1. ã»ãã¥ãªãã£ãšã³ãžãã¢ãšããŠã®ãªã¢ãŒãã¯ãŒã¯ã®çŸç¶
1.1. ãµã€ããŒã»ãã¥ãªãã£æ¥çã®æé·ãšãªã¢ãŒãã¯ãŒã¯
è¿å¹Žããµã€ããŒã»ãã¥ãªãã£æ¥çã¯æ¥éã«æé·ããŠããŸãããã®æé·ã¯ãããžã¿ã«ãã©ã³ã¹ãã©ãŒã¡ãŒã·ã§ã³ã®é²è¡ãããµã€ããŒæ»æã®å¢å ã«äŒŽãã»ãã¥ãªãã£å¯Ÿçã®å¿ èŠæ§ãé«ãŸã£ãŠããããšã«èµ·å ããŠããŸãããã®ãããªèæ¯ã®äžãå€ãã®äŒæ¥ãã»ãã¥ãªãã£ãšã³ãžãã¢ã®æ¡çšãç©æ¥µçã«è¡ã£ãŠããŸãã
äžæ¹ã§ãæ°åã³ãããŠã€ã«ã¹ã®åœ±é¿ããã¯ãŒã¯ã¹ã¿ã€ã«ã®å€æ§åã«ããããªã¢ãŒãã¯ãŒã¯ãäžè¬çã«ãªã£ãŠããŸãããã»ãã¥ãªãã£ãšã³ãžãã¢ãäŸå€ã§ã¯ãªããå€ãã®ãšã³ãžãã¢ãèªå® ãã«ãã§ãªã©ããªãã£ã¹ä»¥å€ã®å Žæã§ã®äœæ¥ãéžæããŠããŸãããã®ãããªç¶æ³ãããµã€ããŒã»ãã¥ãªãã£æ¥çã®æé·ãšãªã¢ãŒãã¯ãŒã¯ã®æ®åãåæã«ä¿é²ããŠããã®ã§ãã
1.2. ãªã¢ãŒãã¯ãŒã¯ã®ã¡ãªãããšãã¡ãªãã
ãªã¢ãŒãã¯ãŒã¯ã«ã¯å€ãã®ã¡ãªããããããŸãããŸããéå€æéããªããªãããšã§ãæ¥ã ã®ç掻ã®è³ªãåäžããŸãããŸããèªåã®å¥œããªå Žæã§äœæ¥ãã§ãããããäœæ¥ç°å¢ãèªå奜ã¿ã«ã«ã¹ã¿ãã€ãºããããšãã§ããŸããããã«ãããçç£æ§ã®åäžããããéäžããŠäœæ¥ã«åãçµãããšãå¯èœãšãªããŸãã
ãããããªã¢ãŒãã¯ãŒã¯ã«ã¯ãã¡ãªãããååšããŸããäŸãã°ããªãã£ã¹ã«ãããšããšæ¯ã¹ãŠãæ å ±ã®å ±æãã³ãã¥ãã±ãŒã·ã§ã³ãé£ãããªãããšããããŸãããŸããèªå® ã§ã®äœæ¥ãé·åŒããšãä»äºãšãã©ã€ããŒãã®å¢çãææ§ã«ãªããé©åãªäŒæ©ãåãããšãé£ãããªãããšããããŸãããã®ãããªãã¡ãªãããç解ããé©åãªå¯Ÿçãè¬ããããšãããªã¢ãŒãã¯ãŒã¯ãæåãããããã®éµãšãªããŸãã
2. ãªã¢ãŒãã¯ãŒã¯æã®ã»ãã¥ãªãã£å¯Ÿç
2.1. å人ã®Wi-Fiæ¥ç¶ãšããã€ã¹ã®ã»ãã¥ãªãã£
ãªã¢ãŒãã¯ãŒã¯ãè¡ãéãæãåºæ¬çãªã»ãã¥ãªãã£å¯ŸçãšããŠWi-Fiæ¥ç¶ãšäœ¿çšããããã€ã¹ã®ã»ãã¥ãªãã£ãæããããŸããèªå® ã®Wi-Fiã¯ããã£ãããšãã¹ã¯ãŒããèšå®ããWPA2ãªã©ã®ææ°ã®æå·åæè¡ã䜿çšããããšãæšå¥šãããŸãããŸããäžèŠãªããŒãã¯éãããã¡ã€ã¢ãŠã©ãŒã«ãæå¹ã«ããããšã§ãå€éšããã®äžæ£ã¢ã¯ã»ã¹ãé²ãããšãã§ããŸãã
