å®åè è¦ç¹ã§èããè å¨ã¤ã³ããªã¸ã§ã³ã¹ã®æ å ±å ±æã®å¨ãæ¹
ï½æ å ±å ±æã«ããã¦ä¸è¶³ãã¦ãã観ç¹ã¨ãã®èæ¯ï½
1. ã¯ããã«
ãµã¤ãã¼æ»æã®è
å¨ããçµç¹ãå®ãããã«ãæ¬ã³ã©ã ã®èªè
ã®çæ§ã¯ä½ãããã¦ããã§ããããï¼è³ç£ç®¡çãèå¼±æ§ç®¡çãIoC(Indicator of Compromise)ãä¸å¿ã¨ããè
å¨ã¤ã³ããªã¸ã§ã³ã¹ã®åéãã»ãã¥ãªãã£æ©å¨ã¸ã®é©ç¨ãªã©ããã¾ãã¾ãªå¯¾å¿ãè¡ããã¦ããã¨æãã¾ããããã®ä¸ã§ããæ
å ±å
±æããå®æ½ããã¦ããçµç¹ã¯ããã§ããããï¼
æ¨ä»ãIoCãã¯ããã¨ããè
å¨ã«é¢ããæ
å ±å
±æãæ´»çºã¨ãªã£ã¦ãã¾ããããããå
±æãããæ
å ±ã®ä¸èº«ãã¢ããªã¹ãããã¹ã¦ç®ãéãã¦ããã±ã¼ã¹ã¯å°ãªãã®ã§ã¯ãªãã§ããããï¼æ©æ¢°çã«ä¸å¯©ï¼æªæ§ã¨è©ä¾¡ãããå
·ä½çãªè
å¨ãå®æ½ãã¹ã対å¦ãªã©ãè¨ããã¦ããªãã¾ã¾å
±æãããã±ã¼ã¹ãå¤ãã®ã§ã¯ãªãã§ããããï¼ã¤ã¾ãã¨ãããå®åè
ãã調æ»ã対çã«æçã«æ´»ç¨ã§ãããã¨ãã観ç¹ã§ã®æ
å ±å
±æã¯ãªããªãé²ãã§ããªãã¨æãã¦ãã¾ãã
æ¬ã³ã©ã ã§ã¯ãæ
å ±å
±æã«ããã¦ç¾ç¶ä¸è¶³ãã¦ããã¨æããç¹ã¨ãã®èæ¯ã«ã¤ãã¦CSIRTã®æ¥åã«å¾äºããçè
ã®è¦ç¹ã§èå¯ãã¾ãã
2. æ å ±å ±æã®å¿ è¦æ§
ãµã¤ãã¼æ»æã¯æµ·å¤ãä¸å¿ã¨ãã£ã風潮ãããã¾ããããä»ãEmotetã«ããæªæ§ã¡ã¼ã«ã®ãã©ãããæ
å ±çªåãã©ã³ãµã ã¦ã§ã¢ã«ãããã¼ã¿ç ´å£ãªã©ãå½å
ã§ãè
å¨ãç®ç«ã£ã¦ãã¦ãã¾ããè
å¨ããã¡æ©ãçºè¦ã対å¦ããããã«ã¯ãäºåã«ã»ãã¥ãªãã£æ©å¨ã¸IoCãç»é²ãã¦é²å¾¡ãã¦ãããã¨ããè½åçã«è
å¨ã®èª¿æ»ï¼ããããThreat Huntingï¼ãè¡ã対çãä¸å®å
¨ãªç®æã«å¯¾å¦ãæ½ããã¨ãªã©ãæ±ãããã¾ãããããããã®ããã®æ
å ±ãèªçµç¹ã ãã§åéï¼ä½æãããã¨ã¯ã大å¤ãªå´åã¨æéãã¤ããã®ã§ããã ããããããã¾ãã¾ãªçµç¹ã§å¾ãæ
å ±ãå
±æããããã人éãç解ããä¸ã§ã調æ»ã対çã«å½¹ç«ã¦ããã¨ãæ±ãããã¾ãã
IoCãã¯ããã¨ããæ
å ±å
±æã®ä¸ççãªååã¨ãã¦ã¯ã2011å¹´é ããMISP[1]ã¨å¼ã°ããIoCã®æ
å ±å
±æã«ç¹åããOSSã®éçºããã¸ã§ã¯ããå§ã¾ãã2012å¹´é ããã¯STIX[2]ãTAXII[3]ã¨ããæ
å ±å
±æã«é¢ãããã©ã¼ãããï¼ãããã³ã«ãå®ãããã¦ãã¾ããã¾ããISAC(Information
