{"id":1119,"date":"2023-12-12T11:53:16","date_gmt":"2023-12-12T02:53:16","guid":{"rendered":"https:\/\/cont.securityagent.jp\/?page_id=1119"},"modified":"2023-12-28T22:24:47","modified_gmt":"2023-12-28T13:24:47","slug":"security-glossary","status":"publish","type":"page","link":"https:\/\/securityagent.jp\/cont\/security-glossary\/","title":{"rendered":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7528\u8a9e\u96c6"},"content":{"rendered":"<ul>\n<li><a href=\"\/cont\/cat-security-glossary\/1118\" aria-label=\"OAuth\">OAuth<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1117\" aria-label=\"\u30de\u30eb\u30c1\u30d5\u30a1\u30af\u30bf\u8a8d\u8a3c\">\u30de\u30eb\u30c1\u30d5\u30a1\u30af\u30bf\u8a8d\u8a3c<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1116\" aria-label=\"\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u30ea\u30b9\u30c8\uff08ACL\uff09\">\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u30ea\u30b9\u30c8\uff08ACL\uff09<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1115\" aria-label=\"\u5c5e\u6027\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff08ABAC\uff09\">\u5c5e\u6027\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff08ABAC\uff09<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1114\" aria-label=\"\u30ed\u30fc\u30eb\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1(RBAC)\">\u30ed\u30fc\u30eb\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1(RBAC)<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1113\" aria-label=\"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1112\" aria-label=\"\u8106\u5f31\u6027\">\u8106\u5f31\u6027<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1111\" aria-label=\"\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\uff08\u30ea\u30b9\u30af\u8a55\u4fa1\uff09\">\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\uff08\u30ea\u30b9\u30af\u8a55\u4fa1\uff09<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1110\" aria-label=\"\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u5236\u5fa1\">\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u5236\u5fa1<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1109\" aria-label=\"\u30d9\u30f3\u30c0\u30fc\u30ed\u30c3\u30af\u30a4\u30f3\">\u30d9\u30f3\u30c0\u30fc\u30ed\u30c3\u30af\u30a4\u30f3<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1108\" aria-label=\"\u4e2d\u592e\u7ba1\u7406\">\u4e2d\u592e\u7ba1\u7406<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1107\" aria-label=\"\u30d5\u30ed\u30fc\u5236\u5fa1\">\u30d5\u30ed\u30fc\u5236\u5fa1<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1106\" aria-label=\"\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\">\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/301\" aria-label=\"\u30c7\u30d0\u30a4\u30b9\u7ba1\u7406\">\u30c7\u30d0\u30a4\u30b9\u7ba1\u7406<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1105\" aria-label=\"\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u5bfe\u7b56\">\u30b9\u30d1\u30a4\u30a6\u30a7\u30a2\u5bfe\u7b56<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1104\" aria-label=\"IPS\">IPS<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1103\" aria-label=\"IDS\">IDS<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1102\" aria-label=\"SIEM\">SIEM<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1101\" aria-label=\"\u30a2\u30ce\u30de\u30ea\u691c\u77e5\u578b\">\u30a2\u30ce\u30de\u30ea\u691c\u77e5\u578b<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1100\" aria-label=\"\u30b7\u30b0\u30cd\u30c1\u30e3\u30d9\u30fc\u30b9\u578b\">\u30b7\u30b0\u30cd\u30c1\u30e3\u30d9\u30fc\u30b9\u578b<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1099\" aria-label=\"Diffie-Hellman\u9375\u5171\u6709\u6cd5\">Diffie-Hellman\u9375\u5171\u6709\u6cd5<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1098\" aria-label=\"RSA\">RSA<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1097\" aria-label=\"\u30d6\u30ed\u30c3\u30af\u6697\u53f7\u5316\u65b9\u5f0f\">\u30d6\u30ed\u30c3\u30af\u6697\u53f7\u5316\u65b9\u5f0f<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1096\" aria-label=\"AES\">AES<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1095\" aria-label=\"DES\">DES<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1094\" aria-label=\"\u516c\u958b\u9375\u6697\u53f7\u65b9\u5f0f\">\u516c\u958b\u9375\u6697\u53f7\u65b9\u5f0f<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1093\" aria-label=\"\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f\">\u5bfe\u79f0\u9375\u6697\u53f7\u65b9\u5f0f<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1092\" aria-label=\"TLS\uff08Transport Layer Security\uff09\">TLS\uff08Transport Layer Security\uff09<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1091\" aria-label=\"SSL\uff08Secure Sockets Layer\uff09\">SSL\uff08Secure Sockets Layer\uff09<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1090\" aria-label=\"\u30d5\u30a9\u30ec\u30b9\u30c8\">\u30d5\u30a9\u30ec\u30b9\u30c8<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1089\" aria-label=\"\u30d7\u30ed\u30c8\u30b3\u30eb\">\u30d7\u30ed\u30c8\u30b3\u30eb<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1088\" aria-label=\"\u30aa\u30d6\u30b8\u30a7\u30af\u30c8\u7ba1\u7406\">\u30aa\u30d6\u30b8\u30a7\u30af\u30c8\u7ba1\u7406<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1087\" aria-label=\"LDAP\">LDAP<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1086\" aria-label=\"Active