{"id":6111,"date":"2021-08-26T05:28:55","date_gmt":"2021-08-26T05:28:55","guid":{"rendered":"https:\/\/www.cyfirma.com\/?p=6111"},"modified":"2023-06-07T06:19:58","modified_gmt":"2023-06-07T06:19:58","slug":"cyber-capabilities-and-national-power-3","status":"publish","type":"post","link":"https:\/\/beta06.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/","title":{"rendered":"Cyber Capabilities and National Power -3- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09"},"content":{"rendered":"<h4 style=\"border-width: 0px 0px 0px 7px; border-color: #99CCFF; border-style: solid; padding: 15px 10px; margin: 0px 0px 10px 0px; background: #F5F5F5;\">Cyber Capabilities and National Power -3-<\/h4>\n<p>\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u4e09\u5f3e\u3067\u3059\u3002<\/p>\n<p><span class=\"TextRun SCXW34334388 BCX0\" lang=\"JA-JP\" xml:lang=\"JA-JP\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34334388 BCX0\">#<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u3061\u306a\u307f\u306b\u3001\u5f0a\u793e<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u5185\u306e\u4e00\u90e8<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u3067\u306f<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u672c\u30ec\u30dd\u30fc\u30c8\u3092<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u300c\u3044\u304e\u308a\u3059\u306e\u3084\u3064\u300d\u3068\u547c\u79f0\u3057\u3066\u304a\u308a\u3001<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u539f\u984c\u3092\u5fd8\u308c\u304c\u3061\u3067\u3059\u3002\u3002\u3002<\/span><\/span><span class=\"EOP SCXW34334388 BCX0\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>\u4eca\u56de\u306f\u3001\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002<\/p>\n<p>\u25c6Governance, command and control \uff1c\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u6307\u63ee\u7d71\u5236\uff1e<\/p>\n<p>\u25c6Core cyber-intelligence capability \uff1c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\uff1e<\/p>\n<p>\u25c6Cyber empowerment and dependence \uff1c\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u3068\u4f9d\u5b58\uff1e<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u25c6<\/strong>Governance, command and control \uff1c\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u6307\u63ee\u7d71\u5236\uff1e<\/p>\n<p>\u3053\u306e\u7ae0\u3067\u306f\u3001\u30ac\u30d0\u30ca\u30f3\u30b9\u3068\u6307\u63ee\u7d71\u5236\u306b\u95a2\u308f\u308b\u6587\u66f8\u3068\u7d44\u7e54\u306b\u3064\u3044\u3066\u8ff0\u3079\u3089\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>2015\u5e74\u306b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u672c\u6cd5\u304c\u65bd\u884c\u3055\u308c\u305f\u3053\u3068\u3001\u305d\u308c\u306b\u4f34\u3063\u3066\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u672c\u90e8\u3084NISC\uff08\u5185\u95a3\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30f3\u30bf\u30fc\uff09\u304c\u767a\u8db3\u3057\u305f\u3053\u3068\u3001\u307e\u305f\u30012018\u5e74\u306e\u6539\u6b63\u306b\u4f34\u3063\u3066\u3001\u653f\u5e9c\u3001\u6c11\u9593\u90e8\u9580\u3001\u5b66\u4f1a\u5168\u4f53\u3067\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u60c5\u5831\u3092\u4ea4\u63db\u3001\u5354\u529b\u3059\u308b\u305f\u3081\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5354\u8b70\u4f1a\u304c\u8a2d\u7acb\u3055\u308c\u305f\u3053\u3068\u306b\u8a00\u53ca\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u305d\u306e\u307b\u304b\u30012014\u5e74\u306b\u8a2d\u7acb\u3055\u308c\u305f\u81ea\u885b\u968a\u306b\u304a\u3051\u308b\u30b5\u30a4\u30d0\u30fc\u9632\u885b\u968a\u304c\u3001\u6642\u3092\u7d4c\u3066\u4eba\u54e1\