device 5, which is collected by the cyber security system 6 and stored in an operation log storage means, is acquired by an operation log collection means of a physical/cyber cooperative device 1. An operation log analysis means 1b identifies the electronic device 5 receiving fraudulent access among a plurality of electronic devices 5, and acquires an identification code of a monitoring camera 9 to be operated on the basis of a PC/camera correspondence table 2a. Operation control information of the monitoring camera 9 is decided by a physical/cyber cooperative rule 2c from contents of an operation log; and an external command is created/issued on the basis of the identification code and the operation control information of the monitoring camera 9, and a video monitoring operation command 2b and is input into an external command input means of a video monitoring device 11. <P>COPYRIGHT: (C)2010,JPO&INPIT</p> |