Guidelines for secure AI system development Ministerstwo Cyfryzacji 03 About this document This document is published by the UK National Cyber Security Centre (NCSC), the US Cybersecurity and Infrastructure Security Agency (CISA), and the following international partners: > National Security Agency (NSA) > Federal Bureau of Investigation (FBI) > Australian Signals Directorateâs Australian Cyber Se
è¦å¯åºåã³å é£ãµã¤ãã¼ã»ãã¥ãªãã£ã»ã³ã¿ã¼ï¼NISCï¼ã¯ãç±³å½å®¶å®å ¨ä¿éå±ï¼NSAï¼ãç±³é£é¦ææ»å±ï¼FBIï¼åã³ç±³å½åå®å ¨ä¿éçãµã¤ãã¼ã»ãã¥ãªãã£ã»ã¤ã³ãã©åºï¼CISAï¼ã¨ã¨ãã«ãä¸å½ãèæ¯ã¨ãããµã¤ãã¼æ»æã°ã«ã¼ããBlackTechãï¼ãã©ãã¯ããã¯ï¼ã«ãããµã¤ãã¼æ»æã«é¢ããååã®æ³¨æåèµ·ãçºåºãã¾ããã ä¸å½ãèæ¯ã¨ãããµã¤ãã¼æ»æã°ã«ã¼ãBlackTechã«ãããµã¤ãã¼æ»æã«ã¤ãã¦ï¼æ³¨æåèµ·ï¼ People's Republic of China-Linked Cyber Actors Hide in Router Firmware åã®ãã¼ã¸ã«æ»ã
2023å¹´8æ4æ¥ãå é£ãµã¤ãã¼ã»ãã¥ãªãã£ã»ã³ã¿ã¼(NISC)ã¨æ°è±¡åºã¯ããããé»åã¡ã¼ã«é¢é£ã®ã·ã¹ãã ã»æ©å¨ããä¸æ£éä¿¡ã®çè·¡ã確èªãããã¡ã¼ã«ãã¼ã¿ã®ä¸é¨ãå¤é¨ã«æµåºããå¯è½æ§ãããã¨å ¬è¡¨ãã¾ãããããã§ã¯é¢é£ããæ å ±ãã¾ã¨ãã¾ãã æ¿åºçµç¹ã«å¯¾ãã¼ããã¤æ»æ NISCã¨æ°è±¡åºåã³æ°è±¡ç 究æãå½ç«ç§å¦åç©é¤¨ãæè·å¡æ¯æ´æ©æ§ãåã éç¨ãè¡ã£ã¦ããé»åã¡ã¼ã«é¢é£ã·ã¹ãã ã»æ©å¨ã«èå¼±æ§ãåå¨ãã¦ããããã®èå¼±æ§ã«é¢é£ããä¸æ£éä¿¡ã確èªãããã ä»å確èªãããä¸æ£éä¿¡ã«ãããã¡ã¼ã«ãã¼ã¿ã®ä¸é¨ãå¤é¨ã«æµåºããå¯è½æ§ãããã両çµç¹ã§ã¯ã¡ã¼ã«ã¢ãã¬ã¹çã®å人æ å ±ãæ¼ããããå¯è½æ§ãæé¤ã§ããªãã¨ãã¦å人æ å ±ä¿è·å§å¡ä¼ã«å ±åããä»ã対象è ã«ãåå¥ã«é£çµ¡ãè¡ããå ¬è¡¨æç¹ã§ã¯æµåºå¯è½æ§ã®ããæ å ±ã®æªç¨ã¯ç¢ºèªããã¦ããªãããNISCã§ã¯ç´5,000件ã®å人æ å ±ã対象ã«å«ã¾ãã¦ãããæµåºå¯è½æ§ã®ããäºæ¡ã
