{"id":106563,"date":"2020-02-20T00:37:46","date_gmt":"2020-02-20T08:37:46","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=106563"},"modified":"2020-02-20T00:37:46","modified_gmt":"2020-02-20T08:37:46","slug":"cc-tools-k-12-cybersecurity","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/02\/cc-tools-k-12-cybersecurity\/?lang=ja","title":{"rendered":"\u5e7c\u7a1a\u5712\u304b\u3089\u9ad8\u6821\u307e\u3067\u3001\u30c7\u30b8\u30bf\u30eb\u4e16\u754c\u306e\u5b66\u6821\u3092\u5b89\u5168\u306b\u4fdd\u3064K-12\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e3\u3064\u306e\u65b9\u6cd5"},"content":{"rendered":"<h2>\u306f\u3058\u3081\u306b<\/h2>\n<p>\u3059\u3079\u3066\u304c\u3064\u306a\u304c\u308b\u30b3\u30cd\u30af\u30c6\u30c3\u30c9\u306a\u4e16\u754c\u3067\u306f\u3001\u3042\u3089\u3086\u308b\u5e74\u9f62\u306e\u5b66\u7fd2\u8005\u306b\u30c1\u30e3\u30f3\u30b9\u306e\u6249\u304c\u958b\u304b\u308c\u3066\u3044\u307e\u3059\u3002\u305f\u3060\u3057\u305d\u306e\u30b3\u30cd\u30af\u30c6\u30c3\u30c9\u306a\u4e16\u754c\u3068\u306f\u3001\u3053\u3069\u3082\u305f\u3061\u304c\u5165\u529b\u306e\u3057\u304b\u305f\u3084\u30b9\u30ef\u30a4\u30d7\u306e\u3057\u304b\u305f\u3001\u30af\u30ea\u30c3\u30af\u306e\u3057\u304b\u305f\u3092\u899a\u3048\u305f\u3068\u305f\u3093\u3001\u30ea\u30b9\u30af\u306e\u6249\u3082\u958b\u304f\u4e16\u754c\u3067\u3059\u3002\u3069\u3093\u306a\u306b\u5c0f\u3055\u306a\u3053\u3069\u3082\u3067\u3082\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3092\u5229\u7528\u3059\u308c\u3070\u305d\u306e\u75d5\u8de1\u306f\u6b8b\u3063\u3066\u3057\u307e\u3046\u3082\u306e\u3002\u3067\u3059\u304b\u3089\u3001\u8cac\u4efb\u611f\u306e\u3042\u308b\u5b89\u5168\u306a\u30c7\u30b8\u30bf\u30eb\u5e02\u6c11\u306b\u306a\u308b\u305f\u3081\u306e\u65b9\u6cd5\u3092\u5b66\u3076\u306e\u306b\u65e9\u3059\u304e\u308b\u3068\u3044\u3046\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<p>\u5b66\u6821\u3082\u30aa\u30f3\u30e9\u30a4\u30f3\u4e0a\u3067\u306e\u5b89\u5168\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u306f\u5f37\u3044\u95a2\u5fc3\u3092\u5bc4\u305b\u3066\u3044\u307e\u3059\u3002K-12\u306e\u5b66\u6821\u3067\u50cd\u304fIT\u30ea\u30fc\u30c0\u30fc\u305f\u3061\u306b\u3088\u308c\u3070\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f<a href=\"https:\/\/cosn.org\/sites\/default\/files\/_CoSN_ITLdrship_Report_2019_Final.pdf\" rel=\"nofollow,noopener\" >\u4e00\u756a\u306e\u61f8\u5ff5<\/a>\u300d\u306a\u306e\u3060\u3068\u304b\u3002\u305d\u308c\u3082\u305d\u306e\u306f\u305a\u3067\u3001Pew Research Center\u306e\u00a0<a href=\"https:\/\/www.pewresearch.org\/internet\/2018\/08\/22\/how-teens-and-parents-navigate-screen-time-and-device-distractions\/\" rel=\"nofollow,noopener\" >2018\u5e74\u5ea6\u306e\u5831\u544a\u66f8<\/a> \u306b\u3088\u308c\u3070\u3001\u7c73\u56fd\u3060\u3051\u53d6\u308a\u4e0a\u3052\u3066\u3082\u300c10\u4ee3\u306e\u5b50\u4f9b\u306f\u5927\u591a\u6570\u304c\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u306b\u3075\u308c\u308b\u6a5f\u4f1a\u304c\u3042\u308a\u3001\u305d\u306e45\uff05\u306f\u307b\u307c\u5e38\u6642\u30aa\u30f3\u30e9\u30a4\u30f3\u72b6\u614b\u300d\u306a\u306e\u3060\u305d\u3046\u3067\u3059\u3002<\/p>\n<p>\u300c\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u