{"id":5722,"date":"2021-07-29T06:58:29","date_gmt":"2021-07-29T06:58:29","guid":{"rendered":"https:\/\/www.cyfirma.com\/?p=5722"},"modified":"2023-06-07T06:20:03","modified_gmt":"2023-06-07T06:20:03","slug":"cyber-capabilities-and-national-power_first","status":"publish","type":"post","link":"https:\/\/beta06.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/","title":{"rendered":"Cyber Capabilities and National Power -1- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09"},"content":{"rendered":"<h4 style=\"border-width: 0px 0px 0px 7px; border-color: #99CCFF; border-style: solid; padding: 15px 10px; margin: 0px 0px 10px 0px; background: #F5F5F5;\">Cyber Capabilities and National Power -1-<\/h4>\n<p>2021\u5e746\u670828\u65e5\u306b\u30a4\u30ae\u30ea\u30b9\u306e\u6c11\u9593\u56fd\u969b\u7684\u6226\u7565\u7814\u7a76\u6a5f\u95a2\u3067\u3042\u308bIISS\uff08THE INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES\uff09\u304b\u3089\u300cCyber Capabilities and National Power\u300d\u3068\u3044\u3046\u5404\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u80fd\u529b\u3068\u56fd\u529b\u306e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u304c\u516c\u8868\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p><span class=\"TextRun SCXW34334388 BCX0\" lang=\"JA-JP\" xml:lang=\"JA-JP\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34334388 BCX0\">#<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u3061\u306a\u307f\u306b\u3001\u5f0a\u793e<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u5185\u306e\u4e00\u90e8<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u3067\u306f<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u672c\u30ec\u30dd\u30fc\u30c8\u3092<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u300c\u3044\u304e\u308a\u3059\u306e\u3084\u3064\u300d\u3068\u547c\u79f0\u3057\u3066\u304a\u308a\u3001<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u539f\u984c\u3092\u5fd8\u308c\u304c\u3061\u3067\u3059\u3002\u3002\u3002<\/span><\/span><span class=\"EOP SCXW34334388 BCX0\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>\u4eca\u56de\u304b\u30892\u56de\u306b\u6e21\u3063\u3066\u3001\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306b\u3064\u3044\u3066\u898b\u3066\u3044\u304d\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u5916\u90e8\u6a5f\u95a2\u304c\u767a\u884c\u3059\u308b\u30ec\u30dd\u30fc\u30c8\u306f\u5916\u90e8\u60c5\u52e2\u3092\u628a\u63e1\u3059\u308b\u969b\u306b\u91cd\u8981\u306a\u3046\u3048\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306b\u898b\u3048\u3066\u3044\u308b\u304b\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306a\u72b6\u614b\u306b\u3042\u308b\u306e\u304b\u3092\u77e5\u308b\u3046\u3048\u3067\u3082\u5927\u3044\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002<\/p>\n<p>\u30ec\u30dd\u30fc\u30c8\u306e\u5bfe\u8c61\u56fd\u306f\u3001\u30a2\u30e1\u30ea\u30ab\u3001\u30a4\u30ae\u30ea\u30b9\u3001\u30ab\u30ca\u30c0\u3001\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\uff08\u4ee5\u4e0a\u3001\u30d5\u30a1\u30a4\u30d6\u30a2\u30a4\u30ba\u306e\u30e1\u30f3\u30d0\u30fc\uff09\u3001\u30d5\u30e9\u30f3\u30b9\u3001\u30a4\u30b9\u30e9\u30a8\u30eb\u3001\u65e5\u672c\uff08\u4ee5\u4e0a\u3001\u30d5\u30a1\u30a4\u30d6\u30a2\u30a4\u30ba\u3068\u30b5\u30a4\u30d0\u30fc\u5bfe\u5fdc\u306b\u304a\u3051\u308b\u540c\u76df\u56fd\uff09\u3001\u4e2d\u56fd\u3001\u30ed\u30b7\u30a2\u3001\u30a4\u30e9\u30f3\u3001\u5317\u671d\u9bae\uff08\u4ee5\u4e0a\u3001\u30d5\u30a1\u30a4\u30d6\u30a2\u30a4\u30ba\u3068\u305d\u306e\u540c\u76df\u56fd\u304c\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3068\u307f\u306a\u3057\u3066\u3044\u308b\u56fd\uff09\u3001\u30a4\u30f3\u30c9\u3001\u30a4\u30f3\u30c9\u30cd\u30b7\u30a2\u3001\u30de\u30ec\u30fc\u30b7\u30a2\u3001\u30d9\u30c8\u30ca\u30e0\uff08\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u80fd\u529b\u304c\u521d\u671f\u6bb5\u968e\u306b\u3042\u308b\u56fd\uff09\u306e15\u304b\u56fd\u3067\u3001\u305d\u308c\u305e\u308c\u306b\u56fd\u306b\u3064\u3044\u3066\u4ee5\u4e0b\u306e7\u3064\u306e\u30ab\u30c6\u30b4\u30ea\u3067\u8a55\u4fa1\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002<br \/>\n\u203b\u304b\u3063\u3053\u66f8\u304d\u5185\u306e\u8868\u8a18\u306f\u30a8\u30b0\u30bc\u30af\u30c6\u30a3\u30d6\u30b5\u30de\u30ea\u30fc\u306b\u6e96\u3058\u3066\u3044\u307e\u3059\u3002<\/p>\n<p style=\"padding-left: 80px;\">\u30fbStrategy and doctrine \uff1c\u6226\u7565\u3068\u57fa\u672c\u539f\u5247\uff1e<\/p>\n<p style=\"padding-left: 80px;\">\u30fbGovernance, command and control \uff1c\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u6307\u63ee\u7d71\u5236\uff1e<\/p>\n<p style=\"padding-left: 80px;\">\u30fbCore cyber-intelligence capability \uff1c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\uff1e<\/p>\n<p style=\"padding-left: 80px;\">\u30fbCyber empowerment and dependence \uff1c\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u3068\u4f9d\u5b58\uff1e<\/p>\n<p style=\"padding-left: 80px;\">\u30fbCyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e<\/p>\n<p style=\"padding-left: 80px;\">\u30fbGlobal leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e<\/p>\n<p style=\"padding-left: 