Glosario de ciberseguridad
Los atacantes de la actualidad se aprovechan de los cambios en la dinámica de la forma de trabajar para apuntar sus ataques hacia las personas en cualquier parte que trabajen. Un aspecto esencial para proteger a las empresas contra las brechas de seguridad y el acceso no autorizado a datos consiste en mantenerse al tanto de los vectores de ataque y las amenazas.
Account Takeover Fraud | ã¢ã«ãŠã³ãã®ä¹ã£åã
ã¢ã«ãŠã³ãä¹ã£åã(ãŸãã¯ã¢ã«ãŠã³ã䟵害) ã¯ãæ»æè ãä»äººã®ã¢ã«ãŠã³ãæš©éãåŸãããšããå§ãŸããŸãã æ»æè ã¯ã¢ã«ãŠã³ãæš©éãæªçšããŠã以äžã®ãããªæ»æã仿ããŠããŸãã
Active Directory | ã¢ã¯ãã£ããã£ã¬ã¯ããª
Active Directoryã¯ãMicrosoftãWindowsãã¡ã€ã³ãããã¯ãŒã¯çšã«éçºãããã£ã¬ã¯ããªãµãŒãã¹ã§ããŠãŒã¶ãŒãã³ã³ãã¥ãŒã¿ã¢ã«ãŠã³ãããããã¯ãŒã¯ãªãœãŒã¹ãªã©ãæŽçã»ç®¡çããã®ã«äžå¯æ¬ ãªããŒã«ã§ãã
Adversary-in-the-Middle Attack | äžéè æ»æïŒAiTMæ»æïŒ
äžéè æ»æã¯ãMiTMïŒAdversary in the MiddleïŒæ»æãšãåŒã°ããéä¿¡è ããåä¿¡è ãžã®ããŒã¿ãæ»æè ãååãããã®åŸãåä¿¡è ããéä¿¡è ã«æ»ããšããããŒã¿çèŽã»çªçã®äžçš®ã§ãã
APT (Advanced Persistent Threat) | æšçåã®æç¶çãªè åš
ã»ãšãã©ã®å Žåãåœå®¶ãæ¯æŽããŠããæ»æã§ãã¹ãã€è¡çºãç®æšã®ç Žå£ãéè¡ããããã«çµç¹ãžã®ã»ãã¥ãªãã£äŸµå®³ãè¡ãããªããã€é·æéæ€ç¥ãããªãããšãç®çãšããæ»æã
Artificial Intelligence | AIïŒäººå·¥ç¥èœïŒ
AIïŒäººå·¥ç¥èœïŒãšã¯ãæ©æ¢°ãã³ã³ãã¥ãŒã¿ã·ã¹ãã ã人éã®ç¥èœãæš¡å£ããããšãæããŸããããã¯ã人éã®ç¥èœãšã¯å¯Ÿç §çãªãã®ã§ãã
Attack Surface | ASMïŒAttack Surface ManagementïŒ
ã¢ã¿ãã¯ãµãŒãã§ã¹ãšã¯ãäžæ£ã¢ã¯ã»ã¹ãã·ã¹ãã äŸµå ¥ãæ©å¯æ å ±ãžã®ã¢ã¯ã»ã¹ãå¯èœã«ããæœåšçãªãšã³ããªãã€ã³ããè匱æ§ã®ç·äœãæããŸãã
Bad Rabbit | ãããã©ããã
Bad Rabbit ãšã¯ã©ã³ãµã ãŠã§ã¢ã®äžçš®ã§ãããåããŠåºçŸããã®ã¯ 2017 幎ã§ãPetya ã®å€ç°ãšèããããŠããŸãã
BEC (Business Email Compromise) | ããžãã¹ã¡ãŒã«è©æ¬º
è©æ¬ºã¡ãŒã«ã¯çžæãã ãŸããæã«äžåã§æ°åäžãã«ã«ãäžãéé¡ã®é»ä¿¡ééããããããäŒæ¥ãŸãã¯åäººã®æ©å¯ããŒã¿ãéä¿¡ããããããŸãã ããããã¡ãŒã«ã¯æé«çµå¶è²¬ä»»è ïŒCEOïŒãä»ã®åœ¹å¡ããéä¿¡ãããããã«èŠããããåä¿¡è ã«è©³çްã®ç§å¯ä¿æãæ±ããŸãã
Botnet | ãããããã
ããããããã¯ãæšçãšãªã£ã被害è ã«å¯ŸããŠãæªè³ªãªã¢ã¯ãã£ããã£ãå®è¡ããã³ã³ãã¥ãŒã¿çŸ€ãæ°ã ã®ããã€ã¹ãæããŸãã
Brute-Force Attack | ãã«ãŒããã©ãŒã¹ã¢ã¿ãã¯ïŒç·åœããæ»æïŒ
ãã«ãŒããã©ãŒã¹ã¢ã¿ãã¯ã¯ãã¢ã«ãŠã³ãã®èªèšŒæ å ±ãããã®ãã¡ç¹ã«ãã¹ã¯ãŒããç¹å®ããããã«ãµã€ããŒç¯çœªè ã䜿ããã¹ã¯ãŒãã¯ã©ããã³ã°ã®æå£ã§ãã
BYOD
BYODïŒBring Your Own DeviceïŒããªã·ãŒãšã¯ãåŸæ¥å¡ããã®ä»ã®ã¹ã¿ãããå人ã®ããŒãããœã³ã³ãã¹ããŒããã©ã³ãè·å Žã«æã¡èŸŒã¿ãããããäŒæ¥ãããã¯ãŒã¯ã«æ¥ç¶ããããšãèš±å¯ãããã®ã§ãã
CASB (Cloud Access Security Broker)
CASBã¯ããŠãŒã¶ãŒãšã¯ã©ãŠããã©ãããã©ãŒã ã®ä»²ä»åœ¹ãšããŠãã¯ã©ãŠããµãŒãã¹ãå©çšããäŒæ¥ãæ±ããæ¿èªãå¯èŠåã®åé¡ã«å¯Ÿå¿ããã¯ã©ãŠãäžã®ããŒã¿ãä¿è·ããŸãã
CCPA
CCPAïŒCalifornia Consumer Privacy ActïŒãšã¯ãããã°ããã¯ã«ãããã¢ã¯ã»ã¹å¶åŸ¡ããã©ã€ãã·ãŒç®¡çã®äžåããããŒã¿æŒæŽ©ãå€çºããããšã«å¯ŸåŠããããã2018幎ã«å¶å®ãããã«ãªãã©ã«ãã¢å·æ¶è²»è ãã©ã€ãã·ãŒæ³ã®ããšã§ãã
Cerber RansomwareïœCerberã©ã³ãµã ãŠã§ã¢
Cerberã©ã³ãµã ãŠã§ã¢ã¯ã2016幎3æã«çºèŠãããŸãããRaaSïŒRansomware as a ServiceïŒåãã«ãŠã§ã¢ã§ããããããããã³ã°ãã³ãŒãã£ã³ã°ã®ã¹ãã«ããªããŠã誰ã§ãå°å ¥ããããšãå¯èœã§ãã
ChatGPT
ChatGPTã¯ãOpenAIã«ãã£ãŠéçºããããGPT-3(Generative Pretrained Transformer 3) ãšãåŒã°ããæå 端ã®AIãã£ãããããã§ãã
CISOïœæé«æ å ±ã»ãã¥ãªãã£è²¬ä»»è
CISOïŒChief Information Security OfficerïŒãšã¯ãäŒæ¥ã®ããŒã¿ãä¿è·ããããã«äœ¿çšãããµã€ããŒã»ãã¥ãªãã£æŠç¥ãèšèšããçµç¹å šäœã®ãªã¹ã¯ãè©äŸ¡ããŠããµã€ããŒé²åŸ¡ãæ¹åãã責任ããã€ãæé«æ å ±ã»ãã¥ãªãã£è²¬ä»»è ã®ããšã§ãã
Cloud Archiveïœã¯ã©ãŠãã¢ãŒã«ã€ã
ã¯ã©ãŠãããŒã¹ã®ã¢ãŒã«ã€ããœãªã¥ãŒã·ã§ã³ã¯ãããŒã¿ããªããµã€ãã®ã¯ã©ãŠããµãŒããŒã«ä¿åãã管çè ãå¿ èŠãªãªãœãŒã¹ãããããžã§ãã³ã°ããããšã§ãååãªã¹ãã¬ãŒãžå®¹éã§å®å šãªããã¯ã¢ãããäœæããããšãã§ããŸãã
Cloud Compliance | ã¯ã©ãŠãã³ã³ãã©ã€ã¢ã³ã¹
æ©å¯ããŒã¿ã第äžè ã®ã¯ã©ãŠããµãŒããŒã«ä¿åããå Žåããã®ç¬¬äžè ãã¹ãããã¹ãŠã®ããŒã¿ãã©ã€ãã·ãŒãšä¿è·ã®èŠå¶åºæºã«æºæ ããŠããããšãäžå¯æ¬ ã§ãã
Cloud DLP (Data Loss Prevention) | ã¯ã©ãŠãæ å ±æŒæŽ©å¯Ÿç
ã¯ã©ãŠãæ å ±æŒæŽ©å¯Ÿç (DLP) ã¯ãæ©å¯æ å ±ãéèŠæ å ±ããµã€ããŒæ»æè ãå éšç€Ÿå¡ã«ããæµåºããå®ããŸãã
Cloud Security | ã¯ã©ãŠãã»ãã¥ãªãã£
ã¯ã©ãŠãã³ã³ãã¥ãŒãã£ã³ã°ã¯ãã¯ã©ãŠããžã®ç§»è¡ãšã¢ãã€ã«ã¯ãŒã«ãŒãåºçŸ©ã«æããèšèã§ãæ°ããã»ãã¥ãªãã£ãšã³ã³ãã©ã€ã¢ã³ã¹äžã®ãªã¹ã¯ãçã¿åºããŸããã
Compliance Managementïœã³ã³ãã©ã€ã¢ã³ã¹ãããžã¡ã³ã