Directory\">Active Directory<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1085\" aria-label=\"\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\">\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1084\" aria-label=\"\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4\">\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1083\" aria-label=\"\u30d7\u30ed\u30ad\u30b7\u30b5\u30fc\u30d0\">\u30d7\u30ed\u30ad\u30b7\u30b5\u30fc\u30d0<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1082\" aria-label=\"\u30d1\u30b1\u30c3\u30c8\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\">\u30d1\u30b1\u30c3\u30c8\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1081\" aria-label=\"\u751f\u4f53\u8a8d\u8a3c\u8981\u7d20\">\u751f\u4f53\u8a8d\u8a3c\u8981\u7d20<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1080\" aria-label=\"\u6240\u6709\u8981\u7d20\">\u6240\u6709\u8981\u7d20<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1079\" aria-label=\"\u77e5\u8b58\u8981\u7d20\">\u77e5\u8b58\u8981\u7d20<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1078\" aria-label=\"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1077\" aria-label=\"\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5b9a\u7fa9\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\uff08SDN, Software-Defined Networking\uff09\">\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5b9a\u7fa9\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\uff08SDN, Software-Defined Networking\uff09<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1076\" aria-label=\"\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\">\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1075\" aria-label=\"\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\">\u30ea\u30b9\u30af\u30d9\u30fc\u30b9<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1074\" aria-label=\"\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u76e3\u8996\">\u30ea\u30a2\u30eb\u30bf\u30a4\u30e0\u76e3\u8996<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1073\" aria-label=\"\u30c8\u30fc\u30af\u30f3\u30d9\u30fc\u30b9\">\u30c8\u30fc\u30af\u30f3\u30d9\u30fc\u30b9<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1072\" aria-label=\"\u76e3\u67fb\">\u76e3\u67fb<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1071\" aria-label=\"\u8a8d\u53ef\">\u8a8d\u53ef<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1070\" aria-label=\"\u4e0d\u6b63\u691c\u77e5\u30b7\u30b9\u30c6\u30e0\">\u4e0d\u6b63\u691c\u77e5\u30b7\u30b9\u30c6\u30e0<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1069\" aria-label=\"\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\">\u30a2\u30af\u30bb\u30b9\u5236\u5fa1<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1068\" aria-label=\"\u6697\u53f7\u5316\">\u6697\u53f7\u5316<\/a>\n<\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1067\" aria-label=\"\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\">\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1066\" aria-label=\"CIA\">CIA<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1065\" aria-label=\"\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\">\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1064\" aria-label=\"2\u8981\u7d20\u8a8d\u8a3c\">2\u8981\u7d20\u8a8d\u8a3c<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1063\" aria-label=\"\u8a8d\u8a3c\">\u8a8d\u8a3c<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1062\" aria-label=\"\u591a\u8981\u7d20\u8a8d\u8a3c\">\u591a\u8981\u7d20\u8a8d\u8a3c<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1061\" aria-label=\"\u7d99\u7d9a\u7684\u8a55\u4fa1\">\u7d99\u7d9a\u7684\u8a55\u4fa1<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1060\" aria-label=\"\u30ea\u30fc\u30b9\u30c8\u30d7\u30ea\u30d3\u30ec\u30c3\u30b8\u539f\u5247\">\u30ea\u30fc\u30b9\u30c8\u30d7\u30ea\u30d3\u30ec\u30c3\u30b8\u539f\u5247<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1059\" aria-label=\"\u30de\u30a4\u30af\u30ed\u30bb\u30b0\u30e1\u30f3\u30c6\u30fc\u30b7\u30e7\u30f3\">\u30de\u30a4\u30af\u30ed\u30bb\u30b0\u30e1\u30f3\u30c6\u30fc\u30b7\u30e7\u30f3<\/a><\/li>\n<li><a href=\"\/cont\/cat-security-glossary\/1058\" aria-label=\"\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\">\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>OAuth \u30de\u30eb\u30c1\u30d5\u30a1\u30af\u30bf\u8a8d\u8a3c \u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u30ea\u30b9\u30c8\uff08ACL\uff09 \u5c5e\u6027\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff08ABAC\uff09 \u30ed\u30fc\u30eb\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1(RBAC) \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8 \u8106\u5f31\u6027 \u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\uff08\u30ea\u30b9\u30af\u8a55\u4fa1\uff09 \u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u5236\u5fa1 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1119","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/pages\/1119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/comments?post=1119"}],"version-history":[{"count":7,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/pages\/1119\/revisions"}],"predecessor-version":[{"id":1154,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/pages\/1119\/revisions\/1154"}],"wp:attachment":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/media?parent=1119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}