306e\u30ea\u30f3\u30af\u3092\u30af\u30ea\u30c3\u30af\u3059\u308b\u300d\u3001\u305f\u3060\u305d\u308c\u3060\u3051\u306e\u884c\u70ba\u3067\u3001\u751f\u5f92\u306b\u3082\u5b66\u6821\u306b\u3082\u6df1\u523b\u306a\u7d50\u679c\u304c\u3082\u305f\u3089\u3055\u308c\u304b\u306d\u307e\u305b\u3093\u3002\u6700\u8fd1\u306e\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u653b\u6483\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u306f\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u3088\u308b\u653b\u6483\u3092\u5f15\u304d\u8d77\u3053\u3057\u3066\u3044\u307e\u3059\u304b\u3089\u3001\u3053\u306e\u305b\u3044\u3067\u5b66\u6821\u304c\u9589\u9396\u3055\u308c\u305f\u308a\u3001\u5b66\u751f\u3084\u5f93\u696d\u54e1\u306e\u60c5\u5831\u304c\u516c\u958b\u3055\u308c\u305f\u308a\u3001\u4e0d\u6b63\u8acb\u6c42\u306b\u3046\u3063\u304b\u308a\u652f\u6255\u3044\u3092\u3057\u3066\u3057\u307e\u3046\u5f93\u696d\u54e1\u304c\u591a\u984d\u306e\u304a\u91d1\u3092\u76d7\u307e\u308c\u305f\u308a\u3057\u3066\u3044\u308b\u306e\u3067\u3059\u3002\u3053\u3053\u3067\u4f55\u304b\u3072\u3068\u3064\u3060\u3051\u6c7a\u307e\u3063\u305f\u30a2\u30d7\u30ed\u30fc\u30c1\u3067\u5bfe\u7b56\u3092\u3057\u305f\u306e\u3067\u306fK-12\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3067\u61f8\u5ff5\u3055\u308c\u308b\u3059\u3079\u3066\u306e\u7bc4\u56f2\u3092\u30ab\u30d0\u30fc\u3067\u304d\u307e\u305b\u3093\u3002<\/p>\n<p>\u305d\u3053\u3067\u4ee5\u4e0b\u306b\u3054\u7d39\u4ecb\u3059\u308b\u306e\u306f\u3001\u5f0a\u793e\u304c\u6559\u80b2\u8005\u3084\u7ba1\u7406\u8005\u306e\u7686\u3055\u3093\u3092\u652f\u63f4\u3057\u3001\u5b66\u751f\u3068\u5b66\u6821\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u4fdd\u3064\u305f\u3081\u306e3\u3064\u306e\u65b9\u6cd5\u3067\u3059\u3002<\/p>\n<h3>1. K-12\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5411\u3051\u6559\u80b2\u30d7\u30ed\u30b0\u30e9\u30e0 Cyber A.C.E.S \u3067\u5553\u8499\u3059\u308b<\/h3>\n<p><a href=\"https:\/\/start.paloaltonetworks.com\/cyberaces\">Cyber A.C.E.S. \u3064\u307e\u308a Activities in Cybersecurity Education for Students (\u7565\u3057\u3066A.C.E.S) \u306f\u3001\u5b66\u751f\u5411\u3051\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5553\u8499\u6d3b\u52d5\u3067\u3001<\/a>5\u6b73\u304b\u308915\u6b73\u307e\u3067\u306e\u3053\u3069\u3082\u305f\u3061\u306b\u3001\u3088\u308a\u5b89\u5168\u306a\u30aa\u30f3\u30e9\u30a4\u30f3\u4f53\u9a13\u3092\u63d0\u4f9b\u3057\u3001\u512a\u308c\u305f\u30c7\u30b8\u30bf\u30eb\u5e02\u6c11\u306b\u306a\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u77e5\u8b58\u3092\u8eab\u306b\u4ed8\u3051\u3082\u3089\u3046\u305f\u3081\u306e\u7121\u6599\u30a4\u30f3\u30bf\u30e9\u30af\u30c6\u30a3\u30d6\u5b66\u7fd2\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3059\u3002\u30ec\u30c3\u30b9\u30f3\u306f4\u3064\u306e\u7279\u5b9a\u5e74\u9f62\u30b0\u30eb\u30fc\u30d7\u306b\u5206\u304b\u308c\u3001\u6559\u80b2\u8005\u304c\u4e8b\u524d\u306b\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u3092\u53d7\u3051\u3066\u3044\u306a\u304f\u3066\u3082\u7c21\u5358\u306b\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092\u6307\u5c0e\u3067\u304d\u308b\u3088\u3046\u8a2d\u8a08\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u5404\u5e74\u9f62\u30b0\u30eb\u30fc\u30d7\u7528\u306e\u30e2\u30b8\u30e5\u30fc\u30eb\u306b\u306f\u3001\u300c\u8cac\u4efb\u3042\u308b\u63a5\u7d9a\u300d\u3001\u300c\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u300d\u3001\u300c\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u300d\u3001\u300c\u30c7\u30b8\u30bf\u30eb\u5e02\u6c11\u6a29\u300d\u306e4\u3064\u306e\u5206\u91ce\u3067\u306e\u5b9f\u8df5\u7684\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u305c\u3072<a