å é£å®æ¿å é£ãµã¤ãã¼ã»ãã¥ãªãã£ã»ã³ã¿ã¼ï¼NISCï¼ã¯ããµã¤ãã¼ã»ãã¥ãªãã£å¯¾çã«ããã¦åç §ãã¹ãé¢ä¿æ³ä»¤ãQ&Aå½¢å¼ã§è§£èª¬ããããµã¤ãã¼ã»ãã¥ãªãã£é¢ä¿æ³ä»¤Q&Aãã³ãããã¯ãï¼ä»¥ä¸ãæ¬ãã³ãããã¯ãã¨ããã¾ããï¼ãä½æãã¦ãã¾ãã ä¼æ¥ã«ãããå¹³æã®ãµã¤ãã¼ã»ãã¥ãªãã£å¯¾çåã³ã¤ã³ã·ãã³ãçºçæã®å¯¾å¿ã«é¢ããæ³ä»¤ä¸ã®äºé ã«å ããæ å ±ã®åæ±ãã«é¢ããæ³ä»¤ãæ å¢ã®å¤åçã«ä¼´ãçããæ³ç課é¡çãå¯è½ãªéãå¹³æãªè¡¨è¨ã§è¨è¿°ãã¦ãã¾ãã ä¼æ¥å®åã®åèã¨ãã¦ãå¹ççã»å¹æçãªãµã¤ãã¼ã»ãã¥ãªãã£å¯¾çã»æ³ä»¤éµå®ã®ä¿é²ã¸ã®ä¸å©ã¨ãªãã°å¹¸ãã§ãã â»Ver2.0ã¯ã令å5å¹´9æã«ããµã¤ãã¼ã»ãã¥ãªãã£ãåãå·»ãç°å¢å¤åãé¢ä¿æ³ä»¤ã»ã¬ã¤ãã©ã¤ã³çã®æç«ã»æ¹æ£ãè¸ã¾ããé ç®ç«ã¦ã»å 容ã®å å®ã»æ´æ°ãè¡ãæ¹è¨ããããã®ã§ãã Qï¼Aã§åãä¸ãã¦ãã主ãªãããã¯ã¹ã«ã¤ã㦠ãµã¤ãã¼ã»ãã¥ãªãã£åºæ¬æ³é¢é£ ä¼ç¤¾æ³
å é£ãµã¤ãã¼ã»ãã¥ãªãã£ã»ã³ã¿ã¼ï¼NISCï¼ã§ã¯ããµã¤ãã¼ã»ãã¥ãªãã£ã«é¢ããæ®ååçºæ´»åã®ä¸ç°ã¨ãã¦ããã¤ã³ã¿ã¼ãããã®å®å ¨ã»å®å¿ãã³ãããã¯ããå ¬éãã¦ãã¾ããã¿ããªãå®å¿ãã¦ä½¿ããããã社ä¼ãå®ç¾ããããã«ã¯ããã®æã ã®ãµã¤ãã¼ã»ãã¥ãªãã£ã«é¢ããæ£ããç¥èã身ã«ä»ããå®è¡ããã¨ã¨ãã«ã家æãå人ãªã©èº«ã®åãã®äººéã«ãä¼ãã¦ãããã¨ã大åã§ããæ¬ãã³ãããã¯ã¯ãã¿ãªããã«ãµã¤ãã¼ã»ãã¥ãªãã£ã«é¢ããåºæ¬çãªç¥èãç´¹ä»ãã誰ããæä½éå®æ½ãã¦ããã¹ãåºæ¬çãªãµã¤ãã¼ã»ãã¥ãªãã£å¯¾çãå®è¡ãã¦ããããã¨ã§ãæ´ã«å®å ¨ã»å®å¿ã«ã¤ã³ã¿ã¼ããããå©æ´»ç¨ãã¦ããããã¨ãç®çã«å¶ä½ãããã®ã§ãã â»ãã®Ver.5.00ã¯ã2023å¹´1æã«ãµã¤ãã¼ç©ºéã®ææ°ååããä»ç¹ã«æ°ãä»ããã¹ããã¤ã³ãçãè¸ã¾ãã¦æ¹è¨ããã¾ããã ãæ´»ç¨ä¾ã æ¬ãã³ãããã¯ã®èä½æ¨©ã¯ NISC ãä¿æãã¾ããããµã¤ãã¼ã»ãã¥ãª
ãç¥ãã 2024.12.17 æ°è¦æ½ç SECCONï¼æ å ±ã»ãã¥ãªãã£æè¡ã®ç«¶æ大ä¼ï¼ãæ²è¼ãã¾ããã 2024.12.06 ããµã¤ãã¼ã»ãã¥ãªãã£æéãå®æ½ã«ä¼´ãé¢é£è¡äºãåéãã¦ãã¾ãï¼ç· åæ¥ï¼ä»¤å7å¹´1æ10æ¥ï¼ 2024.12.02 NISCãã¼ã¿ã«ãµã¤ãã«æ²è¼ãããµã¤ãã¼ã»ãã¥ãªãã£æ®ååçºæ½çãåéãã¦ãã¾ãï¼ç· åæ¥ï¼ä»¤å7å¹´1æ10æ¥ï¼ 2024.10.25 æ°è¦æ½ç ãå®åè åãããã°ã©ã ERABãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ãã³ã°ï¼IPAï¼ããæ²è¼ãã¾ããã 2024.10.10 ãç®çãæå±ã»å½¹å²ããé¸ã¶æ½çä¸è¦§ãããªãã¥ã¼ã¢ã«ãã¾ããã 2024.8.16 æ°è¦æ½ç ããã£ãã·ã³ã°ãµã¤ãæ²æ» ãã£ã¬ã³ã¸ã«ããããæ²è¼ãã¾ããã 2024.6.28 NISCãã¼ã¿ã«ãµã¤ãã«æ²è¼ãããµã¤ãã¼ã»ãã¥ãªãã£æ®ååçºæ½çãåéãã¦ãã¾ãï¼ç· åæ¥ï¼ä»¤å6å¹´7æ31æ¥ï¼â»åéãçµäºã