ãã¹ãŠã®äŒæ¥ã¯ãäŒæ¥æŽ»åãå«ççãã€å®å šã«è¡ãããã®èŠåã«åŸããªããã°ãªããŸãããããŒã¿ãITã€ã³ãã©ã管çããã³ã³ãã©ã€ã¢ã³ã¹èŠå¶ã¯ãäŒæ¥ãå°éå®¶ã«ãã£ãŠçå®ãããæ¹æ³ãçšããŠæ¶è²»è ããŒã¿ãä¿è·ããåŸæ¥å¡åã³ç¬¬äžè ãå«ççãªæ¹æ³ã§ããŒã¿ã«ã¢ã¯ã»ã¹ã§ããããã«ããŸãã
Compliance Risk | ã³ã³ãã©ã€ã¢ã³ã¹ãªã¹ã¯
ã³ã³ãã©ã€ã¢ã³ã¹èŠå¶ã¯ãæ£è ããŒã¿ã財åããŒã¿ãå人ãç¹å®ã§ããæ å ±ïŒPIIïŒãªã©ãæ¶è²»è ãšãã®å人ããŒã¿ãä¿è·ããããšãç®çãšããŠããŸãã
Computer Virus | ã³ã³ãã¥ãŒã¿ãŠã€ã«ã¹
ã³ã³ãã¥ãŒã¿ãŠã€ã«ã¹ãšã¯ãããã€ã¹ãããŒã«ã«ãããã¯ãŒã¯äžã§ç Žå£è¡çºãè¡ãããã«äœ¿çšãããæªè³ªãªã¢ããªã±ãŒã·ã§ã³ãããã°ã©ã ã®ããšãæããŸãã
Credential Stuffing | ã¯ã¬ãã³ã·ã£ã«ã¹ã¿ããã£ã³ã°æ»æ
ã¯ã¬ãã³ã·ã£ã«ã¹ã¿ããã£ã³ã°ã¯ãçãŸãããŠãŒã¶ãŒåãšãã¹ã¯ãŒãã䜿çšããŠãªã³ã©ã€ã³ãŠãŒã¶ãŒã¢ã«ãŠã³ãã«ã¢ã¯ã»ã¹ãããµã€ããŒè åšã§ãã
Cross-Site Scripting (XSS) | ã¯ãã¹ãµã€ãã¹ã¯ãªããã£ã³ã°
ã¯ãã¹ãµã€ãã¹ã¯ãªããã£ã³ã°ïŒXSSïŒãšã¯ãããŸããŸãªãŠã§ãã¢ããªã±ãŒã·ã§ã³ã§èŠãããã»ãã¥ãªãã£è匱æ§ã®ããšã§ãã
Cryptojacking | ã¯ãªãããžã£ããã³ã°
æå·é貚ã®äŸ¡å€ãé«ãŸããšããŠãŒã¶ãŒããæå·é貚ãçãããã«ãŠã§ã¢æ»æè ãå¢å ããŸãã
CryptoLocker
CryptoLocker ãšã¯ã©ã³ãµã ãŠã§ã¢ã®äžçš®ã§ãããã³ã³ãã³ããæå·åããããšã§ææããã³ã³ãã¥ãŒã¿ãŒãžã®ã¢ã¯ã»ã¹ãå¶éããŸãã
CryptoWallïœã¯ãªãããŠã©ãŒã«
CryptoWallãšã¯ãææããã³ã³ãã¥ãŒã¿äžã®ãã¡ã€ã«ãæå·åããããšã§åäœãã埩å·åããŒãåãåãããã«èº«ä»£éãæ¯æããããŠãŒã¶ãŒã«èŠæ±ããã©ã³ãµã ãŠã§ã¢ã®ããšã§ãã
CSPMãšã»ãã¥ãªãã£
å€ãã®çµç¹ããçµç¹ãéå¶ããããã«ãããªãã¯ã¯ã©ãŠãã€ã³ãã©ã«äŸåããŠããŸãããããããã®å€ãã誀ã£ãèšå®ã管çãããŠããŸãããã®çµæãé«é¡ã§æå®³ãªããŒã¿æŒæŽ©ãçºçããŠããŸãã
Cyber Crime | ãµã€ããŒç¯çœª
ãµã€ããŒç¯çœªãšã¯ãã³ã³ãã¥ãŒã¿ããããã¯ãŒã¯ããŸãã¯ãã®ä»ã®ããžã¿ã«ããã€ã¹ã䜿çšããŠè¡ãããããŸããŸãªç¯çœªæŽ»åãæãäžè¬çãªçšèªã§ãã
Cyber Hygiene
ãµã€ããŒãã€ãžãŒã³ïŒãµã€ããŒã»ãã¥ãªã㣠ãã€ãžãŒã³ãŸã㯠IT ãã€ãžãŒã³ïŒãšã¯ãã·ã¹ãã ãããã€ã¹ããããã¯ãŒã¯ãããŒã¿ã®å¥å šæ§ãšã»ãã¥ãªãã£ã®åŒ·éæ§ãç¶æããããã«ãå人ãçµç¹ã宿œããæ £è¡ãæé ãæããŸãã
Cyber Insurance | ãµã€ããŒä¿éº
ãµã€ããŒä¿éºã¯ããµã€ããŒã»ãã¥ãªãã£ã®äºè±¡ã«é¢é£ãããªã¹ã¯ãããã«ãã£ãŠçããã³ã¹ãã«å¯Ÿå¿ããããã®ä¿éºã§ãã
Cyber Kill Chain | ãµã€ããŒãã«ãã§ãŒã³
ãµã€ããŒãã«ãã§ãŒã³ã¯ããµã€ããŒæ»æã®å§ãŸãããæçµç®æšïŒéåžžã¯ããŒã¿æŒæŽ©ãã·ã¹ãã ã®äŸµå®³ïŒã«è³ããŸã§ã®æ®µéãæŠèª¬ããããã«ãããããŒãã»ããŒãã£ã³ã«ãã£ãŠéçºãããæŠå¿µã§ãã
Cyber-Attackïœãµã€ããŒæ»æ
ãµã€ããŒæ»æïŒãµã€ããŒã¢ã¿ãã¯ïŒãšã¯ãã·ã¹ãã äžã§é²è¡äžã®ããããè åšã®ç·ç§°ã§ãã
Cybersecurity / Network Security | ãµã€ããŒã»ãã¥ãªãã£ãšãããã¯ãŒã¯ã»ãã¥ãªãã£
ç°¡åã«èšãã°ããããã¯ãŒã¯ã»ãã¥ãªãã£ãšã¯ããµã€ããŒè åšãããããã¯ãŒã¯ãå®ãããã«ã匷åºãªä¿è·ææ®µãšæŽç·Žãããæè¡ãå®è£ ããããšã§ãã
Cybersecurity | ãµã€ããŒã»ãã¥ãªãã£
ãµã€ããŒã»ãã¥ãªãã£ãšã¯ãäžæ£ã¢ã¯ã»ã¹ãæ¹ããããŸãã¯åŠšå®³ããããžã¿ã«ãšã³ã·ã¹ãã ãå®ãããã«å±éãããæŠç¥ãšå®è·µãæããŸãã
Dark Web | ããŒã¯ãŠã§ã
ããŒã¯ãŠã§ããšã¯ãæå·åãããã€ã³ã¿ãŒãããã®äžéšã§ãããéåžžã®ãŠã§ããã©ãŠã¶ã§ã¯ã¢ã¯ã»ã¹ã§ããªãé ãããé åãæããŸãã
Data Archiving | ããŒã¿ã¢ãŒã«ã€ã
ããŒã¿ã¢ãŒã«ã€ãã¯ãå€ãããŒã¿ãåéãå®å šãªå Žæã«ç§»åããããšãæããŸããç§åŠææ»çã§å¿ èŠã«ãªã£ãéã«ãåãåºããå Žæã«ããŒã¿ãä¿ç®¡ããããšã§ãã
Data BreachïœããŒã¿äŸµå®³
ããŒã¿äŸµå®³ã¯ãããŒã¿ãçãŸããããèš±å¯ãããŠããªã第äžè ã«å ¬éããããããããšã§çºçããŸãã
Data Center Security | ããŒã¿ã»ã³ã¿ãŒã»ãã¥ãªãã£
äŒæ¥ã®ã€ã³ãã©ãããŒã¿ã»ã³ã¿ãŒã«å容ãããŠããå Žåããã®ç¬¬äžè æ ç¹ã®ç©ççã»ä»®æ³çãªå®å šæ§ã確ä¿ããããšãäžå¯æ¬ ã§ããããŒã¿ã»ã³ã¿ãŒã®ã»ãã¥ãªãã£ã«ã¯ãäŒæ¥ããŒã¿ãæ»æè ããå®ãããã®ç©ççããã³ä»®æ³çãªãµã€ããŒã»ãã¥ãªãã£ãå«ãŸããŸãã
Data Center | ããŒã¿ã»ã³ã¿ãŒ
ããŒã¿ã»ã³ã¿ãŒãšã¯ãå€§èŠæš¡ãªã³ã³ãã¥ãŒã¿ãŒ ã·ã¹ãã ããµãŒããŒããããã¯ãŒã¯æ©åšãã¹ãã¬ãŒãžã€ã³ãã©ãå容ã»ç®¡çããããã«èšèšãããå°éæœèšã®ããšã§ãã
Data Classification | ããŒã¿åé¡
ããŒã¿åé¡ãšã¯ããã¡ã€ã«ããã®ä»ã®éèŠãªããžãã¹æ å ±ãå®çŸ©ããåé¡ããææ³ã®ããšã§ãã
Data Exfiltration | ããŒã¿æŒæŽ©
ããŒã¿æŒæŽ©ãšã¯ããµãŒããå人ã®ã³ã³ãã¥ãŒã¿ã®ããŒã¿ãç¡èš±å¯ã§ã³ããŒã転éããŸãã¯ååŸãããããšãæããŸãã
Data GovernanceïœããŒã¿ã¬ããã³ã¹
ããŒã¿ã¬ããã³ã¹ãšã¯ãäŒæ¥ã®ããŒã¿ãšãã®ã»ãã¥ãªãã£ãç¶æããããã«çå®ãããæŠç¥ãã«ãŒã«ã®ããšã§ãã
Data Leak | æ å ±æŒæŽ©
æ å ±æŒæŽ©ãšã¯ãæ©å¯æ§ã®é«ãæ å ±ãä¿è·ãããæ å ±ããŸãã¯ç§å¯æ å ±ãæ¬æ¥ã®ç°å¢å€ã«æå³ããã«é²åºããããšã§ãã
Data Loss Prevention (DLP)
DLPïŒdata loss preventionïŒãšã¯ããããã¯ãŒã¯ç®¡çè ããŠãŒã¶ãŒã®è»¢éã§ããããŒã¿ãå¶åŸ¡ããæ©å¯ãŸãã¯éèŠãªæ å ±ãäŒæ¥ãããã¯ãŒã¯ã®å€éšã«æŒæŽ©ããªãããã«ãããœãããŠã§ã¢ãæããŸãã
Data Masking | ããŒã¿ãã¹ãã³ã°
Data masking, also known as data obfuscation or data anonymization, is a cybersecurity technique that generates a fundamentally similar but artificial form of an organizationâs data.