80px;\">\u30fbOffensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e<\/p>\n<p>\u3053\u306e\u8a55\u4fa1\u8ef8\u3092\u3082\u3068\u306b15\u304b\u56fd\u30923\u6bb5\u968e\u306b\u5206\u985e\u3057\u3066\u304a\u308a\u3001\u305d\u306e\u7d50\u679c\u306f\u4ee5\u4e0b\u306e\u901a\u308a\u3067\u3059\u3002<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-5783\" src=\"https:\/\/www.cyfirma.com\/wp-content\/uploads\/2021\/07\/0729chart-5.png\" alt=\"\" width=\"auto\" height=\"auto\" \/><\/p>\n<p>\u65e5\u672c\u304c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u80fd\u529b\u304c\u521d\u671f\u6bb5\u968e\u306b\u3042\u308b\u3068\u3055\u308c\u308b\u56fd\u3005\u3068\u540c\u3058\u6700\u4e0b\u5c64\u306b\u5c5e\u3057\u3066\u3044\u308b\u3053\u3068\u306b\u5bfe\u3057\u3066\u3001\u7686\u69d8\u306f\u3069\u306e\u3088\u3046\u306a\u611f\u60f3\u3092\u9802\u304f\u3067\u3057\u3087\u3046\u304b\uff1f<br \/>\n\u3061\u306a\u307f\u306b\u3001\u30ec\u30dd\u30fc\u30c8\u3067\u306f\u3001\u3053\u306e\u6bb5\u968e\u5206\u3051\u306b\u3064\u3044\u3066\u4ee5\u4e0b\u306e\u8a00\u53ca\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Of all the factors potentially contributing to a country moving up from one tier to the next, the most decisive appears to be strength in the core ICT industries. That is why China, on its current trajectory and providing it addresses its weakness in cyber security, is best placed to join the US in Tier One. It is also why Japan, despite the many weaknesses it needs to address, is the Tier Three country best placed to rise into Tier Two.<\/span><\/div>\n<p>\u65e5\u672c\u306b\u8a00\u53ca\u3057\u305f\u90e8\u5206\u3092\u610f\u8a33\u3059\u308b\u3068\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u611f\u3058\u3067\u3057\u3087\u3046\u304b\u3002<br \/>\n\u300c\u4e0a\u306e\u6bb5\u968e\u306b\u4e0a\u304c\u308b\u305f\u3081\u306e\u8981\u7d20\u306f\u69d8\u3005\u3067\u306f\u3042\u308b\u304c\u3001\u6700\u3082\u6c7a\u5b9a\u7684\u306a\u8981\u56e0\u306f\u30b3\u30a2ICT\u7523\u696d\u306e\u5f37\u3055\u3067\u3001\u65e5\u672c\u306f\u591a\u304f\u306e\u5f31\u70b9\u304c\u3042\u308b\u306b\u3082\u95a2\u308f\u3089\u305a\u30b3\u30a2ICT\u7523\u696d\u306e\u5f37\u3055\u304b\u3089Tier 2\u306b\u6700\u3082\u8fd1\u3044\u56fd\u3067\u3042\u308b\u3002\u300d<\/p>\n<p>\u8a89\u3081\u3066\u308b\u306e\u304b\u8cb6\u3057\u3066\u308b\u306e\u304b\u3088\u304f\u308f\u304b\u308a\u307e\u305b\u3093\u306d\u3002\u3002\u3002<\/p>\n<p><strong>\u30a2\u30e1\u30ea\u30ab<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Dominance in cyberspace has been a strategic goal of the United States since the mid-1990s. It is the only country with a heavy global footprint in both civil and military uses of cyberspace, although it now perceives itself as seriously threatened by China and Russia in that domain.<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u512a\u4f4d\u6027\u306f\u30011990\u5e74\u4ee3\u534a\u3070\u304b\u3089\u7c73\u56fd\u306e\u6226\u7565\u7684\u76ee\u6a19\u3067\u3057\u305f\u3002\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306e\u6c11\u9593\u304a\u3088\u3073\u8ecd\u4e8b\u5229\u7528\u306e\u4e21\u65b9\u3067\u4e16\u754c\u898f\u6a21\u306e\u5927\u304d\u306a\u5b58\u5728\u611f\u3092\u6301\u3064\u552f\u4e00\u306e\u56fd\u3067\u3059\u304c\u3001\u73fe\u5728\u3001\u305d\u306e\u9818\u57df\u3067\u4e2d\u56fd\u3068\u30ed\u30b7\u30a2\u306b\u3088\u3063\u3066\u6df1\u523b\u306a\u8105\u5a01\u306b\u3055\u3089\u3055\u308c\u3066\u3044\u308b\u3068\u8a8d\u8b58\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u30a4\u30ae\u30ea\u30b9<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">The United Kingdom is a highly capable cyber state, with clear strategic oversight at the political level. It has world-class strengths in its cyber-security ecosystem, centred on the National Cyber Security Centre, and in its related cyber-intelligence capability centred on the Government Communications Headquarters.<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u82f1\u56fd\u306f\u975e\u5e38\u306b\u6709\u80fd\u306a\u30b5\u30a4\u30d0\u30fc\u56fd\u5bb6\u3067\u3042\u308a\u3001\u653f\u6cbb\u30ec\u30d9\u30eb\u3067\u306e\u660e\u78ba\u306a\u6226\u7565\u7684\u76e3\u67fb\u304c\u3042\u308a\u307e\u3059\u3002\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30f3\u30bf\u30fc\u3092\u4e2d\u5fc3\u3068\u3057\u305f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u3068\u3001\u653f\u5e9c\u901a\u4fe1\u672c\u90e8\u3092\u4e2d\u5fc3\u3068\u3057\u305f\u95a2\u9023\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\u306b\u304a\u3044\u3066\u3001\u4e16\u754c\u30af\u30e9\u30b9\u306e\u5f37\u307f\u3092\u6301\u3063\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">The UK has developed, and used, offensive cyber capabilities since at least the early 2000s, and is investing further in their expansion.<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u82f1\u56fd\u306f\u3001\u5c11\u306a\u304f\u3068\u30822000\u5e74\u4ee3\u521d\u982d\u304b\u3089\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\u3092\u958b\u767a\u304a\u3088\u3073\u4f7f\u7528\u3057\u3066\u304a\u308a\u3001\u305d\u306e\u62e1\u5927\u306b\u3055\u3089\u306b\u6295\u8cc7\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u30ab\u30ca\u30c0<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Canada is a highly digitized middle power with an advanced economy. It pursues a whole-of-society approach to cyber security that sits comfortably with its system of government and foreign policy.