Sharing and Analysis Center)ãã¯ããã¨ããå½å
å¤ã§ã®æ
å ±å
±æã®ã³ãã¥ããã£æ´»åãæ´»çºã§ãããã®ä»ã«ããæ
å ±ã»ãã¥ãªãã£ã®å½éçãªãã¬ã¼ã ã¯ã¼ã¯ã¨ãªã£ã¦ããCSF[4]ãSP800-53[5]ãSP800-150[6]ã§ããæ
å ±å
±æãçµç¹ã®ã»ãã¥ãªãã£æç度ãé«ããè¦ä»¶ã®ä¸ã¤ã¨ãã¦è¨ãããã¦ããã社ä¼çã«æ
å ±å
±æã®æ³¨ç®åº¦ãå¿
è¦æ§ã¯é«ã¾ã£ã¦ãã¾ãã
3. å ±æãã¹ãæ å ±ã¨ãæ å ±å ±æã§è¶³ãã¦ããªãã¨æããé¨å
ããã¾ã§ããå ±æãã¨ããè¨èãä½åº¦ãåºã¦ãã¾ããããå ±æãã¨èãã¨ããåæ¹ãåããã®ãâææâãããã ãã®æå³ã«æããã¡ã§ãããå®éã¯ãåæ¹ãåããã®ãâæ´»ç¨âããããã¨ãã§ããªããã°å ±æã¨ã¯è¨ãã¾ãããã¾ããæ å ±å ±æãéè¦ã§ããããã¨è¨ã£ã¦ãä½ã§ãããã§ãå ±æããã°ããã¨ãããã®ã§ã¯ããã¾ãããæ å ±æ°¾æ¿«ãèµ·ããã¦ããç¾ä»£ã§éè¦ãªãã¤ã³ãã¯ããå¿ è¦ãªæ å ±ããå¿ è¦ãªäººã«ãã¿ã¤ã ãªã¼ã«ãæ£ç¢ºã«ãæ´»ç¨ã§ããç¶æ ã§ä¼ãããã¨ãã§ãã
ä¾ãã°ãã·ã¹ãã éç¨æ å½è ï¼æ å ±ã®åãæï¼ã®ç«å ´ã¯ãå ±æãããæ å ±ãç¨ãã¦ãã»ãã¥ãªãã£æ©å¨ã§èª¤æ¤ç¥ç¡ãæ»æã®æ¤ç¥ãé®æãè¡ãããã¨èãã¾ãããããã£ã¦ãå ±æãããã¹ãæ å ±ã¯ç²¾åº¦ã®é«ãIoCã§ããç¨åº¦ã¯å 足ãã¾ãã
â IoCï¼éä¿¡å ï¼IPã¢ãã¬ã¹ï¼ãã¡ã¤ã³ï¼URLï¼ãããã·ã¥å¤ã¨ãã£ãæ©å¨ãæ´»ç¨ããæ å ±[7]
ã»ãã¥ãªãã£æ©å¨ã«ç»é²ãããã¨ã§ãæ»æã®æ¤ç¥ãé®æã«å½¹ç«ã¤æ å ±ã§ããæ©æ¢°çãªæ¤ç¥ï¼é®æï¼èª¿æ»çã§ã®æ´»ç¨ãåæã¨ãã¦ãã¾ãã
CSIRTï¼æ å ±ã®åãæã ãã§ãªãçºä¿¡ãããï¼ã®ç«å ´ã§ã¯ãå ±æãããæ å ±ãç¨ãã¦è å¨ã®èª¿æ»ã対çãæ¤è¨ããã·ã¹ãã éç¨æ å½è ã¸æ示ãããã¨ãããã¾ãããã®ãããªå¤æãä¸ãããã«ã¯ãIoCã ãã§ãªãããããã©ããªè å¨ã«é¢é£ãããã®ãã説æããæ å ±ï¼ã³ã³ããã¹ãï¼ãã»ããã«ãªã£ãããè å¨æ å ±ãããè å¨ã¤ã³ããªã¸ã§ã³ã¹ããæ±ãããã¾ãã
â è å¨æ å ±ï¼IoCã«ã¿ã°ãªã©ä»ä¸ãã¦è å¨ã®åé¡ä»ãããããæ å ±[7]
è å¨æ å ±ã¯IoCã«ã¡ã¿çæ å ±ãä»ä¸ããæ å ±ã§ãããããã£ã¦ãIoCåä½ã«ããæ©æ¢°çãªéä¿¡æ¤ç¥ï¼é®æããã¡ã¿çæ å ±ããIoCã¨é¢é£ããè å¨ãå¤æããåæã«ãå½¹ç«ã¡ã¾ãã
