III ．情報資産に対する脅威と対策② コンピュータ利用上の脅威 インターネットの利用に関する脅威 電子媒体の利用に関する脅威 外部からの攻撃の脅威 コンピュータ不正利用等の対策 インターネット不正利用対策 電子媒体不正利用対策 ネットワーク攻撃対策
IV ．コンピュータの一般知識 ソフトウェアに関する知識 ハードウェアに関する知識 ＯＳに関する知識 ネットワークに関する知識
合格点 I ～ IV 各々７０％以上
【Android OSの推奨バージョン】 Android OS 4.0以降 ※推奨OSを搭載していても、機種により、アプリの一部の機能がご利用いただけない場合があります。無料問題をダウンロードし、動作をご確認（問題が解けるか、不正解問題が抽出されているか、などの各機能について）のうえ有料コンテンツをご購入下さい。
Only one person of carelessness, company information, a company of the lifeline and mismanagement will easily flows. Please defense the outflow of confidential information is a "company of lifeline" in your guidance.
Range, which is required as a knowledge of information security has spread every year. By engaging business, also skills required becoming a wide variety. Moreover, this trend is sure to further intensify in the future. In considering the information security, and not only in fragmentary knowledge, in order to live a modern IT has become essential, all employees, regardless of industry and business must understanding. In line with the business needs, the individual level it has become a content that covers the summary to be worn in, knowledge that is asked is from recent years of information security incidents, determined to threats ranging variety, which is included in the information measures, software / hard of I Oyobi to knowledge of both sides. Information security management mechanic certification exam will certify that it has the necessary knowledge as management leader in security measures.
Ⅰ. Information security review article Examples and corporate responsibility in recent years of information security incidents And expertise in the three areas of information security To protect the company and the individual rights related to information The laws and regulations relating to the protection of information Overview of risk analysis and safety measures Privacy Mark certification system For ISMS conformity assessment system
II. Threats and Countermeasures for information assets ① Threats on the use of paper media The threat posed by such outsiders and cooperation companies with employees in-house Threat of entry into buildings and room Threats related to natural disasters Threats related to large-scale failure Paper media fraud measures Management of equipment Intrusion measures of unspecified person Large-scale failure measures and natural disasters
III. Threats and Countermeasures for information assets ② Threats on the computer use Threats on the use of the Internet Threats on the use of electronic media Threat of attack from outside Measures of computer misuse Internet fraud measures Electronic media fraud measures Network attack measures
IV. General knowledge of computer Knowledge of software Knowledge of hardware Knowledge of OS Knowledge of network
Passing grade I ~ IV each more than 70%
※ OS2.3 there are times when it does not operate in the following. Please use it to upgrade to OS4.0 or more.
[Recommended version of Android OS] Android OS 4.0 or later ※ Even if equipped with the recommended OS, depending on the model, some of the functions of the app is not available. Download a free issue, check the operation you please buy the paid content is top of (or problem is solvable, or incorrect problems have been extracted, each feature for such).