u3092\u62e1\u5927\u3057\u3066\u3044\u308b\u70b9\u306b\u3082\u8a00\u53ca\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u56fd\u306e\u65bd\u7b56\u3068\u3057\u3066\u3001\u524d\u306e\u7ae0\u306e\uff1c\u6226\u7565\u3068\u57fa\u672c\u539f\u5247\uff1e\u3067\u8a00\u53ca\u3055\u308c\u3066\u3044\u305f\u6587\u66f8\u306b\u57fa\u3065\u3044\u3066\u3001\u6cd5\u6574\u5099\u3001\u7d44\u7e54\u4f53\u5236\u306b\u3064\u3044\u3066\u3082\u7740\u3005\u3068\u6574\u5099\u3001\u62e1\u5145\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u304c\u4f3a\u3048\u307e\u3059\u3002<\/p>\n<p>\u25c6Core cyber-intelligence capability \uff1c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\uff1e<\/p>\n<p>\u3053\u306e\u7ae0\u3067\u306f\u3001\u65e5\u672c\u56fa\u6709\u3068\u3082\u8a00\u3048\u308b\u554f\u984c\u306b\u3064\u3044\u3066\u8a00\u53ca\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">For a variety of political reasons, including the constitutional arrangements put in place after the Second World War, Japan\u2019s intelligence organisations are small and underfunded in comparison to those of other states of similar size. For example, Article 21 of Japan\u2019s constitution severely limits the extent to which the government can collect signals intelligence and consequently conduct cyber reconnaissance.<\/span><\/div>\n<p style=\"text-align: left; padding-left: 40px;\">\u6284\u8a33\u300c\u7b2c\u4e8c\u6b21\u4e16\u754c\u5927\u6226\u5f8c\u306b\u65bd\u884c\u3055\u308c\u305f\u61b2\u6cd5\u4e0a\u306e\u53d6\u308a\u6c7a\u3081\u3092\u542b\u3080\u3055\u307e\u3056\u307e\u306a\u653f\u6cbb\u7684\u7406\u7531\u306b\u3088\u308a\u3001\u65e5\u672c\u306e\u8adc\u5831\u6a5f\u95a2\u306f\u4ed6\u306e\u540c\u69d8\u306e\u898f\u6a21\u306e\u56fd\u306b\u6bd4\u3079\u3066\u5c0f\u898f\u6a21\u3067\u8cc7\u91d1\u304c\u4e0d\u8db3\u3057\u3066\u3044\u307e\u3059\u3002\u305f\u3068\u3048\u3070\u3001\u65e5\u672c\u56fd\u61b2\u6cd5\u7b2c21\u6761 \u306f\u3001\u653f\u5e9c\u304csignals intelligence\u3092\u53ce\u96c6\u3057\u3001\u305d\u306e\u7d50\u679c\u30b5\u30a4\u30d0\u30fc\u5075\u5bdf\u3092\u5b9f\u65bd\u3067\u304d\u308b\u7bc4\u56f2\u3092\u53b3\u3057\u304f\u5236\u9650\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p>\u6240\u8b02\u3001\u901a\u4fe1\u306e\u79d8\u5bc6\u554f\u984c\u3067\u3059\u306d\u3002<\/p>\n<p style=\"padding-left: 40px;\">\u300c\u65e5\u672c\u56fd\u61b2\u6cd5\u7b2c21\u6761\u2461\u3000\u691c\u95b2\u306f\u3001\u3053\u308c\u3092\u3057\u3066\u306f\u306a\u3089\u306a\u3044\u3002\u901a\u4fe1\u306e\u79d8\u5bc6\u306f\u3001\u3053\u308c\u3092\u4fb5\u3057\u3066\u306f\u306a\u3089\u306a\u3044\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Overall, Japan\u2019s indigenous cyber-intelligence capabilities are embryonic, with the country largely reliant on key international partners, especially the US, for its cyber situational awareness and its development of intelligence capabilities.<\/span><\/div>\n<p style=\"padding-left: 40px;\">\u6284\u8a33:\u300c\u5168\u4f53\u3068\u3057\u3066\u3001\u65e5\u672c\u306e\u56fa\u6709\u306e\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\u306f\u521d\u671f\u6bb5\u968e\u306b\u3042\u308a\u3001\u30b5\u30a4\u30d0\u30fc\u60c5\u52e2\u8a8d\u8b58\u3068\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\u306e\u958b\u767a\u306b\u3064\u3044\u3066\u306f\u3001\u4e3b\u8981\u306a\u56fd\u969b\u7684\u30d1\u30fc\u30c8\u30ca\u30fc\u3001\u7279\u306b\u7c73\u56fd\u306b\u5927\u304d\u304f\u4f9d\u5b58\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p>\u56fd\u3068\u3057\u3066\u306e\u69d8\u3005\u306a\u7406\u7531\u306b\u3088\u308a\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u80fd\u529b\u306f\u4f4e\u304