href=\"https:\/\/start.paloaltonetworks.com\/cyberaces\">Cyber A.C.E.S \u30e2\u30b8\u30e5\u30fc\u30eb\u3092\u3054\u81ea\u8eab\u3067\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066<\/a> \u8a66\u3057\u3066\u307f\u308b\u3053\u3068\u3092\u304a\u3059\u3059\u3081\u3057\u307e\u3059\u3002<\/p>\n<h3>2. \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c7\u30d0\u30a4\u30b9\u8a2d\u5b9a\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u5f93\u3046<\/h3>\n<p>\u6b8b\u5ff5\u306a\u304c\u3089\u4eca\u65e5\u306e\u30c7\u30b8\u30bf\u30eb\u4e16\u754c\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5553\u8499\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u3060\u3051\u3067\u5bfe\u7b56\u304c\u3053\u3068\u8db3\u308a\u308b\u3068\u3044\u3046\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u3067\u3059\u304c\u5b66\u6821\u3068\u3044\u3046\u306e\u306f\u3048\u3066\u3057\u3066(\u3068\u304f\u306b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u306f)\u5272\u304f\u3053\u3068\u306e\u3067\u304d\u308bIT\u30ea\u30bd\u30fc\u30b9\u304c\u9650\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u305d\u3053\u3067\u5f0a\u793e\u306f\u3001K-12\u74b0\u5883\u3092\u9069\u5207\u306b\u4fdd\u8b77\u3057\u3084\u3059\u304f\u3059\u308b\u305f\u3081\u306e\u30c4\u30fc\u30eb\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u79c1\u305f\u3061\u304c\u3064\u304f\u3063\u305fDay1 K-12\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u8a2d\u5b9a\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u306f\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3092\u624b\u52d5\u3067\u8a2d\u5b9a\u30fb\u76e3\u67fb\u3059\u308b\u5fc5\u8981\u3092\u6e1b\u3089\u3057\u3001\u5150\u7ae5\u306e\u4fdd\u8b77\u3084\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3057\u653f\u5e9c\u304c\u8981\u6c42\u3059\u308b\u898f\u5236\u3092K-12\u306e\u5404\u6a5f\u95a2\u304c\u6e80\u305f\u305b\u308b\u3088\u3046\u652f\u63f4\u3059\u308b\u3082\u306e\u3067\u3059\u3002\u3053\u3046\u3057\u305f\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u3092\u4f7f\u3046\u3053\u3068\u3067\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u7ba1\u7406\u8005\u306f\u3001\u30bb\u30fc\u30d5\u30b5\u30fc\u30c1\u3001\u30ea\u30b9\u30af\u3092\u8efd\u6e1b\u3057\u3066\u304f\u308c\u308b\u9078\u629e\u7684\u306a\u6697\u53f7\u5316\u901a\u4fe1\u306e\u89e3\u8aad\u30dd\u30ea\u30b7\u30fc\u3001\u5b66\u6821\u306b\u9069\u3057\u305fweb\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u30dd\u30ea\u30b7\u30fc\u306a\u3069\u3092\u3059\u3070\u3084\u304f\u6709\u52b9\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u8a73\u3057\u304f\u306f<a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/security-reference-blueprint-k-12\">Security Reference Blueprint for K-12 Education IT (\u82f1\u8a9e)<\/a>\u3092\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\u3002\u3053\u3046\u3057\u305f\u8a2d\u5b9a\u4f5c\u696d\u306b\u3064\u3044\u3066\u3059\u3067\u306b\u3088\u304f\u3054\u5b58\u77e5\u306e\u5834\u5408\u306f\u3001<a href=\"https:\/\/github.com\/PaloAltoNetworks\/K12Skillet\" rel=\"nofollow,noopener\" >\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u306eK-12\u30c7\u30d7\u30ed\u30a4\u30e1\u30f3\u30c8\u8a2d\u5b9a\u7528\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8(\u82f1\u8a9e)<\/a>\u3092Github\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3059\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u3059\u3002<\/p>\n<h3>3. K-12\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7528\u306e\u8cc7\u91d1\u3092\u78ba\u4fdd\u3059\u308b\u305f\u3081\u306e\u30ea\u30bd\u30fc\u30b9\u3092\u6d3b\u7528\u3059\u308b<\/h3>\n<p>\u6700\u5f8c\u306b\u3068\u3066\u3082\u91cd\u8981\u306a\u306e\u304c\u3001\u8cc7\u91d1\u3092\u3069\u3046\u8abf\u9054\u3059\u308b\u304b\u3067\u3059\u3002\u7c73\u56fd\u306e\u5834\u5408\u3001<a href=\"https:\/\/www.usac.org\/e-rate\/\" rel=\"nofollow,noopener\" >Universal Service Program for Schools and Libraries (\u5b66\u6821\u304a\u3088\u3073\u56f3\u66f8\u9928\u306e\u305f\u3081\u306e\u30e6\u30cb\u30d0\u30fc\u30b5\u30eb\u30b5\u30fc\u30d3\u30b9\u30d7\u30ed\u30b0\u30e9\u30e0 E-rate)<\/a>\u306b\u3088\u308a\u3001\u5b66\u6821\u304c\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u7d4c\u7531\u3067\u60c5\u5831\u3084\u30ea\u30bd\u30fc\u30b9\u3092\u5f97\u308b\u305f\u3081\u306e\u8cc7\u91d1\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002E-rate\u306f\u3001\u5b89\u5168\u306aK-12\u5b66\u7fd2\u74b0\u5883\u3092\u69cb\u7bc9\u3059\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306e\u4e00\u90e8\u306e\u8cc7\u91d1\u8abf\u9054\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002\u7c73\u56fd\u306e\u5b66\u533a\u3084\u5b66\u6821\u3067\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u4fdd\u8b77\u306e\u305f\u3081\u306b2020\u5e74\u5ea6\u306eE-rate\u8cc7\u91d1\u306e\u5229\u7528\u3092\u8a08\u753b\u3057\u3066\u3044\u308b\u6a5f\u95a2\u306e\u7686\u3055\u3093\u306e\u305f\u3081\u306b<a href=\"https:\/\/www.paloaltonetworks.com\/security-for\/industry\/education\/k-12\/e-rate\">E-rate\u30ea\u30bd\u30fc\u30b9\u306e\u30ea\u30b9\u30c8\u3092\u4f5c\u6210\u3057\u307e\u3057\u305f<\/a>\u306e\u3067\u8cc7\u91d1\u8abf\u9054\u30d7\u30ed\u30bb\u30b9\u306e\u30ac\u30a4\u30c9\u3068\u3057\u3066\u304a\u4f7f\u3044\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u304c\u4e16\u754c\u4e2d\u306eK-12\u6a5f\u95a2\u306e\u5b66\u3073\u306e\u5834\u3092\u4fdd\u8b77\u3057\u3066\u3044\u308b\u65b9\u6cd5\u306b\u3064\u3044\u3066\u8a73\u3057\u304f\u306f\u3001<a href=\"https:\/\/www.paloaltonetworks.com\/security-for\/industry\/education\/k-12\">\u3053\u3061\u3089\u306eK-12\u696d\u754c\u306b\u95a2\u3059\u308b\u30da\u30fc\u30b8\u3082\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/a><\/p>\n<p><em>\u672c\u7a3f\u306f\u7c73\u56fdSLED<\/em><em>\u30d7\u30ed\u30b0\u30e9\u30e0 <\/em><em>\u30c7\u30a3\u30ec\u30af\u30bf\u30fc\u306eGreg Herbold<\/em><em>\u6c0f\u3068\u30b0\u30ed\u30fc\u30d0\u30eb\u30b3\u30fc\u30dd\u30ec\u30fc\u30c8\u30ec\u30b9\u30dd\u30f3\u30b7\u30d3\u30ea\u30c6\u30a3\u306e\u30b7\u30cb\u30a2\u30c7\u30a3\u30ec\u30af\u30bf\u30fcJeff