Data Privacy | ããŒã¿ãã©ã€ãã·ãŒ
ããŒã¿ãã©ã€ãã·ãŒãšã¯ãå人æ å ±ã®é©åãªåãæ±ããšä¿è·ã«é¢ããæŠå¿µã§ãã
Data ProtectionïœããŒã¿ä¿è·
æ»æè ã¯æ¥ã ãäŒæ¥ãã貎éãªæ©å¯ããŒã¿ãçã¿åºãããšçã£ãŠããŸãããã®ãããããŒã¿ïŒæ å ±ä¿è·æŠç¥ã§ã¯ãæ»æè ã黿¢ããããã®ã€ã³ãã©ãšããªã·ãŒã®æ§ç¯ã«éç¹ã眮ããŠããŸãã
Data Security | ããŒã¿ã»ãã¥ãªãã£
ããŒã¿ã»ãã¥ãªãã£ãšã¯ãæ©å¯æ å ±ãæ»æè ããä¿è·ããããã«çšããããå®è·µãæŠç¥ãæé ãããã³è»œæžæè¡ãæããŸãã
DDoSæ»æ
DDoSæ»æ (Distributed Denial of Service attack) ã¯ãç¹å®ã®ãµãŒãããµãŒãã¹ããããã¯ãŒã¯äžã®ãã©ãã£ãã¯ã劚害ããæªè³ªè¡çºã§ãã
Deepfake Technology | ãã£ãŒããã§ã€ã¯
ãã£ãŒããã§ã€ã¯ãšã¯ãAIãšæ©æ¢°åŠç¿ïŒMLïŒã®æè¡ã䜿çšããŠãéåžžã«ãªã¢ã«ã«èŠããé³å£°ãåç»ãç»åã®çæãŸãã¯æäœãè¡ãé«åºŠã«ç·Žãããåæã¡ãã£ã¢ã®åœ¢åŒãæããŸãã
Digital Signature | ããžã¿ã«çœ²å
ããžã¿ã«çœ²åãšã¯ãæå·æè¡ãçšããŠããžã¿ã«ã¡ãã»ãŒãžãææžã®çæ£æ§ãšå®å šæ§ãæ€èšŒããæ°åŠçãªãããã³ã«ã®ããšãæããŸãã
Disaster Recoveryïœãã£ã¶ã¹ã¿ãªã«ããª
ãã£ã¶ã¹ã¿ãªã«ããªãšã¯ãåºçŸ©ã«ã¯ãçµç¹ã®éå¶ãã€ã³ãã©ã«æªåœ±é¿ãåãŒã倧æšäºã«å¯Ÿå¿ãããããã埩æ§ããçµç¹ã®èœåã®ããšã§ãã
DKIM
DKIM (DomainKeys Identified Mail) ã¯ãããã³ã«ã® 1 ã€ã§ãçµç¹ãã¡ãã»ãŒãžãéä¿¡ããéã«çœ²åãããã¡ãŒã«ããã¯ã¹ ãããã€ããŒããããæ€èšŒãããšãããã®ã§ãã
DMARC
.jp-news { display:flex; /*暪䞊ã³*/ } dl.jp-news { margin-left:40px; } .jp-news dt { /å·Šã«å¯ãã/ float: left ; /åŸç¶ã®å·Šå¯ããè§£é€/ clear: left ; margin-right: 0.5em ; /* width: 120px ; */ } .jp-news dd { float: left ; margin-left: 1em ; }
DNS
DNSïŒãã¡ã€ã³ ããŒã ã·ã¹ãã ïŒãšã¯ãæ°åã®çµã¿åããã§ããIPã¢ãã¬ã¹ããã³ã³ãã¥ãŒã¿ããã®ä»ã®æ¥ç¶ããã€ã¹ã§äººãèªã¿åãå¯èœãªãã¡ã€ã³åã«å€æããã·ã¹ãã ã§ãã
DNS Spoofing|DNSã¹ããŒãã£ã³ã°
DNSïŒDomain Name ServiceïŒã¹ããŒãã£ã³ã°ãšã¯ãDNSãµãŒããŒã®ãšã³ããªããã€ãºãã³ã°ããæšçãšãªããŠãŒã¶ãŒãæ»æè ã®ã³ã³ãããŒã«äžã«ããæªæã®ãããŠã§ããµã€ãã«ãªãã€ã¬ã¯ããããããšã§ãã
Doxing | ããã·ã³ã°
ããã·ã³ã°ïŒDoxingïŒãšã¯ãæªæãæã£ãŠå人æ å ±ãåéãå ¬éãããµã€ããŒæ»æææ³ã§ããããã¯ã·ã³ã°ããdoxxingããd0xingããšããŠãç¥ãããŠããŸãã
E-Discovery | eãã£ã¹ã«ããªãŒ
eDiscoveryãšã¯ãã¡ãŒã«ãå«ãããžãã¹äžã®é£çµ¡ãããã®ä»ã®ããŒã¿ã®äžããã蚎èšã§å©çšå¯èœãªæ³ç蚌æ ãæ¢ãåºã段éãå«ããç±³åœã®é»å蚌æ é瀺å¶åºŠã®ããšã§ãã
Email Account Compromise (EAC) | Eã¡ãŒã«ã¢ã«ãŠã³ã䟵害
EACïŒEã¡ãŒã«ã¢ã«ãŠã³ã䟵害ïŒãšã¯ãæ»æè ããã¹ã¯ãŒãã¹ãã¬ãŒããã£ãã·ã³ã°ããã«ãŠã§ã¢ãªã©ããŸããŸãªæå£ã䜿ã£ãŠè¢«å®³è ã®ã¡ãŒã«ã¢ã«ãŠã³ãã䟵害ããæ£èŠã®ã¡ãŒã«ããã¯ã¹ã«ã¢ã¯ã»ã¹ã§ããããã«ããé«åºŠã«æŽç·Žãããæ»æã§ãã
Email Archiving | ã¡ãŒã«ã¢ãŒã«ã€ã
ã¡ãŒã« ã¢ãŒã«ã€ããšã¯ãããžã¿ã«ã§ä¿åãã€ã³ããã¯ã¹äœæãæ€çŽ¢ãååŸã§ãã圢åŒã§ã¡ãŒã«éä¿¡ããŒã¿ãä¿ç®¡ããã·ã¹ãã ããããŸããçµç¹ãã¡ãŒã« ã¢ãŒã«ã€ã ãœãªã¥ãŒã·ã§ã³ ãæ¡çšããã«ã¯äž»ã«æ¬¡ã®ãããªçç±ããããŸãã
Email Authentication | éä¿¡ãã¡ã€ã³èªèšŒ
ããžã¿ã«äžçã«ãããŠãéä¿¡ãã¡ã€ã³èªèšŒã¯ãã¡ãŒã«ã¡ãã»ãŒãžã®æ£åœæ§ãšåºæã確èªããããã«èšèšãããæè¡ãšãããã³ã«ã®éåäœã§ãã
Email Encryption | ã¡ãŒã«æå·å
ã¡ãŒã«ã®æå·åãšã¯ãã¡ãŒã«ã¡ãã»ãŒãžã®å å®¹ãæ·»ä»ãã¡ã€ã«ããšã³ã³ãŒããŸãã¯ã¹ã¯ã©ã³ãã«ãã第äžè ã«ããäžæ£ã¢ã¯ã»ã¹ãååãé²ãããã»ã¹ã§ãã
Email Filtering | ã¡ãŒã«ãã£ã«ã¿ãªã³ã°
ã¡ãŒã«ãã£ã«ã¿ãªã³ã°ãšã¯ãçµç¹ã®ã€ã³ããŠã³ããšã¢ãŠãããŠã³ãã®ã¡ãŒã«ãã©ãã£ãã¯ããã£ã«ã¿ãŒããåŠçãæããŸããã€ã³ããŠã³ãã®ã¡ãŒã«ãã£ã«ã¿ãªã³ã°ã¯ããŠãŒã¶ãŒå®ãŠã®ã¡ãã»ãŒãžãã¹ãã£ã³ããããŸããŸãªã«ããŽãªã«åé¡ããŸãã
Email Gateway | ã¡ãŒã«ã²ãŒããŠã§ã€
ã»ãã¥ã¢ ã¡ãŒã« ã²ãŒããŠã§ã€ (SEG) ãšã¯ãéåä¿¡ãããã¡ãŒã«ã®ç£èŠã«äœ¿çšãããããã€ã¹ãŸãã¯ãœãããŠã§ã¢ãæããŸããSEG ã¯ãæãŸãããªãã¡ãŒã«ã黿¢ããåé¡ã®ãªãã¡ãŒã«ãéä¿¡ããããèšèšãããŠããŸãã
Email Protection | ã¡ãŒã«ã»ãã¥ãªãã£å¯Ÿç
ã¡ãŒã«ã»ãã¥ãªãã£å¯Ÿç (Email Protection) ã¯ãã»ãã¥ãªãã£æè¡ã®å°å ¥ãšããã¬ãŒãã³ã°ãçµã¿åããããã®ã§ãããã¬ãŒãã³ã°ã®å¯Ÿè±¡ã«ã¯ãåŸæ¥å¡ãé¢ä¿äŒæ¥ã顧客ãå«ã¿ãã¡ãŒã«ãä»ããŠãããã¯ãŒã¯ãžäŸµå ¥ããæ»æã«åããŸãã
Email Scams | ã¡ãŒã«è©æ¬º
ã¡ãŒã«ã¯ã誰ãšã§ãã³ãã¥ãã±ãŒã·ã§ã³ããšããéåžžã«äŸ¿å©ãªææ®µã§ããããããæ»æè ãééãå£åº§æ å ±ãæ©å¯æ å ±ãªã©ãçãããã®äž»èŠãªããŒã«ã§ããããŸãã
Email Security | ã¡ãŒã«ã»ãã¥ãªãã£
ã¡ãŒã«ã»ãã¥ãªãã£ã¯ãã¡ãŒã«ã¢ã«ãŠã³ããã¡ãŒã«ã®å 容ãã³ãã¥ãã±ãŒã·ã§ã³ãäžæ£ã¢ã¯ã»ã¹ãæŒæŽ©ã䟵害ããå®ããããŸããŸãªæè¡ãæé ã®ç·ç§°ã§ãã
Email Spoofing | ãªãããŸãã¡ãŒã«
ãªãããŸãã¡ãŒã«(Email Spoofing)ã¯ãã¹ãã ããã£ãã·ã³ã°æ»æã§çšããããææ³ã§ãã
