{"id":4613,"date":"2023-07-25T22:53:03","date_gmt":"2023-07-25T13:53:03","guid":{"rendered":"https:\/\/itresearchart.biz\/?p=4613"},"modified":"2023-07-25T22:53:03","modified_gmt":"2023-07-25T13:53:03","slug":"active-cyber-defense-%e5%af%be%e3%82%a2%e3%82%af%e3%83%86%e3%82%a3%e3%83%96%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%83%87%e3%82%a3%e3%83%95%e3%82%a7%e3%83%b3%e3%82%b9","status":"publish","type":"post","link":"https:\/\/itresearchart.biz\/?p=4613","title":{"rendered":"Active Cyber Defense \u5bfe\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9"},"content":{"rendered":"<p>7\u67081\u65e5\u304b\u3089\u3001\u30ed\u30f3\u30c9\u30f3\u306b\u4e45\u3057\u3076\u308a\u306b\u3044\u3063\u3066\u304d\u307e\u3057\u305f\u3002&#8221;Frozen&#8221;\u3084&#8221;Tina&#8221;\u306a\u3069\u306e\u30df\u30e5\u30fc\u30b8\u30ab\u30eb\u306a\u3069\u3082\u898b\u3066\u304d\u307e\u3057\u305f\u3002Frozen (\u30a2\u30ca\u3068\u96ea\u306e\u5973\u738b)\u3067\u3059\u304c\u3001\u300clet it go\u300d\u304c\u4e00\u5e55\u76ee\u306e\u7d42\u308f\u308a\u306b\u6765\u308b\u306e\u3067\u3059\u304c\u3001\u9ce5\u808c\u30e2\u30ce\u306e\u3059\u3054\u3055\u3067\u3057\u305f\u3002\u672c\u5f53\u306b\u3001\u6a5f\u4f1a\u304c\u3042\u308a\u307e\u3057\u305f\u3089\u3001\u305c\u3072\u3068\u3082\u3054\u3089\u3093\u304f\u3060\u3055\u3044\u3002Tina\u3082\u6700\u5f8c\u306f\u3001\u7dcf\u7acb\u3061\u306e\u30e9\u30a4\u30d6\u30e2\u30fc\u30c8\u3067\u3059\u3057\u3001\u697d\u3057\u304b\u3063\u305f\u3002<\/p>\n<p><a href=\"https:\/\/itresearchart.biz\/?attachment_id=4623\" rel=\"attachment wp-att-4623\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-4623\" src=\"https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/Tina.jpg?resize=644%2C483&#038;ssl=1\" alt=\"\" width=\"644\" height=\"483\" srcset=\"https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/Tina-scaled.jpg?resize=644%2C483&amp;ssl=1 644w, https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/Tina-scaled.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/Tina-scaled.jpg?resize=768%2C576&amp;ssl=1 768w, https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/Tina-scaled.jpg?resize=1536%2C1152&amp;ssl=1 1536w, https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/Tina-scaled.jpg?resize=2048%2C1536&amp;ssl=1 2048w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/a><\/p>\n<p>\u3068\u3044\u3063\u3066\u3082\u3001\u30e1\u30a4\u30f3\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u95a2\u4fc2\u306e\u30a4\u30f3\u30bf\u30d3\u30e5\u30fc\u3092\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u305d\u3053\u3067\u3001\u3059\u3054\u304f\u6c17\u306b\u306a\u3063\u305f\u3053\u3068\u304c\u3001\u82f1\u8a9e(British English)\u3068\u3057\u3066 \u306e&#8221;Active Cyber Defense&#8221;\u3068\u65e5\u672c\u306e\u95a2\u4fc2\u8005\u304c\u3044\u3046\u300c\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u300d\u304c\u5168\u304f\u5225\u7269\u3067\u3042\u3063\u3066\u3001\u3057\u304b\u3082\u3001\u82f1\u56fd\u306e\u95a2\u4fc2\u8005\u306f\u3001\u65e5\u672c\u4eba\u306e\u7528\u8a9e\u3078\u306e\u920d\u611f\u3055\u304c\u3001\u6c17\u306b\u306a\u3063\u3066\u3044\u308b\u3068\u3044\u3046\u3053\u3068\u3067\u3057\u305f\u3002<\/p>\n<p>\u3068\u3044\u3046\u3053\u3068\u3067\u3001\u4ee5\u4e0b\u3001Active Cyber Defense (\u3053\u308c\u306f\u3001British English\u3068\u3057\u3066 \u306e&#8221;Active Cyber Defense&#8221;\u3092\u3044\u3044\u307e\u3059)\u5bfe\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u3068\u3044\u3046\u3053\u3068\u3067\u3001\u82f1\u56fd\u304b\u3089\u3001\u65b0\u3057\u3044\u5206\u6790\u8cc7\u6599\u304c\u3067\u305f\u3053\u3068\u3082\u3042\u308b\u306e\u3067\u3001\u3053\u306e\u70b9\u306b\u3064\u3044\u3066\u307e\u3068\u3081\u3066\u307f\u307e\u3059\u3002(\u7c73\u8a9e\u3067\u3082&#8221;Active Cyber Defense&#8221;\u304c\u3042\u308b\u3053\u3068\u306f\u3001<a href=\"https:\/\/itresearchart.biz\/?p=4478\">\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u306e\u6982\u5ff5\u306e\u6587\u732e\u7684\u5206\u6790\u3068\u6cd5\u76843D\u5206\u6790<\/a>\u306eDorothy E. Denning and Bradley J. Strawser\u201cActive Cyber Defense: Applying Air Defense to the Cyber Domain\u201d(2017)\u3092\u3069\u3046\u305e\u3002)<\/p>\n<h1>1 Active Cyber Defense<\/h1>\n<h2>1.1 2016 \u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565<\/h2>\n<h5>Active Cyber Defense\u306e\u6982\u5ff5<\/h5>\n<p>2106\u5e74\uff11\uff11\u6708\uff11\u65e5\u306b\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30f3\u30bf\u30fc\uff08NCSC\u3000\u4ee5\u4e0b\u3001NCSC\u3068\u3082\u3044\u3046\uff09 \u306f\u3001\u300c\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\uff08National Cyber Security Strategy\uff09\u300d\u3092\u660e\u3089\u304b\u306b\u3057\u3066\u3044\u307e\u3059\u3002\u305d\u3053\u3067\u306f\u3001<\/p>\n<blockquote><p>\u6bd4\u8f03\u7684\u81ea\u52d5\u7684\u306a\u65b9\u6cd5\u306b\u3088\u3063\u3066\u3001\u82f1\u56fd\u3092\u653b\u6483\u3059\u308b\u30b5\u30a4\u30d0\u30fc \u653b\u6483\u306b\u305f\u3044\u3057\u3066\u3001\u683c\u95d8\u3057\u3088\u3046\u3068\u3059\u308b\u610f\u56f3\u3055\u308c\u305f\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3042\u308b\u3002\u3053\u3053\u3067\u3001\u81ea\u52d5\u7684\u3068\u3044\u3046\u306e\u306f\u3001\u3088\u308a\u30b9\u30b1\u30fc\u30eb\u5927\u304d\u304f\u306a\u308c\u3070\u3001\u3046\u307e\u304f\u3044\u304f\u3068\u3044\u3046\u610f\u5473\u3067\u3042\u308b\u3002\u4e07\u80fd\u85ac\u3067\u306f\u306a\u3044\u304c\u3001\u79c1\u305f\u3061\u306e\u7d4c\u9a13\u3059\u308b\u653b\u6483\u306e\u76f8\u5f53\u7a0b\u5ea6\u306e\u30a4\u30f3\u30d1\u30af\u30c8\u3092\u7de9\u548c\u3059\u308b\u306e\u3092\u52a9\u3051\u3066\u304f\u308c\u308b\u3002\u672c\u6765\u306e\u6a19\u7684\u578b\u653b\u6483\u306b\u305f\u3044\u3057\u3066\u306f\u3001\uff08\u5c11\u306a\u304f\u3066\u3082\u6700\u521d\u306f\uff09\u3001\u5f71\u97ff\u3059\u308b\u3053\u3068\u306f\u306a\u3044\u304c\u3001\u9632\u5fa1\u5074\u306e\u4ed5\u4e8b\u306b\u304a\u3051\u308b\u30ce\u30a4\u30ba\u3092\u8efd\u6e1b\u3059\u308b\u306e\u306b\u5f79\u7acb\u3064\u306e\u3092\u671b\u3093\u3067\u3044\u308b\u3002<\/p><\/blockquote>\n<p>\u3068\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3092\u793a\u3057\u305f\u30b0\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u518d\u5ea6\u3001\u3042\u3052\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/itresearchart.biz\/?attachment_id=4168\" rel=\"attachment