Rangel<\/em><em>\u6c0f\u306b\u3088\u308a\u5bc4\u7a3f\u3055\u308c\u307e\u3057\u305f\u3002<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u306f\u3058\u3081\u306b \u3059\u3079\u3066\u304c\u3064\u306a\u304c\u308b\u30b3\u30cd\u30af\u30c6\u30c3\u30c9\u306a\u4e16\u754c\u3067\u306f\u3001\u3042\u3089\u3086\u308b\u5e74\u9f62\u306e\u5b66\u7fd2\u8005\u306b\u30c1\u30e3\u30f3\u30b9\u306e\u6249\u304c\u958b\u304b\u308c\u3066\u3044\u307e\u3059\u3002\u305f\u3060\u3057\u305d\u306e\u30b3\u30cd\u30af\u30c6\u30c3\u30c9\u306a\u4e16\u754c\u3068\u306f\u3001\u3053\u3069\u3082\u305f\u3061\u304c\u5165\u529b\u306e\u3057\u304b\u305f\u3084\u30b9\u30ef\u30a4\u30d7\u306e\u3057\u304b\u305f\u3001\u30af\u30ea\u30c3\u30af\u306e\u3057\u304b\u305f\u3092\u899a\u3048\u305f\u3068\u305f\u3093\u3001\u30ea\u30b9\u30af\u306e\u6249\u3082\u958b\u304f\u4e16\u754c\u3067\u3059\u3002\u3069\u3093\u306a\u306b\u5c0f\u3055\u306a\u3053\u3069\u3082\u3067\u3082\u3001\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u3092\u5229\u7528\u3059\u308c\u3070\u305d\u306e\u75d5\u8de1\u306f\u6b8b\u3063\u3066\u3057\u307e\u3046\u3082\u306e\u3002\u3067\u3059\u304b\u3089\u3001\u8cac\u4efb\u611f\u306e\u3042\u308b\u5b89\u5168\u306a\u30c7\u30b8\u30bf\u30eb\u5e02\u6c11\u306b\u306a\u308b\u305f\u3081\u306e\u65b9\u6cd5\u3092\u5b66\u3076\u306e\u306b\u65e9\u3059\u304e\u308b\u3068\u3044\u3046\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002 \u5b66\u6821\u3082\u30aa\u30f3\u30e9\u30a4\u30f3\u4e0a\u3067\u306e\u5b89\u5168\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u306f\u5f37\u3044\u95a2\u5fc3\u3092\u5bc4\u305b\u3066\u3044\u307e\u3059\u3002K-12\u306e\u5b66\u6821\u3067\u50cd\u304fIT\u30ea\u30fc\u30c0\u30fc\u305f\u3061\u306b\u3088\u308c\u3070\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f\u4e00\u756a\u306e\u61f8\u5ff5\u300d\u306a\u306e\u3060\u3068\u304b\u3002\u305d\u308c\u3082\u305d\u306e\u306f\u305a\u3067\u3001Pew Research Center\u306e\u00a02018\u5e74\u5ea6\u306e\u5831\u544a\u66f8 \u306b\u3088\u308c\u3070\u3001\u7c73\u56fd\u3060\u3051\u53d6\u308a\u4e0a\u3052\u3066\u3082\u300c10\u4ee3\u306e\u5b50\u4f9b\u306f\u5927\u591a\u6570\u304c\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u306b\u3075\u308c\u308b\u6a5f\u4f1a\u304c\u3042\u308a\u3001\u305d\u306e45\uff05\u306f\u307b\u307c\u5e38\u6642\u30aa\u30f3\u30e9\u30a4\u30f3\u72b6\u614b\u300d\u306a\u306e\u3060\u305d\u3046\u3067\u3059\u3002 \u300c\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30e1\u30fc\u30eb\u306e\u30ea\u30f3\u30af\u3092\u30af\u30ea\u30c3\u30af\u3059\u308b\u300d\u3001\u305f\u3060\u305d\u308c\u3060\u3051\u306e\u884c\u70ba\u3067\u3001\u751f\u5f92\u306b\u3082\u5b66\u6821\u306b\u3082\u6df1\u523b\u306a\u7d50\u679c\u304c\u3082\u305f\u3089\u3055\u308c\u304b\u306d\u307e\u305b\u3093\u3002\u6700\u8fd1\u306e\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u653b\u6483\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u306f\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306b\u3088\u308b\u653b\u6483\u3092\u5f15\u304d\u8d77\u3053\u3057\u3066\u3044\u307e\u3059\u304b\u3089\u3001\u3053\u306e\u305b\u3044\u3067\u5b66\u6821\u304c\u9589\u9396\u3055\u308c\u305f\u308a\u3001\u5b66\u751f\u3084\u5f93\u696d\u54e1\u306e\u60c