â è å¨ã¤ã³ããªã¸ã§ã³ã¹ï¼IoCã ãã§ãªããæ»æè ï¼æ»æææ³ãªã©ã®ãããªã³ã³ããã¹ããç´ã¥ããæ å ±[7]
è å¨ã¤ã³ããªã¸ã§ã³ã¹ã¯ãè¤æ°ã®è å¨æ å ±ãé¢é£ã¥ãã¦ããã人ã®ç¥è¦ãä»ãã¦åæãããæ å ±ã®ãã¨ã§ããæ»æè ãæ»æææ³ãªã©ã®æ å ±ããIoCã ãã§ã¯è¦ããªãå ·ä½çãªè å¨ãå¤æããå ããã¦å¹æçãªå¯¾çãæã¤ãã¨ãã§ãã¾ãã
ããã«çµå¶å±¤çãªç«å ´ã§ã¯ãä¸é·æçãªæ½çãå®æ½ããä¸ã§ä¸è¨ã®ãããªæ å ±ã ãã§ãªããå½éæ å¢ãæ¥çååãªã©ã®å¤è§çãªæ å ±ãå¿ è¦ã«ãªãã§ãããã
ããããç¾ç¶ã¯ã³ã³ããã¹ããä¼´ããªããåãªãIoCã¬ãã«ã§ã®æ å ±å ±æã«éãã¦ãããã¨ãã»ã¨ãã©ã§ããããã¤æå¹ã§ãã£ããããããªãIoCãããåææ å ±ãä¼´ã£ã¦ããªãIoCã ãä»çµç¹ããå ±æããã¦ããããã«ãããããã®ç«å ´ã§ä»¥ä¸ã®ãããªåé¡ãçºçãã¦ããã®ã§ã¯ãªããã¨æãã¾ãã
ï¼ã·ã¹ãã éç¨æ å½è ï¼
IoCãã»ãã¥ãªãã£æ©å¨ã§ã®æ»ææ¤ç¥ï¼é®æã«å½¹ç«ã¤ãã¨ã¯äºå®ã§ããããããå¤ãã®å ´åã¯ããå ±æå ãæªæ§ã¨å¤æããããããªã©ã®çç±ã§ãCSIRTãªã©ã®ã»ãã¥ãªãã£é¨éããä½ã§ãããã§ãIoCãç»é²ãããããã¡ã§ããçµæçã«ã精度ã®ä¸ç¢ºããªIoCãç¡æéã«å¤§éã«ç»é²ããã¦ãã¾ãã誤æ¤ç¥ã®çºçãã·ã¹ãã ã®ããã©ã¼ãã³ã¹ã«å½±é¿ãåã¼ãã¨ããåé¡ã«ã¤ãªããã¾ãã
ï¼CSIRTãã»ãã¥ãªãã£ã¢ããªã¹ãï¼
ã¤ã³ã·ãã³ã対å¿ãThreat Huntingã®èª¿æ»ã§IoCãç¨ããããã®ã¯äºå®ã§ããããããIoCã ãã§ã¯ä»®ã«ã¢ã¯ã»ã¹ãã°çã§åè´ãã¦ãããä½ã®è
å¨ããã¯ãããã¾ãããã¾ããIoCã®æå¹æéãããããªãã¨ãç¡å°½èµã«ãã°ã調æ»ãããã¨ã«ãªã£ã¦ãã¾ãã大å¤éå¹çã§ãã
ããã«ãCSIRTã¯ã·ã¹ãã éç¨æ
å½è
ã¸IoCãå
±æãéä¿¡ã®é®æè¨å®ãä¾é ¼ãããã¨ãããã¾ãããã®éãå
±æå
ããæä¾ãããIoCã«ã³ã³ããã¹ãããªãã¨ãä¾é ¼ã®å¿
è¦æ§ãå
·ä½çãªä¾é ¼å
容ã®æ¤è¨ãã§ãã¾ãããã¨ã¯ãããããããªãããã¯ãã·ãã®ç²¾ç¥ã§ã¨ããããIoCãå
±æããã¨ãä¸è¨ã®ï¼ã·ã¹ãã éç¨æ
å½è
ï¼ã§ã®åé¡ç¹ãçºçããåæ¹ã§ãã¡ãªããã¨ãªãã¾ãã
ã¡ãªã¿ã«ããã¯ç§èªèº«ã®å¤±æè«ã§ãããããä¸èº«ãä½ããªãæ