f\u3001\u7c73\u56fd\u3078\u306e\u4f9d\u5b58\u5ea6\u304c\u9ad8\u3044\u3002\u3068\u3044\u3046\u7d50\u8ad6\u3067\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u6587\u66f8\u3001\u7d44\u7e54\u6574\u5099\u306f\u3067\u304d\u308b\u3068\u3053\u308d\u304b\u3089\u5730\u9053\u306b\u5b9f\u884c\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u3084\u306f\u308a\u6700\u5f8c\u306e\u90e8\u5206\u3067\u306f\u30a2\u30e1\u30ea\u30ab\u306b\u983c\u3089\u3056\u308b\u3092\u5f97\u306a\u3044\u306e\u304c\u73fe\u72b6\u3068\u3044\u3046\u3068\u3053\u308d\u3067\u3057\u3087\u3046\u304b\u3002<\/p>\n<p>\u25c6Cyber empowerment and dependence \uff1c\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u3068\u4f9d\u5b58\uff1e<\/p>\n<p>\u7d9a\u3044\u3066\u3001\u30b5\u30a4\u30d0\u30fc\u3068\u3044\u3044\u307e\u3059\u304bIT\u306e\u6d3b\u7528\u72b6\u6cc1\u3068\u3044\u3046\u65b9\u304c\u8fd1\u3044\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u304c\u3001\u6c11\u9593\u3092\u542b\u3081\u305f\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u72b6\u6cc1\u306b\u3064\u3044\u3066\u8a00\u53ca\u3055\u308c\u3066\u3044\u308b\u7ae0\u3067\u3059\u3002<\/p>\n<p>\u3053\u306e\u7ae0\u3067\u306f\u3001\u307e\u305a\u3001\u56fd\u969b\u901a\u8ca8\u57fa\u91d1\u306e2019\u5e74\u306e\u8abf\u67fb\u7d50\u679c\u3068\u3057\u3066\u56fd\u306e\u30c7\u30b8\u30bf\u30eb\u7d4c\u6e08\u304cGDP\u306e49\uff05\u3092\u5360\u3081\u3066\u3044\u308b\u70b9\uff08\u30a2\u30e1\u30ea\u30ab60%\u3001\u4e2d\u56fd30%\uff09\u3068\u30012020\u5e74\u306eFortune\u300c\u30b0\u30ed\u30fc\u30d0\u30eb500\u300d\u306b\u4e0a\u304c\u3063\u3066\u3044\u308b\u901a\u4fe1\u307e\u305f\u306f\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u4f01\u696d51\u793e\u306e\u3046\u3061\u3001\u30a2\u30e1\u30ea\u30ab\u306e\u4f01\u696d\u304c16\u793e\u3067\u3001\u65e5\u672c\u306e\u4f01\u696d\u304c10\u793e\u30672\u4f4d\u3092\u5360\u3081\u3066\u3044\u308b\u70b9\u304c\u5831\u544a\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u7d9a\u3044\u3066\u3001\u7523\u696d\u7528\u30ed\u30dc\u30c3\u30c8\u3084\u534a\u5c0e\u4f53\u306e\u512a\u4f4d\u6027\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u74b0\u5883\u304c\u56fd\u7523\u4f01\u696d\u306b\u3088\u3063\u3066\u4fdd\u305f\u308c\u3066\u3044\u308b\u70b9\u306a\u3069\u304c\u8a00\u53ca\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u826f\u3044\u70b9\u3070\u304b\u308a\u306e\u3088\u3046\u3067\u3059\u304c\u3001\u6b8b\u5ff5\u306a\u304c\u3089\u3053\u306e\u5f8c\u306f\u76ae\u8089\u4ea4\u3058\u308a\u306e\u8a00\u53ca\u304c\u7d9a\u304d\u307e\u3059\u3002<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">Japan is currently lagging behind many other members of the Organisation for Economic Co-operation and Development (OECD) in terms of technological productivity, with an OECD survey suggesting the country needs greater investment in skills and digital competence \u2013 &#8216;particularly for middle-aged and older workers&#8217; \u2013 in order to close the gap.<\/span><\/div>\n<p style=\"padding-left: 40px;\">\u6284\u8a33:\u300c\u65e5\u672c\u306f\u73fe\u5728\u3001\u7d4c\u6e08\u5354\u529b\u958b\u767a\u6a5f\u69cb\uff08OECD\uff09\u306e\u4ed6\u306e\u591a\u304f\u306e\u30e1\u30f3\u30d0\u30fc\u306b\u6280\u8853\u7684\u751f\u7523\u6027\u306e\u70b9\u3067\u9045\u308c\u3092\u3068\u3063\u3066\u304a\u308a\u3001OECD\u306e\u8abf\u67fb\u306b\u3088\u308b\u3068\u3001\u65e5\u672c\u306f\u30b9\u30ad\u30eb\u3068\u30c7\u30b8\u30bf\u30eb\u80fd\u529b\u306e\u30ae\u30e3\u30c3\u30d7\u3092\u57cb\u3081\u308b\u305f\u3081\u306b\uff08\u7279\u306b\u4e2d\u9ad8\u5e74\u306e\u52b4\u50cd\u8005\u306e\u305f\u3081\u306b\uff09\u3088\u308a\u5927\u304d\u306a\u6295\u8cc7\u304c\u5fc5\u8981\u3067\u3042\u308b\u3053\u3068\u304c\u793a\u5506\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">There is widespread concern about the digital divide between the younger and older generations \u2013 a situation illustrated in particularly embarrassing fashion for the government in 2018, when the minister responsible for cyber security was forced to admit he had never used a computer.