䜿çšããããã€ã¹ã«é¢ããŠã¯ãææ°ã®ã»ãã¥ãªãã£ã¢ããããŒããåžžã«é©çšããäžèŠãªã¢ããªã±ãŒã·ã§ã³ããµãŒãã¹ã¯åé€ãŸãã¯ç¡å¹åããããšãéèŠã§ããããã«ã匷åãªãã¹ã¯ãŒããäºèŠçŽ èªèšŒãèšå®ããããšã§ãããã€ã¹ã®ã»ãã¥ãªãã£ãäžå±€åŒ·åããããšãã§ããŸãã
2.2. äŒæ¥ãããã¯ãŒã¯ãšã®éã
äŒæ¥ã®ãªãã£ã¹å ã§ã®ãããã¯ãŒã¯æ¥ç¶ãšããªã¢ãŒãã¯ãŒã¯æã®ãããã¯ãŒã¯æ¥ç¶ã«ã¯ãããã€ãã®éãããããŸãããªãã£ã¹å ã®ãããã¯ãŒã¯ã¯ãå°éã®ã»ãã¥ãªãã£ããŒã ã«ãã£ãŠç®¡çãããé«åºŠãªã»ãã¥ãªãã£å¯ŸçãæœãããŠããŸããäžæ¹ãèªå® ã®ãããã¯ãŒã¯ã¯ããã®ãããªå°éçãªå¯ŸçããªãããŠããªãããšãå€ãã§ãã
ãã®ããããªã¢ãŒãã¯ãŒã¯æã«ã¯ãVPNïŒVirtual Private NetworkïŒã䜿çšããŠãäŒæ¥ã®ãããã¯ãŒã¯ã«å®å šã«æ¥ç¶ããããšãæšå¥šãããŸããVPNã䜿çšããããšã§ãã€ã³ã¿ãŒãããäžã§ã®ããŒã¿ã®ããåããæå·åããã第äžè ã«ããããŒã¿ã®ååãæ¹ãããé²ãããšãã§ããŸãã
2.3. ãµã€ããŒã»ãã¥ãªãã£å°é家ãšããŠã®å¯Ÿç
ãµã€ããŒã»ãã¥ãªãã£å°é家ãšããŠããªã¢ãŒãã¯ãŒã¯æã®ã»ãã¥ãªãã£å¯Ÿçã¯ããã«éèŠãšãªããŸãããŸããèªèº«ã䜿çšããããã€ã¹ã®ã»ãã¥ãªãã£ãæ倧éã«é«ããããšãæ±ããããŸããããã«å ããŠãã»ãã¥ãªãã£ã®ãã¹ããã©ã¯ãã£ã¹ãææ°ã®è åšæ å ±ãåžžã«ãã§ãã¯ããããã«åºã¥ããŠå¯ŸçãæŽæ°ããããšãå¿ èŠã§ãã
ãŸãããªã¢ãŒãã¯ãŒã¯ãè¡ãååãã¯ã©ã€ã¢ã³ãã«å¯ŸããŠãã»ãã¥ãªãã£ã«é¢ããã¢ããã€ã¹ãæè²ãè¡ã圹å²ãæ ããŸããããã«ãããçµç¹å šäœã®ã»ãã¥ãªãã£ã¬ãã«ãåäžãããããšãã§ããŸãã
3. ãªã¢ãŒãã¯ãŒã¯ããµããŒããããªãœãŒã¹ãšããŒã«
3.1. å¿ èŠãªã»ãã¥ãªãã£ãœãããŠã§ã¢ãšãããã¯ãŒã¯ã¢ã¯ã»ã¹