Encryption | æå·å
æå·åãšã¯ãããŒã¿ãèªã¿åãå¯èœãªåœ¢åŒããæå·åããŒã䜿çšããŠåŸ©å·åãããåŸã«ã®ã¿èªã¿åãããšã³ã³ãŒã圢åŒã«å€æããããŒã¿ã»ãã¥ãªãã£ã®æ¹æ³ã§ããæå·åã¯ãã¡ãã»ãŒãžãæ å ±ããšã³ã³ãŒãããäžè¬çãªããã»ã¹ã§ãããèš±å¯ãããåœäºè ã®ã¿ãã¢ã¯ã»ã¹ã§ããèš±å¯ãããŠããªãè ã¯ã¢ã¯ã»ã¹ã§ããŸããã
Endpoint Detection and Response (EDR)
EDRïŒEndpoint Detection and ResponseïŒãšã¯ãçµç¹ã®ãšã³ããã€ã³ãã«ãããæªæã®ããæŽ»åãç£èŠãæ€ç¥ã察å¿ããããã«èšèšããããµã€ããŒã»ãã¥ãªãã£ã»ãœãªã¥ãŒã·ã§ã³ã®äžçš®ã§ãã
Endpoint Securityïœãšã³ããã€ã³ãã»ãã¥ãªãã£
ãšã³ããã€ã³ãã»ãã¥ãªãã£ã«ã¯ãäŒæ¥ãããã¯ãŒã¯äžã®ãã¹ãŠã®ããã€ã¹ãšã¢ã¯ã»ã¹ãã€ã³ããä¿è·ããããã®æŠç¥ããœãããŠã§ã¢ãããŒããŠã§ã¢ãå«ãŸããŸãã
Endpoint-Delivered Threats | ãšã³ããã€ã³ãã§éè¡ãããè åš
æ»æè ã¯ãææãããUSBãã©ã€ããçµç¹ã®é§è»å ŽåšèŸºã«çœ®ããŠãããšãããããªæŠç¥ã䜿çšããå ŽåããããŸããåŸæ¥å¡ãæŸã£ãŠããããã¯ãŒã¯ã«æ¥ç¶ããã·ã¹ãã ã«å·®ã蟌ãããšãäºæãããã®ã§ãã
Enterprise Security | ãšã³ã¿ãŒãã©ã€ãºã»ãã¥ãªãã£
ãšã³ã¿ãŒãã©ã€ãºã»ãã¥ãªãã£ã¯ãè åšã¢ã¯ã¿ãŒããäŒæ¥ãæ³äººãå®ãããã«çšããããå šäœçãªæŠç¥ãšæé ã§æ§æãããŸãããããã®è åšã¢ã¯ã¿ãŒã¯ãå€éšã®ããã«ãŒã§ãã£ããã瀟å ã®åŸæ¥å¡ãè«è² æ¥è ã§ãã£ããããŸãã
EUMïœãšã³ããŠãŒã¶ãŒã¢ãã¿ãªã³ã°
ãŠãŒã¶ãŒã®è¡åã远跡ããããšã¯ãããŒã±ãã£ã³ã°æŽ»åã«ãããŠéåžžã«éèŠã§ããã管çè ãäžæ£è¡çºãç¹å®ã»æ€ç¥ããããã黿¢ããã®ã«ã圹ç«ã¡ãŸãã
FERPA (Family Educational Rights And Privacy Acts)
Family Educational Rights and Privacy ActsïŒFERPAïŒãšã¯å®¶æã®æè²ã®æš©å©ãšãã©ã€ãã·ãŒã«é¢ããæ³åŸã®ããšã§ããŠãŒã¶ãŒã®ããŒã¿ãä¿è·ããããã«1974幎ã«å¯æ±ºãããŸããã
Firewallïœãã¡ã€ã¢ãŠã©ãŒã«
ãã¡ã€ã¢ãŠã©ãŒã«ã¯ãã»ãã¥ãªãã£ã®ç¬¬äžç·ã§æŽ»èºããé²åŸ¡ææ®µã§ããããã§ã¯ããã®ä»çµã¿ã«ã€ããŠã玹ä»ããŸãã
GameOver Zeus (GOZ)ïœã²ãŒã ãªãŒããŒãŒãŠã¹
Zeusã¯ã2005幎ã«åããŠçºèŠããããã«ãŠã§ã¢ãã¡ããªãŒã§ããGameOver ZeusïŒGOZïŒã¯ããªãªãžãã«ã®Zeusã®éèå£åº§ççšã³ã³ããŒãã³ãã«å ããŠãã©ã³ãµã ãŠã§ã¢ã³ã³ããŒãã³ããæã€é«åºŠãªäºçš®ã§ãã
GDPR | EU äžè¬ããŒã¿ä¿è·èŠå
EU äžè¬ããŒã¿ä¿è·èŠå (GDPR) ã¯ããŒã¿ä¿è·ã«é¢ããèŠå®ã§ããã2018 å¹Žã«æœè¡ãããŸããã
Graymail | ã°ã¬ãŒã¡ãŒã«
ã°ã¬ãŒã¡ãŒã«ãšã¯ãæ£èŠã®ãœãŒã¹ããéä¿¡ãããå¿çã¡ãŒã«ã§ãå¥ã ã®åä¿¡è ã«ãšã£ãŠç°ãªã䟡å€ãæã€ãããã¹ãã ã®å®çŸ©ã«ã¯åœãŠã¯ãŸããªã倧éã¡ãŒã«ãæããŸãã
Hacking | ãããã³ã°
ãããã³ã°ã¯ãçµç¹ã®ã³ã³ãã¥ãŒã¿ã·ã¹ãã ããããã¯ãŒã¯ã®è匱æ§ãæªçšããããžã¿ã«è³ç£ã«å¯Ÿããäžæ£ã¢ã¯ã»ã¹ãŸãã¯å¶åŸ¡ãåŸãè¡çºãšããŠåºãå®çŸ©ãããŠããŸãã
Hacktivism | ãã¯ãã£ããºã
ããã¯ãã£ããºã ããšã¯ããããã¯ããšãã¢ã¯ãã£ããºã ããçµã¿åãããèšèã§ããç¹å®ã®æ»æè ã®æå³ã説æããããã®èšèã§ãã
HIPAA Compliance | HIPAAã³ã³ãã©ã€ã¢ã³ã¹
HIPAAïŒHealth Insurance Portability and Accountability ActïŒã¯ãå»çä¿éºã®æºè¡æ§ãšè²¬ä»»ã«é¢ããæ³åŸããšèš³ããããä¿è·å¯Ÿè±¡ä¿éºæ å ±ïŒPHIïŒProtected health informationïŒããæ±ãäŒæ¥ã«ç©ççãããžã¿ã«äžã§ãããã³æç¶ãäžã§ã®ã»ãã¥ãªãã£ãŒå¯Ÿçãè¬ããããã«åŸãããšãèŠå®ããŠããŸãã
Honeypot ïœ ãããŒããã
ãµã€ããŒã»ãã¥ãªãã£ã§ã®ãããŒããããšã¯ããµã€ããŒæ»æè ãåŒãä»ããããã«èšèšãããåœè£ ã»ãã¥ãªãã£ã¡ã«ããºã ã§ãã»ãã¥ãªãã£ç ç©¶è ãæ»æè ã®è¡åãç®çã芳å¯ããããã«èšèšãããŠããŸãã
Human Firewall | ãã¥ãŒãã³ãã¡ã€ã¢ãŠã©ãŒã«
ãã¥ãŒãã³ ãã¡ã€ã¢ãŠã©ãŒã«ãšã¯ããµã€ããŒè åšã«å¯Ÿæãããããçµç¹å ã®åŸæ¥å¡äžäººã²ãšããèšç·ŽãåããŠæ ãåºæ¬çãªé²åŸ¡ã®åœ¹å²ãæããŸãã
IAMïŒIdentity and Access ManagementïŒ
IAMïŒIDãšã¢ã¯ã»ã¹ç®¡çïŒãšã¯ãçµç¹ãããžã¿ã«ã¢ã€ãã³ãã£ãã£ã管çããã³ã³ãã¥ãŒã¿ãããã¯ãŒã¯å ã®ããŒã¿ãã·ã¹ãã ãããã³ãªãœãŒã¹ãžã®ãŠãŒã¶ãŒã¢ã¯ã»ã¹ãå¶åŸ¡ããããã®ããªã·ãŒãããã»ã¹ãããã³æè¡ã®ãã¬ãŒã ã¯ãŒã¯ã§ãã
Identity Theft | å人æ å ±çªç
å人æ å ±çªçãšã¯ã誰ããããªãã®ååã瀟äŒä¿éçªå·ãéè¡å£åº§çªå·ãã¯ã¬ãžããã«ãŒãããŒã¿ãªã©ã®å人æ å ±ãçãã§ãè©æ¬ºãä»ã®ç¯çœªæŽ»åãè¡ãããšã§ãã
Identity Threat Detection & Response (ITDR)
ITDRïŒIdentity Threat Detection and ResponseïŒãšã¯ããŠãŒã¶ãŒ ID ãš ID ããŒã¹ã®ã·ã¹ãã ããµã€ããŒè åšããä¿è·ããããšã«éç¹ã眮ãããæå 端ã®ãµã€ããŒã»ãã¥ãªãã£ã»ãœãªã¥ãŒã·ã§ã³ã§ãã
Incident Responseïœã€ã³ã·ãã³ã察å¿
ã€ã³ã·ãã³ã察å¿ïŒã€ã³ã·ãã³ãã¬ã¹ãã³ã¹ïŒãšã¯ãçµç¹ããµã€ããŒè åšãç¹å®ã察åŠãããã³åŸ©æ§ããããã«äŸåããäœç³»çãã€èšç»çãªã¢ãããŒãã®ããšã§ãã
Information Seeking Scams | æ å ±ãèŠæ±ããã¹ãã£ã
ã¹ãã£ããŒïŒè©æ¬ºåž«ïŒã®ç®çã¯æ å ±ã§ãã¡ãŒã«åä¿¡è ãã ãŸããŠæ å ±ãåŒãåºãããšããŸãã ã¹ãã£ããŒã¯ãçµç¹å³ããäŒæ¥ãªãœãŒã¹ãžã®ãŠãŒã¶ãŒåããã¹ã¯ãŒãçã®éèŠãªæ å ±ãåéããŸãã