<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30ab\u30ca\u30c0\u306f\u9ad8\u5ea6\u306b\u30c7\u30b8\u30bf\u30eb\u5316\u3055\u308c\u305f\u30df\u30c9\u30eb\u30d1\u30ef\u30fc\u3067\u3042\u308a\u3001\u5148\u9032\u56fd\u3067\u3059\u3002\u305d\u308c\u306f\u3001\u653f\u5e9c\u3068\u5916\u4ea4\u653f\u7b56\u306e\u30b7\u30b9\u30c6\u30e0\u3068\u5feb\u9069\u306b\u8abf\u548c\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3078\u306e\u793e\u4f1a\u5168\u4f53\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u8ffd\u6c42\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">In part because of its 70-year membership of the Five Eyes intelligence alliance, Australia has more mature cyber capabilities than its modest defence and intelligence budgets might suggest. It\u3000is active in global diplomacy for cyber norms and\u3000cyber capacity-building. In 2016 it acknowledged for\u3000the first time that it possessed offensive cyber capabilities<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30d5\u30a1\u30a4\u30d6\u30a2\u30a4\u30ba\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306e70\u5e74\u9593\u306e\u30e1\u30f3\u30d0\u30fc\u30b7\u30c3\u30d7\u306e\u304a\u304b\u3052\u3082\u3042\u308a\u3001\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u306f\u3001\u305d\u306e\u63a7\u3048\u3081\u306a\u9632\u885b\u3068\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u4e88\u7b97\u304c\u793a\u5506\u3059\u308b\u3088\u308a\u3082\u6210\u719f\u3057\u305f\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\u3092\u6301\u3063\u3066\u3044\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u898f\u7bc4\u3068\u30b5\u30a4\u30d0\u30fc\u30ad\u30e3\u30d1\u30b7\u30c6\u30a3\u69cb\u7bc9\u306e\u305f\u3081\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u5916\u4ea4\u306b\u7a4d\u6975\u7684\u306b\u53d6\u308a\u7d44\u3093\u3067\u3044\u307e\u3059\u30022016\u5e74\u306b\u3001\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\u3092\u5099\u3048\u3066\u3044\u308b\u3053\u3068\u3092\u521d\u3081\u3066\u8a8d\u3081\u307e\u3057\u305f\u3002\u300d<\/p>\n<p><strong>\u30d5\u30e9\u30f3\u30b9<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">The French government has robust strategies for security in cyberspace, supported by mature institutions and regular budget infusions. France has a wide cyber-intelligence reach but keeps its cybersecurity functions organisationally separate from its intelligence community.<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30d5\u30e9\u30f3\u30b9\u653f\u5e9c\u306f\u3001\u6210\u719f\u3057\u305f\u6a5f\u95a2\u3068\u5b9a\u671f\u7684\u306a\u4e88\u7b97\u306e\u6295\u5165\u306b\u652f\u3048\u3089\u308c\u3066\u3001\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u5f37\u529b\u306a\u6226\u7565\u3092\u6301\u3063\u3066\u3044\u307e\u3059\u3002\u30d5\u30e9\u30f3\u30b9\u306f\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u306e\u30ab\u30d0\u30fc\u7bc4\u56f2\u304c\u5e83\u3044\u3067\u3059\u304c\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u304b\u3089\u7d44\u7e54\u7684\u306b\u5206\u96e2\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u30a4\u30b9\u30e9\u30a8\u30eb<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">In part because of its 70-year membership of the Five Eyes intelligence alliance, Australia has more mature cyber capabilities than its modest defence and intelligence budgets might suggest. It is active in global diplomacy for cyber norms and cyber capacity-building. In 2016 it acknowledged for the first time that it possessed offensive cyber capabilities<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30a4\u30b9\u30e9\u30a8\u30eb\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u3092\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u306b\u5bfe\u3059\u308b\u6f5c\u5728\u7684\u306a\u8105\u5a01\u3068\u3057\u3066\u7279\u5b9a\u3057\u305f\u6700\u521d\u306e\u56fd\u306e1\u3064\u3067\u3042\u308a\u300120\u5e74\u4ee5\u4e0a\u524d\u306b\u3053\u306e\u554f\u984c\u306b\u53d6\u308a\u7d44\u307f\u59cb\u3081\u307e\u3057\u305f\u3002\u5f53\u521d\u3001\u4e3b\u306a\u8105\u5a01\u306f\u305d\u306e\u91cd\u8981\u306a\u56fd\u5bb6\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306b\u5bfe\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3067\u3042\u308b\u3068\u8a8d\u8b58\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u304c\u3001\u305d\u306e\u8a8d\u8b58\u306f\u3001\u4ed6\u306e\u56fd\u5bb6\u7684\u306b\u91cd\u8981\u306a\u30bf\u30fc\u30b2\u30c3\u30c8\u306b\u5bfe\u3059\u308b\u653b\u6483\u3092\u542b\u3080\u3088\u3046\u306b\u9032\u5316\u3057\u307e\u3057\u305f\u3002\u300d<\/p>\n<p><strong>\u4e2d\u56fd<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">The country has since established the world\u2019s most extensive cyberenabled domestic surveillance and censorship system, which is tightly controlled by the leadership.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u3053\u306e\u56fd\u306f\u4e16\u754c\u3067\u6700\u3082\u5e83\u7bc4\u306a\u30b5\u30a4\u30d0\u30fc\u5bfe\u5fdc\u306e\u56fd\u5185\u76e3\u8996\u304a\u3088\u3073\u691c\u95b2\u30b7\u30b9\u30c6\u30e0\u3092\u78ba\u7acb\u3057\u3066\u304a\u308a\u3001\u3053\u308c\u306f\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\u306b\u3088\u3063\u3066\u53b3\u3057\u304f\u7ba1\u7406\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Since the early 2000s China has conducted large-scale cyber operations abroad, aiming to acquire intellectual property, achieve political influence, carry out state-on-state espionage and position capabilities for disruptive effect in case of future conflict.