ãªã¢ãŒãã¯ãŒã¯ãå®å šã«è¡ãããã«ã¯ãé©åãªã»ãã¥ãªãã£ãœãããŠã§ã¢ãšãããã¯ãŒã¯ã¢ã¯ã»ã¹ã®èšå®ãäžå¯æ¬ ã§ããã»ãã¥ãªãã£ãœãããŠã§ã¢ãšããŠã¯ãã¢ã³ããŠã€ã«ã¹ãœãããŠã§ã¢ããã¡ã€ã¢ãŠã©ãŒã«ããã«ãŠã§ã¢å¯ŸçããŒã«ãªã©ãæããããŸãããããã®ããŒã«ã¯ãäžæ£ãªã¢ã¯ã»ã¹ããã«ãŠã§ã¢ã®äŸµå ¥ãé²ãããã®ç¬¬äžç·ãšãªããŸãã
ãããã¯ãŒã¯ã¢ã¯ã»ã¹ã«é¢ããŠã¯ãVPNïŒVirtual Private NetworkïŒã®äœ¿çšãæšå¥šãããŸããVPNã䜿çšããããšã§ãå ¬è¡ãããã¯ãŒã¯äžã§ã®éä¿¡ãæå·åããå®å šã«äŒæ¥ã®å éšãããã¯ãŒã¯ã«ã¢ã¯ã»ã¹ããããšãã§ããŸããããã«ãããããŒã¿ã®æŒæŽ©ã第äžè ã«ããååãé²ãããšãã§ããŸãã
3.2. ãªã¢ãŒãã¯ãŒã¯ã®ã»ãã¥ãªãã£åŒ·åæ¹æ³
ãªã¢ãŒãã¯ãŒã¯ã®ã»ãã¥ãªãã£ã匷åããããã®æ¹æ³ã¯å€å²ã«ããããŸãããŸããå®æçãªã»ãã¥ãªãã£ãã¬ãŒãã³ã°ãåããããšã§ãææ°ã®è åšã察çã«ã€ããŠã®ç¥èãæŽæ°ããããšãã§ããŸãããŸãã䜿çšããããã€ã¹ã®ã»ãã¥ãªãã£ã¢ããããŒããåžžã«é©çšããäžèŠãªã¢ããªã±ãŒã·ã§ã³ããµãŒãã¹ã¯åé€ããããšãéèŠã§ãã
ããã«ãäºèŠçŽ èªèšŒã®å°å ¥ãã匷åãªãã¹ã¯ãŒãã®äœ¿çšãå®æçãªãã¹ã¯ãŒãã®å€æŽãªã©ã®åºæ¬çãªã»ãã¥ãªãã£å¯Ÿçãå¹æçã§ãããããã®å¯Ÿçãçµã¿åãããããšã§ããªã¢ãŒãã¯ãŒã¯æã®ã»ãã¥ãªãã£ãªã¹ã¯ãå€§å¹ ã«äœæžããããšãã§ããŸãã
4. ãµã€ããŒã»ãã¥ãªãã£ã®æ±äººåžå Žãšãªã¢ãŒãã¯ãŒã¯ã®æ©äŒ
4.1. çŸåšã®æ±äººåžå Žã®ç¶æ³
è¿å¹Žããµã€ããŒã»ãã¥ãªãã£ã®éèŠæ§ãé«ãŸãäžããã®åéã®å°é家ãžã®éèŠãæ¥å¢ããŠããŸããããžã¿ã«ãã©ã³ã¹ãã©ãŒã¡ãŒã·ã§ã³ã®é²è¡ãããµã€ããŒæ»æã®å¢å ã«äŒŽããäŒæ¥ãçµç¹ã¯ã»ãã¥ãªãã£å¯Ÿçã匷åããå¿ èŠã«è¿«ãããŠããŸãããã®çµæãã»ãã¥ãªãã£ãšã³ãžãã¢ãã»ãã¥ãªãã£ã¢ããªã¹ããªã©ã®è·çš®ã«é¢ããæ±äººãå¢å ããŠãããæ±äººåžå Žã¯æŽ»æ³ãåããŠããŸãã
ãŸããæè¡ã®é²åãã»ãã¥ãªãã£ã®å°éæ§ãé«ãŸãäžãçµéšãã¹ãã«ãæã€å°é家ã¯ç¹ã«é«ãè©äŸ¡ãåããŠããŸãããã®ãããªèæ¯ããããµã€ããŒã»ãã¥ãªãã£ã®å°é家ãšããŠã®ãã£ãªã¢ãè¿œæ±ããããšã¯ãéåžžã«ææãªéžæãšèšããã§ãããã