Insider Threat | å éšè åš
å éšè åšïŒã€ã³ãµã€ããŒè åšïŒãšã¯ãäŒæ¥ãšãããšããããŠããé¢ä¿è ãããŒã¿ã®ã¢ã¯ã»ã¹æš©ãæªçšããŠãçµç¹ã®éèŠãªæ å ±ãã·ã¹ãã ã«æªåœ±é¿ãåãŒãããšã§ãã
Intrusion Detection System (IDS) | äŸµå ¥æ€ç¥ã·ã¹ãã
IDSã¯ããããã¯ãŒã¯ãã©ãã£ãã¯ãã·ã¹ãã ã¢ã¯ãã£ããã£ã詳现ã«ç£èŠããæœåšçãªéåãäžæ£ã¢ã¯ã»ã¹ããŸãã¯æªæã®ããæŽ»åãæ€ç¥ããããã®é«åºŠãªããã€ã¹ãŸãã¯ãœãããŠã§ã¢ ã¢ããªã±ãŒã·ã§ã³ã§ãã
Intrusion Prevention System (IPS)
IPSïŒäžæ£äŸµå ¥é²æ¢ã·ã¹ãã ïŒã¯ãã³ã³ãã¥ãŒã¿ ãããã¯ãŒã¯ãã·ã¹ãã å ã§ã®äžæ£ã¢ã¯ã»ã¹ãæªæã®ããæŽ»åãæœåšçãªè åšãæ€ç¥ããç©æ¥µçã«ãããã¯ãŸãã¯è»œæžããããã«èšèšãããã»ãã¥ãªãã£æè¡ã§ãã
IoC (Indicators of Compromise) | 䟵害ã®çè·¡
ãµã€ããŒã»ãã¥ãªãã£ã€ã³ã·ãã³ãã«ãããŠãããŒã¿äŸµå®³ã®ææããã蚌æ ãšãªãã®ããIoC (Indicators of Compromise)ãã§ããæ¥æ¬èªã§ã¯ãã䟵害ã®çè·¡ããæå³ããæ»æãçºçããããšã ãã§ãªããå€ãã®å Žåãæ»æã«ã©ã®ãããªããŒã«ã䜿çšããããããã®èåŸã«èª°ãããããæããã«ããŸãã
IoT (Internet of Things) | ã¢ãã®ã€ã³ã¿ãŒããã
IoT ïŒInternet of ThingsïŒ ãšã¯ãèªåçã«ã¯ã©ãŠãã«æ¥ç¶ãããäžçäžã®ããã€ã¹ã®ããšãæãããªã³ã©ã€ã³ãµãŒããŒããããŒã¿ãä¿åããããã³ãã³ããå®è¡ãããããããšã§æ©èœããŸãã
IoT Security | IoTã»ãã¥ãªãã£
IoTïŒInternet of ThingsïŒã»ãã¥ãªãã£ãšã¯ãããŒã ãªãŒãã¡ãŒã·ã§ã³ãSCADAãã·ã³ãã»ãã¥ãªãã£ã«ã¡ã©ãªã©ãã¯ã©ãŠãã«çŽæ¥æ¥ç¶ãããããã€ã¹ã®å®å šå¯Ÿçãšä¿è·ãè¡ããã®ã§ãã
IP Address | IPã¢ãã¬ã¹
IPïŒã€ã³ã¿ãŒããããããã³ã«ïŒã¢ãã¬ã¹ãšã¯ãéä¿¡ã«ã€ã³ã¿ãŒããããããã³ã«ã䜿çšããã³ã³ãã¥ãŒã¿ãããã¯ãŒã¯ã«æ¥ç¶ãããåããã€ã¹ã«å²ãåœãŠãããåºæã®æ°å€ã©ãã«ã§ãã
Keyloggers | ããŒãã¬ãŒ
ããŒãã¬ãŒã®æŠèŠ ããŒãã¬ãŒã®ä»çµã¿ ããŒãã¬ãŒã®æ€åºæ¹æ³ãšããŒã« ããŒãã¬ãŒã®é§é€æ¹æ³
Lateral Movement | ã©ãã©ã«ã ãŒãã¡ã³ã
ã©ãã©ã«ã ãŒãã¡ã³ããšã¯ããµã€ããŒç¯çœªè ãåæã®ã¢ã¯ã»ã¹ãåŸãåŸããããã¯ãŒã¯å ãé²ãããã«äœ¿çšããæé ãææ³ãæå³ããŠããŸãã
Longliningïœãã³ã°ã©ã€ãã³ã°
倧éã®ã«ã¹ã¿ãã€ãºããããã£ãã·ã³ã°ã¡ãã»ãŒãžã§ããããŠãã®å Žåãæšçåæ»æããŸããŠã倧éã«å±ããã¡ãã»ãŒãžã«ã¯èŠããªãããæå³ãããŠããŸãã æ»æè ã¯ã倧éããŒã±ãã£ã³ã°ãã£ã³ããŒã³ã«äœ¿çšãããã¢ãããŒããæŽ»çšããæ°çŸäžä»¶ãã®é¡äŒŒç¹ã®ãªãã¡ãã»ãŒãžãçæããŸãã ã¡ãŒã«ã®å 容ãä»¶åãéä¿¡è ã®IPã¢ãã¬ã¹ãéä¿¡è ã®ã¡ãŒã«ã¢ã«ãŠã³ãããã³URLãããŒããŒã·ã§ã³äœ¿çšã§ããã¡ãŒã«çæã³ãŒããšã€ã³ãã©ã¹ãã©ã¯ãã£ã§ãããè¡ããŸãã
Machine Learning | æ©æ¢°åŠç¿
æ©æ¢°åŠç¿ïŒãã·ã³ã©ãŒãã³ã°ïŒãšã¯ã人工ç¥èœã®äžæ žçãªéšåã§ãããã³ã³ãã¥ãŒã¿ã·ã¹ãã ãããŒã¿å ¥åããåŠç¿ããæç€ºçã«ããã°ã©ã ãããããšãªãèªåŸçã«æ¹åããæè¡ãæããŸãã
Malicious Email Attachments | æªæã®ããã¡ãŒã«æ·»ä»ãã¡ã€ã«
æ»æè ã¯ãããŒã¿ç Žå£ãæ å ±ççšãå¯èœãªãã«ãŠã§ã¢ãã€ã³ã¹ããŒã«ãããã¡ã€ã«ãã¡ãŒã«ã«æ·»ä»ããŸãã ããããææã«ã¯ãæ»æè ã«ç»é¢ãžã®ã¢ã¯ã»ã¹ãäžããŠãæ»æè ã«ãããŠãŒã¶ãŒã®ã³ã³ãã¥ãŒã¿ãŒã®å¶åŸ¡ããããŒã¹ãããŒã¯ã®ä¿åãä»ã®ãããã¯ãŒã¯ã·ã¹ãã ãžã®ã¢ã¯ã»ã¹ãªã©ãèš±ããŠããŸããã®ããããŸãã
Malware | ãã«ãŠã§ã¢
ãã«ãŠã§ã¢ãšã¯ãäžè¬çãªãµã€ããŒæ»æã§ããããšã³ããŠãŒã¶ãŒã®ã·ã¹ãã ããµãŒããŒã«éä¿¡ããã³ã€ã³ã¹ããŒã«ããããããŸããŸãªçš®é¡ã®æªæã®ããããã°ã©ã ã®ç·ç§°ã§ãã
Managed Security Service Provider (MSSP) | ãããŒãžãã»ãã¥ãªãã£ãµãŒãã¹ãããã€ããŒ
MSSPãšã¯ãäŒæ¥ã®æ¥ã ã®ã»ãã¥ãªãã£éçšã管çãããµãŒãããŒãã£ãããã€ããŒã§ãã
MFA (Multifactor Authentication) | å€èŠçŽ èªèšŒ
ãŠãŒã¶ãŒã¢ã«ãŠã³ãã®å®å šæ§ãé«ããããã«ãŒå¯ŸçãšããŠãå€èŠçŽ èªèšŒ (MFA) ãå°å ¥ãããŠããŸãããã£ãã·ã³ã°ããœãŒã·ã£ã«ãšã³ãžãã¢ãªã³ã°ã§ãŠãŒã¶ãŒãã¹ã¯ãŒããæã«å ¥ããå Žåã§ãã 2ã€ç®ã®èŠçŽ ã§ããèªèšŒèŠä»¶ãæºãããªããã°æ»æè ã¯ã¢ã«ãŠã³ãèªèšŒãã§ããŸãããå€èŠçŽ èªèšŒã§ã¯ãçäœèªèšŒãã»ãã¥ãªãã£ããŒã¯ã³ (PIN) ãäœçœ®æ å ±ãå«ããããã€ãã®æ¹æ³ãæ¡çšããŠããŸãã
MITRE ATT&CK Framework | ãã€ã¿ãŒã¢ã¿ãã¯
MITRE ATT&CKïŒãã€ã¿ãŒã¢ã¿ãã¯ïŒãã¬ãŒã ã¯ãŒã¯ãšã¯ããµã€ããŒæ»æè ãçµç¹ã®ã»ãã¥ãªãã£ã·ã¹ãã ã䟵害ããããã«å©çšããæŠè¡ãæè¡ããŸãšããå æ¬çãªç¥èããŒã¹ã®ããšã§ãã
Mobile Securityïœã¢ãã€ã«ã»ãã¥ãªãã£
ã¢ãã€ã«ã»ãã¥ãªãã£ãšã¯ãã¹ããŒããã©ã³ãã¿ãã¬ãããããŒãããœã³ã³ãªã©ãã¢ãã€ã«ããã€ã¹ãä¿è·ããããã®æŠç¥ãã€ã³ãã©ããœãããŠã§ã¢ã®ããšã§ãã
Multicloud | ãã«ãã¯ã©ãŠã
ãã«ãã¯ã©ãŠããšã¯è€æ°ã®ã¯ã©ãŠããå©çšããããšãæããŸãã
MX Record | MXã¬ã³ãŒã
MXïŒMail ExchangeïŒ ã¬ã³ãŒã ãšã¯ãç¹å®ã® DNS ã¬ã³ãŒãã§ããããã¡ã€ã³ã«éä¿¡ãããã¡ãŒã«ãé©åãªã¡ãŒã«ãµãŒããŒã«æ¯ãåãã圹å²ãæãããŸãã
Natural Language Processing (NLP) | èªç¶èšèªåŠç