ã¿ããªã§ä½¿ãããµã¤ãã¼ã»ãã¥ãªãã£ã»ãã¼ã¿ã«ãµã¤ã
New cybervirus found in Japan / Stuxnet designed to attack off-line servers via USB memory sticks The Yomiuri Shimbun Stuxnet, a computer virus designed to attack servers isolated from the Internet, such as at power plants, has been confirmed on 63 personal computers in Japan since July, according to major security firm Symantec Corp. The virus does not cause any damage online, but once it enters
2024.08.01 2024å¹´7æã以ä¸çµç¹ãæ£å¼å çãã¾ããã 森永乳æ¥æ ªå¼ä¼ç¤¾ (MorinagaMilk-CSIRT) 2024.07.01 2024å¹´6æã以ä¸çµç¹ãæ£å¼å çãã¾ããã ãã¥ã¼ãªã¸ã§ã³ã»ãã¥ãªãã£æ ªå¼ä¼ç¤¾ (NLG-SIRT) æ¥æ¸ é£åãã¼ã«ãã£ã³ã°ã¹æ ªå¼ä¼ç¤¾ (NISSIN-CSIRT) æ¥ç£èªåè»æ ªå¼ä¼ç¤¾ (NML-CSIRT) SBSãªã³ã¼ãã¸ã¹ãã£ã¯ã¹æ ªå¼ä¼ç¤¾ (RLSC-SIRT) æ ªå¼ä¼ç¤¾JMDC (JMDC-CIRT) PIPELINEæ ªå¼ä¼ç¤¾ (PPLN-CSIRT) 2024.06.03 2024å¹´5æã以ä¸çµç¹ãæ£å¼å çãã¾ããã æ ªå¼ä¼ç¤¾å¯å£«ãã¼ã»ã¨ã¹ (FPS-CSIRT) ã³ã¼ãããªçæ´»ååçµåé£åä¼ (coopdeliCSIRT) å代ç°å工建è¨æ ªå¼ä¼ç¤¾ (CYD-CSIRT) 2024.05.01 2024å¹´4æã以ä¸çµç¹ãæ£å¼å çã
CSIRTï¼Computer Security Incident Response Teamãã·ã¼ãµã¼ãï¼ã¨ã¯ãã³ã³ãã¥ã¼ã¿ããããã¯ã¼ã¯ï¼ç¹ã«ã¤ã³ã¿ã¼ãããï¼ä¸ã§ä½ããã®åé¡ï¼ä¸»ã«ã»ãã¥ãªãã£ä¸ã®åé¡ï¼ãèµ·ãã¦ããªããã©ããç£è¦ããã¨å ±ã«ãä¸ãä¸åé¡ãçºçããå ´åã«ãã®åå 解æãå½±é¿ç¯å²ã®èª¿æ»ãè¡ã£ããããçµç¹ã®ç·ç§°ã CSIRT以å¤ã«CIRTï¼Cyber Incident Response Teamï¼ã¨ããç¥ç§°ã使ããããã¨ãããã 1988å¹´ã®ã¤ã³ã¿ã¼ãããä¸ã®ã¢ãªã¹ã¯ã¼ã ã«ããã¤ã³ã·ãã³ãã®éã«ãç±³å½ã«ã¼ãã®ã¼ã¡ãã³å¤§å¦å ã«CERT/CCãè¨ç½®ãããã ãã®å¾ãä¸çåå°ã«ãCERTããå«ããã¼ã ãè¨ç½®ãããã ããããã«ã¼ãã®ã¼ã¡ãã³å¤§å¦ã®ç»é²åæ¨ã¨ã®é¢ä¿ããå¥ã®å¼ç§°ãæ±ãããããCSIRTï¼computer security incident response teamï¼ããåºã