4.2. ãªã¢ãŒãã¯ãŒã¯ã®æ±äººã®èŠã€ãæ¹
ãªã¢ãŒãã¯ãŒã¯ã®æ±äººãèŠã€ããããã«ã¯ãããã€ãã®æ¹æ³ããããŸãããŸããå°éã®æ±äººæ å ±ãµã€ãããªã¢ãŒãã¯ãŒã¯å°çšã®æ±äººæ²ç€ºæ¿ãå©çšããããšãå¹æçã§ãããããã®ãµã€ãã§ã¯ããªã¢ãŒãã¯ãŒã¯ãåæãšããæ±äººãå€æ°æ²èŒãããŠãããèªåã®ã¹ãã«ãçµéšã«åã£ãæ±äººãç°¡åã«èŠã€ããããšãã§ããŸãã
ãŸããèªèº«ã®ãããã¯ãŒã¯ã掻çšããããšã倧åã§ããæ¥çã®ã€ãã³ããã»ãããŒã«åå ããããšã§ããªã¢ãŒãã¯ãŒã¯ã®æ©äŒãæäŸããŠããäŒæ¥ãçµç¹ãšã®ç¹ãããæã€ããšãã§ããŸããããã«ãSNSããããã§ãã·ã§ãã«ãããã¯ãŒã¯ã掻çšããŠããªã¢ãŒãã¯ãŒã¯ã®æ å ±ãåéããããšãããããã§ãã
5. ãªã¢ãŒãã¯ãŒã¯ã®ãµã€ããŒã»ãã¥ãªãã£å°é家ãšããŠã®ã¹ãã«ãšè³æ Œ
5.1. å¿ èŠãªæè¡ã¹ãã«ãšè³æ Œ
ãµã€ããŒã»ãã¥ãªãã£å°é家ãšããŠãªã¢ãŒãã¯ãŒã¯ãè¡ãããã«ã¯ãç¹å®ã®æè¡ã¹ãã«ãšè³æ Œãæ±ããããŸããæè¡ã¹ãã«ãšããŠã¯ããããã¯ãŒã¯ã»ãã¥ãªãã£ããšã³ããã€ã³ãã»ãã¥ãªãã£ãã¯ã©ãŠãã»ãã¥ãªãã£ãªã©ã®åºæ¬çãªç¥èã¯ãã¡ãããææ°ã®è åšãæ»æææ³ã«å¯Ÿããç解ãå¿ èŠã§ãã
è³æ ŒãšããŠã¯ãCISSPïŒCertified Information Systems Security ProfessionalïŒãCEHïŒCertified Ethical HackerïŒãªã©ãåœéçã«èªç¥ãããŠãããã®ãå€æ°ååšããŸãããããã®è³æ Œã¯ãå°é家ãšããŠã®ç¥èãšã¹ãã«ã蚌æãããã®ã§ãããæ±äººåžå Žã§ãé«ãè©äŸ¡ãããŠããŸãã
5.2. ã¹ãã«ã¢ãããšãã£ãªã¢ã¢ããã€ã¹
ãµã€ããŒã»ãã¥ãªãã£ã®åéã¯æ¥ã é²åããŠãããå°é家ãšããŠæŽ»èºããããã«ã¯ãåžžã«ææ°ã®ç¥èãç¿åŸããã¹ãã«ã磚ãç¶ããããšãå¿ èŠã§ãããªã³ã©ã€ã³ã®ãã¬ãŒãã³ã°ã³ãŒã¹ãã»ãããŒãã¯ãŒã¯ã·ã§ãããå©çšããŠãç¶ç¶çãªåŠç¿ãå¿ãããããšã倧åã§ãã
ãŸãããã£ãªã¢ãç©ãäžã§ã®ã¢ããã€ã¹ãšããŠã¯ãå®éã®çŸå Žçµéšãç©ãããšãäœããã䟡å€ããããŸããåãã¯ã€ã³ã¿ãŒã³ã·ããããšã³ããªãŒã¬ãã«ã®ããžã·ã§ã³ããã¹ã¿ãŒãããçµéšãç©ãããšã§ãããé«åºŠãªã¹ãã«ãç¥èã身ã«ã€ããããšãã§ããŸãã