èªç¶èšèªåŠçïŒNLPïŒã¯ã人工ç¥èœã®äžåéã§ãã³ã³ãã¥ãŒã¿ãŒã«èªç¶ãªè©±ãæ¹ãæå³ãèªåœãåŠç¿ãã人éãçè§£ããèœåãäžããŸãã
Network-Delivered Threats | ãããã¯ãŒã¯ã§éè¡ãããè åš
ãããã¯ãŒã¯ã§éè¡ãããè åšã«ã¯ãéåžž2ã€ã®åºæ¬çãªã¿ã€ãããããŸãã
OAuth
OAuthïŒèªã¿æ¹ïŒãªãŒãªãŒã¹ïŒã¯ããŠãŒã¶ãŒãèªåã®ã¢ã«ãŠã³ããã¹ã¯ãŒããå ±æããããšãªãããµãŒãããŒãã£ã¢ããªã±ãŒã·ã§ã³ã«èªåã®ããŒã¿ãžã®ã¢ã¯ã»ã¹ãèš±å¯ãããããã³ã«ã§ãã
OSI Model | OSIåç §ã¢ãã«
OSIïŒOpen Systems InterconnectionïŒåç §ã¢ãã«ãšã¯ããããã¯ãŒã¯ã·ã¹ãã ãã©ã®ããã«éä¿¡ããéä¿¡è ããåä¿¡è ã«ããŒã¿ãéä¿¡ããããå®çŸ©ããæŠå¿µçãªãã¬ãŒã ã¯ãŒã¯ã§ãã
OSS (Open Source Software) | ãªãŒãã³ãœãŒã¹ ãœãããŠã§ã¢
ãªãŒãã³ãœãŒã¹ãœãããŠã§ã¢ (OSS) ãšã¯ãã¢ããªã±ãŒã·ã§ã³ã®éçºè ããå®è¡ãã¡ã€ã«ãªã©ã®ã³ã³ãã€ã«æžã¿ãããžã§ã¯ãã®ã¿ã§ã¯ãªãããããžã§ã¯ãã®å®å šãªã³ãŒããæäŸããå ±æããŒã¹ã®ã¢ãã«ã§ãã
Packet Loss | ãã±ãããã¹
ãããã¯ãŒã¯ã«æ å ±ãéããšããTCP/IPãããã³ã«ã¯ãã®æ å ±ãå°ããªãã±ããã«åé¢ããŠãããéãéä¿¡ã§ããããã«åå²ããŸãã
Password Protection | ãã¹ã¯ãŒãä¿è·
ãã¹ã¯ãŒãä¿è·ãšã¯ããã¹ã¯ãŒããèªèšŒæ¹æ³ãããå®å šã«ããããã®ããªã·ãŒãããã»ã¹ãæè¡ã®çµã¿åãããæããŸãã
Patch Management | ããã管ç
ãœãããŠã§ã¢éçºã©ã€ããµã€ã¯ã«ïŒSDLCïŒã®æ§æèŠçŽ ã®1ã€ã¯ããããç¶æããããšã§ããããããç®¡çæŠç¥ã¯ãã¢ããããŒããšããããã£ãã¯ã¹ãããã€ã¹ã®ãããã¯ãŒã¯éã§å©çšå¯èœã«ããæ¹æ³ãåŠçããŸãã
Penetration Testing | ãããã¬ãŒã·ã§ã³ãã¹ãïŒãã³ãã¹ãïŒ
ãããã¬ãŒã·ã§ã³ãã¹ãïŒäŸµå ¥ãã¹ãïŒããŸãã¯ç¥ããŠãã³ãã¹ãã¯ãçµç¹ã®ã·ã¹ãã ãšãããã¯ãŒã¯å ã®è匱æ§ãç¹å®ããããã®ç©æ¥µçãªææ®µãšããŠæ©èœããŸãã
Petya (NotPetya)
Petya ãšã¯æå·åãã«ãŠã§ã¢ã®äžçš®ã§ãMicrosoft Windows ããŒã¹ã®ã³ã³ãã¥ãŒã¿ãŒãæšçãšããŸãã
Pharming | ãã¡ãŒãã³ã°
ãã¡ãŒãã³ã°ã¯ããŠãŒã¶ãŒãéšããŠå人æ å ±ãæµåºããããšããç¹ã§ã¯ãã£ãã·ã³ã°è©æ¬ºãšåãã§ãããæ»æçµè·¯ãšããŠé»åã¡ãŒã«ã«äŸåããã®ã§ã¯ãªãã被害è ã®ããã€ã¹äžã§å®è¡ãããæªæã®ããã³ãŒãã䜿çšããŠãæ»æè ã管çããWebãµã€ãã«ãªãã€ã¬ã¯ãããããã®ã§ãã
Phishing | ãã£ãã·ã³ã°
ãã£ãã·ã³ã°è©æ¬ºãšã¯ãã¡ãŒã«ãããã¹ãã¡ãã»ãŒãžãé»è©±ããã®ä»ã®éä¿¡ææ®µãéããŠå人ãã¿ãŒã²ããã«ããäžè¬çãªãµã€ããŒæ»æã®äžçš®ã§ãã
PII (Personal Identifiable Information) | å人ãç¹å®ã§ããæ å ±
å人ãç¹å®ã§ããæ å ±ïŒPIIïŒãšã¯ãç¹å®ã®å人ãèå¥ããããã«äœ¿çšãããäžé£ã®ããŒã¿ã®ããšã§ããããã¯æ©å¯ããŒã¿ãšã¿ãªãããå人æ å ±ã®çªçã«ã䜿çšãããæ å ±ã§ãã
Pretexting | ããªããã¹ãã£ã³ã°
ããªããã¹ãã£ã³ã°ãšã¯ãæ»æè ãåœã®IDãæ¶ç©ºã®ã·ããªãªãäœãåºãã被害è ã«æ©å¯æ å ±ãæŒããããããå¶éãããã·ã¹ãã ãžã®ã¢ã¯ã»ã¹ãèš±å¯ãããããéåžžè¡ããªãè¡åããšãããããã®ãœãŒã·ã£ã« ãšã³ãžãã¢ãªã³ã°ã®æ»ææ¹æ³ã®äžçš®ã§ãã
Principle of Least Privilege (PoLP) | æå°æš©éã®åå
æå°æš©éã®ååïŒPoLPïŒãšã¯ããŠãŒã¶ãŒãã¢ããªã±ãŒã·ã§ã³ããŸãã¯ã·ã¹ãã ãæ©èœãå®è¡ããããã«å¿ èŠæå°éã®ã¢ã¯ã»ã¹æš©éã®ã¿ãåãåãããšãä¿èšŒããéèŠãªã»ãã¥ãªãã£å¯Ÿçã®ããšã§ãã
Privilege Escalation | æš©éææ Œ
æš©éææ Œãšã¯ãè åšã¢ã¯ã¿ãŒãã»ãã¥ãªãã£ã®è匱æ§ãæªçšããŠãã·ã¹ãã ã«å¯Ÿããé«åºŠãªã¢ã¯ã»ã¹æš©ãšç®¡çæš©éãåŸãããšã§ãã
Privileged Access Management (PAM) | ç¹æš©ã¢ã¯ã»ã¹ç®¡ç
PAMïŒç¹æš©ã¢ã¯ã»ã¹ç®¡çïŒã¯ãçµç¹ã®ç¹æš©ã¢ã«ãŠã³ããä¿è·ã管çããããšã«çŠç¹ãåœãŠããµã€ããŒã»ãã¥ãªãã£ã®éèŠãªåŽé¢ã§ãã
Privileged Identity Management (PIM) | ç¹æš©ID管ç
ç¹æš© ID 管çãšã¯ãçµç¹ãITç°å¢å ã§ãŠãŒã¶ãŒã«äžããããç¹æš©ã¢ã¯ã»ã¹ãç£èŠãå¶åŸ¡ãã¢ãã¿ãªã³ã°ããããã®ã»ãã¥ãªã㣠ãœãªã¥ãŒã·ã§ã³ã§ãã
Public Cloud | ãããªãã¯ã¯ã©ãŠã
ãããªãã¯ã¯ã©ãŠããšã¯ããµãŒãããŒãã£ãããã€ããŒããããŒããŠã§ã¢ããœãããŠã§ã¢ãã¢ãã¿ãªã³ã°ããã³ãã®ã³ã°ãœãªã¥ãŒã·ã§ã³ãID管çãåšå® ã¯ãŒã«ãŒã®ããã®ãªã¢ãŒããªãœãŒã¹ããã®ä»ã®ããŒã¿ã»ã³ã¿ãŒãœãªã¥ãŒã·ã§ã³ãªã©ããããããas-a-serviceããã¯ãããžãŒãæäŸããã¯ã©ãŠãïŒã¯ã©ãŠãã³ã³ãã¥ãŒãã£ã³ã°ïŒã®ããšãæããŸãã
Ransomware | ã©ã³ãµã ãŠã§ã¢
ã©ã³ãµã ãŠã§ã¢ã¯ãã³ã³ãã¥ãŒã¿ãŒã·ã¹ãã ãŸãã¯ããŒã¿ãžã®ã¢ã¯ã»ã¹ããããã¯ããéåžžã被害è ãæ»æè ã«ææ°æãæããŸã§ã¢ã¯ã»ã¹ãæå·åããæªæãããœãããŠã§ã¢ã®äžçš®ã§ãã å€ãã®å Žåã身代éã®èŠæ±ã¯æéä»ãã§å±ããŸãã被害è ããããŸã§ã«æ¯æããªãå ŽåãããŒã¿ãæ°žä¹ ã«å€±ãããŸãã
RAT (Remote Access Trojan) | é éæäœãŠã£ã«ã¹
Remote Access Trojan (RAT) ã¯ããã«ãŠã§ã¢äœæè ãããŠã¹ãããŒããŒãæäœããã¡ã€ã«ããããã¯ãŒã¯ã®ãªãœãŒã¹ãžã®ã¢ã¯ã»ã¹ãå«ããŠãã·ã¹ãã ã®å šã¢ã¯ã»ã¹æš©ãšé éæäœãå¯èœã«ããããŒã«ã§ãã
RUM (Real User Monitoring) | ãªã¢ã«ãŠãŒã¶ãŒã¢ãã¿ãªã³ã°