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u4e2d\u56fd\u306f2000\u5e74\u4ee3\u521d\u982d\u4ee5\u6765\u3001\u77e5\u7684\u8ca1\u7523\u306e\u53d6\u5f97\u3001\u653f\u6cbb\u7684\u5f71\u97ff\u529b\u306e\u7372\u5f97\u3001\u56fd\u5bb6\u9593\u306e\u30b9\u30d1\u30a4\u6d3b\u52d5\u306e\u5b9f\u65bd\u3001\u5c06\u6765\u306e\u7d1b\u4e89\u306e\u969b\u306e\u7834\u58ca\u7684\u5f71\u97ff\u306b\u5bfe\u3059\u308b\u5730\u4f4d\u306e\u78ba\u7acb\u3092\u76ee\u6307\u3057\u3066\u3001\u6d77\u5916\u3067\u5927\u898f\u6a21\u306a\u30b5\u30a4\u30d0\u30fc\u6d3b\u52d5\u3092\u884c\u3063\u3066\u304d\u307e\u3057\u305f\u3002\u300d<\/p>\n<p><strong>\u30ed\u30b7\u30a2<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">For two decades Russia has led, with some successes, diplomatic efforts to curtail what it sees as the dominance of cyberspace by the West, and particularly the United States. It has credible offensive cyber capabilities and has used them extensively as part of a much broader strategy aimed at disrupting the policies and politics of perceived adversaries, especially the US. It has run extensive cyber-intelligence operations, some of which reveal increasing levels of technical sophistication.<\/span><\/div>\n<p>\u6284\u8a33:\u300c20\u5e74\u9593\u3001\u30ed\u30b7\u30a2\u306f\u3001\u3044\u304f\u3064\u304b\u306e\u6210\u529f\u3092\u53ce\u3081\u3066\u3001\u897f\u5074\u3001\u7279\u306b\u7c73\u56fd\u306b\u3088\u308b\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u306e\u652f\u914d\u3068\u898b\u306a\u3055\u308c\u3066\u3044\u308b\u3082\u306e\u3092\u524a\u6e1b\u3059\u308b\u305f\u3081\u306e\u5916\u4ea4\u52aa\u529b\u3092\u4e3b\u5c0e\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u30ed\u30b7\u30a2\u306f\u4fe1\u983c\u3067\u304d\u308b\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\u3092\u6301\u3063\u3066\u304a\u308a\u3001\u8a8d\u8b58\u3055\u308c\u305f\u6575\u3001\u7279\u306b\u7c73\u56fd\u306e\u653f\u7b56\u3068\u653f\u6cbb\u3092\u6df7\u4e71\u3055\u305b\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u305f\u3088\u308a\u5e83\u7bc4\u306a\u6226\u7565\u306e\u4e00\u90e8\u3068\u3057\u3066\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\u3092\u5e83\u304f\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002\u5e83\u7bc4\u306a\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u5b9f\u884c\u3057\u3066\u304a\u308a\u3001\u305d\u306e\u4e00\u90e8\u306f\u6280\u8853\u306e\u9ad8\u5ea6\u5316\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u30a4\u30e9\u30f3<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Iran regards itself as being in an intelligence and cyber war with its enemies.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u3053\u306e\u56fd\u306f\u4e16\u754c\u3067\u6700\u3082\u5e83\u7bc4\u306a\u30b5\u30a4\u30d0\u30fc\u5bfe\u5fdc\u306e\u56fd\u5185\u76e3\u8996\u304a\u3088\u3073\u691c\u95b2\u30b7\u30b9\u30c6\u30e0\u3092\u78ba\u7acb\u3057\u3066\u304a\u308a\u3001\u3053\u308c\u306f\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\u306b\u3088\u3063\u3066\u53b3\u3057\u304f\u7ba1\u7406\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">it lacks the resources, talent and technical infrastructure needed to develop and deploy sophisticated offensive cyber capabilities, even though it has used lower-level offensive cyber techniques widely, with some success.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u9ad8\u5ea6\u306a\u653b\u6483\u7684\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\u3092\u958b\u767a\u304a\u3088\u3073\u5c55\u958b\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u30ea\u30bd\u30fc\u30b9\u3001\u4eba\u6750\u3001\u304a\u3088\u3073\u6280\u8853\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u304c\u4e0d\u8db3\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u4f4e\u30ec\u30d9\u30eb\u306e\u653b\u6483\u7684\u30b5\u30a4\u30d0\u30fc\u6280\u8853\u3092\u5e83\u304f\u4f7f\u7528\u3057\u3066\u304a\u308a\u3001\u3042\u308b\u7a0b\u5ea6\u306e\u6210\u529f\u3092\u53ce\u3081\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u5317\u671d\u9bae<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">North Korea lacks any sophisticated cyber-intelligence capability. It has a basic digital ecosystem, with between three and five million devices connected to internal mobile networks, including via a government intranet. Access to the global internet is strictly controlled by the government and depends on a very small number of gateways provided by Chinese and Russian service providers<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u5317\u671d\u9bae\u306b\u306f\u9ad8\u5ea6\u306a\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\u304c\u3042\u308a\u307e\u305b\u3093\u3002\u57fa\u672c\u7684\u306a\u30c7\u30b8\u30bf\u30eb\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u304c\u3042\u308a\u3001\u653f\u5e9c\u306e\u30a4\u30f3\u30c8\u30e9\u30cd\u30c3\u30c8\u306a\u3069\u3092\u4ecb\u3057\u3066\u3001300\u4e07\u304b\u3089500\u4e07\u53f0\u306e\u30c7\u30d0\u30a4\u30b9\u304c\u5185\u90e8\u30e2\u30d0\u30a4\u30eb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u63a5\u7d9a\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u30b0\u30ed\u30fc\u30d0\u30eb\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3078\u306e\u30a2\u30af\u30bb\u30b9\u306f\u653f\u5e9c\u306b\u3088\u3063\u3066\u53b3\u3057\u304f\u7ba1\u7406\u3055\u308c\u3066\u304a\u308a\u3001\u4e2d\u56fd\u3068\u30ed\u30b7\u30a2\u306e\u30b5\u30fc\u30d3\u30b9\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u304c\u63d0\u4f9b\u3059\u308b\u975e\u5e38\u306b\u5c11\u6570\u306e\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4\u306b\u4f9d\u5b58\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u30a4\u30f3\u30c9<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">India has a good regional cyber-intelligence reach but relies on partners, including the United States, for wider insight.