6. ãªã¢ãŒãã¯ãŒã¯æã®ã³ãã¥ãã±ãŒã·ã§ã³ãšã»ãã¥ãªãã£æèã®éžæ
6.1. ãªã¢ãŒãã¯ãŒã¯ã«ãããã³ãã¥ãã±ãŒã·ã§ã³ã®éèŠæ§
ãªã¢ãŒãã¯ãŒã¯ã§ã¯ãç©ççãªè·é¢ãçãããããå¹æçãªã³ãã¥ãã±ãŒã·ã§ã³ãéåžžã«éèŠãšãªããŸããç¹ã«ãã»ãã¥ãªãã£ã«é¢ããæ å ±å ±æãç·æ¥ã®å¯Ÿå¿ãå¿ èŠãªå Žåãé©åãªã³ãã¥ãã±ãŒã·ã§ã³ããŒã«ãæ段ã䜿çšããŠãæ å ±ãè¿ éãã€æ£ç¢ºã«äŒããããšãæ±ããããŸãã
6.2. ã»ãã¥ãªãã£æèã®éžæãšãã®æ¹æ³
ãªã¢ãŒãã¯ãŒã¯ãå®å šã«è¡ãããã«ã¯ãåã ã®ã»ãã¥ãªãã£æèã®åäžãäžå¯æ¬ ã§ããå®æçãªã»ãã¥ãªãã£ç ä¿®ãã¯ãŒã¯ã·ã§ãããå®æœããããšã§ãææ°ã®è åšã察çã«ã€ããŠã®ç¥èãå ±æããå šå¡ãã»ãã¥ãªãã£ã®éèŠæ§ãèªèããããšã倧åã§ãããŸããå®éã®äºäŸãåãäžããŠãå ·äœçãªå¯Ÿçæ¹æ³ãåŠã¶ããšã§ãããå®è·µçãªç¥èã身ã«ã€ããããšãã§ããŸãã
6.3. ããŒã å ã§ã®æ å ±å ±æãšååã®ä¿é²
ã»ãã¥ãªãã£å¯Ÿçã¯å人ã®åãçµã¿ã ãã§ãªããããŒã å šäœã®ååãå¿ èŠã§ãããªã¢ãŒãã¯ãŒã¯æã«ã¯ããªã³ã©ã€ã³ããŒãã£ã³ã°ããã£ããããŒã«ã掻çšããŠãå®æçã«æ å ±å ±æãè¡ãããšãéèŠã§ãããŸããã»ãã¥ãªãã£ã«é¢ããæ°ããåãçµã¿ãã¢ã€ãã£ã¢ãå ±æããããšã§ãããŒã å šäœã®ã»ãã¥ãªãã£æèãé«ããããšãã§ããŸãã
7. ãªã¢ãŒãã¯ãŒã¯ã®ã»ãã¥ãªãã£å°é家ãšããŠã®æªæ¥ã®å±æ
7.1. ãªã¢ãŒãã¯ãŒã¯ã®æ®åãšã»ãã¥ãªãã£ã®éèŠæ§
è¿å¹Žããªã¢ãŒãã¯ãŒã¯ã®æ®åãé²ãäžãäŒæ¥ãå人ã®ããŒã¿ä¿è·ã®éèŠæ§ãé«ãŸã£ãŠããŸãããã®èæ¯ãããã»ãã¥ãªãã£å°é家ã®åœ¹å²ã¯ä»åŸãå¢å ãããšäºæ³ãããŸããç¹ã«ãæ°ããæè¡ããµãŒãã¹ãç»å Žãããã³ã«ãããã«äŒŽãã»ãã¥ãªãã£ãªã¹ã¯ãå¢å ãããããå°é家ã®ç¥èãšçµéšãæ±ããããã§ãããã
7.2. é²åããè åšãšã®æŠã