ãªã¢ã«ãŠãŒã¶ãŒã¢ãã¿ãªã³ã°ïŒRUMïŒã¯ããŠãŒã¶ãŒãšã¯ã¹ããªãšã³ã¹ãçè§£ããæé©åããããã«äœ¿çšãããŸããããã«ãè åšã®ã¢ãã¿ãªã³ã°ã«ãæå¹ã§ããRUMãšã¯äœãããã®ä»çµã¿ãã¡ãªãããè åšãžã®å¯Ÿå¿ãªã©ã«ã€ããŠã玹ä»ããŸãã
Sandbox | ãµã³ãããã¯ã¹
ãµã€ããŒãã¥ãªãã£æ¥çã«ããããµã³ãããã¯ã¹ãšã¯ããããã¯ãŒã¯ãªãœãŒã¹ãããŒã«ã«ã¢ããªã±ãŒã·ã§ã³ã«åœ±é¿ãäžããããšãªããå±éºæ§ã®ãããœãããŠã§ã¢ãå®è¡ã§ããéé¢ãããä»®æ³ãã·ã³ã®ããšã§ãã
SASE (Secure Access Service Edge) | ãµã·ãŒ
åŸæ¥ããŠãŒã¶ãŒã¯èªåã®ãã¹ã¯ã§å¢çå ã®ãããã¯ãŒã¯ã«æ¥ç¶ããŠããã ãã§ããããåŽåè ã®åšå® å€åãžã®äžççãªç§»è¡ã«ãããITãšãµã€ããŒã»ãã¥ãªãã£ã®ããæ¹ãå€åãã€ã€ãããŸãã
SD-WAN
SD-WAN (Software-Defined Wide Area Network) ã¯ããã©ãã£ãã¯ã®ããªã³ïŒãªããç°å¢ãå©çšããã¹ãã¬ãªã¿ã€ããªããŒããŠã§ã¢ã€ã³ãã©ã§ã¯ãªãããœãããŠã§ã¢ã«ããæé©åãå©çšããŠãããã¯ãŒã¯ã®éçšæ¹æ³ãå¶åŸ¡ãããã®ã§ãã
SECaaS (Security as a Service)
SECaaS (Security as a Service)ã¯ãã¯ã©ãŠãã³ã³ãã¥ãŒãã£ã³ã°ã®äžèŠçŽ ã§ãã¢ããªã±ãŒã·ã§ã³ã¯ãªã¢ãŒãã®ãã¹ããµãŒããŒäžã§å®è¡ãããŸããããµãŒãã¹ã¯ã¯ã©ã€ã¢ã³ãããã€ã¹ãå«ãããŒã«ã«ITã€ã³ãã©ãšçµ±åãããŠããŸãã
Security Awareness Training | ã»ãã¥ãªãã£æèåäžãã¬ãŒãã³ã°
倧ãŸãã«ããã°ãã»ãã¥ãªãã£æèåäžãã¬ãŒãã³ã°ãšã¯ãçµç¹ã®ã»ãã¥ãªãã£ã確ä¿ãããããåå人ãäžå®ã®ç¿æ £ãçè§£ããŠåŸãããã«ããããšãç®æšãšãããã¬ãŒãã³ã°ã§ãã
Security Information and Event Management (SIEM)?
ãŸããŸãå·§åŠåãããµã€ããŒæ»æã«å¯Ÿå¿ãããããäŒæ¥ã¯ããŒã¿ãä¿è·ããæå 端ã®ã»ãã¥ãªãã£å¯Ÿçãå¿ èŠãšããŠããŸãã SIEMïŒã·ãŒã ïŒã¯Security information and event managementã®ç¥ã§ããã»ãã¥ãªãã£æ å ±ã€ãã³ã管çããæå³ããSEMïŒsecurity event managementïŒãšSIMïŒsecurity information managementïŒã®äž¡æ¹ãæé©åããããã¬ãŒã ã¯ãŒã¯ã®äžéšãšããŠçµã¿åããããã€ããªãããœãªã¥ãŒã·ã§ã³ãšããŠç»å ŽããŸããã
Security Service Edge (SSE) | ã»ãã¥ãªãã£ãµãŒãã¹ãšããž
SSEïŒã»ãã¥ãªãã£ãµãŒãã¹ãšããžïŒã¯ã2021幎ã«Gartnerã«ãã£ãŠå°å ¥ããããã¯ã©ãŠãç°å¢ã«ãããããŒã¿ä¿è·ã匷åããæ°ããæŠç¥ã§ãã
Sendmail | ã»ã³ãã¡ãŒã«
Sendmailã¯ãSMTP (Simple Mail Transfer Protocol) ã䜿çšããŠã¡ãŒã«ãéä¿¡ããæ³äººåããµãŒããŒã¢ããªã±ãŒã·ã§ã³ã§ãã
Shadow IT | ã·ã£ããŒIT
ã·ã£ããŒIT (shadow IT) ã¯ITéšéã«æºããç¥èãæ¿èªãªããäŒæ¥ç°å¢å ã§ç€Ÿå¡ãã¯ã©ãŠãã«æ¥ç¶ããã¢ããªããµãŒãã¹ã䜿çšããŠãããäŒæ¥å šè¬ã«èŠãããç¶æ³ãæããŸããäžéšã®ã·ã£ããŒITã¯ç¡å®³ã§ãã圹ã«ç«ã¡ãŸãããåæã«æ°ããªãµã€ããŒã»ãã¥ãªãã£äžã®ãªã¹ã¯ããããããŠããŸãã
Single Sign-On (SSO) | ã·ã³ã°ã«ãµã€ã³ãªã³
SSOïŒã·ã³ã°ã«ãµã€ã³ãªã³ïŒã¯ã1çµã®è³æ Œæ å ±ã§è€æ°ã®ã¢ããªã±ãŒã·ã§ã³ã«ã¢ã¯ã»ã¹ã§ããèªèšŒããã»ã¹ã§ãã
Smishing | ã¹ããã·ã³ã°
ã¹ããã·ã³ã°ïŒSmishingïŒã¯ãæ»æè ãå·§åŠãªã·ã§ãŒãã¡ãã»ãŒãžïŒSMSïŒã䜿ããæšçã«ãªã£ãåä¿¡è ãURLãªã³ã¯ãã¯ãªãã¯ããããä»åããå人æ å ±ãéä¿¡ãããããã¹ããŒããã©ã³ã«æªè³ªãªããã°ã©ã ãããŠã³ããŒãããããã£ãã·ã³ã°ã®äžçš®ã§ãã
SMTP (Simple Mail Transport Protocol)
SMTP (Simple Mail Transport Protocol) ã¯ããŠãŒã¶ãŒãèªåã®ãã¡ã€ã³ãšã¯ç°ãªããã¡ã€ã³ã«é»åã¡ãŒã«ãéä¿¡ããéã«ãåä¿¡è ã®ãã¡ã€ã³ã«ã¡ãŒã«ã確å®ã«è»¢éããŸãã
SOAR | ã»ãã¥ãªãã£ã®ãªãŒã±ã¹ãã¬ãŒã·ã§ã³ãèªååã察å¿
SOARïŒSecurity Orchestration, Automation and ResponseïŒã»ãã¥ãªãã£ã®ãªãŒã±ã¹ãã¬ãŒã·ã§ã³ãèªååã察å¿ïŒãšã¯ãã¿ã¹ã¯ãèªååããã¯ãŒã¯ãããŒããªãŒã±ã¹ãã¬ãŒã·ã§ã³ïŒé£æºïŒããããšã§ãçµç¹ã®ã»ãã¥ãªãã£éçšãåçåã§ããäºææ§ã®ããäžé£ã®ããŒã«ããã³ãœãããŠã§ã¢ããã°ã©ã ãæããŸãã
SOCïŒSecurity Operation CenterïŒ
SOCïŒã»ãã¥ãªã㣠ãªãã¬ãŒã·ã§ã³ ã»ã³ã¿ãŒïŒãšã¯ããµã€ããŒã»ãã¥ãªãã£äžã®è åšã«å¯Ÿå¿ã»ç®¡çããããã®å°éçµç¹ãæããŸãã
Social Engineering | ãœãŒã·ã£ã« ãšã³ãžãã¢ãªã³ã°
ãµã€ããŒã»ãã¥ãªãã£æŠç¥ã«ãããæå€§ã®åŒ±ç¹ã¯ã人ãã§ããããœãŒã·ã£ã« ãšã³ãžãã¢ãªã³ã°ã¯æšçãšãªã£ããŠãŒã¶ãŒãæ»æãèŠæãããšãã§ããªãããšãå©çšããŸãã
Social Media Protection | ãœãŒã·ã£ã«ã¡ãã£ã¢ã»ãã¥ãªãã£
ãœãŒã·ã£ã«ã¡ãã£ã¢ã»ãã¥ãªãã£ãšã¯ãSNSãªã©ã®ãœãŒã·ã£ã«ã¡ãã£ã¢ã§ã®ãµã€ããŒæ»æãè åšãããã¢ã«ãŠã³ããæ å ±ãä¿è·ããæè¡ãæé ã®ç·ç§°ã§ãã
Social Media Threat | ãœãŒã·ã£ã«ã¡ãã£ã¢è åš
SNSã¯æ¥åžžç掻ã§ã®ã§ãããšãåçããããªãã·ã§ã¢ããããšã§äººã³ãšãã€ãªãããŒã«ã§ãããšããããããã¿ããããšã·ã§ã¢ããããåœã¢ã«ãŠã³ããžã®èŠæãæ ã£ãããããšãä»äºããã©ã€ããŒãã§äœ¿çšããã¢ã«ãŠã³ããå±éºã«ãããããŠããŸããŸãã
Spam | ã¹ãã
æªæ¿è«Ÿåºåã¡ãŒã«ïŒUCEïŒãšãåŒã°ããã¹ãã ã¯ãã¡ãŒã«ãšããŠå€§éã«éä¿¡ããããçãããè¿·æåºåã§ãã ããŒã¯æã«ã¯å šã¡ãŒã«ã®92%ãã¹ãã ãå ããŠããŸããããããããã®ã»ãšãã©ãæªæã®ãªããã®ã§ããã
Spear Phishing | ã¹ãã¢ãã£ãã·ã³ã°
