{"id":115,"date":"2022-08-12T20:59:06","date_gmt":"2022-08-12T11:59:06","guid":{"rendered":"https:\/\/www.oca.ac.jp\/itmagazine\/?p=115"},"modified":"2022-08-12T20:59:06","modified_gmt":"2022-08-12T11:59:06","slug":"cisa%e3%80%81%e3%82%a2%e3%83%a1%e3%83%aa%e3%82%ab%e3%81%ae%e9%81%b8%e6%8c%99%e3%82%92%e5%ae%88%e3%82%8b%e3%81%9f%e3%82%81%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5","status":"publish","type":"post","link":"https:\/\/www.oca.ac.jp\/itmagazine\/cybersecurity\/cisa%e3%80%81%e3%82%a2%e3%83%a1%e3%83%aa%e3%82%ab%e3%81%ae%e9%81%b8%e6%8c%99%e3%82%92%e5%ae%88%e3%82%8b%e3%81%9f%e3%82%81%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5\/","title":{"rendered":"CISA\u3001\u30a2\u30e1\u30ea\u30ab\u306e\u9078\u6319\u3092\u5b88\u308b\u305f\u3081\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ad\u30c3\u30c8\u306e\u30ea\u30b9\u30c8\u3092\u516c\u958b"},"content":{"rendered":"<p>\u30a2\u30e1\u30ea\u30ab\u306e\u9023\u90a6\u6a5f\u95a2\u306e\u3072\u3068\u3064\u3067\u3042\u308a\u3001\u30b5\u30a4\u30d0\u30fc\u9632\u885b\u6a5f\u95a2\u3067\u3042\u308b\u3001\u300e\u30a2\u30e1\u30ea\u30ab\u5408\u8846\u56fd\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u793e\u4f1a\u57fa\u76e4\u5b89\u5168\u4fdd\u969c\u5e81\uff08CISA\uff09\u300f\u306f\u3001\u9078\u6319\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306e\u305f\u3081\u306e\u7121\u6599\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ad\u30c3\u30c8\u306e\u30ea\u30b9\u30c8\u3092\u767a\u8868\u3057\u305f\u3002<\/p>\n<p>\u3053\u308c\u306f\u5dde\u653f\u5e9c\u671f\u9593\u3084\u4f01\u696d\u306a\u3069\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u53d6\u308a\u7d44\u307f\u3092\u5f37\u5316\u3057\u3001\u30a2\u30e1\u30ea\u30ab\u56fd\u5185\u306e\u9078\u6319\u30a4\u30f3\u30d5\u30e9\u306e\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u3092\u5411\u4e0a\u3001\u652f\u63f4\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u9632\u885b\u7d44\u7e54\u3067\u3042\u308bJoint Cyber Defense Collaborative\uff08JCDC\uff09\u3092\u901a\u3058\u3066\u30c4\u30fc\u30eb\u30ad\u30c3\u30c8\u306f\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u3002<\/p>\n<p>\u3053\u308c\u3089\u306e\u30c4\u30fc\u30eb\u30ad\u30c3\u30c8\u306f\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u3084\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u3001DDoS\u653b\u6483\u304b\u3089\u9078\u6319\u306e\u30a4\u30f3\u30d5\u30e9\u8cc7\u7523\u3092\u4fdd\u8b77\u3057\u3001\u5371\u967a\u6027\u3092\u8a55\u4fa1\u3059\u308b\u3053\u3068\u306b\u7126\u70b9\u3092\u5408\u308f\u305b\u3066\u3044\u308b\u3068\u306e\u3053\u3068\u3002\u30ea\u30b9\u30c8\u306e\u516c\u958b\u306b\u4f34\u3044\u3001\u30c4\u30fc\u30eb\u30ad\u30c3\u30c8\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3082\u30aa\u30f3\u30e9\u30a4\u30f3\u4e0a\u306b\u516c\u958b\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3URL\u25bc\u25bc<br \/>\n<a href=\"https:\/\/www.cisa.gov\/cybersecurity-toolkit-protect-elections\">https:\/\/www.cisa.gov\/cybersecurity-toolkit-protect-elections<\/a><\/p>\n<p>&nbsp;<\/p>\n<h4>\u30a4\u30f3\u30d5\u30e9\u8cc7\u7523\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3<\/h4>\n<p>CISA\u306f\u300c\u307e\u305a\u306f\u201cElection Security Risk Profile Tool\u201d\u3067\u30ea\u30b9\u30af\u3092\u8a55\u4fa1\u3057\u3001CISA\u3068\u30a2\u30e1\u30ea\u30ab\u5408\u8846\u56fd\u9078\u6319\u652f\u63f4\u59d4\u54e1\u4f1a\u306b\u3088\u3063\u3066\u4f5c\u3089\u308c\u305f\u3053\u306e\u30c4\u30fc\u30eb\u304c\u3001\u30ea\u30b9\u30af\u3092\u8a55\u4fa1\u3057\u3001\u5dde\u3084\u5730\u65b9\u306e\u9078\u6319\u5f53\u5c40\u304c\u76f4\u9762\u3059\u308b\u5371\u967a\u6027\u306e\u7bc4\u56f2\u3001\u7de9\u548c\u7b56\u306a\u3069\u306e\u512a\u5148\u9806\u4f4d\u3092\u4ed8\u3051\u308b\u624b\u52a9\u3051\u3068\u306a\u308b\u300d\u3068\u8ff0\u3079\u3066\u3044\u308b\u3002<\/p>\n<p>\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u306b\u306f\u4ed6\u306b\u3082\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u3084\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306a\u3069\u306e\u6a19\u7684\u306b\u306a\u308a\u3084\u3059\u3044\u9805\u76ee\u306a\u3069\u7d39\u4ecb\u3055\u308c\u305f\u308a\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304b\u3089\u8eab\u3092\u5b88\u308b\u305f\u3081\u306e\u4e88\u9632\u63aa\u7f6e\u306a\u3069\u3082\u7d39\u4ecb\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-118 size-full\" src=\"https:\/\/www.oca.ac.jp\/itmagazine\/wp-content\/uploads\/2022\/08\/cybersecuritytoolkit_image01.png\" alt=\"\" width=\"1316\" height=\"620\" srcset=\"https:\/\/www.oca.ac.jp\/itmagazine\/wp-content\/uploads\/2022\/08\/cybersecuritytoolkit_image01.png 