wp-att-4168\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4168\" src=\"https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2022\/09\/ACDUK.png?resize=567%2C401&#038;ssl=1\" alt=\"\" width=\"567\" height=\"401\" srcset=\"https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2022\/09\/ACDUK.png?w=567&amp;ssl=1 567w, https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2022\/09\/ACDUK.png?resize=300%2C212&amp;ssl=1 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/a><\/p>\n<p>\u5177\u4f53\u7684\u306b\u306f\u3001<\/p>\n<ul>\n<li>\u30a4\u30f3\u30d5\u30e9\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\u306e\u4fee\u6b63<\/li>\n<li>\u96fb\u5b50\u30e1\u30fc\u30eb\u306e\u4fe1\u983c\u56de\u5fa9<\/li>\n<li>\u30c6\u30a4\u30af\u30c0\u30a6\u30f3\u306e\u5b9f\u884c<\/li>\n<li>\u30a4\u30f3\u30d1\u30af\u30c8\u7ba1\u7406\u306e\u305f\u3081\u306e\uff24\uff2e\uff33\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/li>\n<li>\u82f1\u56fd\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u306e\u6539\u5584<\/li>\n<li>\u653f\u5e9c\u306e\u8077\u54e1\u306e\u652f\u63f4<\/li>\n<li>\u8b58\u5225\u30fb\u8a8d\u8a3c\u306e\u305f\u3081\u306e\u30a4\u30ce\u30d6\u30fc\u30c6\u30a3\u30d6\u306a\u9078\u629e\u80a2\u306e\u652f\u63f4<\/li>\n<li>\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u306e\u6240\u6709\u8005\u30fb\u904b\u55b6\u8005\u306e\u305f\u3081\u306b\u652f\u63f4\u306e\u5897\u5927<\/li>\n<\/ul>\n<p>\u306a\u3069\u304c\u3042\u308a\u3001\u305d\u308c\u3089\u306b\u3064\u3044\u3066\u5185\u5bb9\u304c\u7d39\u4ecb\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<h5>\u56fd\u5bb6\u30aa\u30d5\u30a7\u30f3\u30b7\u30d6\u30b5\u30a4\u30d0\u30fc\u30d7\u30ed\u30b0\u30e9\u30e0\uff08National Offensive Cyber Programme (NOCP)<\/h5>\n<p>\u82f1\u56fd\u306b\u304a\u3044\u3066\u3001\u307e\u3063\u305f\u304f\u5225\u500b\u306e\u6982\u5ff5\u3067\u3042\u308b\u306e\u304c\u3001Offensive Cyber(\u653b\u6483\u7684\u30b5\u30a4\u30d0\u30fc)\u3068\u3044\u3046\u6982\u5ff5\u3067\u3059\u3002\u305d\u3053\u3067\u306f\u3001\u653b\u6483\u7684\u30b5\u30a4\u30d0\u30fc\u3068\u306f\u3001<\/p>\n<blockquote><p>\u00a0\u2460\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u306e\u3061\u306b\u5831\u5fa9\u3059\u308b\u80fd\u529b<br \/>\n\u2461\u6a19\u7684\u306e\u901a\u4fe1\u3082\u3057\u304f\u306f\u5175\u5668\u30b7\u30b9\u30c6\u30e0\u3092\u59a8\u5bb3\u3057\u3001\u7834\u6ec5\u3057\u3001\u307e\u305f\u306f\u3001\u7528\u306a\u3057\u306b\u3059\u308b\u80fd\u529b\uff08\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u6e90\u3092\u30b7\u30e3\u30c3\u30c8\u30c0\u30a6\u30f3\u3057\u305f\u308a\u3001\u3088\u308a\u4f1d\u7d71\u7684\u306a\u8ecd\u4e8b\u6d3b\u52d5\u306b\u5099\u3048\u305f\u308a\u3059\u308b\u3053\u3068\u3092\u542b\u3080\uff09<br \/>\n\u2462\u5e83\u7bc4\u56f2\u306e\u30b7\u30b9\u30c6\u30e0\u3084\u30a4\u30f3\u30d5\u30e9\u306b\u5bfe\u3057\u3066\u653b\u6483\u3059\u308b\uff08\u73fe\u5b9f\u4e16\u754c\u3078\u306e\u30c0\u30e1\u30fc\u30b8\u307e\u3067\u62e1\u5f35\u3055\u308c\u308b\uff09\u80fd\u529b<\/p><\/blockquote>\n<p>\u3092<span style=\"font-size: 14px;\">\u30ab\u30d0\u30fc\u3059\u308b\u6982\u5ff5\u306b\u306a\u308a\u307e\u3059\u3002NOCP\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u306f\u30012014\u5e74\u306b\u8a2d\u7acb\u3055\u308c\u3066\u304a\u308a\u3001\u300c\u52b9\u679c\u7684\u306a\u6291\u6b62\u300d\u306b\u5f79\u7acb\u3064\u3082\u306e\u3068\u4f4d\u7f6e\u3065\u3051\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u30d6\u30ed\u30b0\u3067\u306f\u6982\u5ff5\u306e\u9055\u3044\u3092\u8aac\u660e\u3059\u308b\u306e\u3067\u3001\u3053\u306e\u653b\u6483\u7684\u30b5\u30a4\u30d0\u30fc\u306e\u5177\u4f53\u7684\u306a\u63d0\u8981\u306b\u3064\u3044\u3066\u306f\u3001\u3075\u308c\u307e\u305b\u3093\u3002(\u306a\u304a\u3001\u30b5\u30a4\u30d0\u30fc\u30b3\u30de\u30f3\u30c9\u306e\u6d3b\u52d5\u306e\u5831\u544a\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/itresearchart.biz\/?p=4528\">\u300c\u30cf\u30c3\u30af\u306e\u30e9\u30a4\u30bb\u30f3\u30b9-\u82f1\u56fd\u30b5\u30a4\u30d0\u30fc\u30d5\u30a9\u30fc\u30b9\u300c\u5b9f\u8df5-\u8cac\u4efb\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u30d1\u30ef\u30fc\u300d\u306e\u516c\u8868\u300d<\/a>\u3092\u3054\u3089\u3093\u304f\u3060\u3055\u3044\u3002)<\/span><\/p>\n<h2>1.2\u00a0\u305d\u306e\u5f8c\u306e\u82f1\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u653f\u7b56\u7b49<\/h2>\n<p>\u305d\u306e\u5f8c\u3001\u82f1\u56fd\u306f\u3001\u653f\u5e9c\u306e\u300c\u5b89\u5168\u4fdd\u969c\u30fb\u9632\u885b\u30fb\u958b\u767a\u30fb\u5916\u4ea4\u653f\u7b56\u306e\u7d71\u5408\u30ec\u30d3\u30e5\u30fc\u300d\u3092\u767a\u8868\u3057\u307e\u3059\u3002<\/p>\n<p>\u305d\u3053\u3067\u306f\u3001<\/p>\n<p>(1) \u30b5\u30a4\u30d0\u30fc\u30d1\u30ef\u30fc\u304c\u56fd\u5bb6\u76ee\u6a19\u3092\u9054\u6210\u3059\u308b\u305f\u3081\u306e\u91cd\u8981\u306a\u30c6\u30b3\u3068\u306a\u308b\u3053\u3068\u3001<\/p>\n<p>(2)\u30b5\u30a4\u30d0\u30fc\u30d1\u30ef\u30fc\u306e\u7dad\u6301\u306e\u305f\u3081\u306e\u3088\u308a\u5305\u62ec\u7684\u3067\u7d71\u5408\u7684\u306a\u6226\u7565\u306e\u5fc5\u8981\u6027<\/p>\n<p>(3)\u793e\u4f1a\u5168\u4f53\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3067\u3042\u308b\u3053\u3068\u306e\u5fc5\u8981\u6027<\/p>\n<p>\u3092\u660e\u3089\u304b\u306b\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3055\u3089\u306b\u3001<a