ã¹ãã¢ãã£ãã·ã³ã°ãšã¯ãéåžžã®ãã£ãã·ã³ã°ãšåæ§ã«ãåä¿¡è ãã ãŸããŠã¢ã«ãŠã³ãæ å ±ãªã©ã®æ©å¯æ å ±ãæ»æè ã«æäŸãããããšããè©æ¬ºã®ããšã§ãã
SPF (Sender Policy Framework) | SPFã¬ã³ãŒã
SPF (Sender Policy Framework) ã¯ãé»åã¡ãŒã«èªèšŒãããã³ã«ã§ããããã£ãã·ã³ã°æ»æã黿¢ããããã«äœ¿çšãããé»åã¡ãŒã«ã®ãµã€ããŒã»ãã¥ãªãã£ã®äžéšã§ãã
Spoofing | ã¹ããŒãã£ã³ã°
ã¹ããŒãã£ã³ã°ãšã¯ãè åšã¢ã¯ã¿ãŒãæªç¥ãŸãã¯äžæ£ãªéä¿¡ãããŒã¿ã®ãœãŒã¹ãæ¢ç¥ã§ä¿¡é Œã§ãããã®ãšããŠåœè£ ããäžè¬çãªææ³ãæããŸãã
Spyware | ã¹ãã€ãŠã§ã¢
ã¹ãã€ãŠã§ã¢ãšã¯ããšã³ããŠãŒã¶ãŒãæ°ä»ããªããã¡ã«ã³ã³ãã¥ãŒãã£ã³ã° ããã€ã¹ã«ã€ã³ã¹ããŒã«ãããç¹å®ã®æªæã®ãããœãããŠã§ã¢ïŒãã«ãŠã§ã¢ïŒã§ãã
SQL Injection (Structured Query Language) | SQLã€ã³ãžã§ã¯ã·ã§ã³
SQLã€ã³ãžã§ã¯ã·ã§ã³ïŒSQLiïŒãšã¯ãSQLïŒæ§é ååãåããèšèªïŒããŒã¿ããŒã¹ã䜿çšããã¢ããªã±ãŒã·ã§ã³ãæšçãšãããµã€ããŒè åšã®ããšã§ãã
SSTP (Secure Socket Tunneling Protocol)
SSTP (Secure Socket Tunneling Protocol) ã¯ãä»®æ³ãã©ã€ããŒããããã¯ãŒã¯ïŒVPNïŒæ¥ç¶ã§ãã䜿çšããããããã³ã«ã§ãããã®ãããã³ã«ã¯Microsoft瀟ã«ãã£ãŠéçºãããã®ã§ãLinuxãããWindowsç°å¢ã§ããäžè¬çã«äœ¿ãããŠããŸãã
Supply Chain Attack | ãµãã©ã€ãã§ãŒã³æ»æ
ãµãã©ã€ãã§ãŒã³æ»æãšã¯ãéçºè ã補é è ããšã³ãã¯ã©ã€ã¢ã³ããæ°ã¥ããªããã¡ã«ãæªæã®ããã©ã€ãã©ãªãã³ã³ããŒãã³ãã補åã«æ³šå ¥ããã»ãã¥ãªãã£ã䟵害ããéåžžã«å¹æçãªæ¹æ³ã§ãã
Thin Client | ã·ã³ã¯ã©ã€ã¢ã³ã
ã·ã³ã¯ã©ã€ã¢ã³ãïŒthin clientïŒãšã¯ãéäžç®¡çããããµãŒããŒãããµãŒãã¹ããœãããŠã§ã¢ãå®è¡ããåºæ¬çãªã³ã³ãã¥ãŒãã£ã³ã°ããã€ã¹ã®ããšã§ãã
Threat Actor | è åšã¢ã¯ã¿ãŒ
è åšã¢ã¯ã¿ãŒãšã¯ãããŒã¿ã»ãã¥ãªãã£ã«åœ±é¿ãäžããå¯èœæ§ã®ããå éšãŸãã¯å€éšã®æ»æè ã®ããšã§ãã
Threat Intelligence | è åšã€ã³ããªãžã§ã³ã¹
ãµã€ããŒè åšã€ã³ããªãžã§ã³ã¹ïŒã¹ã¬ããã€ã³ããªãžã§ã³ã¹ïŒãšã¯ããµã€ããŒæ»æã«é¢ããæ å ±ãåéã»åæããçµç¹ã®ã»ãã¥ãªãã£å¯Ÿçã«æŽ»çšã§ããåœ¢ã«æŽçããæ å ±ã®ããšã§ãã
Trojan Horse | ããã€ã®æšéЬ
ããã€ã®æšéЬãšã¯ãæ£èŠã®ãœãããŠã§ã¢ãè£ ã£ãŠã³ã³ãã¥ãŒã¿ã·ã¹ãã ãžã®ã¢ã¯ã»ã¹ãçããã«ãŠã§ã¢ã®äžçš®ã§ãã
UEBA (User and Entity Behavior Analytics)
å®çŸ© ã»ãã¥ãªãã£ã«ãããUEBAãšã¯ïŒ UEBAã®ä»çµã¿ UEBAãšSIEMãšã®éã
Vishing | ããã·ã³ã°
ããã·ã³ã° (Vishing) ã¯ããã€ã¹ãã£ãã·ã³ã° (Voice Phishing) ã®ç¥ã§ãããã£ãã·ã³ã°ã®äžçš®ã§ãç®çã¯åãã§ããããã®æå£ãç°ãªããŸãã
VPN (Virtual Private Network)
VPN (Virtual Private Network) ã¯ããŠãŒã¶ãŒããŠã§ãããŒã¹ã®ãµãŒãã¹ããµã€ãã«æ¥ç¶ããéã«ãã»ãã¥ãªãã£ãšå¿åæ§ãæäŸããŸãã
Vulnerabilities | è匱æ§
ãµã€ããŒã»ãã¥ãªãã£ã«ãããè匱æ§ãšã¯ãã·ã¹ãã ã®èšèšãå®è£ ãéçšããŸãã¯ç®¡çã«ååšããæ¬ é¥ã匱ç¹ã®ããšã§ãããæ»æè ããããæªçšããããšã§äžæ£ã¢ã¯ã»ã¹ãåŸãããæå®³ãåŒãèµ·ããããããå¯èœæ§ããããŸãã
WannaCry | ã¯ãã¯ã©ã€
WannaCry ãšã¯ 2017 幎 5 æã«çºèŠããããŠã€ã«ã¹ã§ãäžçèŠæš¡ã®ãµã€ããŒæ»æã®äžã§ Microsoft Windows ã§çšŒåããäŒæ¥ãããã¯ãŒã¯ãæ»æããŸããã
Watering Hole | ãŠã©ãŒã¿ãŒããŒã«æ»æ (氎飲ã¿å Žæ»æ)
ç¹å®ã®æ¥çãè·çš®ã®ãŠãŒã¶ãŒãé垞䜿çšãããŠã§ããµã€ããææãããæªæã®ãããµã€ããžèªãããšã§ããŠãŒã¶ãŒãžã®ã»ãã¥ãªãã£äŸµå®³ãæå³ããæšçåæ»æã 氎飲ã¿å Žåæ»æãå¥åæŠç¥çãŠã§ããµã€ãäŸµå®³æ»æã¯ãéã«é Œãé¢ãããããããã®ç¯å²ãéå®ãããŸãã ãããããŠãŒã¶ãŒããŠã§ããµã€ãã«èªå°ããã¡ãŒã«ã®æç€ºãšäœµãããã广çã«ãªã£ãŠããŠããŸãã
Web Proxy Server | ãããã·ãµãŒããŒ
çµç¹ã¯ãå éšIPã¢ãã¬ã¹ã®å¿ååãããŒã¿è»¢éé床ã®åäžãšåž¯åå¹ ã®äœ¿çšéãæžããããã®ã³ã³ãã³ãã®ãã£ãã·ã¥ãªã©ããµã€ããŒã»ãã¥ãªãã£ãšããã©ãŒãã³ã¹äžã®çç±ãããããã·ãµãŒããŒïŒWebãããã·ïŒã䜿çšããŸãã
Web Security | Webã»ãã¥ãªãã£
ãWebã»ãã¥ãªãã£ãã¯ããŠãŒã¶ãŒãæªæã®ããWebãµã€ããããã«ãŠã§ã¢ããã®ä»ã®è åšããããã¯ãŒã¯ã«æã¡èŸŒãã®ãé²ãããã«ãæŠç¥ãã€ã³ãã©ããã¬ãŒãã³ã°ãã¢ãã¿ãªã³ã°ã掻çšããŸãã
Wi-Fi
Wi-FiïŒWireless FidelityïŒãšã¯ãé»åæ©åšãç¡ç·åšæ³¢æ°ãä»ããŠãããã¯ãŒã¯ã«ã·ãŒã ã¬ã¹ã«æ¥ç¶ã§ããç¡ç·ãããã¯ãŒã¯æè¡ã®ããšã§ãã
Zero Trust | ãŒããã©ã¹ã
ãŒããã©ã¹ãã¯ãã誰ãã»äœãä¿¡é ŒããªãããšããæŠå¿µã衚ãèšèã§ããã©ã¹ãïŒä¿¡é ŒïŒããŒãã§ããããšãæå³ããŠããŸãã
Zero-Day Exploit | ãŒããã€æ»æ
ãŒããã€è匱æ§ãšã¯ãéå»ã«äžåºŠã確èªãããããšã®ãªãã»ãã¥ãªãã£äžã®æ¬ é¥ãæãèšèã§ããéåžžãæ»æè ã¯ãè匱æ§ãçºèŠãããŸã§ã·ã¹ãã ã調æ»ããŸãã
Zeus Trojan (Zbot) | ããã€ã®æšéЬZeusãå¥åZbot
Zeus TrojanïŒããã€ã®æšéЬZeusãå¥åZbotïŒã¯ãæšçãšãªã被害è ã®éè¡å£åº§æ å ±ãçãããã«äœ¿çšãããæãå€ããã«ãŠã§ã¢ããã°ã©ã ã®1ã€ã§ããäœè ã¯Zeusã®ã³ãŒããç«¶åä»ç€Ÿã«å£²åŽããŸããããäœå¹Žãã®éãããã€ãã®äºçš®ããªãªãŒã¹ãããŸããã