{"id":6329,"date":"2021-09-09T05:17:43","date_gmt":"2021-09-09T05:17:43","guid":{"rendered":"https:\/\/www.cyfirma.com\/?p=6329"},"modified":"2023-06-07T06:19:57","modified_gmt":"2023-06-07T06:19:57","slug":"cyber-capabilities-and-national-power-4","status":"publish","type":"post","link":"https:\/\/beta06.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/","title":{"rendered":"Cyber Capabilities and National Power -4- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09"},"content":{"rendered":"<h4 style=\"border-width: 0px 0px 0px 7px; border-color: #99CCFF; border-style: solid; padding: 15px 10px; margin: 0px 0px 10px 0px; background: #F5F5F5;\">Cyber Capabilities and National Power -4-<\/h4>\n<p>\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u56db\u5f3e\u3067\u3059\u3002<\/p>\n<p><span class=\"TextRun SCXW34334388 BCX0\" lang=\"JA-JP\" xml:lang=\"JA-JP\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34334388 BCX0\">#<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u3061\u306a\u307f\u306b\u3001\u5f0a\u793e<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u5185\u306e\u4e00\u90e8<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u3067\u306f<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u672c\u30ec\u30dd\u30fc\u30c8\u3092<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u300c\u3044\u304e\u308a\u3059\u306e\u3084\u3064\u300d\u3068\u547c\u79f0\u3057\u3066\u304a\u308a\u3001<\/span><span class=\"NormalTextRun SCXW34334388 BCX0\">\u539f\u984c\u3092\u5fd8\u308c\u304c\u3061\u3067\u3059\u3002\u3002\u3002<\/span><\/span><span class=\"EOP SCXW34334388 BCX0\" data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/p>\n<p>\u4eca\u56de\u306f\u3001\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002<\/p>\n<p>\u25c6Cyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e<\/p>\n<p>\u25c6Global leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e<\/p>\n<p>\u25c6Offensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u25c6<\/strong>Cyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e<\/p>\n<p>\u3053\u306e\u7ae0\u3067\u306f\u4e3b\u306b\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u306b\u3064\u3044\u3066\u30ec\u30dd\u30fc\u30c8\u3055\u308c\u3066\u304a\u308a\u3001\u7279\u306b\u6c11\u9593\u4f01\u696d\u3084\u6c11\u9593\u4f01\u696d\u5411\u3051\u306e\u56fd\u306e\u53d6\u308a\u7d44\u307f\u306b\u3064\u3044\u3066\u8a00\u53ca\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">In the private sector, the major obstacle to improving cyber resilience is the lack of willingness among companies to share information regarding cyber incidents. This is partly the result of cultural and structural factors. These include a general lack of familiarity with cyber-security issues among senior business leaders, an overreliance on government regulators to establish cyber-security requirements and traditional Japanese business practices that hinder collaboration between companies. According to government statistics, Japanese companies have been slow to integrate cyber security into their corporate governance, especially their risk planning.<\/span><\/div>\n<p style=\"padding-left: 40px;\">\u6284\u8a33\u300c\u6c11\u9593\u30bb\u30af\u30bf\u30fc\u3067\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u3092\u6539\u5584\u3059\u308b\u4e0a\u3067\u306e\u4e3b\u306a\u969c\u5bb3\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u95a2\u3059\u308b\u60c5\u5831\u3092\u5171\u6709\u3059\u308b\u4f01\u696d\u9593\u306e\u610f\u6b32\u306e\u6b20\u5982\u3067\u3059\u3002\u3053\u308c\u306f\u90e8\u5206\u7684\u306b\u6587\u5316\u7684\u304a\u3088\u3073\u69cb\u9020\u7684\u8981\u56e0\u306e\u7d50\u679c\u3067\u3059\u3002\u3053\u308c\u3089\u306b\u306f\u3001\u7d4c\u55b6\u5c64\u306e\u9593\u3067\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u554f\u984c\u306b\u95a2\u3059\u308b\u4e00\u822c\u7684\u306a\u77e5\u8b58\u306e\u6b20\u5982\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8981\u4ef6\u3092\u78ba\u7acb\u3059\u308b\u305f\u3081\u306e\u653f\u5e9c\u898f\u5236\u5f53\u5c40\u3078\u306e\u904e\u5ea6\u306e\u4f9d\u5b58\u3001\u304a\u3088\u3073\u4f01\u696d\u9593\u306e\u30b3\u30e9\u30dc\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u59a8\u3052\u308b\u4f1d\u7d71\u7684\u306a\u65e5\u672c\u306e\u30d3\u30b8\u30cd\u30b9\u6163\u884c\u304c\u542b\u307e\u308c\u307e\u3059\u3002\u653f\u5e9c\u306e\u7d71\u8a08\u306b\u3088\u308b\u3068\u3001\u65e5\u672c\u4f01\u696d\u306f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u30b3\u30fc\u30dd\u30ec\u30fc\u30c8\u30ac\u30d0\u30ca\u30f3\u30b9\u3001\u7279\u306b\u30ea\u30b9\u30af\u8a08\u753b\u306b\u7d71\u5408\u3059\u308b\u306e\u306b\u6642\u9593\u304c\u304b\u304b\u3063\u3066\u3044\u307e\u3059\u3002 \u300d<\/p>\n<p>\u624b\u53b3\u3057\u3044\u3067\u3059\u306d\u3002\u81ea\u52a9\u3001\u516c\u52a9\u3001\u5171\u52a9\u306e\u8003\u3048\u65b9\u306b\u304a\u3044\u3066\u3001\u65e5\u672c\u306e\u6c11\u9593\u4f01\u696d\u306f\u3001\u5171\u52a9\u306e\u610f\u8b58\u306e\u6b20\u5982\u304a\u3088\u3073\u516c\u52a9\u3078\u306e\u904e\u5ea6\u306e\u4f9d\u5b58\u4f53\u8cea\u304c\u3042\u308b\u3068\u6307\u6458\u3057\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u7d4c\u55b6\u5c64\u306b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u77e5\u8b58\u306e\u6b20\u5982\u3082\u6307\u6458\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u70b9\u306b\u3064\u3044\u3066\u306f2015\u5e74\u306b\u7d4c\u7523\u7701\u304c\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7d4c\u55b6\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u300d\u3092\u767a\u884c\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f\u7d4c\u55b6\u554f\u984c\u3067\u3042\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306f\u30b3\u30b9\u30c8\u3067\u306f\u306a\u304f\u6295\u8cc7\u3068\u6349\u3048\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6295\u8cc7\u306f\u5fc5\u8981\u4e0d\u53ef\u6b20\u304b\u3064\u7d4c\u55b6\u8005\u3068\u3057\u3066\u306e\u8cac\u52d9\u3068\u660e\u8a18\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u4e2d\u3005\u6d78\u900f\u3057\u3066\u3044\u306a\u3044\u306e\u304c\u5b9f\u611f\u3067\u3059\u3002<\/p>\n<p>\u305d\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7d4c\u55b6\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u306b\u3064\u3044\u3066\u306f\u3001\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u8a18\u8ff0\u304c\u3042\u308a\u307e\u3057\u305f\u3002<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">The fact that these guidelines are based on the Cybersecurity Framework of the US National Institute of Standards and Technology illustrates both a tendency towards the adoption of the US view on cyber security and an absence of significant domestic innovation on the issue.<\/span><\/div>\n<p style=\"padding-left: 40px;\">\u6284\u8a33\u300c\u3053\u308c\u3089\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u304cNIST\uff08\u7c73\u56fd\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240\uff09\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306b\u57fa\u3065\u3044\u3066\u3044\u308b\u3068\u3044\u3046\u4e8b\u5b9f\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u7c73\u56fd\u306e\u898b\u89e3\u3092\u63a1\u7528\u3059\u308b\u50be\u5411\u3068\u3001\u3053\u306e\u554f\u984c\u306b\u95a2\u3059\u308b\u91cd\u8981\u306a\u56fd\u5185\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u306e\u6b20\u5982\u306e\u4e21\u65b9\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002 \u300d<\/p>\n<p>\u3053\u3053\u3067\u3082\u7c73\u56fd\u3078\u306e\u4f9d\u5b58\u5ea6\u306b\u3064\u3044\u3066\u8a00\u53ca\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u78ba\u304b\u306b\u7c73\u56fd\u3084EU\u306a\u3069\u72ec\u81ea\u3067\u57fa\u6e96\u7b56\u5b9a\u3092\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u78ba\u304b\u306b\u65e5\u672c\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u591a\u304f\u306fNIST\u3084ENISA\u3084\u305d\u306e\u4ed6\u6d77\u5916\u56e3\u4f53\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u4e0b\u5730\u3068\u3057\u305f\u3082\u306e\u304c\u591a\u3044\u306e\u306f\u4e8b\u5b9f\u3067\u3057\u3087\u3046\u3002\u305d\u306e\u80cc\u666f\u306b\u306f\u30d3\u30b8\u30cd\u30b9\u304c\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u5c55\u958b\u3055\u308c\u3066\u3044\u308b\u4ee5\u4e0a\u3001\u4f55\u3082\u53c2\u8003\u306b\u305b\u305a\u72ec\u81ea\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u4f5c\u6210\u3059\u308b\u3088\u308a\u3082\u7247\u65b9\u53c2\u7167\u3068\u306f\u3044\u3048\u6d77\u5916\u3067\u3082\u901a\u3058\u308b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3068\u3059\u308b\u4e0a\u3067\u306f\u60aa\u3044\u9078\u629e\u3067\u306f\u306a\u3044\u3068\u3082\u8003\u3048\u3089\u308c\u307e\u3059\u3002<\/p>\n<p>\u25c6Global leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e<\/p>\n<p>\u3053\u306e\u7ae0\u3067\u306f\u65e5\u672c\u306e\u30b5\u30a4\u30d0\u30fc\u5916\u4ea4\u306b\u3064\u3044\u3066\u8ff0\u3079\u3089\u308c\u3066\u304a\u308a\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u5916\u4ea4\u3067\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u6cd5\u306e\u652f\u914d\u306e\u4fc3\u9032\u3001\u4fe1\u983c\u91b8\u6210\u63aa\u7f6e\u306e\u63a8\u9032\u3001\u80fd\u529b\u958b\u767a\u306b\u95a2\u3059\u308b\u56fd\u969b\u5354\u529b\u306e\u5f37\u5316\u3068\u3044\u30463\u3064\u306e\u67f1\u304c\u3042\u308b\u65e8\u3068\u3001\u69d8\u3005\u306a\u56fd\u3084\u7d44\u7e54\u3068\u30b5\u30a4\u30d0\u30fc\u5916\u4ea4\u3092\u63a8\u9032\u3057\u3066\u3044\u308b\u65e8\u304c\u5831\u544a\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u25c6Offensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e<\/p>\n<p>\u3053\u306e\u7ae0\u306f\u984c\u540d\u306e\u901a\u308a\u3067\u3059\u306d\u3002\u7686\u69d8\u3054\u5b58\u3058\u306e\u901a\u308a\u3001\u65e5\u672c\u3067\u306f\u96e3\u3057\u3044\u554f\u984c\u3067\u3059\u304c\u3001\u30ec\u30dd\u30fc\u30c8\u3067\u3082\u3053\u306e\u3088\u3046\u306b\u8a18\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">\u00a0The development of any offensive military capability is constrained by Japan\u2019s military history and by current views on the post-Second World War pacifist constitution. Article 9 of the constitution denies the country the right to military forces of any kind.<\/span><\/div>\n<p style=\"text-align: left; padding-left: 40px;\">\u6284\u8a33\u300c\u653b\u6483\u7684\u306a\u8ecd\u4e8b\u529b\u306e\u767a\u5c55\u306f\u3001\u65e5\u672c\u306e\u8ecd\u4e8b\u53f2\u3068\u7b2c\u4e8c\u6b21\u4e16\u754c\u5927\u6226\u5f8c\u306e\u5e73\u548c\u4e3b\u7fa9\u61b2\u6cd5\u306b\u95a2\u3059\u308b\u73fe\u5728\u306e\u898b\u89e3\u306b\u3088\u3063\u3066\u5236\u7d04\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u61b2\u6cd5\u7b2c9\u6761\u306f\u3001\u56fd\u304c\u3042\u3089\u3086\u308b\u7a2e\u985e\u306e\u8ecd\u4e8b\u529b\u3092\u884c\u4f7f\u3059\u308b\u6a29\u5229\u3092\u5426\u5b9a\u3057\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">\u00a0Since 2015 the government has made additional reinterpretations to make it possible, under certain circumstances, to come to the aid of an ally even if Japan itself is not under attack. This shift is now also seen as allowing collective self-defence and active defence in cyberspace.<\/span><\/div>\n<p style=\"padding-left: 40px;\">\u6284\u8a33:\u300c2015\u5e74\u4ee5\u964d\u3001\u653f\u5e9c\u306f\u3001\u7279\u5b9a\u306e\u72b6\u6cc1\u4e0b\u3067\u3001\u65e5\u672c\u81ea\u4f53\u304c\u653b\u6483\u3092\u53d7\u3051\u3066\u3044\u306a\u304f\u3066\u3082\u540c\u76df\u56fd\u306e\u652f\u63f4\u3092\u53d7\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3088\u3046\u306b\u3001\u8ffd\u52a0\u306e\u518d\u89e3\u91c8\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u5909\u5316\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u3067\u306e\u96c6\u56e3\u7684\u81ea\u5df1\u9632\u885b\u3068\u7a4d\u6975\u7684\u306a\u9632\u885b\u3092\u53ef\u80fd\u306b\u3059\u308b\u3082\u306e\u3068\u3057\u3066\u3082\u898b\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u300d<\/p>\n<p>\u6240\u8b02\u3001\u96c6\u56e3\u7684\u81ea\u885b\u6a29\u3067\u3059\u306d\u3002\u30ec\u30dd\u30fc\u30c8\u3067\u306f\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u3067\u3082\u9069\u7528\u3055\u308c\u308b\u306e\u3067\u306f\u306a\u3044\u304b\u3068\u5206\u6790\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u7ae0\u3067\u3082\u3046\u3072\u3068\u3064\u3001\u65e5\u7c73\u306e\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u5354\u529b\u306b\u3064\u3044\u3066\u8a00\u53ca\u3055\u308c\u3066\u3044\u308b\u7b87\u6240\u304c\u3042\u308a\u307e\u3057\u305f\u3002<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">The