href=\"https:\/\/www.gov.uk\/government\/publications\/national-cyber-strategy-2022\/national-cyber-security-strategy-2022\">2022\u5e74\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u6226\u7565<\/a>\u306b\u304a\u3044\u3066\u306f\u3001<span style=\"font-size: 14px;\">\u30b5\u30a4\u30d0\u30fc\u306b\u4e0d\u53ef\u6b20\u306a\u6280\u8853\u306b\u304a\u3051\u308b\u6211\u3005\u306e\u624b\u3092\u5f37\u5316\u3059\u308b\u3053\u3068\u3001\u3068\u3001\u6211\u3005\u306e\u4fa1\u5024\u89b3\u3092\u5171\u6709\u3057\u306a\u3044\u4f53\u5236\u4e0b\u3067\u958b\u767a\u3055\u308c\u305f\u500b\u3005\u306e\u30b5\u30d7\u30e9\u30a4\u30e4\u30fc\u3084\u6280\u8853\u3078\u306e\u4f9d\u5b58\u3092\u5236\u9650\u3059\u308b\u3053\u3068\u3001\u3068\u3044\u3046<\/span><span style=\"font-size: 14px;\">\u4e8c\u3064\u306e\u76ee\u6a19<\/span><span style=\"font-size: 14px;\">\u3092\u3082\u3068\u306b\u3001<\/span><\/p>\n<ul>\n<li>\u30b5\u30a4\u30d0\u30fc\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u306e\u5f37\u5316\u7b49(\u67f11)<\/li>\n<li>\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9(\u67f12)<\/li>\n<li>\u4e0d\u53ef\u6b20\u306a\u6280\u8853\u306e\u30a2\u30c9\u30d0\u30f3\u30c6\u30fc\u30b8\u7b49(\u67f13)<\/li>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\u3068\u5f71\u97ff\u529b\u306e\u4fc3\u9032\u7b49(\u67f14)<\/li>\n<li>\u8105\u5a01\u3078\u306e\u5bfe\u5fdc(\u67f15)<\/li>\n<\/ul>\n<p>\u8ad6\u3058\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u67f15\u306b\u304a\u3044\u3066\u306f\u3001\u6575\u5bfe\u52e2\u529b\u3092\u691c\u77e5\u3001\u7834\u58ca\u3001\u6291\u6b62\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u306b\u304a\u3051\u308b\u3001\u305d\u3057\u3066\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u3092\u901a\u3058\u3066\u306e\u82f1\u56fd\u306e\u5b89\u5168\u4fdd\u969c\u3092\u5f37\u5316\u3059\u308b\u3053\u3068\u3001\u304c\u5f37\u8abf\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u3053\u3067\u3001\u4e0a\u306e\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u306f\u3001\u3088\u308a\u5e83\u3044\u56fd\u5bb6\u6226\u7565\u306e\u3072\u3068\u3064\u3068\u3057\u3066\u4f4d\u7f6e\u3065\u3051\u3089\u308c\u308b\u3053\u3068\u306b\u306a\u308a\u3001\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u6226\u7565\u3068\u547c\u3070\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u6226\u7565\u306f\u3001\u300c\u5168\u4f53\u793e\u4f1a(whole of society)\u300d\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u3068\u3063\u305f\u3082\u306e\u3067\u3042\u308b\u3068\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u3088\u3046\u306a\u6226\u7565\u306e\u3082\u3068\u3001Active Cyber Defense\u306b\u3064\u3044\u3066\u3001\u3053\u308c\u3089\u306e\u30b5\u30fc\u30d3\u30b9\u306e\u6709\u7528\u6027\u3092\u3001\u4e2d\u5c0f\u4f01\u696d\u7d4c\u55b6\u8005\u304b\u3089\u6559\u80b2\u30fb\u6148\u5584\u90e8\u9580\u306b\u81f3\u308b\u307e\u3067\u3001\u3088\u308a\u5e83\u7bc4\u306a\u30e6\u30fc\u30b6\u30fc\u306b\u5e83\u3052\u308b\u3053\u3068\u306b\u306a\u308a\u307e\u3057\u305f\u3002\u30a2\u30af\u30bb\u30b7\u30d3\u30ea\u30c6\u30a3\u3068\u4f7f\u3044\u3084\u3059\u3055\u3092\u8a2d\u8a08\u306e\u57fa\u672c\u539f\u5247\u3068\u3057\u305f\uff09\u300e\u6839\u672c\u7684\u306b\u30b7\u30f3\u30d7\u30eb\u306a\u300f\u30c7\u30b8\u30bf\u30eb\u30fb\u30b5\u30fc\u30d3\u30b9\u306e\u8a2d\u8a08\u3068\u958b\u767a\u3078\u306e\u610f\u8b58\u7684\u306a\u30b7\u30d5\u30c8\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u90e8\u7f72\u3092\u6301\u305f\u306a\u3044\u500b\u4eba\u3084\u7d44\u7e54\u306b\u3082\u8106\u5f31\u6027\u30c1\u30a7\u30c3\u30af\u306e\u30e1\u30ea\u30c3\u30c8\u3092\u63d0\u4f9b\u3059\u308b\u306e\u306b\u5f79\u7acb\u3064\u3067\u3057\u3087\u3046\u3068\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<h2>1.3 \u73fe\u5728\u306eActive Cyber Defense<\/h2>\n<h3>1.3.1 \u5e74\u6b21Active Cyber Defense\u5831\u544a\u66f8<\/h3>\n<p>NCSC\u306eActive Cyber Defense\u306e\u30da\u30fc\u30b8\u3067\u306f\u3001\u5e74\u6b21\u306e\u5831\u544a\u66f8\u3092\u307f\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<ul>\n<li>2018\u5e74\u5831\u544a\u66f8(2\u5e74\u76ee)<\/li>\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/report\/acd-report-year-three\">2019\u5e74\u5831\u544a\u66f8(3\u5e74\u76ee)<\/a><\/li>\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/report\/acd-report-year-four\">2020\u5e74\u5831\u544a\u66f8(4\u5e74\u76ee)<\/a><\/li>\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/report\/acd-the-fifth-year\">2021\u5e74\u5831\u544a\u66f8(5\u5e74\u76ee)<\/a><\/li>\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/report\/acd-the-sixth-year\">2022\u5e74\u5831\u544a\u66f8(6\u5e74\u76ee)<\/a><\/li>\n<\/ul>\n<p>\u306a\u304a\u30016\u5e74\u76ee\u306e\u5831\u544a\u66f8\u306b\u3064\u3044\u3066\u306f\u3001\u4e38\u5c71\u3055\u3093\u306e\u30d6\u30ed\u30b0\u3067\u7d39\u4ecb\u304c\u306a\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u305f\u3060\u3057\u3001\u5177\u4f53\u7684\u306a\u5185\u5bb9\u306b\u3064\u3044\u3066\u306f\u3001\u3075\u308c\u3066\u3044\u306a\u3044\u306e\u3067\u3001\u5177\u4f53\u7684\u306a\u30b5\u30fc\u30d3\u30b9\u30d9\u30fc\u30b9\u3067\u8a18\u8f09\u3057\u3066\u3044\u304d\u307e\u3059\u3002<\/p>\n<h3>1.3.2 Active Cyber Defense\u306e\u5177\u4f53\u7684\u306a\u30b5\u30fc\u30d3\u30b9<\/h3>\n<p>\u6982\u5ff5\u7684\u306a\u3082\u306e\u3092\u8ad6\u3058\u308b\u3088\u308a\u3082\u5177\u4f53\u7684\u306a\u904b\u7528\u306b\u6ce8\u76ee\u3057\u3066\u8ad6\u3058\u308b\u3079\u304d\u3067\u3042\u308b\u3068\u3044\u3046\u3053\u3068\u3092<a