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30a4\u30f3\u30c9\u306f\u5730\u57df\u306e\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u306e\u7bc4\u56f2\u306f\u5e83\u3044\u3067\u3059\u304c\u3001\u3088\u308a\u5e83\u7bc4\u306a\u6d1e\u5bdf\u3092\u5f97\u308b\u305f\u3081\u306b\u7c73\u56fd\u3092\u542b\u3080\u30d1\u30fc\u30c8\u30ca\u30fc\u306b\u4f9d\u5b58\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">The private sector has moved more quickly than the government in promoting national cyber security.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u6c11\u9593\u90e8\u9580\u306f\u3001\u56fd\u5bb6\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u4fc3\u9032\u306b\u304a\u3044\u3066\u653f\u5e9c\u3088\u308a\u3082\u8fc5\u901f\u306b\u52d5\u3044\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u30a4\u30f3\u30c9\u30cd\u30b7\u30a2<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Indonesia has only limited cyber-intelligence capabilities but has been investing in cyber surveillance for domestic security.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30a4\u30f3\u30c9\u30cd\u30b7\u30a2\u306e\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\u306f\u9650\u3089\u308c\u3066\u3044\u307e\u3059\u304c\u3001\u56fd\u5185\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u30b5\u30a4\u30d0\u30fc\u76e3\u8996\u306b\u6295\u8cc7\u3057\u3066\u3044\u307e\u3059\u3002\u307b\u3068\u3093\u3069\u306e\u767a\u5c55\u9014\u4e0a\u56fd\u3088\u308a\u3082\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30c7\u30b8\u30bf\u30eb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u306e\u63a1\u7528\u306b\u53d6\u308a\u7d44\u3093\u3067\u3044\u307e\u3059\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Indonesia has some cyber-surveillance and cyber-espionage capabilities, but there is little evidence of it planning for, or having conducted, offensive cyber operations.<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30a4\u30f3\u30c9\u30cd\u30b7\u30a2\u306b\u306f\u3044\u304f\u3064\u304b\u306e\u30b5\u30a4\u30d0\u30fc\u76e3\u8996\u6a5f\u80fd\u3068\u30b5\u30a4\u30d0\u30fc\u30b9\u30d1\u30a4\u6a5f\u80fd\u304c\u3042\u308a\u307e\u3059\u304c\u3001\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u64cd\u4f5c\u3092\u8a08\u753b\u3057\u3066\u3044\u308b\u3001\u307e\u305f\u306f\u5b9f\u65bd\u3057\u305f\u3068\u3044\u3046\u8a3c\u62e0\u306f\u307b\u3068\u3093\u3069\u3042\u308a\u307e\u305b\u3093\u3002\u300d<\/p>\n<p><strong>\u30de\u30ec\u30fc\u30b7\u30a2<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">There is little information available on core cyber-intelligence capabilities or the development of offensive cyber, with the policy statements issued in 2020 focusing more on active defence in cyberspace.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\u3084\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u306e\u958b\u767a\u306b\u95a2\u3059\u308b\u60c5\u5831\u306f\u307b\u3068\u3093\u3069\u306a\u304f\u30012020\u5e74\u306b\u767a\u884c\u3055\u308c\u305f\u30dd\u30ea\u30b7\u30fc\u30b9\u30c6\u30fc\u30c8\u30e1\u30f3\u30c8\u306f\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u3067\u306e\u7a4d\u6975\u7684\u306a\u9632\u5fa1\u306b\u91cd\u70b9\u3092\u7f6e\u3044\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p><strong>\u30d9\u30c8\u30ca\u30e0<\/strong><\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">While overall offensive cyber capabilities are likely to be nascent or weak, the covert government-linked group APT32 could probably launch relatively sophisticated cyber attacks.<br \/>\n<\/span><\/div>\n<p>\u6284\u8a33:\u300c\u5168\u4f53\u7684\u306a\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\u306f\u521d\u671f\u6bb5\u968e\u307e\u305f\u306f\u8106\u5f31\u3067\u3042\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u304c\u3001\u653f\u5e9c\u3068\u306e\u95a2\u9023\u6027\u304c\u7591\u308f\u308c\u3066\u3044\u308b\u30cf\u30c3\u30ab\u30fc\u30b0\u30eb\u30fc\u30d7APT32\u306f\u3001\u304a\u305d\u3089\u304f\u6bd4\u8f03\u7684\u9ad8\u5ea6\u306a\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3092\u4ed5\u639b\u3051\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002\u300d<\/p>\n<p>\u3044\u304b\u304c\u3067\u3057\u3087\u3046\u304b\uff1f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u4e16\u754c\u3067\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u306e\u5f37\u5316\u3082\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u308220\u5e74\u4ee5\u4e0a\u524d\u304b\u3089\u69d8\u3005\u306a\u6d3b\u52d5\u304c\u884c\u308f\u308c\u3066\u3044