{"id":192,"date":"2023-11-19T15:18:40","date_gmt":"2023-11-19T06:18:40","guid":{"rendered":"https:\/\/yokohama-infosec-consulting-service.net\/?p=192"},"modified":"2024-04-19T13:18:17","modified_gmt":"2024-04-19T04:18:17","slug":"mitre-attckadversarial-tactics-techniques-and-common-knowledge","status":"publish","type":"post","link":"https:\/\/yokohama-infosec-consulting-service.net\/?p=192","title":{"rendered":"Cyber Attack\u306e\u6226\u8853\u3068\u30c6\u30af\u30cb\u30c3\u30af\u3068\u5bfe\u7b56\u306e\u6c4e\u7528\u77e5\u8b58\u30d9\u30fc\u30b9"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">MITRE ATT&amp;CK(Adversarial Tactics, Techniques, and Common Knowledge)<\/h2>\n\n\n\n<p>\u4e16\u754c\u4e2d\u304b\u3089\u306e\u4e8b\u4f8b\u306b\u57fa\u3065\u304fCyber Attack\u306e\u653b\u6483\u624b\u9806\u3001\u5bfe\u5fdc\u7b56\u3001\u76e3\u8996\u65b9\u6cd5\u3092\u8abf\u3079\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<br>Cyber Security\u306e\u30a4\u30f3\u30d5\u30e9\u3068\u3082\u3044\u3046\u3079\u304d\u77e5\u8b58\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3067\u3059\u3002<br>\u30b5\u30a4\u30d0\u30fc\u30ad\u30eb\u30c1\u30a7\u30fc\u30f3\u306e\u5404\u6bb5\u968e\u3067\u3001\u6b21\u306e\u653b\u6483\u306e\u691c\u8a0e\u3068\u5bfe\u7b56\u3001\u6e96\u5099\u6bb5\u968e\u3067\u306e\u7db2\u7f85\u7684\u306a\u5bfe\u6297\u7b56\u306e\u8abf\u67fb\u3092\u3057\u3066\u3044\u304f\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>MITRE ATT&amp;CK<\/strong><br><a href=\"https:\/\/attack.mitre.org\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/attack.mitre.org<\/a><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"MITRE ATT&amp;CK(Adversarial Tactics, Techniques, and Common Knowledge) \u4e16\u754c\u4e2d\u304b\u3089\u306e\u4e8b\u4f8b\u306b\u57fa\u3065\u304fCyber Attack\u306e\u653b\u6483\u624b\u9806\u3001\u5bfe\u5fdc\u7b56\u3001\u76e3\u8996\u65b9\u6cd5 [&hellip;]","protected":false},"author":1,"featured_media":196,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge"],"_links":{"self":[{"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=\/wp\/v2\/posts\/192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=192"}],"version-history":[{"count":14,"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=\/wp\/v2\/posts\/192\/revisions"}],"predecessor-version":[{"id":449,"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=\/wp\/v2\/posts\/192\/revisions\/449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=\/wp\/v2\/media\/196"}],"wp:attachment":[{"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yokohama-infosec-consulting-service.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}