å ±ãæä¾ããã¦ãå°ããããIoCã¨ãã¦ããã£ãéä¿¡å
ã¯æ£è¦ãµã¼ãã¹ã§å©ç¨ãããã®ã ãããã¡ãã¨ç²¾æ»ã§ãã¦ããã®ãï¼ããªã©ãããã¤ãã®ãå±ããããã ããã¨ãããã¾ããâ¦â¦ã
ãã®ãããªåé¡ãçºçãããªãããã«ããå°ãªãã¨ãIoCãæ å ±å ±æããéã¯ã
- ✓ä½ã®è å¨ã«é¢ããIoCãªã®ããè£è¶³ããããã¨
- ✓ã©ã®æéæå¹ã§ãã£ãIoCãªã®ã
- ✓ã©ã®ããã«IoCãæ´»ç¨ãã¹ãã
ï¼Proxyã«ããã¢ã¦ããã¦ã³ãéä¿¡ã¸ã®å¶éã§æ´»ç¨ãã¹ããªã®ããFWã«ããã¤ã³ãã¦ã³ãéä¿¡ã¸ã®å¶éã§æ´»ç¨ãã¹ããªã®ãããªã©ï¼
ã¨ãã£ãã人éã調æ»ï¼å¯¾çãè¡ãä¸ã§å¿ è¦ãªå¤ææ ¹æ ã¨ãªãæ å ±ãæ示ããªããã°ãããªãã¨æãã¾ãã
4. ãæ å ±ã®ä¸èº«ãããè¯ããã¨ããæèãèããã¡ãªèæ¯
æ å ±ã®ä¸èº«ãããè¯ããªãã°ãæ å ±å ±æã¯ãã£ã¨ãã¼ãºãé«ã¾ããããè¯ããã®ã«ãªãã¨èãã¦ãã¾ããããããç¾ç¶ã§ã¯IoCã¬ãã«ã§ã®æ å ±å ±æãã»ã¨ãã©ã§ããæ å ±ã®ä¸èº«ãããè¯ããã¨ããæèãèããã¡ã ã¨æãã¦ãã¾ãããã®èæ¯ã«ã¯ã以ä¸ã®ãããªè¦å ãåå¨ããããã ã¨èãã¦ãã¾ãã
ï¼ãªã½ã¼ã¹é¢ï¼
- âåæãã¦ãã¦ãæã£ãã¢ããªã¹ããããªã
- âä»ã®æ¥åã¨æãæã¡ã§åæã®ããã®æéãå¤ãå²ããªã
ã»ãã¥ãªãã£æ©å¨ã§ã®æ¤ç¥ããéä¿¡å ã®æ å ±å ±æã®ããã«ãã»ãã¥ãªãã£ãã³ããæ©æ¢°çãªæ¤ç¥åºæºã«ä¾åããæ å ±å ±æãè¡ã£ã¦ããã±ã¼ã¹ãå½ã¦ã¯ã¾ãã¾ããæ¤ç¥ããæ å ±ãèªçµç¹ã®ã¢ããªã¹ãã®è¦³ç¹ã§ç²¾æ»ï¼è£è¶³ããããã§æ å ±å ±æã§ããã°è¯ãã®ã§ãããåæãã¦ãã¦ãåæã®ããã®æéãç¡ãã¨ãçµæçã«æ©æ¢°çã«æ¤ç¥ããæ å ±ããã®ã¾ã¾å ±æãã¦ãã¾ãã¾ããããã¯æ å ±ã®ä¸èº«ãããè¯ãã§ããªãã¾ã¾ãIoCã¬ãã«ã§ã®æ å ±å ±æã«éãã¦ãã¾ãæã大ããªè¦å ã®ä¸ã¤ã ã¨æãã¾ãã
ï¼æèé¢ï¼
- âåãåãæã®ç«å ´ã§èãããã¦ããªã
åãåãæãç¾å ´ã®æ å½è ãªã®ããçµå¶å±¤çãªç«å ´ã®æ¹ãªã®ãã¯äºåã«ææ¡ãã¦ããã¹ãã§ããç¾å ´ã¬ãã«ã§ããã·ã¹ãã éç¨æ å½ãã»ãã¥ãªãã£æ å½ãªã©ããã¾ãã¾ãªå½¹å²ãããã¾ããæ å ±å ±æã®éã¯ãèªèº«ãåãåãæã¨ãªã£ããã¨ãæ³åãã¦ããå¾ç¶å¯¾å¿ã«ã¤ãªããããã®å åãªæ å ±ãå«ãã§ããããã確èªãããã¨ãå¿ è¦ã ã¨æãã¾ãã
ï¼æ å ±å ±æã®æ¹æ³ï¼