<\/span><\/div>\n<p style=\"padding-left: 40px;\">\u6284\u8a33:\u300c\u82e5\u3044\u4e16\u4ee3\u3068\u53e4\u3044\u4e16\u4ee3\u306e\u9593\u306e\u30c7\u30b8\u30bf\u30eb\u30c7\u30d0\u30a4\u30c9\u306b\u3064\u3044\u3066\u306f\u5e45\u5e83\u3044\u61f8\u5ff5\u304c\u3042\u308a\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u62c5\u5f53\u3059\u308b\u5927\u81e3\u304c\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u3092\u4f7f\u7528\u3057\u305f\u3053\u3068\u304c\u306a\u3044\u3053\u3068\u3092\u8a8d\u3081\u3056\u308b\u3092\u5f97\u306a\u304b\u3063\u305f2018\u5e74\u3001\u653f\u5e9c\u306b\u3068\u3063\u3066\u7279\u306b\u6065\u305a\u304b\u3057\u3044\u72b6\u6cc1\u304c\u793a\u3055\u308c\u307e\u3057\u305f\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">In the field of AI, Japan is competitive. It was placed ninth, for example, in a study that ranked the top 50 countries based on their contributions to the two most prestigious AI conferences in 2020. Japanese companies are very active in AI research, with nine of them featuring in a list of the world\u2019s leading 100 companies in that regard, compared with six from South Korea and none from India. Nevertheless, the aggregate contribution that Japan\u2019s industrial sector makes to AI research still falls behind that of South Korea.<\/span><\/div>\n<p style=\"padding-left: 40px;\">\u6284\u8a33:\u300cAI\u306e\u5206\u91ce\u3067\u306f\u3001\u65e5\u672c\u306f\u7af6\u4e89\u529b\u304c\u3042\u308a\u307e\u3059\u3002\u305f\u3068\u3048\u3070\u30012020\u5e74\u306b\u6700\u3082\u6a29\u5a01\u306e\u3042\u308b2\u3064\u306eAI\u4f1a\u8b70\u3078\u306e\u8ca2\u732e\u5ea6\u306b\u57fa\u3065\u3044\u3066\u4e0a\u4f4d50\u304b\u56fd\u3092\u30e9\u30f3\u30af\u4ed8\u3051\u3057\u305f\u8abf\u67fb\u3067\u306f9\u4f4d\u306b\u306a\u308a\u307e\u3057\u305f\u3002\u65e5\u672c\u4f01\u696d\u306fAI\u7814\u7a76\u306b\u975e\u5e38\u306b\u7a4d\u6975\u7684\u3067\u3042\u308a\u3001\u305d\u306e\u3046\u30619\u793e\u304c\u4e16\u754c\u3092\u30ea\u30fc\u30c9\u3059\u308b100\u793e\u306e\u30ea\u30b9\u30c8\u306b\u63b2\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u304c\u3001\u97d3\u56fd\u306f6\u793e\u3001\u30a4\u30f3\u30c9\u306f1\u793e\u3082\u3042\u308a\u307e\u305b\u3093\u3002\u305d\u308c\u306b\u3082\u304b\u304b\u308f\u3089\u305a\u3001\u65e5\u672c\u306e\u7523\u696d\u90e8\u9580\u304cAI\u7814\u7a76\u306b\u4e0e\u3048\u308b\u7dcf\u8ca2\u732e\u306f\u3001\u4f9d\u7136\u3068\u3057\u3066\u97d3\u56fd\u306e\u8ca2\u732e\u306b\u9045\u308c\u3092\u3068\u3063\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p>\u4e2d\u9ad8\u5e74\u306e\u30c7\u30b8\u30bf\u30eb\u30b9\u30ad\u30eb\u306e\u554f\u984c\u306f\u3001\u3053\u3068IT\u696d\u754c\u5185\u3067\u8a00\u3048\u3070\u3001\u9ece\u660e\u671f\u304b\u3089\u696d\u754c\u3092\u652f\u3048\u3066\u3044\u308b\u4e2d\u9ad8\u5e74\u306e\u65b9\u304c\u30b9\u30ad\u30eb\u304c\u9ad8\u304f\u3001\u82e5\u5e74\u5c64\u306e\u65b9\u304c\u3080\u3057\u308d\u30b9\u30ad\u30eb\u304c\u4f4e\u3044\u3002\u3068\u3044\u3046\u610f\u898b\u3082\u3042\u308a\u307e\u3059\u304c\u3001\u3084\u306f\u308a\u5e83\u304f\u4e00\u822c\u793e\u4f1a\u3092\u898b\u308b\u3068\u3001\u6307\u6458\u306f\u3082\u3063\u3068\u3082\u304b\u306a\u3068\u601d\u3048\u307e\u3059\u3002<br \/>\n2018\u5e74\u306e\u4ef6\u306f\u6562\u3048\u3066\u89e6\u308c\u305f\u304f\u306a\u3044\u3053\u3068\u3067\u3059\u306e\u3067\u5272\u611b\u3057\u3001AI\u306e\u5206\u91ce\u3067\u306e\u7523\u696d\u90e8\u9580\u3067\u306e\u8ca2\u732e\u306e\u4f4e\u3055\u306b\u3064\u3044\u3066\u306f\u3001AI\u306b\u95a2\u308f\u3089\u305a\u3069\u306e\u5206\u91ce\u3067\u3082\u65b0\u3057\u3044\u9818\u57df\u3067\u306f\u65e5\u672c\u3067\u3088\u304f\u8d77\u3053\u308b\u4e8b\u8c61\u306e\u3088\u3046\u306b\u601d\u3048\u307e\u3059\u3002<\/p>\n<p>\u3044\u304b\u304c\u3067\u3057\u3087\u3046\u3002\u56fd\u306e\u6587\u66f8\u3084\u7d44\u7e54\u6574\u5099\u306b\u3064\u3044\u3066\u306f\u30b9\u30d4\u30fc\u30c9\u611f\u306f\u5225\u3068\u3057\u3066\u7740\u3005\u3068\u9032\u3093\u3067\u3044\u308b\u3068\u8aad\u307f\u53d6\u308c\u307e\u3059\u3002\u3057\u304b\u3057\u3001\u6c11\u9593\u4f01\u696d\u3084IT\u6d3b\u7528\u306b\u3064\u3044\u3066\u306e\u8a00\u53ca\u306f\u8033\u304c\u75db\u3044\u6307\u6458\u3067\u306f\u306a\u3044\u3067\u3057\u3087\u3046\u304b\u3002\u53ce\u96c6\u3001\u5206\u6790\u3057\u305f\u60c5\u5831\u306b\u5bfe\u3057\u3066\u82e5\u5e72\u306e\u30b9\u30d1\u30a4\u30b9\u3092\u3044\u308c\u3066\u5831\u544a\u3057\u3066\u3044\u308bIISS\u3068\u3044\u3046\u30a4\u30ae\u30ea\u30b9\u306e\u8abf\u67fb\u6a5f\u95a2\u306e\u8abf\u67fb\u80fd\u529b\u3068\u3068\u3082\u306b\u3001\u30ec\u30dd\u30fc\u30c8\u304c\u8aad\u307f\u624b\u3092\u610f\u8b58\u3057\u3066\u8a18\u8f09\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u3082\u4f1d\u308f\u3063\u3066\u304d\u307e\u3059\u3002\u672c\u30d6\u30ed\u30b0\u3067\u306f\u4e00\u90e8\u3092\u5207\u308a\u53d6\u3063\u3066\u306e\u3054\u7d39\u4ecb\u306b\u7559\u307e\u3063\u3066\u3044\u307e\u3059\u306e\u3067\u3001\u3054\u8208\u5473\u306e\u3042\u308b\u65b9\u306f\u539f\u6587\u3092\u4e00\u8aad\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u9577\u304f\u306a\u308a\u307e\u3057\u305f\u306e\u3067\u3001\u4eca\u56de\u306f\u3053\u3053\u307e\u3067\u3002<br \/>\n\u6b21\u56de\u3001\u672c\u30b7\u30ea\u30fc\u30ba\u306e\u5b8c\u7d50\u7de8\u3068\u3057\u3066\u4ee5\u4e0b\u306e\u7ae0\u306b\u3064\u3044\u3066\u8a73\u7d30\u306b\u898b\u3066\u3044\u304d\u307e\u3059\u3002\u304a\u697d\u3057\u307f\u306b\uff01<\/p>\n<p>\u25c6Cyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e<\/p>\n<p>\u25c6Global leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e<\/p>\n<p>\u25c6Offensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e<\/p>\n<p>&nbsp;<\/p>\n<p>\u25c6\u53c2\u8003\u6587\u732e<\/p>\n<p>Cyber Capabilities and National Power\uff08IISS\uff09\uff1a<\/p>\n<p><a href=\"https:\/\/www.iiss.org\/blogs\/research-paper\/2021\/06\/cyber-capabilities-national-power\">https:\/\/www.iiss.org\/blogs\/research-paper\/2021\/06\/cyber-capabilities-national-power<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>CYFIRMA\u3067\u306f\u7d44\u7e54\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u304b\u3089\u6226\u8853\u9762\u307e\u3067\u6d3b\u7528\u3067\u304d\u308b\u3001\u5305\u62ec\u7684\u306a\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u3054\u8208\u5473\u306e\u3042\u308b\u65b9\u306f\u3001\u3069\u3046\u305e\u304a\u6c17\u8efd\u306b\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/p>\n<h4 style=\"border-width: 0px 0px 0px 7px; border-color: #99CCFF; border-style: solid; padding: 15px 10px; margin: 0px 0px 10px 0px; background: #F5F5F5;\"><strong><span style=\"color: #000000;\"><span style=\"font-family: Georgia,serif;\">CYFIRMA\u3067\u306f\u8272\u3005\u306a\u8996\u70b9\u304b\u3089\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u7406\u89e3\u3057\u3066\u9802\u3051\u308b\u69d8\u3001\u5404\u7a2e\u7121\u6599\u306e\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u3054\u7528\u610f\u3057\u3066\u3044\u307e\u3059\uff01<\/span><\/span><\/strong><\/h4>\n<h4><\/h4>\n<h4>\u2727\u6bce\u9031\u706b\u66dc\u65e5\u306b\u767a\u884c\u300cWeekly