fact remains that, for the foreseeable future, Japan will probably remain reliant on its alliance with the US for any kind of offensive response to a cyber threat. It is notable that the 2015 guidelines for US\u2013Japan defence cooperation include an entire section dedicated to cyberspace, setting out the circumstances under which the US can lend cyber support in Japan&#8217;s defence. The narrowest interpretation of the text would limit US assistance to the protection of Japanese critical information infrastructure used by US forces in Japan, but in the broadest interpretation the text is analogous to NATO\u2019s Article 5, with a serious cyber attack on Japan being treated like an attack on the US.<\/span><\/div>\n<p style=\"padding-left: 40px;\">\u6284\u8a33:\u300c\u8fd1\u3044\u5c06\u6765\u3001\u65e5\u672c\u306f\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3078\u306e\u3042\u3089\u3086\u308b\u7a2e\u985e\u306e\u653b\u6483\u7684\u5bfe\u5fdc\u306b\u3064\u3044\u3066\u7c73\u56fd\u3068\u306e\u540c\u76df\u306b\u4f9d\u5b58\u3057\u7d9a\u3051\u308b\u3067\u3042\u308d\u3046\u3068\u3044\u3046\u4e8b\u5b9f\u306f\u6b8b\u3063\u3066\u3044\u307e\u3059\u3002\u65e5\u7c73\u9632\u885b\u5354\u529b\u306b\u95a2\u3059\u308b2015\u5e74\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u306b\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30b9\u30da\u30fc\u30b9\u306b\u7279\u5316\u3057\u305f\u30bb\u30af\u30b7\u30e7\u30f3\u5168\u4f53\u304c\u542b\u307e\u308c\u3066\u304a\u308a\u3001\u7c73\u56fd\u304c\u65e5\u672c\u306e\u9632\u885b\u306b\u304a\u3044\u3066\u30b5\u30a4\u30d0\u30fc\u652f\u63f4\u3092\u63d0\u4f9b\u3067\u304d\u308b\u72b6\u6cc1\u304c\u793a\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u306f\u6ce8\u76ee\u306b\u5024\u3057\u307e\u3059\u3002\u30c6\u30ad\u30b9\u30c8\u306e\u6700\u3082\u72ed\u3044\u89e3\u91c8\u306f\u3001\u65e5\u672c\u3067\u7c73\u8ecd\u304c\u4f7f\u7528\u3059\u308b\u65e5\u672c\u306e\u91cd\u8981\u306a\u60c5\u5831\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u306e\u4fdd\u8b77\u306b\u5bfe\u3059\u308b\u7c73\u56fd\u306e\u652f\u63f4\u3092\u5236\u9650\u3057\u307e\u3059\u304c\u3001\u3057\u304b\u3057\u3001\u6700\u3082\u5e83\u3044\u89e3\u91c8\u3067\u306f\u3001\u30c6\u30ad\u30b9\u30c8\u306fNATO\u306e\u7b2c5\u6761\u306b\u985e\u4f3c\u3057\u3066\u304a\u308a\u3001\u65e5\u672c\u306b\u5bfe\u3059\u308b\u6df1\u523b\u306a\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306f\u7c73\u56fd\u306b\u5bfe\u3059\u308b\u653b\u6483\u306e\u3088\u3046\u306b\u6271\u308f\u308c\u307e\u3059\u3002\u00a0\u300d<\/p>\n<p>2015\u5e74\u304b\u3089\u65e5\u7c73\u9593\u3067\u306f\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u5354\u529b\u306b\u3064\u3044\u3066\u8a00\u53ca\u3055\u308c\u3066\u3044\u308b\u3068\u8a18\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u8fd1\u306e\u8a71\u3067\u306f\u306a\u304f\u524d\u304b\u3089\u3057\u3063\u304b\u308a\u3068\u8003\u3048\u3089\u308c\u3066\u3044\u305f\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3059\u3002\u3067\u306f\u3001\u8a00\u53ca\u3055\u308c\u3066\u3044\u308b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3067\u306f\u3069\u306e\u3088\u3046\u306b\u8a18\u8f09\u3055\u308c\u3066\u3044\u308b\u304b\u898b\u3066\u307f\u307e\u3057\u3087\u3046\u3002<\/p>\n<div style=\"display: inline-block; background: #fcfcff; padding: 15px; border: 3px double #8d0806;\"><span style=\"font-size: 18px;\">\u65e5\u7c73\u9632\u885b\u5354\u529b\u306e\u305f\u3081\u306e\u6307\u91dd\uff082015.4.27\uff09<br \/>\n\u81ea\u885b\u968a\u53ca\u3073\u65e5\u672c\u306b\u304a\u3051\u308b\u7c73\u8ecd\u304c\u5229\u7528\u3059\u308b\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u53ca\u3073\u30b5\u30fc\u30d3\u30b9\u306b\u5bfe\u3059\u308b\u3082\u306e\u3092\u542b\u3081\u3001\u65e5\u672c\u306b\u5bfe\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u4e8b\u6848\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u3001\u65e5\u672c\u306f\u4e3b\u4f53\u7684\u306b\u5bfe\u51e6\u3057\u3001\u7dca\u5bc6\u306a\u4e8c\u56fd\u9593\u8abf\u6574\u306b\u57fa\u3065\u304d\u3001\u7c73\u56fd\u306f\u65e5\u672c\u306b\u5bfe\u3057\u9069\u5207\u306a\u652f\u63f4\u3092\u884c\u3046\u3002\u65e5\u7c73\u4e21\u653f\u5e9c\u306f\u307e\u305f\u3001\u95a2\u9023\u60c5\u5831\u3092\u8fc5\u901f\u304b\u3064\u9069\u5207\u306b\u5171\u6709\u3059\u308b\u3002\u65e5\u672c\u304c\u6b66\u529b\u653b\u6483\u3092\u53d7\u3051\u3066\u3044\u308b\u5834\u5408\u306b\u767a\u751f\u3059\u308b\u3082\u306e\u3092\u542b\u3081\u3001\u65e5\u672c\u306e\u5b89\u5168\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u6df1\u523b\u306a\u30b5\u30a4\u30d0\u30fc\u4e8b\u6848\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u3001\u65e5\u7c73\u4e21\u653f\u5e9c\u306f\u3001\u7dca\u5bc6\u306b\u5354\u8b70\u3057\u3001\u9069\u5207\u306a\u5354\u529b\u884c\u52d5\u3092\u3068\u308a\u5bfe\u51e6\u3059\u308b\u3002<br \/>\n<\/span><\/div>\n<p>\u78ba\u304b\u306b\u3001\u30b5\u30a4\u30d0\u30fc\u4e8b\u6848\u304c\u767a\u751f\u3057\u305f\u5834\u5408\u306f\u7c73\u56fd\u304c\u65e5\u672c\u306b\u9069\u5207\u306a\u652f\u63f4\u3092\u63d0\u4f9b\u3067\u304d\u308b\u65e8\u304c\u8a18\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u306e\u7ae0\u3067\u30ec\u30dd\u30fc\u30c8\u3055\u308c\u3066\u3044\u308b\u5185\u5bb9\u306f\u65e5\u672c\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u696d\u754c\u306b\u3068\u3063\u3066\u9577\u5e74\u306e\u8ab2\u984c\u304c\u672a\u3060\u89e3\u6c7a\u306b\u81f3\u3063\u3066\u3044\u306a\u3044\u3053\u3068\u3092\u601d\u3044\u77e5\u3089\u3055\u308c\u307e\u3059\u3002\u307e\u305f\u3001\u3053\u308c\u307e\u3067\u898b\u3066\u304d\u305f\u901a\u308a\u3001\u56fd\u3068\u3057\u3066\u306e\u53d6\u308a\u7d44\u307f\u306f\u3068\u3082\u3059\u308b\u3068\u5916\u304b\u3089\u898b\u308b\u3068\u9045\u3044\u6b69\u307f\u306b\u898b\u3048\u308b\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u304c\u3001\u7c73\u56fd\u8ffd\u5f93\u3068\u63f6\u63c4\u3055\u308c\u3064\u3064\u3082\u7740\u5b9f\u306b\u9032\u3093\u3067\u3044\u308b\u3088\u3046\u306b\u898b\u53d7\u3051\u3089\u308c\u307e\u3059\u3002\u7ffb\u3063\u3066\u3001\u65e5\u672c\u4f01\u696d\u306f\u3053\u306e\u3088\u3046\u306a\u56fd\u306e\u53d6\u308a\u7d44\u307f\u306b\u983c\u308b\u3001\u76e3\u7763\u5b98\u5e81\u306b\u8a00\u308f\u308c\u305f\u4ee5\u4e0a\u306e\u3053\u3068\u306f\u3057\u306a\u3044\u3001\u696d\u754c\u6a2a\u4e26\u3073\u306e\u610f\u8b58\u3067\u306f\u306a\u304f\u3001\u81ea\u52a9\u3001\u5171\u52a9\u306b\u3064\u3044\u3066\u6539\u3081\u3066\u8003\u3048\u3066\u3001\u80fd\u52d5\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3078\u884c\u52d5\u5909\u9769\u3059\u308b\u3053\u3068\u304c\u81ea\u7d44\u7e54\u3092\u5b88\u308b\u8fd1\u9053\u3068\u306a\u308b\u306e\u3067\u306f\u306a\u3044\u3067\u3057\u3087\u3046\u304b\u3002<\/p>\n<p>\u672c\u30d6\u30ed\u30b0\u3067\u306f\u4e00\u90e8\u3092\u5207\u308a\u53d6\u3063\u3066\u306e\u3054\u7d39\u4ecb\u306b\u7559\u307e\u3063\u3066\u3044\u307e\u3059\u306e\u3067\u3001\u3054\u8208\u5473\u306e\u3042\u308b\u65b9\u306f\u539f\u6587\u3092\u4e00\u8aad\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u25c6\u53c2\u8003\u6587\u732e<\/p>\n<p>Cyber Capabilities and National Power\uff08IISS\uff09\uff1a<\/p>\n<p><a href=\"https:\/\/www.iiss.org\/blogs\/research-paper\/2021\/06\/cyber-capabilities-national-power\">https:\/\/www.iiss.org\/blogs\/research-paper\/2021\/06\/cyber-capabilities-national-power<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>CYFIRMA\u3067\u306f\u7d44\u7e54\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u304b\u3089\u6226\u8853\u9762\u307e\u3067\u6d3b\u7528\u3067\u304d\u308b\u3001\u5305\u62ec\u7684\u306a\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u3054\u8208\u5473\u306e\u3042\u308b\u65b9\u306f\u3001\u3069\u3046\u305e\u304a\u6c17\u8efd\u306b\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/p>\n<h4 style=\"border-width: 0px 0px 0px 7px; border-color: #99CCFF; border-style: solid; padding: 15px 10px; margin: 0px 0px 10px 0px; background: #F5F5F5;\"><strong><span style=\"color: #000000;\"><span style=\"font-family: Georgia,serif;\">CYFIRMA\u3067\u306f\u8272\u3005\u306a\u8996\u70b9\u304b\u3089\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u7406\u89e3\u3057\u3066\u9802\u3051\u308b\u69d8\u3001\u5404\u7a2e\u7121\u6599\u306e\u30b3\u30f3\u30c6\u30f3\u30c4\u3092\u3054\u7528\u610f\u3057\u3066\u3044\u307e\u3059\uff01<\/span><\/span><\/strong><\/h4>\n<h4><\/h4>\n<h4>\u2727\u6bce\u9031\u706b\u66dc\u65e5\u306b\u767a\u884c\u300cWeekly Security Update\u300d<\/h4>\n<p>CYFIRMA\u304c\u72ec\u81ea\u3067\u6bce\u9031\u767a\u884c\u3057\u3066\u3044\u308b\u300cWeekly Security Update\u300d\u306e\u30e1\u30fc\u30eb\u30de\u30ac\u30b8\u30f3\u3067\u3059\u3002<br \/>\n\u305d\u306e\u9031\u306b\u3042\u3063\u305f\u51fa\u6765\u4e8b\u3092\u30d4\u30c3\u30af\u30a2\u30c3\u30d7\u3057\u3001\u3055\u3089\u306b\u30b5\u30a4\u30d5\u30a1\u30fc\u30de\u306a\u3089\u3067\u306f\u306e\u60c5\u5831\u3082\u4ea4\u3048\u3066\u3054\u7d39\u4ecb\u3057\u3066\u3044\u307e\u3059\u3002<br \/>\n\u30cf\u30c3\u30ab\u30fc\u306e\u4f1a\u8a71\u3092\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0\u3057\u3066\u3044\u308b\u304b\u3089\u3053\u305d\u3001\u901a\u5e38\u3067\u306f\u5f97\u3089\u308c\u306a\u3044\u69d8\u306a\u60c5\u5831\u3082\u3044\u3061\u65e9\u304f\u624b\u306b\u5165\u308c\u308b\u4e8b\u304c\u3067\u304d\u307e\u3059\u306e\u3067\u3001<br \/>\n\u3054\u8208\u5473\u306e\u3042\u308b\u65b9\u306f\u4e0b\u8a18\u3088\u308a\u304a\u7533\u8fbc\u4e0b\u3055\u3044\u3002<br \/>\n\u203b\u540c\u696d\u4ed6\u793e\u306e\u65b9\u306f\u304a\u65ad\u308a\u3059\u308b\u5834\u5408\u304c\u3054\u3056\u3044\u307e\u3059\u3001\u3054\u4e86\u627f\u4e0b\u3055\u3044\u3002<\/p>\n<p><a href=\"https:\/\/www.cyfirma.com\/jp\/news\/weekly-security-updates\/\">\u30e1\u30eb\u30de\u30ac\u304a\u7533\u8fbc<\/a><\/p>\n<h4><\/h4>\n<h4>\u2727\u6bce\u6708\u5b9a\u671f\u958b\u50ac\u300cCYFIRMA \u30a6\u30a7\u30d3\u30ca\u30fc\u300d<\/h4>\n<p>\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3068\u306f\u4f55\u304b\u3068\u3044\u3046\u521d\u6b69\u7684\u306a\u5185\u5bb9\u304b\u3089\u3001MITRE ATT&amp;CK\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306e\u6d3b\u7528\u65b9\u6cd5\u3001<br \/>\n\u6bce\u6708\u306e\u8105\u5a01\u30c8\u30ec\u30f3\u30c9\u5831\u544a\u306a\u3069\u306a\u3069\u3001\u65ec\u306a\u8a71\u984c\u3092\u53d6\u308a\u5165\u308c\u3001\u304b\u3064\u5f0a\u793e\u72ec\u81ea\u76ee\u7dda\u3082\u53d6\u308a\u5165\u308c\u305f\u5185\u5bb9\u3068\u306a\u3063\u3066\u304a\u308a\u3001<br \/>\n\u5f0a\u793e\u30b5\u30fc\u30d3\u30b9\u7d39\u4ecb\u3068\u3044\u3046\u3088\u308a\u3082\u3001\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3092\u3069\u3046\u8003\u3048\u308b\u304b\u3001\u3069\u3046\u6d3b\u7528\u3059\u308b\u304b\u3068\u3044\u3046\u90e8\u5206\u3067<br \/>\n\u7686\u69d8\u306e\u30d2\u30f3\u30c8\u3068\u306a\u308b\u3088\u3046\u904b\u55b6\u3057\u3066\u304a\u308a\u307e\u3059\u3002\u662f\u975e\u304a\u6c17\u8efd\u306b\u3054\u53c2\u52a0\u4e0b\u3055\u3044\u307e\u305b\uff01\uff01\uff01<\/p>\n<p><a href=\"https:\/\/www.cyfirma.com\/jp\/eventslists\/webinar\/\">\u30a6\u30a7\u30d3\u30ca\u30fc\u8a73\u7d30\uff06\u304a\u7533\u8fbc<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>\u2727\u305d\u306e\u4ed6\u3001\u3054\u4e0d\u660e\u306a\u70b9\u304c\u3054\u3056\u3044\u307e\u3057\u305f\u3089<a href=\"https:\/\/www.cyfirma.com\/jp\/start-now\/\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089<\/a>\u304b\u3089\u3054\u9023\u7d61\u4e0b\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Capabilities and National Power -4- \u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u56db\u5f3e\u3067\u3059\u3002","protected":false},"author":14,"featured_media":6337,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[],"tags":[70,83,84,75,82,72,79,80,76,78,68,69],"class_list":["post-6329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-ioc","tag-83","tag-84","tag-75","tag-82","tag-72","tag-79","tag-80","tag-76","tag-78","tag-68","tag-69"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Capabilities and National Power -4- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA<\/title>\n<meta name=\"description\" content=\"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u56db\u5f3e\u3067\u3059\u3002# \u3061\u306a\u307f\u306b\u3001\u5f0a\u793e\u5185\u306e\u4e00\u90e8\u3067\u306f\u672c\u30ec\u30dd\u30fc\u30c8\u3092\u300c\u3044\u304e\u308a\u3059\u306e\u3084\u3064\u300d\u3068\u547c\u79f0\u3057\u3066\u304a\u308a\u3001\u539f\u984c\u3092\u5fd8\u308c\u304c\u3061\u3067\u3059\u3002\u3002\u3002\u4eca\u56de\u306f\u3001\u6b8b\u308a\u306e\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002\uf075 Cyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e\uf075 Global leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e\uf075 Offensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Capabilities and National Power -4- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA\" \/>\n<meta property=\"og:description\" content=\"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u56db\u5f3e\u3067\u3059\u3002# \u3061\u306a\u307f\u306b\u3001\u5f0a\u793e\u5185\u306e\u4e00\u90e8\u3067\u306f\u672c\u30ec\u30dd\u30fc\u30c8\u3092\u300c\u3044\u304e\u308a\u3059\u306e\u3084\u3064\u300d\u3068\u547c\u79f0\u3057\u3066\u304a\u308a\u3001\u539f\u984c\u3092\u5fd8\u308c\u304c\u3061\u3067\u3059\u3002\u3002\u3002\u4eca\u56de\u306f\u3001\u6b8b\u308a\u306e\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002\uf075 Cyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e\uf075 Global leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e\uf075 Offensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/\" \/>\n<meta property=\"og:site_name\" content=\"CYFIRMA\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-09T05:17:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-07T06:19:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyfirma.com\/wp-content\/uploads\/2021\/09\/2018-08-06-Cyber-Risks-to-our-\u2018Digital-Shadow-could-be-more-significant-than-to-IT-Assets-and-Financial-data.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"472\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gourav Ghai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gourav Ghai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Capabilities and National Power -4- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","description":"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u56db\u5f3e\u3067\u3059\u3002# \u3061\u306a\u307f\u306b\u3001\u5f0a\u793e\u5185\u306e\u4e00\u90e8\u3067\u306f\u672c\u30ec\u30dd\u30fc\u30c8\u3092\u300c\u3044\u304e\u308a\u3059\u306e\u3084\u3064\u300d\u3068\u547c\u79f0\u3057\u3066\u304a\u308a\u3001\u539f\u984c\u3092\u5fd8\u308c\u304c\u3061\u3067\u3059\u3002\u3002\u3002\u4eca\u56de\u306f\u3001\u6b8b\u308a\u306e\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002\uf075 Cyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e\uf075 Global leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e\uf075 Offensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Capabilities and National Power -4- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","og_description":"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u56db\u5f3e\u3067\u3059\u3002# \u3061\u306a\u307f\u306b\u3001\u5f0a\u793e\u5185\u306e\u4e00\u90e8\u3067\u306f\u672c\u30ec\u30dd\u30fc\u30c8\u3092\u300c\u3044\u304e\u308a\u3059\u306e\u3084\u3064\u300d\u3068\u547c\u79f0\u3057\u3066\u304a\u308a\u3001\u539f\u984c\u3092\u5fd8\u308c\u304c\u3061\u3067\u3059\u3002\u3002\u3002\u4eca\u56de\u306f\u3001\u6b8b\u308a\u306e\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002\uf075 Cyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e\uf075 Global leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e\uf075 Offensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e","og_url":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/","og_site_name":"CYFIRMA","article_published_time":"2021-09-09T05:17:43+00:00","article_modified_time":"2023-06-07T06:19:57+00:00","og_image":[{"width":800,"height":472,"url":"https:\/\/www.cyfirma.com\/wp-content\/uploads\/2021\/09\/2018-08-06-Cyber-Risks-to-our-\u2018Digital-Shadow-could-be-more-significant-than-to-IT-Assets-and-Financial-data.jpeg","type":"image\/jpeg"}],"author":"Gourav Ghai","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gourav Ghai","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/","url":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/","name":"Cyber Capabilities and National Power -4- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09 - CYFIRMA","isPartOf":{"@id":"https:\/\/www.cyfirma.