\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3059\u3002\u3082\u3061\u308d\u3093\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3082\u3053\u3053\u6570\u5e74\u306e\u8a71\u3067\u306f\u306a\u304f\u6614\u304b\u3089\u3042\u308b\u3082\u306e\u3067\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u5404\u56fd\u306e\u72b6\u6cc1\u3092\u982d\u306b\u5165\u308c\u3066\u304a\u304f\u3068\u3001\u5730\u653f\u5b66\u7684\u8105\u5a01\u60c5\u52e2\u306e\u7406\u89e3\u3092\u3088\u308a\u6df1\u3081\u3089\u308c\u308b\u306e\u3067\u306f\u306a\u3044\u3067\u3057\u3087\u3046\u304b\u3002<\/p>\n<p>\u6b21\u56de\u306f\u3001\u672c\u30ec\u30dd\u30fc\u30c8\u306e\u65e5\u672c\u90e8\u5206\u306b\u3064\u3044\u3066\u8a73\u7d30\u306b\u898b\u3066\u3044\u304d\u307e\u3059\u3002\u304a\u697d\u3057\u307f\u306b\uff01<\/p>\n<p>CYFIRMA\u3067\u306f\u7d44\u7e54\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u304b\u3089\u6226\u8853\u9762\u307e\u3067\u6d3b\u7528\u3067\u304d\u308b\u3001\u5305\u62ec\u7684\u306a\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u3054\u8208\u5473\u306e\u3042\u308b\u65b9\u306f\u3001\u3069\u3046\u305e\u304a\u6c17\u8efd\u306b\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/p>\n<h4 style=\"border-width: 0px 0px 0px 7px; border-color: #99CCFF; border-style: solid; padding: 15px 10px; margin: 0px 0px 10px 0px; background: #F5F5F5;\"><strong><span style=\"color: #000000;\"><span style=\"font-family: Georgia,serif;\">CYFIRMA\u3067\u306f\u8272\u3005\u306a\u8996\u70b9\u304b\u3089\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u7406\u89e3\u3057\u3066\u9802\u3051\u308b\u69d8\u3001\u5404\u7a2e\u7121\u6599\u306e\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u3054\u7528\u610f\u3057\u3066\u3044\u307e\u3059\uff01<\/span><\/span><\/strong><\/h4>\n<h4><\/h4>\n<h4>\u2727\u6bce\u9031\u706b\u66dc\u65e5\u306b\u767a\u884c\u300cWeekly Security Update\u300d<\/h4>\n<p>CYFIRMA\u304c\u72ec\u81ea\u3067\u6bce\u9031\u767a\u884c\u3057\u3066\u3044\u308b\u300cWeekly Security Update\u300d\u306e\u30e1\u30fc\u30eb\u30de\u30ac\u30b8\u30f3\u3067\u3059\u3002<br \/>\n\u305d\u306e\u9031\u306b\u3042\u3063\u305f\u51fa\u6765\u4e8b\u3092\u30d4\u30c3\u30af\u30a2\u30c3\u30d7\u3057\u3001\u3055\u3089\u306b\u30b5\u30a4\u30d5\u30a1\u30fc\u30de\u306a\u3089\u3067\u306f\u306e\u60c5\u5831\u3082\u4ea4\u3048\u3066\u3054\u7d39\u4ecb\u3057\u3066\u3044\u307e\u3059\u3002<br \/>\n\u30cf\u30c3\u30ab\u30fc\u306e\u4f1a\u8a71\u3092\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0\u3057\u3066\u3044\u308b\u304b\u3089\u3053\u305d\u3001\u901a\u5e38\u3067\u306f\u5f97\u3089\u308c\u306a\u3044\u69d8\u306a\u60c5\u5831\u3082\u3044\u3061\u65e9\u304f\u624b\u306b\u5165\u308c\u308b\u4e8b\u304c\u3067\u304d\u307e\u3059\u306e\u3067\u3001<br \/>\n\u3054\u8208\u5473\u306e\u3042\u308b\u65b9\u306f\u4e0b\u8a18\u3088\u308a\u304a\u7533\u8fbc\u4e0b\u3055\u3044\u3002<br \/>\n\u203b\u540c\u696d\u4ed6\u793e\u306e\u65b9\u306f\u304a\u65ad\u308a\u3059\u308b\u5834\u5408\u304c\u3054\u3056\u3044\u307e\u3059\u3001\u3054\u4e86\u627f\u4e0b\u3055\u3044\u3002<\/p>\n<p><a href=\"https:\/\/www.cyfirma.com\/jp\/news\/weekly-security-updates\/\">\u30e1\u30eb\u30de\u30ac\u304a\u7533\u8fbc<\/a>\u3000\uff08\u30e1\u30eb\u30de\u30ac\u304a\u7533\u8fbc\u30da\u30fc\u30b8\u304c\u65b0\u3057\u304f\u306a\u308a\u307e\u3057\u305f\uff09<\/p>\n<h4><\/h4>\n<h4>\u2727\u6bce\u6708\u5b9a\u671f\u958b\u50ac\u300cCYFIRMA \u30a6\u30a7\u30d3\u30ca\u30fc\u300d<\/h4>\n<p>\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3068\u306f\u4f55\u304b\u3068\u3044\u3046\u521d\u6b69\u7684\u306a\u5185\u5bb9\u304b\u3089\u3001MITRE ATT&amp;CK\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306e\u6d3b\u7528\u65b9\u6cd5\u3001<br \/>\n\u6bce\u6708\u306e\u8105\u5a01\u30c8\u30ec\u30f3\u30c9\u5831\u544a\u306a\u3069\u306a\u3069\u3001\u65ec\u306a\u8a71\u984c\u3092\u53d6\u308a\u5165\u308c\u3001\u304b\u3064\u5f0a\u793e\u72ec\u81ea\u76ee\u7dda\u3082\u53d6\u308a\u5165\u308c\u305f\u5185\u5bb9\u3068\u306a\u3063\u3066\u304a\u308a\u3001<br \/>\n\u5f0a\u793e\u30b5\u30fc\u30d3\u30b9\u7d39\u4ecb\u3068\u3044\u3046\u3088\u308a\u3082\u3001\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u3069\u3046\u8003\u3048\u308b\u304b\u3001\u3069\u3046\u6d3b\u7528\u3059\u308b\u304b\u3068\u3044\u3046\u90e8\u5206\u3067<br \/>\n\u7686\u69d8\u306e\u30d2\u30f3\u30c8\u3068\u306a\u308b\u3088\u3046\u904b\u55b6\u3057\u3066\u304a\u308a\u307e\u3059\u3002\u662f\u975e\u304a\u6c17\u8efd\u306b\u3054\u53c2\u52a0\u4e0b\u3055\u3044\u307e\u305b\uff01\uff01\uff01<\/p>\n<p><a href=\"https:\/\/www.cyfirma.com\/jp\/eventslists\/webinar\/\">\u30a6\u30a7\u30d3\u30ca\u30fc\u8a73\u7d30\uff06\u304a\u7533\u8fbc<\/a>\u3000\uff08\u30a6\u30a7\u30d3\u30ca\u30fc\u8a73\u7d30\uff06\u304a\u7533\u8fbc\u30da\u30fc\u30b8\u304c\u65b0\u3057\u304f\u306a\u308a\u307e\u3057\u305f\uff09<\/p>\n<p>&nbsp;<\/p>\n<p>\u2727\u305d\u306e\u4ed6\u3001\u3054\u4e0d\u660e\u306a\u70b9\u304c\u3054\u3056\u3044\u307e\u3057\u305f\u3089<a href=\"https:\/\/www.cyfirma.com\/jp\/start-now\/\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089<\/a>\u304b\u3089\u3054\u9023\u7d61\u4e0b\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Capabilities and National Power -1- 