ãµã€ããŒã»ãã¥ãªãã£ã®äžçã§ã¯ãæ»æææ³ãè åšãæ¥ã é²åããŠããŸããããã«å¯Ÿæããããã«ã¯ãææ°ã®æè¡ãç¥èãç¿åŸããåžžã«ã¢ããããŒããç¶ããããšãå¿ èŠã§ãããŸããæ°ããè åšã«å¯Ÿããè¿ éãªå¯Ÿå¿ããäºåã®ãªã¹ã¯åæãéèŠãªåœ¹å²ãæãããŸãã
7.3. ã»ãã¥ãªãã£å°é家ãšããŠã®ãã£ãªã¢ãã¹
ã»ãã¥ãªãã£å°é家ãšããŠã®ãã£ãªã¢ã¯å€å²ã«ããããŸããåãã¯äžè¬çãªã»ãã¥ãªãã£ã®ç¥èãæã€ã¹ã¿ãããšããŠã¹ã¿ãŒãããçµéšãç©ãããšã§ãç¹å®ã®åéãæè¡ã«ç¹åãããšãã¹ããŒããšããŠæŽ»èºããããšãå¯èœã§ãããŸãããªãŒããŒã·ãããåãããžã·ã§ã³ããæè²ã»ç ä¿®ãæ åœãã圹å²ããããŸããã»ãã¥ãªãã£ã®åéã¯åºå€§ã§ãããå€ãã®ãã£ãªã¢ãã£ã³ã¹ãååšããŸãã
8. ãŸãšã
ãªã¢ãŒãã¯ãŒã¯ã¯çŸä»£ã®åãæ¹ãšããŠæ¥éã«æ®åããŠããããã®äžã§ã®ã»ãã¥ãªãã£ã®éèŠæ§ã¯æ¥å¢ãã«é«ãŸã£ãŠããŸããã»ãã¥ãªãã£ãšã³ãžãã¢ãšããŠããã®æ°ããåãæ¹ã®äžã§ã®åœ¹å²ã¯éåžžã«å€§ãããå€ãã®ãã£ã¬ã³ãžãåŸ ã£ãŠããŸãã
ãã®èšäºã§ã¯ããªã¢ãŒãã¯ãŒã¯æã®ã»ãã¥ãªãã£ã®çŸç¶ã察çãå¿ èŠãªããŒã«ããªãœãŒã¹ããããŠãã£ãªã¢ã®å±æã«ã€ããŠè©³ãã解説ããŸãããç¹ã«ãã»ãã¥ãªãã£ã®å°é家ãšããŠã®åœ¹å²ã責任ã¯å€§ãããæ¥ã ã®æ¥åã ãã§ãªããèªå·±ç éœãã¹ãã«ã¢ãããæ±ããããŸãã
æåŸã«ãã»ãã¥ãªãã£ã¯å人ã®åé¡ã ãã§ãªããå šç€Ÿçãªåãçµã¿ãšããŠã®åŽé¢ãæã£ãŠããŸãããªã¢ãŒãã¯ãŒã¯ãå®å šã«ããããŠå¹æçã«é²ããããã«ã¯ãçµç¹å šäœã§ã®æèã®éžæãæ å ±å ±æãäžå¯æ¬ ã§ããã»ãã¥ãªãã£ãšã³ãžãã¢ãšããŠããã®äžå¿ãšãªã£ãŠæŽ»èºããããšã§ãããè¯ããªã¢ãŒãã¯ãŒã¯ç°å¢ã®æ§ç¯ã«è²¢ç®ããããšãã§ããã§ãããã
åèæç®
- freelance-start.comã®èšäº: ã»ãã¥ãªãã£ãšã³ãžãã¢ãšããŠã®ãªã¢ãŒãã¯ãŒã¯ã®ã¡ãªããããã¡ãªãããã»ãã¥ãªãã£å¯Ÿçã«ã€ããŠã®æ å ±ã詳ããèšèŒãããŠããŸãã
- learningpeople.comã®èšäº: ãµã€ããŒã»ãã¥ãªãã£æ¥çã®çŸç¶ããªã¢ãŒãã¯ãŒã¯ã®å¯èœæ§ãæ±äººåžå Žã®æ å ±ãªã©ã詳现ã«æ²èŒãããŠããŸãã