Security Update\u300d<\/h4>\n<p>CYFIRMA\u304c\u72ec\u81ea\u3067\u6bce\u9031\u767a\u884c\u3057\u3066\u3044\u308b\u300cWeekly Security Update\u300d\u306e\u30e1\u30fc\u30eb\u30de\u30ac\u30b8\u30f3\u3067\u3059\u3002<br \/>\n\u305d\u306e\u9031\u306b\u3042\u3063\u305f\u51fa\u6765\u4e8b\u3092\u30d4\u30c3\u30af\u30a2\u30c3\u30d7\u3057\u3001\u3055\u3089\u306b\u30b5\u30a4\u30d5\u30a1\u30fc\u30de\u306a\u3089\u3067\u306f\u306e\u60c5\u5831\u3082\u4ea4\u3048\u3066\u3054\u7d39\u4ecb\u3057\u3066\u3044\u307e\u3059\u3002<br \/>\n\u30cf\u30c3\u30ab\u30fc\u306e\u4f1a\u8a71\u3092\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0\u3057\u3066\u3044\u308b\u304b\u3089\u3053\u305d\u3001\u901a\u5e38\u3067\u306f\u5f97\u3089\u308c\u306a\u3044\u69d8\u306a\u60c5\u5831\u3082\u3044\u3061\u65e9\u304f\u624b\u306b\u5165\u308c\u308b\u4e8b\u304c\u3067\u304d\u307e\u3059\u306e\u3067\u3001<br \/>\n\u3054\u8208\u5473\u306e\u3042\u308b\u65b9\u306f\u4e0b\u8a18\u3088\u308a\u304a\u7533\u8fbc\u4e0b\u3055\u3044\u3002<br \/>\n\u203b\u540c\u696d\u4ed6\u793e\u306e\u65b9\u306f\u304a\u65ad\u308a\u3059\u308b\u5834\u5408\u304c\u3054\u3056\u3044\u307e\u3059\u3001\u3054\u4e86\u627f\u4e0b\u3055\u3044\u3002<\/p>\n<p><a href=\"https:\/\/www.cyfirma.com\/jp\/news\/weekly-security-updates\/\">\u30e1\u30eb\u30de\u30ac\u304a\u7533\u8fbc<\/a>\u3000\uff08\u30e1\u30eb\u30de\u30ac\u304a\u7533\u8fbc\u30da\u30fc\u30b8\u304c\u65b0\u3057\u304f\u306a\u308a\u307e\u3057\u305f\uff09<\/p>\n<h4><\/h4>\n<h4>\u2727\u6bce\u6708\u5b9a\u671f\u958b\u50ac\u300cCYFIRMA \u30a6\u30a7\u30d3\u30ca\u30fc\u300d<\/h4>\n<p>\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3068\u306f\u4f55\u304b\u3068\u3044\u3046\u521d\u6b69\u7684\u306a\u5185\u5bb9\u304b\u3089\u3001MITRE ATT&amp;CK\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306e\u6d3b\u7528\u65b9\u6cd5\u3001<br \/>\n\u6bce\u6708\u306e\u8105\u5a01\u30c8\u30ec\u30f3\u30c9\u5831\u544a\u306a\u3069\u306a\u3069\u3001\u65ec\u306a\u8a71\u984c\u3092\u53d6\u308a\u5165\u308c\u3001\u304b\u3064\u5f0a\u793e\u72ec\u81ea\u76ee\u7dda\u3082\u53d6\u308a\u5165\u308c\u305f\u5185\u5bb9\u3068\u306a\u3063\u3066\u304a\u308a\u3001<br \/>\n\u5f0a\u793e\u30b5\u30fc\u30d3\u30b9\u7d39\u4ecb\u3068\u3044\u3046\u3088\u308a\u3082\u3001\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u3069\u3046\u8003\u3048\u308b\u304b\u3001\u3069\u3046\u6d3b\u7528\u3059\u308b\u304b\u3068\u3044\u3046\u90e8\u5206\u3067<br \/>\n\u7686\u69d8\u306e\u30d2\u30f3\u30c8\u3068\u306a\u308b\u3088\u3046\u904b\u55b6\u3057\u3066\u304a\u308a\u307e\u3059\u3002\u662f\u975e\u304a\u6c17\u8efd\u306b\u3054\u53c2\u52a0\u4e0b\u3055\u3044\u307e\u305b\uff01\uff01\uff01<\/p>\n<p><a href=\"https:\/\/www.cyfirma.com\/jp\/eventslists\/webinar\/\">\u30a6\u30a7\u30d3\u30ca\u30fc\u8a73\u7d30\uff06\u304a\u7533\u8fbc<\/a>\u3000\uff08\u30a6\u30a7\u30d3\u30ca\u30fc\u8a73\u7d30\uff06\u304a\u7533\u8fbc\u30da\u30fc\u30b8\u304c\u65b0\u3057\u304f\u306a\u308a\u307e\u3057\u305f\uff09<\/p>\n<p>&nbsp;<\/p>\n<p>\u2727\u305d\u306e\u4ed6\u3001\u3054\u4e0d\u660e\u306a\u70b9\u304c\u3054\u3056\u3044\u307e\u3057\u305f\u3089<a href=\"https:\/\/www.cyfirma.com\/jp\/start-now\/\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089<\/a>\u304b\u3089\u3054\u9023\u7d61\u4e0b\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Capabilities and National Power -3- \u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u4e09\u5f3e\u3067\u3059\u3002","protected":false},"author":14,"featured_media":6117,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[],"tags":[70,83,84,75,82,72,79,80,76,78,68,69],"class_list":["post-6111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-ioc","tag-83","tag-84","tag-75","tag-82","tag-72","tag-79","tag-80","tag-76","tag-78","tag-68","tag-69"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Capabilities and National Power -3- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA<\/title>\n<meta name=\"description\" content=\"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u4e09\u5f3e\u3067\u3059\u3002\u4eca\u56de\u306f\u3001\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002Governance, command and control \uff1c\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u6307\u63ee\u7d71\u5236\uff1eCore cyber-intelligence capability \uff1c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\uff1eCyber empowerment and dependence \uff1c\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u3068\u4f9d\u5b58\uff1e\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Capabilities and National Power -3- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA\" \/>\n<meta property=\"og:description\" content=\"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u4e09\u5f3e\u3067\u3059\u3002\u4eca\u56de\u306f\u3001\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002Governance, command and control \uff1c\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u6307\u63ee\u7d71\u5236\uff1eCore cyber-intelligence capability \uff1c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\uff1eCyber empowerment and dependence \uff1c\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u3068\u4f9d\u5b58\uff1e\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/\" \/>\n<meta property=\"og:site_name\" content=\"CYFIRMA\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-26T05:28:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-07T06:19:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyfirma.com\/wp-content\/uploads\/2021\/08\/blog0826.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1350\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gourav Ghai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gourav Ghai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Capabilities and National Power -3- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","description":"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u4e09\u5f3e\u3067\u3059\u3002\u4eca\u56de\u306f\u3001\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002Governance, command and control \uff1c\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u6307\u63ee\u7d71\u5236\uff1eCore cyber-intelligence capability \uff1c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\uff1eCyber empowerment and dependence \uff1c\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u3068\u4f9d\u5b58\uff1e","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Capabilities and National Power -3- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","og_description":"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u4e09\u5f3e\u3067\u3059\u3002\u4eca\u56de\u306f\u3001\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002Governance, command and control \uff1c\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u6307\u63ee\u7d71\u5236\uff1eCore cyber-intelligence capability \uff1c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\uff1eCyber empowerment and dependence \uff1c\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u3068\u4f9d\u5b58\uff1e","og_url":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/","og_site_name":"CYFIRMA","article_published_time":"2021-08-26T05:28:55+00:00","article_modified_time":"2023-06-07T06:19:58+00:00","og_image":[{"width":1350,"height":600,"url":"https:\/\/www.cyfirma.com\/wp-content\/uploads\/2021\/08\/blog0826.png","type":"image\/png"}],"author":"Gourav Ghai","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gourav Ghai","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/","url":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/","name":"Cyber Capabilities and National Power -3- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","isPartOf":{"@id":"https:\/\/www.cyfirma.