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/#primaryimage"},"image":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/#primaryimage"},"thumbnailUrl":"https:\/\/beta06.cyfirma.com\/media\/2021\/09\/2018-08-06-Cyber-Risks-to-our-\u2018Digital-Shadow-could-be-more-significant-than-to-IT-Assets-and-Financial-data.jpeg","datePublished":"2021-09-09T05:17:43+00:00","dateModified":"2023-06-07T06:19:57+00:00","author":{"@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/39999b97a81a9c711e1c02fc4055819e"},"description":"\u300cCyber Capabilities and National Power\u300d\u3092\u8aad\u3093\u3067\u307f\u308b\u30b7\u30ea\u30fc\u30ba\u7b2c\u56db\u5f3e\u3067\u3059\u3002# \u3061\u306a\u307f\u306b\u3001\u5f0a\u793e\u5185\u306e\u4e00\u90e8\u3067\u306f\u672c\u30ec\u30dd\u30fc\u30c8\u3092\u300c\u3044\u304e\u308a\u3059\u306e\u3084\u3064\u300d\u3068\u547c\u79f0\u3057\u3066\u304a\u308a\u3001\u539f\u984c\u3092\u5fd8\u308c\u304c\u3061\u3067\u3059\u3002\u3002\u3002\u4eca\u56de\u306f\u3001\u6b8b\u308a\u306e\u4ee5\u4e0b\u306e\u30ab\u30c6\u30b4\u30ea\u3092\u898b\u3066\u3044\u304d\u307e\u3059\u3002\uf075 Cyber security and resilience \uff1c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1e\uf075 Global leadership in cyberspace affairs \uff1c\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u554f\u984c\u306b\u5bfe\u3059\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\uff1e\uf075 Offensive cyber capability \uff1c\u653b\u6483\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u6a5f\u80fd\uff1e","breadcrumb":{"@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/#breadcrumb"},"inLanguage":"jp","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/"]}]},{"@type":"ImageObject","inLanguage":"jp","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/#primaryimage","url":"https:\/\/beta06.cyfirma.com\/media\/2021\/09\/2018-08-06-Cyber-Risks-to-our-\u2018Digital-Shadow-could-be-more-significant-than-to-IT-Assets-and-Financial-data.jpeg","contentUrl":"https:\/\/beta06.cyfirma.com\/media\/2021\/09\/2018-08-06-Cyber-Risks-to-our-\u2018Digital-Shadow-could-be-more-significant-than-to-IT-Assets-and-Financial-data.jpeg","width":800,"height":472},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyfirma.com\/jp\/blogs\/cyber-capabilities-and-national-power-4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyfirma.com\/jp\/"},{"@type":"ListItem","position":2,"name":"Cyber Capabilities and National Power -4- \uff08\u3044\u304e\u308a\u3059\u306e\u3084\u3064\uff09"}]},{"@type":"WebSite","@id":"https:\/\/www.cyfirma.com\/#website","url":"https:\/\/www.cyfirma.com\/","name":"CYFIRMA","description":"A threat discovery and cyber-intelligence platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyfirma.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"jp"},{"@type":"Person","@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/39999b97a81a9c711e1c02fc4055819e","name":"Gourav Ghai","image":{"@type":"ImageObject","inLanguage":"jp","@id":"https:\/\/www.cyfirma.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85928dc1eb2b4f25f8806126ab6bca344f769f648c3655556ab9770d1f119e4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85928dc1eb2b4f25f8806126ab6bca344f769f648c3655556ab9770d1f119e4e?s=96&d=mm&r=g","caption":"Gourav Ghai"},"url":"https:\/\/beta06.cyfirma.com\/jp\/author\/gourav\/"}]}},"_links":{"self":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/6329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/comments?post=6329"}],"version-history":[{"count":11,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/6329\/revisions"}],"predecessor-version":[{"id":6343,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/posts\/6329\/revisions\/6343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/media\/6337"}],"wp:attachment":[{"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/media?parent=6329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/categories?post=6329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta06.cyfirma.com\/jp\/wp-json\/wp\/v2\/tags?post=6329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}