href=\"https:\/\/itresearchart.biz\/?p=4478\">\u300c\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u306e\u6982\u5ff5\u306e\u6587\u732e\u7684\u5206\u6790\u3068\u6cd5\u76843D\u5206\u6790\u300d<\/a>\u306a\u3069\u3067\u308d\u3093\u3058\u3066\u304d\u305f\u3068\u3053\u308d\u3067\u3059\u3002\u3068\u3044\u3046\u3053\u3068\u3067\u3001\u3053\u306e\u82f1\u56fd\u306b\u304a\u3044\u3066Active Cyber Defense\u3068\u3044\u3046\u6982\u5ff5\u304c\u4f55\u3092\u6307\u3059\u306e\u304b\u3068\u3044\u3046\u3053\u3068\u304b\u3089\u8003\u3048\u3066\u3044\u304d\u305f\u3044\u3068\u601d\u3044\u307e\u3059\u3002<span style=\"font-size: 14px;\">\u30e6\u30fc\u30b6\u30fc\u306e\u8ca0\u62c5\u3092\u8efd\u6e1b\u3057\u3001\u653b\u6483\u3092\u5927\u898f\u6a21\u306b\u963b\u6b62\u3059\u308b\u3053\u3068\u3092\u53ef\u80fd\u306b\u3059\u308b<\/span><span style=\"font-size: 14px;\">\u6bd4\u8f03\u7684\u81ea\u52d5\u5316\u3055\u308c\u305f\u30b9\u30b1\u30fc\u30e9\u30d6\u30eb\u306a\u65b9\u6cd5\u3067\u6a5f\u80fd\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u3092\u4e2d\u5fc3\u306b\u3059\u308b\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u4e00\u4f53\u3068\u306a\u308a\u307e\u3059\u3002<\/span><\/p>\n<p>\u4f8b\u3048\u3070\u3001<a style=\"font-size: 14px;\" href=\"https:\/\/www.ncsc.gov.uk\/report\/acd-report-year-four\">2020\u5e74\u5831\u544a\u66f8(4\u5e74\u76ee)<\/a> \u306b\u304a\u3044\u3066\u306f\u3001\u300c(\u30b5\u30fc\u30d3\u30b9\u306e)\u307e\u3068\u3081\u300d\u304c\u3042\u308a\u307e\u3059\u3002\u307e\u305f\u3001NCSC\u306e\u30da\u30fc\u30b8\u306b\u306f\u3001\u5177\u4f53\u7684\u306a\u30b5\u30fc\u30d3\u30b9\u306e\u8aac\u660e\u304c\u3042\u308a\u307e\u3059\u3002\u4ee5\u4e0b\u3001NCSC \u306e\u30b5\u30fc\u30d3\u30b9\u3092\u3082\u3068\u306b\u305d\u306e\u6982\u8981\u3092\u307f\u3066\u3044\u304f\u3053\u3068\u306b\u3057\u307e\u3059\u3002<\/p>\n<h4>1) \u30bb\u30eb\u30d5\u30b5\u30fc\u30d3\u30b9\u30c1\u30a7\u30c3\u30af<\/h4>\n<p>\u3053\u308c\u306f\u3001\u7d44\u7e54\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u72b6\u6cc1\u3092\u78ba\u8a8d\u3057\u3001\u5411\u4e0a\u3059\u308b\u305f\u3081\u306e\u3082\u306e\u3067\u3059\u3002<\/p>\n<h6>\u65e9\u671f\u8b66\u6212(early <strong>warning)<\/strong><\/h6>\n<p>\u3053\u308c\u306f\u3001\u60c5\u5831\u30d5\u30a3\u30fc\u30c9\u3067\u691c\u51fa\u3055\u308c\u305f\u60aa\u610f\u306e\u3042\u308b\u6d3b\u52d5\u3092\u901a\u77e5\u3059\u308b\u3053\u3068\u3067\u3001\u7d44\u7e54\u304c\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u4e0a\u306e\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3092\u8abf\u67fb\u3059\u308b\u306e\u3092\u652f\u63f4\u3059\u308b\u3082\u306e\u3067\u3059\u3002<\/p>\n<h6><span style=\"font-size: 14px;\">Exercise in a Box (www.ncsc.gov.uk\/information\/exercise-in-a-box)<\/span><\/h6>\n<p><span style=\"font-size: 14px;\">\u73fe\u5b9f\u7684\u306a\u30b7\u30ca\u30ea\u30aa\u306e\u30c4\u30fc\u30eb\u30ad\u30c3\u30c8\u3067\u3001\u7d44\u7e54\u304c\u5b89\u5168\u3067\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u306a\u74b0\u5883\u3067\u30b5\u30a4\u30d0\u30fc\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3078\u306e\u5bfe\u5fdc\u3092\u7df4\u7fd2\u3057\u3001\u6d17\u7df4\u3055\u305b\u308b\u306e\u306b\u5f79\u7acb\u3064\u3082\u306e\u3067\u3059\u3002<\/span><\/p>\n<h6><span style=\"font-size: 14px;\">Mail Check (www.ncsc.gov.uk\/information\/mailcheck) <\/span><\/h6>\n<p><span style=\"font-size: 14px;\">\u7d44\u7e54\u304c\u96fb\u5b50\u30e1\u30fc\u30eb\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u3092\u8a55\u4fa1\u3057\u3001\u72af\u7f6a\u8005\u306b\u3088\u308b\u96fb\u5b50\u30e1\u30fc\u30eb\u30fb\u30c9\u30e1\u30a4\u30f3\u306e\u306a\u308a\u3059\u307e\u3057\u3092\u9632\u6b62\u3059\u308b\u5b89\u5168\u306a\u96fb\u5b50\u30e1\u30fc\u30eb\u6a19\u6e96\u306e\u63a1\u7528\u3092\u652f\u63f4\u3057\u307e\u3059<\/span><\/p>\n<h6><span style=\"font-size: 14px;\">Web Check (www.ncsc.gov.uk\/information\/web-check)<\/span><\/h6>\n<p><span style=\"font-size: 14px;\"> \u516c\u5171\u90e8\u9580\u306e\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u306e\u6240\u6709\u8005\u304c\u4e00\u822c\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u554f\u984c\u3092\u7279\u5b9a\u3057\u3066\u4fee\u6b63\u3059\u308b\u306e\u3092\u652f\u63f4\u3057\u3001\u82f1\u56fd\u306e\u30b5\u30a4\u30c8\u304c\u653b\u6483\u8005\u306b\u3068\u3063\u3066\u9b45\u529b\u7684\u306a\u6a19\u7684\u3068\u306a\u3089\u306a\u3044\u3088\u3046\u306b\u3057\u307e\u3059<\/span><\/p>\n<p>\u306a\u304a\u3001\u5831\u544a\u66f8\u3067\u306f\u3001\u3053\u308c\u3089\u306b\u985e\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066<\/p>\n<ul>\n<li>NCSC Observatory NCSC \u306e\u8abf\u67fb\u3068\u6226\u7565\u3092\u652f\u3048\u308b\u30c7\u30fc\u30bf\u4e3b\u5c0e\u306e\u6d1e\u5bdf\u306e\u751f\u6210\u3002<\/li>\n<li>Logging Made Easy (www.ncsc.gov.uk\/information\/logging-made-easy) Windows \u30b7\u30b9\u30c6\u30e0\u306e\u65e5\u5e38\u7684\u306a\u30a8\u30f3\u30c9\u30c4\u30fc\u30a8\u30f3\u30c9\u306e\u76e3\u8996\u3092\u53ef\u80fd\u306b\u3059\u308b\u3001\u57fa\u672c\u7684\u306a\u30ed\u30ae\u30f3\u30b0\u6a5f\u80fd\u3092 IT \u8cc7\u7523\u306b\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u7d44\u7e54\u3092\u652f\u63f4\u3059\u308b\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3002<\/li>\n<li>Cyber Threat Intelligence Adaptor(Cyber Threat Intelligence (CTI) Adaptor \u306f\u3001NCSC \u306e Threat Detection and Response \u30c1\u30fc\u30e0\u306b\u3088\u3063\u3066\u8a2d\u8a08\u3055\u308c\u305f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3042\u308a\u3001\u8a8d\u53ef\u3055\u308c\u305f\u7d44\u7e54\u304c NCSC \u304b\u3089\u9ad8\u54c1\u8cea\u3067\u6587\u8108\u306b\u5bcc\u3093\u3060\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30fb\u30d5\u30a3\u30fc\u30c9\u3092\u53d7\u3051\u53d6\u308b\u3053\u3068\u3092\u53ef\u80fd\u306b\u3059\u308b\u3002)<\/li>\n<\/ul>\n<p>\u306a\u3069\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<h5>2)\u7d44\u7e54\u306b\u3088\u308b\u691c\u51fa<\/h5>\n<h6 style=\"font-size: 14px;\"><span style=\"font-size: 14px;\">Host Based Capability (www.ncsc.gov.uk\/information\/host-based-capability)<\/span><\/h6>\n<p><span style=\"font-size: 14px;\">\u653f\u5e9c\u3084\u305d\u306e\u4ed6\u306e\u4e3b\u8981\u30b5\u30fc\u30d3\u30b9\u306b\u304a\u3051\u308b\u8106\u5f31\u6027\u306e\u7279\u5b9a\u3001\u5831\u544a\u3001\u662f\u6b63\u3092\u4e2d\u5fc3\u3068\u3057\u305f<span style=\"font-size: 14px;\">\u5148\u9032\u7684\u306aNCSC\u306e\u8105\u5a01\u691c\u77e5\u6a5f\u80fd\u306e<\/span><\/span><span style=\"font-size: 14px;\">\u30b5\u30fc\u30d3\u30b9\u3067\u3042\u3063\u3066<\/span><span style=\"font-size: 14px;\">\u3001\u7d44\u7e54\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u4e0a\u306e\u8105\u5a01\u3092\u691c\u77e5\u3059\u308b\u305f\u3081\u306b\u5c0e\u5165\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002\u00a0<\/span><\/p>\n<h6><span style=\"font-size: 14px;\">Protective DNS (www.ncsc.gov.uk\/information\/pdns) <\/span><\/h6>\n<p><span style=\"font-size: 14px;\">PDNS\u306f\u3001\u60aa\u610f\u306e\u3042\u308b\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u542b\u3080\u3053\u3068\u304c\u77e5\u3089\u308c\u3066\u3044\u308b\u30c9\u30e1\u30a4\u30f3\u3084IP\u306b\u30e6\u30fc\u30b6\u30fc\u304c\u30a2\u30af\u30bb\u30b9\u3059\u308b\u306e\u3092\u9632\u304e\u3001\u3059\u3067\u306b\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u4e0a\u306b\u3042\u308b\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u30db\u30fc\u30e0\u306b\u547c\u3073\u51fa\u3059\u306e\u3092\u963b\u6b62\u3059\u308b\u3002<\/span><\/p>\n<p>\u306a\u304a\u3001\u5831\u544a\u66f8\u3067\u306f\u3001\u3053\u308c\u3089\u306b\u985e\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066<\/p>\n<ul>\n<li>Dangling DNS(\u30b5\u30d6\u30c9\u30e1\u30a4\u30f3\u30cf\u30a4\u30b8\u30e3\u30c3\u30af\u306e\u8106\u5f31\u6027\u3092\u691c\u51fa\u3057\u307e\u3059\u3002\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30b7\u30b0\u30ca\u30ea\u30f3\u30b0 \u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3084\u96fb\u8a71\u901a\u4fe1\u30b7\u30b9\u30c6\u30e0\u306e\u57fa\u76e4\u3068\u306a\u3063\u3066\u3044\u308b\u30a4\u30f3\u30d5\u30e9\u30d7\u30ed\u30c8\u30b3\u30eb\u3001BGP\uff08Border Gateway Protocol\uff09\u3084SS7\uff08Signalling System No.7\uff09\u306e\u4fee\u6b63\u3002\u3053\u308c\u306b\u306f\u3001SMS\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30fb\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u306b\u304a\u3051\u308b\u60aa\u7528\u304b\u3089\u7d44\u7e54\u3092\u5b88\u308b\u305f\u3081\u306eSMS SenderID Protective Registry\u306e\u3088\u3046\u306a\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u306e\u8a2d\u5b9a\u3082\u542b\u307e\u308c\u307e\u3059\u3002)\u3001<\/li>\n<\/ul>\n<p>\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<h3>3)\u8105\u5a01\u306e\u58ca\u6ec5(Disrupt threats)<\/h3>\n<h5><span style=\"font-size: 14px;\">Suspicious Email Reporting Service (www.ncsc.gov.uk\/section\/products-services\/active-cyber-defence#section_8) <\/span><\/h5>\n<p><span style=\"font-size: 14px;\">\u53d7\u4fe1\u30c8\u30ec\u30a4\u306b\u5c4a\u3044\u305f\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u3084\u4e0d\u5be9\u306a\u30e1\u30fc\u30eb\u3092\u4e00\u822c\u306e\u4eba\u304c\u5831\u544a\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\u3002\u3053\u306e\u30b5\u30fc\u30d3\u30b9\u306f\u3001\u60aa\u8cea\u306a\u30b5\u30a4\u30c8\u3078\u306e\u30ea\u30f3\u30af\u304c\u306a\u3044\u304b\u30e1\u30fc\u30eb\u3092\u5206\u6790\u3057\u3001\u88ab\u5bb3\u304c\u5e83\u304c\u308b\u306e\u3092\u9632\u3050\u305f\u3081\u306b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u304b\u3089\u305d\u308c\u3089\u306e\u30b5\u30a4\u30c8\u3092\u524a\u9664\u3059\u308b\u3088\u3046\u52aa\u3081\u308b\u3002<\/span><\/p>\n<h6><span style=\"font-size: 14px;\">\u30c6\u30a4\u30af\u30c0\u30a6\u30f3\u30fb\u30b5\u30fc\u30d3\u30b9 (www.ncsc.gov.uk\/information\/takedown-service)<\/span><\/h6>\n<p><span style=\"font-size: 14px;\"> \u60aa\u8cea\u306a\u30b5\u30a4\u30c8\u3092\u767a\u898b\u3057\u3001\u91cd\u5927\u306a\u88ab\u5bb3\u304c\u767a\u751f\u3059\u308b\u524d\u306b\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u304b\u3089\u524a\u9664\u3059\u308b\u3088\u3046\u3001\u30db\u30b9\u30c8\u307e\u305f\u306f\u6240\u6709\u8005\u306b\u901a\u77e5\u3092\u9001\u4fe1\u3057\u307e\u3059\u3002NCSC\u304c\u30b5\u30fc\u30d3\u30b9\u3092\u4e00\u5143\u7ba1\u7406\u3057\u3066\u3044\u308b\u305f\u3081\u3001\u5404\u90e8\u9580\u304c\u767b\u9332\u3057\u306a\u304f\u3066\u3082\u81ea\u52d5\u7684\u306b\u6069\u6075\u3092\u53d7\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/span><\/p>\n<h3>4)\u305d\u306e\u4ed6<\/h3>\n<p><span style=\"font-size: 14px;\">MyNCSC (www.ncsc.gov.uk\/information\/myncsc) NCSC\u306e\u30c7\u30b8\u30bf\u30eb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u3001ACD\u3084\u305d\u306e\u4ed6\u306eNCSC\u30b5\u30fc\u30d3\u30b9\u3078\u306e\u30b7\u30f3\u30b0\u30eb\u30dd\u30a4\u30f3\u30c8\u3092\u63d0\u4f9b\u3059\u308b\u3002<\/span><\/p>\n<h1>2 \u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9<\/h1>\n<p>\u6b21\u306b\u65e5\u672c\u8a9e\u3068\u3057\u3066\u306e\u300c\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u300d\u3092\u307e\u3068\u3081\u307e\u3057\u3087\u3046\u3002\u307e\u305a\u306f\u3001\u30b9\u30bf\u30fc\u30c8\u3068\u3057\u3066\u306e\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u6226\u7565()\u304b\u3089\u3067\u3059\u3002<\/p>\n<h2>2.1 <a href=\"https:\/\/www.cas.go.jp\/jp\/siryou\/221216anzenhoshounss-j.pdf\">\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u6226\u7565<\/a><\/h2>\n<p>\u3053\u308c\u306b\u3064\u3044\u3066\u306f\u3001\u300c<a href=\"https:\/\/itresearchart.biz\/?p=4333\">\u5b89\u5168\u4fdd\u969c\u95a2\u90233\u6587\u66f8\u3068\u80fd\u52d5\u7684\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1-Beyond Barbershop talk(12\u670821\u65e5\u4fee\u6b63)<\/a>\u300d\u3067\u307e\u3068\u3081\u3066\u3044\u307e\u3059\u3002\u5b9a\u7fa9\u3068\u3057\u3066\u306f<\/p>\n<blockquote><p>\u6b66\u529b\u653b\u6483\u306b\u81f3\u3089\u306a\u3044\u3082\u306e\u306e\u3001\u56fd\u3001\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u7b49\u306b\u5bfe\u3059\u308b\u5b89\u5168\u4fdd\u969c\u4e0a\u306e\u61f8\u5ff5\u3092\u751f\u3058\u3055\u305b\u308b\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u304a\u305d\u308c\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u308c\u3092\u672a\u7136\u306b\u6392\u9664\u3057\u3001\u307e\u305f\u3001\u3053\u306e\u3088\u3046\u306a\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u306e\u88ab\u5bb3\u306e\u62e1\u5927\u3092\u9632\u6b62\u3059\u308b\u305f\u3081\u306b\u80fd\u52d5\u7684\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u3092\u5c0e\u5165<\/p><\/blockquote>\n<p>\u3068\u3044\u3046\u8a18\u8ff0\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<p>\u5177\u4f53\u7684\u306a\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u3068\u3057\u3066\u306f<\/p>\n<ol>\n<li>\u6c11\u9593\u4e8b\u696d\u8005\u7b49\u304c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3092\u53d7\u3051\u305f\u5834\u5408\u7b49\u306e\u653f\u5e9c\u3078\u306e\u60c5\u5831\u5171\u6709\u3084\u3001\u653f\u5e9c\u304b\u3089\u6c11\u9593\u4e8b\u696d\u8005\u7b49\u3078\u306e\u5bfe\u51e6\u8abf\u6574\u3001\u652f\u63f4\u7b49\u306e\u53d6\u7d44\u3092\u5f37\u5316\u3059\u308b<\/li>\n<li>\u56fd\u5185\u306e\u901a\u4fe1\u4e8b\u696d\u8005\u304c\u5f79\u52d9\u63d0\u4f9b\u3059\u308b\u901a\u4fe1\u306b\u4fc2\u308b\u60c5\u5831\u3092\u6d3b\u7528\u3057\u3001\u653b\u6483\u8005\u306b\u3088\u308b\u60aa\u7528\u304c\u7591\u308f\u308c\u308b\u30b5\u30fc\u30d0\u7b49\u3092\u691c\u77e5\u3059\u308b\u305f\u3081\u306b\u3001\u6240\u8981\u306e\u53d6\u7d44\u3092\u9032\u3081\u308b\u3002<\/li>\n<li>\u00a0\u56fd\u3001\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u7b49\u306b\u5bfe\u3059\u308b\u5b89\u5168\u4fdd\u969c\u4e0a\u306e\u61f8\u5ff5\u3092\u751f\u3058\u3055\u305b\u308b\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u3064\u3044\u3066\u3001\u53ef\u80fd\u306a\u9650\u308a\u672a\u7136\u306b\u653b\u6483\u8005\u306e\u30b5\u30fc\u30d0\u7b49\u3078\u306e\u4fb5\u5165\u30fb\u7121\u5bb3\u5316\u304c\u3067\u304d\u308b\u3088\u3046\u3001\u653f\u5e9c\u306b\u5bfe\u3057\u5fc5\u8981\u306a\u6a29\u9650\u304c\u4ed8\u4e0e\u3055\u308c\u308b\u3088\u3046\u306b\u3059\u308b\u3002<\/li>\n<\/ol>\n<p>\u3068\u306a\u308a\u307e\u3059\u3002<\/p>\n<p>(\u9ad8\u6a4b\u30b3\u30e1\u30f3\u30c8)\u3053\u306e\u6bb5\u968e\u306b\u304a\u3044\u3066\u306f\u3001op1\u3084op2\u306b\u3064\u3044\u3066\u306f\u3001\u4e0a\u8a18\u306e\u82f1\u56fd\u306eActive Cyber Defense\u3068\u306e\u5b88\u5099\u7bc4\u56f2\u3068\u3082\u9055\u308f\u306a\u3044\u3088\u3046\u306a\u611f\u3058\u304c\u3057\u307e\u3059\u3002<\/p>\n<h2>2.2 \u65b0\u805e\u5831\u9053<\/h2>\n<p>\u305d\u306e\u5f8c\u3001\u300c\u300c\u80fd\u52d5\u7684\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u300d\u6cd5\u6574\u5099\u3078 \u901a\u4fe1\u306e\u79d8\u5bc6\u4fdd\u8b77 \u4f8b\u5916\u691c\u8a0e\u300d\u3068\u3044\u3046\u8a18\u4e8b(\u65e5\u7d4c\u65b0\u805e 6\u670830\u65e5)(\u30ea\u30f3\u30af<a href=\"https:\/\/www.nikkei.com\/article\/DGXZQOUA286070Y3A620C2000000\/\">\u3053\u3061\u3089\u3067\u3059\u3002<\/a>)\u304c\u51fa\u3066\u3044\u307e\u3059\u3002\u8a73\u3057\u304f\u306f\u3001<a href=\"https:\/\/itresearchart.biz\/?p=4600&amp;fbclid=IwAR225H2eoQF6-V3ZoSiMDTShB8j4s2zF0iDPGWiAhd0b0duAjTBlOiUjdTA\">\u300c\u300c\u80fd\u52d5\u7684\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u300d\u6cd5\u6574\u5099\u3078 \u901a\u4fe1\u306e\u79d8\u5bc6\u4fdd\u8b77 \u4f8b\u5916\u691c\u8a0e\u300d\u3067\u691c\u8a0e\u3057\u307e\u3057\u305f<\/a>\u3002<\/p>\n<p>\u3053\u3053\u3067\u3001\u300c\u56fd\u300d(\u81ea\u885b\u968a\u304b\u3001\u8b66\u5bdf\u304b\u306f\u3001\u4e0d\u660e-\u65b0\u805e\u8a18\u4e8b\u3060\u3068\u81ea\u885b\u968a\u3092\u3044\u3063\u3066\u3044\u308b\u3088\u3046\u306b\u601d\u3048\u308b)\u304c\u3001<\/p>\n<ul>\n<li>\u63a2\u77e5<\/li>\n<li>\u4fb5\u5165<\/li>\n<\/ul>\n<p>\u306e\u6a29\u9650\u3092\u3082\u305f\u305b\u308b\u3068\u3044\u3046\u3053\u3068\u3092\u3044\u3063\u3066\u3044\u307e\u3059\u3002\u3082\u3063\u3068\u3082<strong>\u56fd\u969b\u6cd5\u7684<\/strong>\u306b\u306f\u3001\u653b\u6483\u30b7\u30b9\u30c6\u30e0\u306e\u30a2\u30af\u30bb\u30b9\u6a29\u9650\u304c\u306a\u3044\u306e\u306b\u30a2\u30af\u30bb\u30b9\u3057\u305f\u304b\u3089\u3068\u3044\u3063\u3066\u3082\u3001\u305d\u308c\u81ea\u4f53\u3067\u3001\u56fd\u969b\u6cd5\u7684\u306b\u9055\u6cd5\u306b\u306a\u308b\u308f\u3051\u3067\u306f\u306a\u3044\u306e\u3067\u3001\u4f55\u3092\u3059\u308b\u306e\u304b\u3068\u3044\u3046\u306e\u306f\u3001\u3088\u304f\u308f\u304b\u3089\u306a\u304b\u3063\u305f\u3068\u3053\u308d\u3067\u3059\u3002<\/p>\n<h2>2.3 \u30c6\u30ec\u30d3\u5831\u9053\u3084\u4e00\u90e8\u6709\u8b58\u8005\u306e\u767a\u8a00<\/h2>\n<p>\u305d\u306e\u3088\u3046\u306a\u3068\u3053\u308d\u3067\u3001\u3055\u3089\u306b\u30c6\u30ec\u30d3\u5831\u9053\u3084\u4e00\u90e8\u6709\u8b58\u8005\u306f\u3001\u4e0a\u306eActive Cyber Defense\u3084\u3001Offensive