{"url":"https://maxima.hatenablog.jp/entry/2020/03/29/200231","width":"100%","height":"190","type":"rich","provider_name":"Hatena Blog","blog_url":"https://maxima.hatenablog.jp/","version":"1.0","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fmaxima.hatenablog.jp%2Fentry%2F2020%2F03%2F29%2F200231\" title=\"-\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3- CISSP\u306e\u8a66\u9a13\u554f\u984c\u306f\u306a\u305c\u96e3\u3057\u3044\u306e\u304b\u3000\u4f8b\u984c\uff13 - Maxima \u3067\u7db4\u308b\u6570\u5b66\u306e\u65c5\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/j/jurupapa/20200329/20200329194919.jpg","categories":["\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3"],"title":"-\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3- CISSP\u306e\u8a66\u9a13\u554f\u984c\u306f\u306a\u305c\u96e3\u3057\u3044\u306e\u304b\u3000\u4f8b\u984c\uff13","blog_title":"Maxima \u3067\u7db4\u308b\u6570\u5b66\u306e\u65c5","author_url":"https://blog.hatena.ne.jp/jurupapa/","published":"2020-03-29 20:02:31","provider_url":"https://hatena.blog","description":"\u672c\u65e5\u3082rslade\u3055\u3093\u306b\u3088\u308bCISSP\u306e\u4f8b\u984c\u3092\u304a\u9001\u308a\u3057\u307e\u3059\u3002 \u5b9f\u88c5\u3059\u308b\u524d\u306b\u6e96\u5099\u3059\u308b\u3079\u304d\u904b\u7528\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8ab2\u984c\u306e\u5b8c\u5168\u306a\u8a18\u8ff0\u3067\u306f\u3001\u8105\u5a01\u3001\u8106\u5f31\u6027\u53ca\u3073\u4ee5\u4e0b\u306e\u3069\u308c\u3092\u793a\u3059\u3079\u304d\u3067\u3057\u3087\u3046\u304b\u3002 a. \u4fdd\u8b77\u624b\u6bb5b. \u8cc7\u7523c. \u66dd\u9732d. \u65bd\u7b56 Prior to implementation, a complete description of an operational security issue should specify threat, vulnerability, and a. safeguard.b. asset.c. exposure.d. control. \u6587\u732e: Fitzgerald, Jerr\u2026","author_name":"jurupapa"}