{"id":53,"date":"2020-06-30T19:24:11","date_gmt":"2020-06-30T10:24:11","guid":{"rendered":"https:\/\/www.dataclasys.com\/value\/security-threat\/"},"modified":"2020-12-28T13:52:08","modified_gmt":"2020-12-28T04:52:08","slug":"risk","status":"publish","type":"value","link":"https:\/\/www.dataclasys.com\/value\/risk\/","title":{"rendered":"\u69d8\u3005\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u3078\u306e\u5bfe\u7b56"},"content":{"rendered":"\n
IT\u3092\u53d6\u308a\u5dfb\u304f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u3068\u30ea\u30b9\u30af\u306f\u6570\u591a\u304f\u3001\u5404\u4f01\u696d\u306f\u65e5\u3005\u9032\u5316\u3059\u308b\u3042\u3089\u3086\u308b\u8105\u5a01\u306b\u5bfe\u3057\u3066\u5bfe\u7b56\u3092\u8b1b\u3058\u3066\u3044\u304b\u306a\u304f\u3066\u306f\u306a\u308a\u307e\u305b\u3093\u3002\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u7d44\u7e54\u306b\u3088\u308b\u5916\u90e8\u304b\u3089\u306e\u653b\u6483\u3084\u793e\u54e1\u306b\u3088\u308b\u6a5f\u5bc6\u60c5\u5831\u306e\u4e0d\u6b63\u6301\u3061\u51fa\u3057\u306a\u3069\u306e\u5185\u90e8\u72af\u884c\u3001\u30e1\u30fc\u30eb\u306e\u8aa4\u9001\u4fe1\u306a\u3069\u306e\u30df\u30b9\u3001\u696d\u52d9\u7aef\u672b\u306e\u7d1b\u5931\u30fb\u76d7\u96e3\u306a\u3069\u306e\u4e8b\u6545\u306a\u3069\u3001\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306f\u591a\u5c90\u306b\u308f\u305f\u308a\u307e\u3059\u3002<\/p>\n\n\n\n
\u305d\u3046\u3044\u3063\u305f\u69d8\u3005\u306a\u60c5\u5831\u6f0f\u6d29\u30ea\u30b9\u30af\u306e\u6839\u672c\u5bfe\u7b56\u3068\u306a\u308b\u306e\u304c\u3001\u30d5\u30a1\u30a4\u30eb\u6697\u53f7\u5316\u30fbDRM\/IRM\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3067\u3059\u3002\u6f0f\u6d29\u306e\u629c\u3051\u9053\u3092\u585e\u3050\u306e\u3067\u306f\u306a\u304f\u3001\u60c5\u5831\u305d\u306e\u3082\u306e\u306b\u4fdd\u8b77\u3092\u304b\u3051\u308b\u3053\u3068\u306b\u3088\u308a\u3001\u3042\u3089\u3086\u308b\u30ea\u30b9\u30af\u304b\u3089\u6f0f\u6d29\u3092\u9632\u3050\u3053\u3068\u304c\u53ef\u80fd\u3067\u3059\u3002<\/p>\n\n\n\n