- âæ
å ±å
±æã¨ãããæ段ãããç®çãã«ãªã£ã¦ãã¾ã£ã¦ãã
ä¾ãã°ãä¸å±¤é¨ããã®ä¸å£°ã§ããæ å ±å ±æã¯å¤§äºã ï¼ããï¼ãã¨ãã£ãæ示ããããæ¤ç¥ï¼å ¥æããæ å ±ãã¨ããããå ±æãã¦ãã¾ãã±ã¼ã¹ã§ããããã«ããããæ å ±å ±æã«ããå¹æçãªèª¿æ»ã対çã®å®æ½ã«å½¹ç«ã¦ããã¨ããæ¬æ¥ã®ç®çãèãã¦ãã¾ããçµæçã«ç²¾æ»ãè£è¶³ãä»ä¸ãããªãæ å ±ãå ±æããã¦ãã¾ããã¨ã«ç¹ããã®ã ã¨æãã¾ãã - âæ
å ±å
±æããéã®ã«ã¼ã«ãå®ã¾ã£ã¦ããªã
ãIoCã«ã¯å¿ ãã¿ã°ä»ããè¡ãããªã©ã®ã«ã¼ã«ãè¨ããªãã£ãããã«ãæä¾å´ã¨ãã¦ã¯å¥½ããªããã«ï¼æéã®ããããªãããã«ï¼æ å ±å ±æããã¦ãã¾ãç¹ã«è¦å ãããã¨æãã¾ããã¾ããæä¾å´ã¨ãã¦ã¯ãã詳細ãªæ å ±ãä»ä¸ãã¦å ±æããããã®ã®ãå ±æç¯å²ãåç¨å©ç¨ã®å¯å¦ãã«ã¼ã«ã¨ãã¦å®ãã¦ããªãããã«ããåé å´ã§æ³å®å¤ã®å©ç¨ãå ±æâ»ããããªãããã«è©³ç´°ãªæ å ±ãæä¾ããªããã¨ãã£ãä¿å®çãªèãã«ãªã£ã¦ãã¾ãç¹ãè¦å ã®ä¸ã¤ã ã¨èãã¦ãã¾ãã
- â»æ³å®å¤ã®å©ç¨ï¼å
±æã®ä¾ã¨ãã¦ã¯ä¸è¨ãããã¾ãã
- ã»ç¤¾å ã®æ©å¯äºé ãå«ãæ å ±ã社å¤ã¸æ¸¡ããæ å ±æ¼æ´©ã風è©è¢«å®³ã«ã¤ãªãã
- ã»åæ³å©ç¨ä¸å¯ã®æ å ±ãåç¨ãµã¼ãã¹ã§ç¨ããããNDAéåçã®è²¬ä»»åé¡ã«ã¤ãªããããªã©
ï¼ãã¸ãã¹é¢ï¼
- âå ±æãã¦ãééçï¼æè¡çãªå¯¾ä¾¡ããã£ã¼ãããã¯ãå¾ã«ãã
- âæ
å ±å
±æã«ãããã¸ãã¹ã«æªå½±é¿ãåã¼ãå¯è½æ§ããã
æ å ±å ±æãæ¬æ¥ã¨ã§ããã°ããã®ã§ãããç¾ç¶ãæ å ±å ±æã¯é¢ä¿çµç¹éã§ã®æ åæ´»åã¨ãã¦è¡ããã¦ããçµç¹ãå¤ãã¨æãã¾ãããã®ãããééçï¼æè¡çãªå¯¾ä¾¡ã¯åºæ¬çã«ã¯ç¡ããçµæçã«ãªã½ã¼ã¹ãæ å ±å ±æã«å²ããã»ã©ã®ä½è£ããªãç¹ãè¦å ã«ãªã£ã¦ããã¨æãã¾ããã¾ããè¯ããã¨æããIoCã ãã§ãªãããã«ä»éããæ å ±ï¼ã¤ã³ã·ãã³ã対å¿æã«å¾ããã調æ»çµæãªã©ï¼ã詳細ã«è¨è¼ãã¦ãã¾ããã¨ã§ãæ»æãã¤ã³ã·ãã³ãããã£ãäºå®ãå ±æå ã«ç¥ãããçµç¹ã¨ãã¦ä¸å©çã被ãå¯è½æ§ãããç¹ãè¦å ã®ä¸ã¤ã ã¨èãã¦ãã¾ãã
5. ã¾ã¨ã