Cyber\u3001\u305d\u3057\u3066\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u6226\u7565\u306e\u614e\u91cd\u306a\u3044\u3044\u307e\u308f\u3057\u3092\u7121\u8996\u3057\u3066\u3001\u9632\u885b\u306e\u305f\u3081\u306e\u30b5\u30a4\u30d0\u30fc\u3092\u7528\u3044\u305f\u4f5c\u6226\u3059\u3079\u3066\u3092\u610f\u5473\u3059\u308b\u3088\u3046\u306b\u300c\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u300d\u3068\u3044\u3046\u7528\u8a9e\u3092\u4f7f\u3044\u51fa\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u305d\u306e\u4f8b\u3068\u3057\u3066<a href=\"https:\/\/www.fnn.jp\/articles\/-\/557756?fbclid=IwAR3rdP1_f0ZLOToSDF9x12EBAvrcRPcy98KJ4a6fqnu4DuIdAw4gsLFqzoQ\">\u300c\u300c\u53f0\u6e7e\u6709\u4e8b\u30b7\u30df\u30e5\u30ec\u30fc\u30b7\u30e7\u30f3\u300d\u304b\u3089\u898b\u3048\u305f\u201c\u65e5\u672c\u306e\u30b8\u30ec\u30f3\u30de\u201d\u3068\u306f\u300d<\/a>\u3092\u898b\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u3053\u3053\u3067<\/p>\n<blockquote><p>\u5c0f\u91ce\u5bfa\u6c0f\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u306f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3067\u53cd\u6483\u3092\u3059\u308b\u3068\u3044\u3046\u3053\u3068\u3092\u6c7a\u65ad\u3059\u308b\u3002<\/p><\/blockquote>\n<p>\u3068\u304b<\/p>\n<blockquote><p>\u65e5\u672c\u306f\u300c\u30a2\u30af\u30c6\u30a3\u30d6\u30fb\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u300d\u3067\u307e\u305a\u5bfe\u5fdc\u3057\u308d\u3001\u3068\u3044\u3046\u6307\u793a\u3092\u3057\u305f\u3002\u3053\u306e\u60f3\u5b9a\u304c\u53ef\u80fd\u306b\u306a\u308b\u306e\u306f2027\u5e74\u306a\u306e\u3067\u3001\u5b9f\u969b\u306f\u4eca\u306e\u65e5\u672c\u3067\u306f\u51fa\u6765\u306a\u3044\u304c\u3001\u3053\u308c\u304b\u3089\u6cd5\u6539\u6b63\u3092\u3057\u3066\u3001\u65e5\u672c\u304c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3092\u53d7\u3051\u305f\u3089\u3001\u65e5\u672c\u304b\u3089\u3082\u9006\u306b\u30b5\u30a4\u30d0\u30fc\u3067\u53cd\u6483\u3092\u3067\u304d\u308b\u3001\u653b\u6483\u3057\u3066\u7121\u529b\u5316\u3059\u308b\u3002\u3053\u3046\u3044\u3046\u300c\u30a2\u30af\u30c6\u30a3\u30d6\u30fb\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u300d\u304c\u3067\u304d\u308b\u3068\u3044\u3046\u3053\u3068\u3092\u524d\u63d0\u306b\u3001\u307e\u305a\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u306b\u306f\u30b5\u30a4\u30d0\u30fc\u3067\u653b\u6483\u3057\u3088\u3046\u3068\u3044\u3046\u3001\u3053\u3068\u306b\u3057\u305f\u3002<\/p><\/blockquote>\n<p>\u3068\u304b\u3001<\/p>\n<blockquote><p>\u53cd\u6483\u80fd\u529b\u3067\u3059\u306d\u3002\u3053\u308c\u304b\u3089\u56fd\u4f1a\u3067\u8b70\u8ad6\u3057\u307e\u3059\u304c\u3001\u79c1\u3069\u3082\u3053\u306e\u9632\u885b\u6587\u66f8\u306e\u4e2d\u3067\u793a\u3057\u305f\u300c\u30a2\u30af\u30c6\u30a3\u30d6\u30fb\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u300d\u3068\u3044\u3046\u306e\u306f\u3001\u300c\u540c\u3058\u3088\u3046\u306b\u53cd\u6483\u3059\u308b\u80fd\u529b\u300d\u3068\u3044\u3046\u3053\u3068\u306a\u306e\u3067\u3001\u4e8c\u5ea6\u3068\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304c\u3067\u304d\u306a\u3044\u3088\u3046\u306b\u3001\u76f8\u624b\u306e\u30b5\u30fc\u30d0\u30fc\u3092\u30c0\u30a6\u30f3\u3055\u305b\u308b\u3068\u304b\u3002<\/p><\/blockquote>\n<p>\u306e\u767a\u8a00\u304c\u898b\u3089\u308c\u307e\u3059\u3002\u307e\u305f\u3001\u6cb3\u91ce\u514b\u4fca\u6c0f\uff08\u5143\u7d71\u5408\u5e55\u50da\u9577\uff09\u3082<\/p>\n<blockquote><p>\u4eca\u306e\u6bb5\u968e\u3067\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u5bfe\u3057\u3066\u306f\u3001\u5411\u3053\u3046\u306e\u30b5\uff0d\u30d0\u30fc\u3092\u58ca\u3059\u3068\u3044\u3046\u8b70\u8ad6\u307e\u3067\u3060\u3068\u3002<\/p><\/blockquote>\n<p>\u3068\u3044\u3046\u3053\u3068\u304c\u3001\u3044\u308f\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<h1>3 Active Cyber Defense\u5bfe\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9<\/h1>\n<h2>3.1 \u82f1\u56fd\u306e\u7528\u6cd5 \u5bfe \u65e5\u672c\u306e\u7528\u6cd5<\/h2>\n<p>\u65e5\u672c\u306e\u4e0a\u306e\u30e1\u30c7\u30a3\u30a2\u3067\u306e\u7528\u6cd5\u306f\u3001\u82f1\u8a9e(British English)\u3067\u3044\u3046\u3001Offensive Cyber\u306e\u4f5c\u6226\u306b\u8a72\u5f53\u3057\u3066\u304f\u308b\u3068\u8003\u3048\u3089\u308c\u307e\u3059\u3002\u305d\u306e\u3088\u3046\u306a\u5834\u5408\u306b\u30a4\u30ae\u30ea\u30b9\u3068\u6bd4\u8f03\u3059\u308b\u306e\u306f\u3001<a href=\"https:\/\/itresearchart.biz\/?p=4528\">\u300c\u30cf\u30c3\u30af\u306e\u30e9\u30a4\u30bb\u30f3\u30b9-\u82f1\u56fd\u30b5\u30a4\u30d0\u30fc\u30d5\u30a9\u30fc\u30b9\u300c\u5b9f\u8df5-\u8cac\u4efb\u3042\u308b\u30b5\u30a4\u30d0\u30fc\u30d1\u30ef\u30fc\u300d\u306e\u516c\u8868\u300d<\/a>\u3067\u89e6\u308c\u305f\u3068\u3053\u308d\u306b\u306a\u308b\u306e\u3067\u3059\u304c\u3001\u6cd5\u57f7\u884c\u3068\u3057\u3066\u304a\u3053\u306a\u3046\u306e\u304b\u3001\u8adc\u5831\u6a5f\u95a2\u306e\u51c6\u8ecd\u4e8b\u7684\u884c\u70ba\u3068\u3057\u3066\u304a\u3053\u306a\u3046\u306e\u304b\u3001\u81ea\u885b\u968a\u306e\u6d3b\u52d5\u3068\u3057\u3066\u304a\u3053\u306a\u3046\u306e\u304b\u3001\u305d\u306e\u305f\u3081\u306e\u57fa\u672c\u7684\u306a\u67a0\u7d44\u306f\u3069\u3046\u306a\u3063\u3066\u3044\u308b\u306e\u304b\u3001\u3068\u3044\u3046\u3053\u3068\u304c\u6cd5\u7684\u306b\u8b70\u8ad6\u3055\u308c\u308b\u3053\u3068\u306b\u306a\u3063\u3066\u304f\u308b\u306e\u3060\u308d\u3046\u3068\u601d\u3044\u307e\u3059\u3002<\/p>\n<p>\u81ea\u885b\u968a\u304c\u884c\u3046\u3068\u3044\u3046\u65b9\u5411\u6027\u306e\u3088\u3046\u3067\u3059\u304c\u3001\u305d\u306e\u5834\u5408\u306f\u3001\u901a\u5e38\u3060\u3068\u3001\u7dca\u6025\u51fa\u52d5\u3067\u3001\u8b66\u5bdf\u5b98\u8077\u52d9\u57f7\u884c\u6cd5\u306e\u4f8b\u306b\u3088\u308b\u306e\u304b\u3069\u3046\u304b(\u968a\u6cd589\u67611\u9805)\u3068\u3044\u3046\u554f\u984c\u3082\u8003\u3048\u306a\u3044\u3068\u3044\u3051\u306a\u3044\u3088\u3046\u306b\u601d\u3044\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u8b70\u8ad6\u3092\u304d\u3061\u3093\u3068\u3059\u308b\u524d\u306b\u6982\u5ff5\u306e\u6feb\u7528\u3068\u3044\u3046\u306e\u306f\u3001\u304d\u3061\u3093\u3068\u7559\u610f\u3057\u305f\u3044\u3068\u3053\u308d\u3067\u3059\u3002\u3082\u3063\u3068\u3082\u3001IT\u696d\u754c\u306f\u3001(\u6b63\u78ba\u6027\u306f\u4e8c\u306e\u6b21\u3067)\u81ea\u5206\u306b\u52dd\u624b\u306b\u90fd\u5408\u306e\u3044\u3044\u3088\u3046\u306b\u6982\u5ff5\u3092\u7528\u3044\u308b\u50be\u5411\u304c\u3042\u3063\u3066\u3001\u65e5\u672c\u306e\u653f\u6cbb\u7684\u306a\u8b70\u8ad6\u3082\u305d\u306e\u3088\u3046\u306a\u50be\u5411\u304c\u3042\u308b\u3088\u3046\u306b\u611f\u3058\u307e\u3059\u3002<a