2021\u5e746\u670828\u65e5\u306b\u30a4\u30ae\u30ea\u30b9\u306e\u6c11\u9593\u56fd\u969b\u7684\u6226\u7565\u7814\u7a76\u6a5f\u95a2\u3067\u3042\u308bIISS\uff08THE","protected":false},"author":14,"featured_media":5750,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[],"tags":[70,75,72,79,80,76,78,68,69],"class_list":["post-5722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-ioc","tag-75","tag-72","tag-79","tag-80","tag-76","tag-78","tag-68","tag-69"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Capabilities and National Power -1- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA<\/title>\n<meta name=\"description\" content=\"2021\u5e746\u670828\u65e5\u306b\u30a4\u30ae\u30ea\u30b9\u306e\u6c11\u9593\u56fd\u969b\u7684\u6226\u7565\u7814\u7a76\u6a5f\u95a2\u3067\u3042\u308bIISS\uff08THE INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES\uff09\u304b\u3089\u300cCyber Capabilities and National Power\u300d\u3068\u3044\u3046\u5404\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u80fd\u529b\u3068\u56fd\u529b\u306e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u304c\u516c\u8868\u3055\u308c\u307e\u3057\u305f\u3002\u4eca\u56de\u304b\u30892\u56de\u306b\u6e21\u3063\u3066\u3001\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306b\u3064\u3044\u3066\u898b\u3066\u3044\u304d\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u5916\u90e8\u6a5f\u95a2\u304c\u767a\u884c\u3059\u308b\u30ec\u30dd\u30fc\u30c8\u306f\u5916\u90e8\u60c5\u52e2\u3092\u628a\u63e1\u3059\u308b\u969b\u306b\u91cd\u8981\u306a\u3046\u3048\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306b\u898b\u3048\u3066\u3044\u308b\u304b\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306a\u72b6\u614b\u306b\u3042\u308b\u306e\u304b\u3092\u77e5\u308b\u3046\u3048\u3067\u3082\u5927\u3044\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Capabilities and National Power -1- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA\" \/>\n<meta property=\"og:description\" content=\"2021\u5e746\u670828\u65e5\u306b\u30a4\u30ae\u30ea\u30b9\u306e\u6c11\u9593\u56fd\u969b\u7684\u6226\u7565\u7814\u7a76\u6a5f\u95a2\u3067\u3042\u308bIISS\uff08THE INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES\uff09\u304b\u3089\u300cCyber Capabilities and National Power\u300d\u3068\u3044\u3046\u5404\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u80fd\u529b\u3068\u56fd\u529b\u306e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u304c\u516c\u8868\u3055\u308c\u307e\u3057\u305f\u3002\u4eca\u56de\u304b\u30892\u56de\u306b\u6e21\u3063\u3066\u3001\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306b\u3064\u3044\u3066\u898b\u3066\u3044\u304d\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u5916\u90e8\u6a5f\u95a2\u304c\u767a\u884c\u3059\u308b\u30ec\u30dd\u30fc\u30c8\u306f\u5916\u90e8\u60c5\u52e2\u3092\u628a\u63e1\u3059\u308b\u969b\u306b\u91cd\u8981\u306a\u3046\u3048\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306b\u898b\u3048\u3066\u3044\u308b\u304b\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306a\u72b6\u614b\u306b\u3042\u308b\u306e\u304b\u3092\u77e5\u308b\u3046\u3048\u3067\u3082\u5927\u3044\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/\" \/>\n<meta property=\"og:site_name\" content=\"CYFIRMA\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-29T06:58:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-07T06:20:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyfirma.com\/wp-content\/uploads\/2021\/07\/0729blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1350\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gourav Ghai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gourav Ghai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Capabilities and National Power -1- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","description":"2021\u5e746\u670828\u65e5\u306b\u30a4\u30ae\u30ea\u30b9\u306e\u6c11\u9593\u56fd\u969b\u7684\u6226\u7565\u7814\u7a76\u6a5f\u95a2\u3067\u3042\u308bIISS\uff08THE INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES\uff09\u304b\u3089\u300cCyber Capabilities and National Power\u300d\u3068\u3044\u3046\u5404\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u80fd\u529b\u3068\u56fd\u529b\u306e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u304c\u516c\u8868\u3055\u308c\u307e\u3057\u305f\u3002\u4eca\u56de\u304b\u30892\u56de\u306b\u6e21\u3063\u3066\u3001\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306b\u3064\u3044\u3066\u898b\u3066\u3044\u304d\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u5916\u90e8\u6a5f\u95a2\u304c\u767a\u884c\u3059\u308b\u30ec\u30dd\u30fc\u30c8\u306f\u5916\u90e8\u60c5\u52e2\u3092\u628a\u63e1\u3059\u308b\u969b\u306b\u91cd\u8981\u306a\u3046\u3048\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306b\u898b\u3048\u3066\u3044\u308b\u304b\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306a\u72b6\u614b\u306b\u3042\u308b\u306e\u304b\u3092\u77e5\u308b\u3046\u3048\u3067\u3082\u5927\u3044\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Capabilities and National Power -1- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","og_description":"2021\u5e746\u670828\u65e5\u306b\u30a4\u30ae\u30ea\u30b9\u306e\u6c11\u9593\u56fd\u969b\u7684\u6226\u7565\u7814\u7a76\u6a5f\u95a2\u3067\u3042\u308bIISS\uff08THE INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES\uff09\u304b\u3089\u300cCyber Capabilities and National