æ¬ã³ã©ã ã§ã¯ãæ å ±å ±æã«ããã¦ç¾ç¶ä¸è¶³ãã¦ããã¨æããç¹ã¨ãã®èæ¯ã«ã¤ãã¦CSIRTæ¥åã«å¾äºããçè ã®è¦ç¹ã§èå¯ãã¾ããããªã½ã¼ã¹é¢ããã¸ãã¹é¢ãæ å ±å ±æã®æ¹æ³ã«çç®ãã¦è¦å ãåãä¸ãã¾ããããçµç¹ã«ãã£ã¦ã¯ä»ã«ãæ§ã ãªè¦å ãè¤éã«çµ¡ãã§ããã¨æãã¾ããä¸ã¤ä¸ã¤ã解決ããã®ã¯ç°¡åãªãã¨ã§ã¯ããã¾ããããããã¦æ å ±å ±æãããéã¯ãIoCãè£è¶³ããæ å ±ãä»ä¸ãã¦å ±æããããã®ã§ããæ å ±å ±æã®å¶ã¿ã«ããçµç¹ã®ã»ãã¥ãªãã£åä¸ã«ã¤ãªãããã¨ãæå¾ ãã¦ãã¾ãã
åèè³æ
- [1]MISP Open Source Threat Intelligence Platform; Open Standards For Threat Information Sharing
https://www.misp-project.org/ - [2]è
å¨æ
å ±æ§é åè¨è¿°å½¢å¼STIXæ¦èª¬ï¼IPA ç¬ç«è¡æ¿æ³äºº æ
å ±å¦çæ¨é²æ©æ§
https://www.ipa.go.jp/security/vuln/STIX.html - [3]æ¤ç¥ææ¨æ
å ±èªå交ææé TAXIIæ¦èª¬ï¼IPA ç¬ç«è¡æ¿æ³äºº æ
å ±å¦çæ¨é²æ©æ§
https://www.ipa.go.jp/security/vuln/TAXII.html - [4]éè¦ã¤ã³ãã©ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãæ¹åããããã®ãã¬ã¼ã ã¯ã¼ã¯ã1.1ç
Framework for Improving Critical Infrastructure Cybersecurity Version 1.1
https://www.ipa.go.jp/files/000071204.pdf - [5]çµç¹ã¨æ
å ±ã·ã¹ãã ã®ããã®ã»ãã¥ãªãã£ããã³ãã©ã¤ãã·ã¼ç®¡çç
Security and Privacy Controls for Information Systems and Organizations
https://www.ipa.go.jp/files/000092657.pdf - [6]ãµã¤ãã¼è
å¨æ
å ±ã®å
±æï½NIST SP800-150ã®æ¦è¦ï½ | NTTãã¼ã¿å
端æè¡æ ªå¼ä¼ç¤¾
https://www.intellilink.co.jp/column/security/2019/112600.aspx - [7]å®åè
è¦ç¹ã§èããè
å¨ã¤ã³ããªã¸ã§ã³ã¹ï¼ç¬¬ä¸åï¼ | NTTãã¼ã¿å
端æè¡æ ªå¼ä¼ç¤¾
https://www.intellilink.co.jp/column/security/2021/032600.aspx
å®åè è¦ç¹ã§èããè å¨ã¤ã³ããªã¸ã§ã³ã¹ï¼ç¬¬äºåï¼ | NTTãã¼ã¿å 端æè¡æ ªå¼ä¼ç¤¾
https://www.intellilink.co.jp/column/security/2022/032500.aspx