{"id":6588,"date":"2025-09-08T00:00:21","date_gmt":"2025-09-07T15:00:21","guid":{"rendered":"https:\/\/www.seraku.co.jp\/columns\/?post_type=glossary&#038;p=6588"},"modified":"2025-09-08T09:28:19","modified_gmt":"2025-09-08T00:28:19","slug":"cybersecurity-strategy-headquarters","status":"publish","type":"glossary","link":"https:\/\/www.seraku.co.jp\/columns\/glossary\/cybersecurity-strategy-headquarters\/","title":{"rendered":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u672c\u90e8"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u672c\u90e8<\/h2>\n\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30f3\u30ea\u30e3\u30af\u30db\u30f3\u30d6<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u672c\u90e8\u306b\u3064\u3044\u3066<\/h2>\n\n\n\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u672c\u90e8\u3068\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u6226\u7565\u3068\u547c\u3070\u308c\u308b\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u57fa\u672c\u7684\u306a\u8a08\u753b\u300d\u3092\u4f5c\u308a\u3001\u95a3\u8b70\u6c7a\u5b9a\u3092\u3059\u308b\u7d44\u7e54\u3067\u3059\u3002<br><a href=\"https:\/\/www.seraku.co.jp\/columns\/glossary\/cybersecurity-basic-act\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u672c\u6cd5<\/a>\uff08\u5e73\u621026\u5e74\u6cd5\u5f8b\u7b2c104\u53f7\uff09\u3068\u3044\u3046\u6cd5\u5f8b\u306b\u57fa\u3065\u304d3\u5e74\u3054\u3068\u306b\u95a3\u8b70\u6c7a\u5b9a\u3057\u307e\u3059\u3002\u4e16\u754c\u898f\u6a21\u3067\u5e83\u304c\u308b\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u3067\u306e\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3084\u60c5\u5831\u6f0f\u6d29\u306a\u3069\u306e\u30ea\u30b9\u30af\u306b\u5bfe\u3057\u3001\u56fd\u6c11\u30fb\u56fd\u5bb6\u306e\u5b89\u5168\u3068\u5b89\u5fc3\u306e\u78ba\u4fdd\u3084\u793e\u4f1a\u7d4c\u6e08\u306e\u767a\u5c55\u3092\u76ee\u7684\u3068\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u5185\u95a3\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30f3\u30bf\u30fc\uff08NISC\uff09\u306b\u3064\u3044\u3066<\/h2>\n\n\n\n<p>\u5185\u95a3\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30f3\u30bf\u30fc\uff08NISC\uff1aNational center of Incident readiness and Strategy for Cybersecurity\uff09\u306f\u3001\u65e5\u672c\u56fd\u5185\u3067\u306e\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u63a8\u9032\u3059\u308b\u305f\u3081\u65e5\u672c\u56fd\u653f\u5e9c\u304c\u5185\u95a3\u5b98\u623f\u306b\u8a2d\u7f6e\u3057\u305f\u7d44\u7e54\u3067\u3059\u3002\u632f\u308a\u8fbc\u3081\u8a50\u6b3a\u3084\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306b\u3088\u308b\u60c5\u5831\u6d41\u51fa\u306a\u3069\u3068\u3044\u3063\u305f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u5bfe\u3057\u3001\u653f\u5e9c\u6a5f\u95a2\u3084\u56fd\u6c11\u3092\u5b88\u308b\u305f\u3081\u306b\u4e0d\u6b63\u306a\u52d5\u304d\u306e\u76e3\u8996\u3001\u5206\u6790\u3092\u884c\u3046\u307b\u304b\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u5229\u7528\u8005\u306b\u5bfe\u3057\u3066\u6ce8\u610f\u559a\u8d77\u3092\u547c\u3073\u639b\u3051\u308b\u5f79\u5272\u3082\u62c5\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u672c\u90e8\u306e\u80cc\u666f<\/h2>\n\n\n\n<p>\u5143\u3005IT\u95a2\u4fc2\u306e\u6cd5\u5f8b\u306f\u300c<a href=\"https:\/\/www.seraku.co.jp\/columns\/glossary\/itbasiclaw\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u9ad8\u5ea6\u60c5\u5831\u901a\u4fe1\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u793e\u4f1a\u5f62\u6210\u57fa\u672c\u6cd5<\/a>\u300d\u304c\u3042\u308a\u307e\u3057\u305f\u304c\u3001\u5927\u4f01\u696d\u3084\u5b98\u5e81\u306a\u3069\u306e\u30a6\u30a4\u30eb\u30b9\u611f\u67d3\u3084\u653f\u5e9c\u6a5f\u95a2\u3078\u306e\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304c\u5897\u52a0\u3057\u3066\u3044\u304d\u307e\u3057\u305f\u3002<br>\u305d\u308c\u306b\u3088\u308a\u3001\u500b\u4eba\u60c5\u5831\u6f0f\u6d29\u306a\u3069\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u5de7\u5999\u5316\u3084\u5927\u898f\u6a21\u5316\u304c\u9032\u884c\u3057\u305f\u305f\u3081\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u306e\u5f37\u5316\u304c\u5fc5\u8981\u3068\u306a\u308a\u300c<a href=\"https:\/\/www.seraku.co.jp\/columns\/glossary\/cybersecurity-basic-act\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u672c\u6cd5<\/a>\u300d\u304c\u5236\u5b9a\u3055\u308c\u307e\u3059\u3002\u305d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092\u5177\u4f53\u7684\u306b\u5b9a\u3081\u3001\u65bd\u7b56\u3059\u308b\u305f\u3081\u306b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u672c\u90e8\u304c\u767a\u8db3\u3057\u307e\u3057\u305f\u3002<\/p>\n","protected":false},"featured_media":0,"parent":0,"template":"","glossary_category":[23,52,142],"acf":[],"_links":{"self":[{"href":"https:\/\/www.seraku.co.jp\/columns\/wp-json\/wp\/v2\/glossary\/6588"}],"collection":[{"href":"https:\/\/www.seraku.co.jp\/columns\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.seraku.co.jp\/columns\/wp-json\/wp\/v2\/types\/glossary"}],"wp:attachment":[{"href":"https:\/\/www.seraku.co.jp\/columns\/wp-json\/wp\/v2\/media?parent=6588"}],"wp:term":[{"taxonomy":"glossary_category","embeddable":true,"href":"https:\/\/www.seraku.co.jp\/columns\/wp-json\/wp\/v2\/glossary_category?post=6588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}