Power\u300d\u3068\u3044\u3046\u5404\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u80fd\u529b\u3068\u56fd\u529b\u306e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u304c\u516c\u8868\u3055\u308c\u307e\u3057\u305f\u3002\u4eca\u56de\u304b\u30892\u56de\u306b\u6e21\u3063\u3066\u3001\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306b\u3064\u3044\u3066\u898b\u3066\u3044\u304d\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u5916\u90e8\u6a5f\u95a2\u304c\u767a\u884c\u3059\u308b\u30ec\u30dd\u30fc\u30c8\u306f\u5916\u90e8\u60c5\u52e2\u3092\u628a\u63e1\u3059\u308b\u969b\u306b\u91cd\u8981\u306a\u3046\u3048\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306b\u898b\u3048\u3066\u3044\u308b\u304b\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306a\u72b6\u614b\u306b\u3042\u308b\u306e\u304b\u3092\u77e5\u308b\u3046\u3048\u3067\u3082\u5927\u3044\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002","og_url":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/","og_site_name":"CYFIRMA","article_published_time":"2021-07-29T06:58:29+00:00","article_modified_time":"2023-06-07T06:20:03+00:00","og_image":[{"width":1350,"height":650,"url":"https:\/\/www.cyfirma.com\/wp-content\/uploads\/2021\/07\/0729blog.png","type":"image\/png"}],"author":"Gourav Ghai","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gourav Ghai","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/","url":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/","name":"Cyber Capabilities and National Power -1- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","isPartOf":{"@id":"https:\/\/www.cyfirma.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/#primaryimage"},"image":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/#primaryimage"},"thumbnailUrl":"https:\/\/beta06.cyfirma.com\/media\/2021\/07\/0729blog.png","datePublished":"2021-07-29T06:58:29+00:00","dateModified":"2023-06-07T06:20:03+00:00","author":{"@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/39999b97a81a9c711e1c02fc4055819e"},"description":"2021\u5e746\u670828\u65e5\u306b\u30a4\u30ae\u30ea\u30b9\u306e\u6c11\u9593\u56fd\u969b\u7684\u6226\u7565\u7814\u7a76\u6a5f\u95a2\u3067\u3042\u308bIISS\uff08THE INTERNATIONAL INSTITUTE FOR STRATEGIC STUDIES\uff09\u304b\u3089\u300cCyber Capabilities and National Power\u300d\u3068\u3044\u3046\u5404\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u80fd\u529b\u3068\u56fd\u529b\u306e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u304c\u516c\u8868\u3055\u308c\u307e\u3057\u305f\u3002\u4eca\u56de\u304b\u30892\u56de\u306b\u6e21\u3063\u3066\u3001\u3053\u306e\u30ec\u30dd\u30fc\u30c8\u306b\u3064\u3044\u3066\u898b\u3066\u3044\u304d\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u5916\u90e8\u6a5f\u95a2\u304c\u767a\u884c\u3059\u308b\u30ec\u30dd\u30fc\u30c8\u306f\u5916\u90e8\u60c5\u52e2\u3092\u628a\u63e1\u3059\u308b\u969b\u306b\u91cd\u8981\u306a\u3046\u3048\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306b\u898b\u3048\u3066\u3044\u308b\u304b\u3001\u81ea\u56fd\u304c\u3069\u306e\u3088\u3046\u306a\u72b6\u614b\u306b\u3042\u308b\u306e\u304b\u3092\u77e5\u308b\u3046\u3048\u3067\u3082\u5927\u3044\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/#breadcrumb"},"inLanguage":"jp","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/"]}]},{"@type":"ImageObject","inLanguage":"jp","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/#primaryimage","url":"https:\/\/beta06.cyfirma.com\/media\/2021\/07\/0729blog.png","contentUrl":"https:\/\/beta06.cyfirma.com\/media\/2021\/07\/0729blog.png","width":1350,"height":650},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power_first\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyfirma.com\/jp\/"},{"@type":"ListItem","position":2,"name":"Cyber Capabilities and National Power -1- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09"}]},{"@type":"WebSite","@id":"https:\/\/www.cyfirma.com\/#website","url":"https:\/\/www.cyfirma.com\/","name":"CYFIRMA","description":"A threat discovery and cyber-intelligence platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyfirma.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"jp"},{"@type":"Person","@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/39999b97a81a9c711e1c02fc4055819e","name":"Gourav Ghai","image":{"@type":"ImageObject","inLanguage":"jp","@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85928dc1eb2b4f25f8806126ab6bca344f769f648c3655556ab9770d1f119e4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85928dc1eb2b4f25f8806126ab6bca344f769f648c3655556ab9770d1f119e4e?s=96&d=mm&r=g","caption":"Gourav Ghai"},"url":"https:\/\/beta06.cyfirma.com\/jp\/author\/gourav\/"}]}},"_links":{"self":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/5722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/comments?post=5722"}],"version-history":[{"count":47,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/5722\/revisions"}],"predecessor-version":[{"id":6326,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/5722\/revisions\/6326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/media\/5750"}],"wp:attachment":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/media?parent=5722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/categories?post=5722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/tags?post=5722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}