å é£ãµã¤ãã¼ã»ãã¥ãªãã£ã»ã³ã¿ã¼ï¼ãªããããµã¤ãã¼ã»ãã¥ãªãã£ã»ã³ã¿ã¼ãè±: National center of Incident readiness and Strategy for Cybersecurity[1]ãç¥ç§°ï¼NISCï¼ã¯ã2015å¹´1æ9æ¥ã«æ¥æ¬å½æ¿åºãå é£å®æ¿ã«è¨ç½®ããçµç¹ãå身ã¯ã2000å¹´ã«è¨ç½®ã®å é£å®æ¿æ å ±ã»ãã¥ãªãã£å¯¾çæ¨é²å®¤ï¼ãªãããããã¼ããããã»ãã»ãã¥ãªãã£ãããããããããã¤ï¼ã2005å¹´ã«æ¹çµãã¦è¨ç½®ãããå é£å®æ¿æ å ±ã»ãã¥ãªãã£ã»ã³ã¿ã¼ã§ããã å身ã®å é£å®æ¿æ å ±ã»ãã¥ãªãã£ã»ã³ã¿ã¼ï¼è±: National Information Security Center[2]ãç¥ç§°ï¼NISCï¼ã¯2005å¹´4æ25æ¥ãããã«ãã®å身ã§ããæ å ±ã»ãã¥ãªãã£å¯¾çæ¨é²å®¤ã®æ©è½ãå¼·åãã¦è¨ç½®ãããITæ¦ç¥æ¬é¨ã®ãæ å ±ã»ãã¥ãªãã£æ¿çä¼è°ãã¨ã¨ãã«æ¥æ¬ã®æ å ±ã»ãã¥ãª
æ¿åºã¯2012å¹´6æ29æ¥ãåºçåºæ¨ªæã§ãµã¤ãã¼æ»æã«å¯¾å¿ããå°éãã¼ã ãæ å ±ã»ãã¥ãªãã£ç·æ¥æ¯æ´ãã¼ã ããçºè¶³ããããé称ã¯ãCYMATãããµã¤ãã¼äºä»¶æ©åæ¯æ´ãã¼ã ãæå³ãããCyber Incident Mobile Assistant Teamãã®ç¥ç§°ã¨ãªããæ¨çåæ»æãªã©åç¬ã®çµç¹ã§ã¯å¯¾å¿ãé£ããé«åº¦ãªãµã¤ãã¼æ»æãå¢ãããã¨ãããåºçåºæ¨ªæåçµç¹ãçµæããã CYMATã¯ååºçåºããé¸åºãããè·å¡ã§æ§æãããç¾æ®µéã§ã¯26人ã ããæçµçã«ã¯40人è¦æ¨¡ã«ããè¨ç»ã ãCYMATã®çµ±æ¬è²¬ä»»è ã¯æ¿åºCISOï¼æé«æ å ±ã»ãã¥ãªãã£è²¬ä»»è ï¼ã§ãããå é£å®æ¿æ å ±ã»ãã¥ãªãã£ã»ã³ã¿ã¼é·ãæ ããå é£å®æ¿æ å ±ã»ãã¥ãªãã£ã»ã³ã¿ã¼ï¼NISCï¼è·å¡ãCYMATã¡ã³ãã¼ã¨ãã¦åç»ããã CYMATã®å½¹å²ã¯æ å ±ã»ãã¥ãªãã£ã«é¢ããäºä»¶ãçºçããéã被害æ¡å¤§ã®é²æ¢ã復æ§ãåå 調æ»ãåçºé²æ¢ã«åããæè¡çãªæ¯
©National center of Incident readiness and Strategy for Cybersecurity.
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}