5\u5831\u304c\u516c\u958b\u3055\u308c\u305f\u308a\u3001\u4e0d\u6b63\u8acb\u6c42\u306b\u3046\u3063\u304b\u308a\u652f\u6255\u3044\u3092\u3057\u3066\u3057\u307e\u3046\u5f93\u696d\u54e1\u304c\u591a\u984d\u306e\u304a\u91d1\u3092\u76d7\u307e\u308c\u305f\u308a\u3057\u3066\u3044\u308b\u306e\u3067\u3059\u3002\u3053\u3053\u3067\u4f55\u304b\u3072\u3068\u3064\u3060\u3051\u6c7a\u307e\u3063\u305f\u30a2\u30d7\u30ed\u30fc\u30c1\u3067\u5bfe\u7b56\u3092\u3057\u305f\u306e\u3067\u306fK-12\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3067\u61f8\u5ff5\u3055\u308c\u308b\u3059\u3079\u3066\u306e\u7bc4\u56f2\u3092\u30ab\u30d0\u30fc\u3067\u304d\u307e\u305b\u3093\u3002 \u305d\u3053\u3067\u4ee5\u4e0b\u306b\u3054\u7d39\u4ecb\u3059\u308b\u306e\u306f\u3001\u5f0a\u793e\u304c\u6559\u80b2\u8005\u3084\u7ba1\u7406\u8005\u306e\u7686\u3055\u3093\u3092\u652f\u63f4\u3057\u3001\u5b66\u751f\u3068\u5b66\u6821\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u4fdd\u3064\u305f\u3081\u306e3\u3064\u306e\u65b9\u6cd5\u3067\u3059\u3002 1. K-12\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5411\u3051\u6559\u80b2\u30d7\u30ed\u30b0\u30e9\u30e0 Cyber A.C.E.S \u3067\u5553\u8499\u3059\u308b Cyber A.C.E.S. \u3064\u307e\u308a Activities in Cybersecurity Education for Students (\u7565\u3057\u3066A.C.E.S) \u306f\u3001\u5b66\u751f\u5411\u3051\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5553\u8499\u6d3b\u52d5\u3067\u30015\u6b73\u304b\u308915\u6b73\u307e\u3067\u306e\u3053\u3069\u3082\u305f\u3061\u306b\u3001\u3088\u308a\u5b89\u5168\u306a\u30aa\u30f3\u30e9\u30a4\u30f3\u4f53\u9a13\u3092\u63d0\u4f9b\u3057\u3001\u512a\u308c\u305f\u30c7\u30b8\u30bf\u30eb\u5e02\u6c11\u306b\u306a\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u77e5\u8b58\u3092\u8eab\u306b\u4ed8\u3051\u3082\u3089\u3046\u305f\u3081\u306e\u7121\u6599\u30a4\u30f3\u30bf\u30e9\u30af\u30c6\u30a3\u30d6\u5b66\u7fd2\u30d7\u30ed\u30b0\u30e9\u30e0\u3067\u3059\u3002\u30ec\u30c3\u30b9\u30f3\u306f4\u3064\u306e\u7279\u5b9a\u5e74\u9f62\u30b0\u30eb\u30fc\u30d7\u306b\u5206\u304b\u308c\u3001\u6559\u80b2\u8005\u304c\u4e8b\u524d\u306b\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u3092\u53d7\u3051\u3066\u3044\u306a\u304f\u3066\u3082\u7c21\u5358\u306b\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092\u6307\u5c0e\u3067\u304d\u308b\u3088\u3046\u8a2d\u8a08\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u5404\u5e74\u9f62\u30b0\u30eb\u30fc\u30d7\u7528\u306e\u30e2\u30b8\u30e5\u30fc\u30eb\u306b\u306f\u3001\u300c\u8cac\u4efb\u3042\u308b\u63a5\u7d9a\u300d\u3001\u300c\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u300d\u3001\u300c\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u300d\u3001\u300c\u30c7\u30b8\u30bf\u30eb\u5e02\u6c11\u6a29\u300d\u306e4\u3064\u306e\u5206\u91ce\u3067\u306e\u5b9f\u8df5\u7684\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\u305c\u3072Cyber A.C.E.S \u30e2\u30b8\u30e5\u30fc\u30eb\u3092\u3054\u81ea\u8eab\u3067\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066 \u8a66\u3057\u3066\u307f\u308b\u3053\u3068\u3092\u304a\u3059\u3059\u3081\u3057\u307e\u3059\u3002 2. \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c7\u30d0\u30a4\u30b9\u8a2d\u5b9a\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u5f93\u3046 \u6b8b\u5ff5\u306a\u304c\u3089\u4eca\u65e5\u306e\u30c7\u30b8\u30bf\u30eb\u4e16\u754c\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5553\u8499\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u3060\u3051\u3067\u5bfe\u7b56\u304c\u3053\u3068\u8db3\u308a\u308b\u3068\u3044\u3046\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u3067\u3059\u304c\u5b66\u6821\u3068\u3044\u3046\u306e\u306f\u3048\u3066\u3057\u3066(\u3068\u304f\u306b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u306f)\u5272\u304f\u3053\u3068\u306e\u3067\u304d\u308bIT\u30ea\u30bd\u30fc\u30b9\u304c\u9650\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u305d\u3053\u3067\u5f0a\u793e\u306f\u3001K-12\u74b0\u5883\u3092\u9069\u5207\u306b\u4fdd\u8b77\u3057\u3084\u3059\u304f\u3059\u308b\u305f\u3081\u306e\u30c4\u30fc\u30eb\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002\u79c1\u305f\u3061\u304c\u3064\u304f\u3063\u305fDay1 K-12\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u8a2d\u5b9a\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u306f\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u3092\u624b\u52d5\u3067\u8a2d\u5b9a\u30fb\u76e3\u67fb\u3059\u308b\u5fc5\u8981\u3092\u6e1b\u3089\u3057\u3001\u5150\u7ae5\u306e\u4fdd\u8b77\u3084\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3057\u653f\u5e9c\u304c\u8981\u6c42\u3059\u308b\u898f\u5236\u3092K-12\u306e\u5404\u6a5f\u95a2\u304c\u6e80\u305f\u305b\u308b\u3088\u3046\u652f\u63f4\u3059\u308b\u3082\u306e\u3067\u3059\u3002\u3053\u3046\u3057\u305f\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u3092\u4f7f\u3046\u3053\u3068\u3067\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u7ba1\u7406\u8005\u306f\u3001\u30bb\u30fc\u30d5\u30b5\u30fc\u30c1\u3001\u30ea\u30b9\u30af\u3092\u8efd\u6e1b\u3057\u3066\u304f\u308c\u308b\u9078\u629e\u7684\u306a\u6697\u53f7\u5316\u901a\u4fe1\u306e\u89e3\u8aad\u30dd\u30ea\u30b7\u30fc\u3001\u5b66\u6821\u306b\u9069\u3057\u305fweb\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u30dd\u30ea\u30b7\u30fc\u306a\u3069\u3092\u3059\u3070\u3084\u304f\u6709\u52b9\u306b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u8a73\u3057\u304f\u306fSecurity Reference &hellip;<\/p>\n","protected":false},"author":636,"featured_media":103965,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7023,6975],"tags":[6976,7021,7022],"coauthors":[6984,6985],"class_list":["post-106563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-and-culture","category-secure-the-enterprise-2","tag-cybersecurity-ja","tag-education-ja","tag-k-12-ja"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/11\/CS-trusting-the-cloud-r2d1-800x418.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=106563"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106563\/revisions"}],"predecessor-version":[{"id":106564,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106563\/revisions\/106564"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/103965"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=106563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=106563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=106563"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=106563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}