href=\"https:\/\/itresearchart.biz\/?p=4167\">\u7d9a\u30fb\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u306e\u6982\u5ff5<\/a>\u3067\u3001\u653f\u6cbb\u5bb6\u306e\u7528\u8a9e\u6cd5\u306b\u3064\u3044\u3066\u3082\u89e6\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<h2>3.2 \u308f\u304c\u56fd\u306e\u30a2\u30af\u30c6\u30a3\u30d6\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u306e\u305f\u3081\u306b\u6574\u7406\u3055\u308c\u308b\u3079\u304d\u3053\u3068<\/h2>\n<p>\u3044\u3064\u3082\u306e\u3053\u3068\u3067\u3059\u304c\u3001<\/p>\n<ul>\n<li>\u6709\u4e8b\u304b\u5e73\u6642\u304b<\/li>\n<li>\u4e3b\u4f53\u306f\u3069\u3053\u304b<\/li>\n<li>\u624b\u7d9a\u7684\u306a\u4fdd\u969c\u306f\u306a\u306b\u304b<\/li>\n<\/ul>\n<p>\u3068\u3044\u3046\u89b3\u70b9\u304b\u3089\u6574\u7406\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3068\u3044\u3046\u306e\u306e\u304c\u3001\u79c1\u306e\u30b9\u30bf\u30f3\u30b9\u3067\u3059\u3002<\/p>\n<p>\u4eca\u56de\u306f\u3001\u82f1\u56fd\u306eActive Cyber Defense\u3092\u52a0\u3048\u3066\u6574\u7406\u3092\u3057\u3066\u307f\u305f\u3044\u3068\u601d\u3044\u307e\u3059\u3002\u56f3\u3067\u8003\u3048\u3066\u307f\u308b\u3068\u3053\u3093\u306a\u611f\u3058\u3067\u3057\u3087\u3046\u304b\u3002<\/p>\n<p><a href=\"https:\/\/itresearchart.biz\/?attachment_id=4621\" rel=\"attachment wp-att-4621\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4621\" src=\"https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/ACD01.png?resize=1287%2C386&#038;ssl=1\" alt=\"\" width=\"1287\" height=\"386\" srcset=\"https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/ACD01.png?w=1287&amp;ssl=1 1287w, https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/ACD01.png?resize=300%2C90&amp;ssl=1 300w, https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/ACD01.png?resize=644%2C193&amp;ssl=1 644w, https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/ACD01.png?resize=768%2C230&amp;ssl=1 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>\u3067\u3082\u3063\u3066\u3001\u4e0a\u306eOp3\u3068\u306a\u308b<\/p>\n<blockquote><p>\u00a0\u56fd\u3001\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u7b49\u306b\u5bfe\u3059\u308b\u5b89\u5168\u4fdd\u969c\u4e0a\u306e\u61f8\u5ff5\u3092\u751f\u3058\u3055\u305b\u308b\u91cd\u5927\u306a\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u3064\u3044\u3066\u3001\u53ef\u80fd\u306a\u9650\u308a\u672a\u7136\u306b\u653b\u6483\u8005\u306e\u30b5\u30fc\u30d0\u7b49\u3078\u306e\u4fb5\u5165\u30fb\u7121\u5bb3\u5316\u304c\u3067\u304d\u308b\u3088\u3046\u3001\u653f\u5e9c\u306b\u5bfe\u3057\u5fc5\u8981\u306a\u6a29\u9650\u304c\u4ed8\u4e0e\u3055\u308c\u308b\u3088\u3046\u306b\u3059\u308b\u3002<\/p><\/blockquote>\n<p>\u3068\u3044\u3063\u3066\u3082\u3001\u3053\u308c\u304c\u3069\u306e\u3088\u3046\u306a\u5f62\u3067\u306a\u3055\u308c\u308b\u306e\u304b\u3001\u3068\u3044\u3046\u3053\u3068\u306b\u3064\u3044\u3066\u8003\u3048\u306a\u3044\u3068\u3044\u3051\u307e\u305b\u3093\u3002\u4e0a\u306e\u56f3\u3067\u3044\u3046\u3068\u3001<\/p>\n<ul>\n<li>RAT<\/li>\n<li>\u4fd7\u79f0\u30cf\u30c3\u30af\u30d0\u30c3\u30af<\/li>\n<li>\u30db\u30ef\u30a4\u30c8\u30ef\u30fc\u30e0<\/li>\n<li>Wiper<\/li>\n<li>D-Dos<\/li>\n<\/ul>\n<p>\u3042\u305f\u308a\u304b\u3068\u601d\u3044\u307e\u3059\u3002\u3082\u3063\u3068\u3082\u3001\u82f1\u56fd\u3067\u3044\u3046\u3001\u653b\u6483\u7684\u30b5\u30a4\u30d0\u30fc\u306f\u3001\u3082\u3063\u3068\u3001\u672c\u683c\u7684\u306a\u4f5c\u6226\u3092\u5ff5\u982d\u306b\u304a\u3044\u3066\u3044\u308b\u3088\u3046\u306b\u601d\u3048\u308b\u306e\u3067\u3001<\/p>\n<h2><\/h2>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"7\u67081\u65e5\u304b\u3089\u3001\u30ed\u30f3\u30c9\u30f3\u306b\u4e45\u3057\u3076\u308a\u306b\u3044\u3063\u3066\u304d\u307e\u3057\u305f\u3002&#8221;Frozen&#8221;\u3084&#8221;Tina&#8221;\u306a\u3069\u306e\u30df\u30e5\u30fc\u30b8\u30ab\u30eb\u306a\u3069\u3082\u898b\u3066\u304d\u307e\u3057\u305f\u3002Frozen (\u30a2\u30ca\u3068\u96ea\u306e\u5973\u738b)\u3067\u3059\u304c\u3001\u300clet it [&hellip;]","protected":false},"author":2,"featured_media":4621,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[20,13,40,14,5],"tags":[],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/itresearchart.biz\/wp-content\/uploads\/2023\/07\/ACD01.png?fit=1287%2C386&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8IUOX-1cp","_links":{"self":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/4613"}],"collection":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4613"}],"version-history":[{"count":8,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/4613\/revisions"}],"predecessor-version":[{"id":4624,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/posts\/4613\/revisions\/4624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=\/wp\/v2\/media\/4621"}],"wp:attachment":[{"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itresearchart.biz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}