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/#primaryimage"},"image":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/#primaryimage"},"thumbnailUrl":"https:\/\/beta06.cyfirma.com\/media\/2021\/08\/blog0826.png","datePublished":"2021-08-26T05:28:55+00:00","dateModified":"2023-06-07T06:19:58+00:00","author":{"@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/39999b97a81a9c711e1c02fc4055819e"},"description":"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u4e09\u5f3e\u3067\u3059\u3002\u4eca\u56de\u306f\u3001\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002Governance, command and control \uff1c\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u6307\u63ee\u7d71\u5236\uff1eCore cyber-intelligence capability \uff1c\u30b3\u30a2\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6a5f\u80fd\uff1eCyber empowerment and dependence \uff1c\u30b5\u30a4\u30d0\u30fc\u6d3b\u7528\u3068\u4f9d\u5b58\uff1e","breadcrumb":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/#breadcrumb"},"inLanguage":"jp","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/"]}]},{"@type":"ImageObject","inLanguage":"jp","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/#primaryimage","url":"https:\/\/beta06.cyfirma.com\/media\/2021\/08\/blog0826.png","contentUrl":"https:\/\/beta06.cyfirma.com\/media\/2021\/08\/blog0826.png","width":1350,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyfirma.com\/jp\/"},{"@type":"ListItem","position":2,"name":"Cyber Capabilities and National Power -3- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09"}]},{"@type":"WebSite","@id":"https:\/\/www.cyfirma.com\/#website","url":"https:\/\/www.cyfirma.com\/","name":"CYFIRMA","description":"A threat discovery and cyber-intelligence platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyfirma.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"jp"},{"@type":"Person","@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/39999b97a81a9c711e1c02fc4055819e","name":"Gourav Ghai","image":{"@type":"ImageObject","inLanguage":"jp","@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85928dc1eb2b4f25f8806126ab6bca344f769f648c3655556ab9770d1f119e4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85928dc1eb2b4f25f8806126ab6bca344f769f648c3655556ab9770d1f119e4e?s=96&d=mm&r=g","caption":"Gourav Ghai"},"url":"https:\/\/beta06.cyfirma.com\/jp\/author\/gourav\/"}]}},"_links":{"self":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/6111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/comments?post=6111"}],"version-history":[{"count":9,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/6111\/revisions"}],"predecessor-version":[{"id":6328,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/6111\/revisions\/6328"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/media\/6117"}],"wp:attachment":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/media?parent=6111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/categories?post=6111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/tags?post=6111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}