1316w, https:\/\/www.oca.ac.jp\/itmagazine\/wp-content\/uploads\/2022\/08\/cybersecuritytoolkit_image01-300x141.png 300w, https:\/\/www.oca.ac.jp\/itmagazine\/wp-content\/uploads\/2022\/08\/cybersecuritytoolkit_image01-1024x482.png 1024w, https:\/\/www.oca.ac.jp\/itmagazine\/wp-content\/uploads\/2022\/08\/cybersecuritytoolkit_image01-768x362.png 768w\" sizes=\"(max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px\" \/><\/p>\n<p>\u307e\u305f\u3001\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u30c4\u30fc\u30eb\u3084\u30b5\u30fc\u30d3\u30b9\u306f\u3001\u65e5\u672c\u3067\u3082\u591a\u304f\u306e\u4f01\u696d\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306e\u6307\u91dd\u3068\u3057\u3066\u3044\u308b\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306b\u95a2\u3059\u308b\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af<strong>\u300cNIST Cybersecurity Framework\u300d<\/strong>\u306b\u306e\u201c\u9632\u5fa1\uff08Protect\uff09\u201d\u3068\u201c\u691c\u77e5\uff08Detect\uff09\u201d\u306b\u4e00\u81f4\u3057\u3066\u304a\u308a\u3001\u300c\u201c\u9632\u5fa1\u201d\u306f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304b\u3089\u306e\u9632\u885b\u624b\u6bb5\u3068\u3057\u3066\u91cd\u8981\u306a\u30b5\u30fc\u30d3\u30b9\u306e\u63d0\u4f9b\u3092\u4fdd\u8a3c\u3057\u3001\u201c\u691c\u77e5\u201d\u306f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u5146\u5019\u3092\u4e8b\u524d\u306b\u767a\u898b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u300d\u3068\u3082\u3057\u3066\u3044\u308b\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u6700\u5f8c\u306b\u3001CISA\u306f\u3053\u306e\u30c4\u30fc\u30eb\u30ad\u30c3\u30c8\u306e\u30ea\u30b9\u30c8\u306f\u5305\u62ec\u7684\u306a\u3082\u306e\u3067\u306f\u306a\u3044\u3068\u3057\u3001\u7279\u5b9a\u306e\u30b5\u30fc\u30d3\u30b9\u3092\u63a8\u5968\u3001\u652f\u6301\u3057\u3066\u3044\u308b\u308f\u3051\u3067\u306f\u306a\u304f\u3001\u30c4\u30fc\u30eb\u30ad\u30c3\u30c8\u306e\u516c\u958b\u306b\u5bfe\u3057\u3066\u4e2d\u7acb\u6027\u3092\u4e3b\u5f35\u3057\u3066\u3044\u308b\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>Cybersecurity toolkit to protect elections <a href=\"https:\/\/www.cisa.gov\/cybersecurity-toolkit-protect-elections\">\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3<\/a><span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Cybersecurity Framework <a href=\"https:\/\/www.nist.gov\/cyberframework\">\u516c\u5f0f\u30b5\u30a4\u30c8<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30a2\u30e1\u30ea\u30ab\u306e\u9023\u90a6\u6a5f\u95a2\u306e\u3072\u3068\u3064\u3067\u3042\u308a\u3001\u30b5\u30a4\u30d0\u30fc\u9632\u885b\u6a5f\u95a2\u3067\u3042\u308b\u3001\u300e\u30a2\u30e1\u30ea\u30ab\u5408\u8846\u56fd\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u793e\u4f1a\u57fa\u76e4\u5b89\u5168\u4fdd\u969c\u5e81\uff08CISA\uff09\u300f\u306f\u3001\u9078\u6319\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306e\u305f\u3081\u306e\u7121\u6599\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ad\u30c3\u30c8\u306e\u30ea\u30b9\u30c8\u3092\u767a\u8868\u3057\u305f\u3002 \u3053\u308c\u306f\u5dde\u653f &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.oca.ac.jp\/itmagazine\/cybersecurity\/cisa%e3%80%81%e3%82%a2%e3%83%a1%e3%83%aa%e3%82%ab%e3%81%ae%e9%81%b8%e6%8c%99%e3%82%92%e5%ae%88%e3%82%8b%e3%81%9f%e3%82%81%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5\/\" class=\"more-link\"><span class=\"screen-reader-text\">&#8220;CISA\u3001\u30a2\u30e1\u30ea\u30ab\u306e\u9078\u6319\u3092\u5b88\u308b\u305f\u3081\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ad\u30c3\u30c8\u306e\u30ea\u30b9\u30c8\u3092\u516c\u958b&#8221; \u306e<\/span>\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[136],"tags":[],"_links":{"self":[{"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/posts\/115"}],"collection":[{"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/comments?post=115"}],"version-history":[{"count":6,"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/posts\/115\/revisions"}],"predecessor-version":[{"id":122,"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/posts\/115\/revisions\/122"}],"wp:attachment":[{"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/media?parent=115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/categories?post=115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oca.ac.jp\/itmagazine\/wp-json\/wp\/v2\/tags?post=115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}