プレプリント / バージョン1

物理セキュリティアーキテクチャの戦略的設計論

― サイバー・軍事防衛原則の応用による多層防御フレームワークの構築 ―

##article.authors##

DOI:

https://doi.org/10.51094/jxiv.2694

キーワード:

物理セキュリティ、 戦略的設計論、 多層防御、 サイバーセキュリティ、 軍事原則、 リスクマネジメント、 組織防衛

抄録

民間組織の物理セキュリティは、場当たり的な対策の継ぎ足しに陥りやすく、体系的な戦略設計が欠如している。本稿は、この課題に対し、サイバー・軍事分野の知見を応用する。具体的には、「多層防御」のような正規戦由来の普遍的原則に加え、非正規戦における『曖昧な脅威』への対処ドクトリンをも援用し、これら複数の知見を民間組織の文脈に合わせて統合・再構築する。これにより、組織全体の防衛体制を設計するための新たな戦略的フレームワークを提案する。本フレームワークは、①戦略・インテリジェンス層、②能動的対応層、③抑止・検知層の3層で構成され、組織が構築すべき防衛アーキテクチャの合理的かつ再現性のある青写真を提供することを目的とする、理論的試論である。

利益相反に関する開示

本研究に関して、開示すべき利益相反は存在しない。

ダウンロード *前日までの集計結果を表示します

ダウンロード実績データは、公開の翌日以降に作成されます。

引用文献

警察庁生活安全局生活安全企画課. (2025). 令和6年における警備業の概況. 警察庁.

厚生労働省. (2025). 賃金構造基本統計調査による職種別平均賃金(時給換算).

日本経済新聞. (2024年8月23日). 警備など保安職業従事者 求人倍率、6月12.28倍. 日本経済新聞. https://www.nikkei.com/article/DGKKZO82947850S4A820C2L83000/

Moses, S., & Rowe, D. C. (2016). Physical security and cybersecurity: Reducing risk by enhancing physical security posture through multi-factor authentication and other techniques. International Journal for Information Security Research, 6(2), 667–676.

Kang, K., & Kim, J. (2015). A case study on converged security with event correlation of physical and information security. International Journal of Security and Its Applications, 9(9), 77–94. https://doi.org/10.14257/ijsia.2015.9.9.08

Babanov, V. (2024). Internals of Defense-In-Depth Strategy in Cybersecurity. Научно списание „Сигурност и отбрана“. https://doi.org/10.70265/PNEZ3158

Ning, X., & Jiang, J. (2022). Defense-in-depth against insider attacks in cyber-physical systems. Internet of Things and Cyber-Physical Systems, 2, 203–211. https://doi.org/10.1016/j.iotcps.2022.12.001

Howes, N. R., Mezzino, M., & Sarkesain, J. (2004). On cyber warfare command and control systems. Institute for Defense Analyses.

Lindsay, J. R. (2020). Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem. Intelligence and National Security, 36(2), 260-278. https://doi.org/10.1080/02684527.2020.1840746

Sarjito, A. (2024). Integrating risk intelligence into defense policy: A strategic risk management approach. JISHUM (Jurnal Ilmu Sosial dan Humaniora), 3(2), 201–218.

Zhu, Q., & Başar, T. (2011). Towards a unifying security framework for cyber-physical systems. Proceedings of the 49th Annual Allerton Conference on Communication, Control, and Computing,

DiMase, D., Collier, Z. A., Heffner, K., & Linkov, I. (2015). Systems engineering framework for cyber physical security and resilience. Environment Systems and Decisions, 35, 291–300. https://doi.org/10.1007/s10669-015-9540-y

Headquarters, Department of the Army. (2014). Insurgencies and countering insurgencies (MCWP 3-33.5).

Nagl, J. A. (2002). Learning to eat soup with a knife: Counterinsurgency lessons from Malaya and Vietnam. University of Chicago Press.

Kilcullen, D. (2009). The accidental guerrilla: Fighting small wars in the midst of a big one. Oxford University Press.

Boddens Hosang, J. F. R. (2017). Rules of engagement: Rules on the use of force as linchpin for the international law of military operations [Doctoral thesis, University of Amsterdam]. University of Amsterdam Digital Academic Repository.

Martínez, R. (2021). The rules of engagement: An essential tool in need of improvements. In M. Nuciari & E. Olivetta (Eds.), Leaders for tomorrow: Challenges for military leadership in the age of asymmetric warfare (pp. 117–139). Springer. https://doi.org/10.1007/978-3-030-71714-8_7

Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., & Xie, F. (2013). Cyber-Physical System Risk Assessment. 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 442–447. https://doi.org/10.1109/IIH-MSP.2013.116

International Organization for Standardization. (2018). ISO 31000:2018 Risk management — Guidelines.

成田浩志. (2025). 『サイバー防衛戦略の物理的セキュリティへの応用に関する理論的考察』. Unpublished manuscript.

AXA XL Risk Consulting. (2020). Emergency response teams and incident management systems (PRC.17.02). AXA XL. https://axaxl.com/-/media/axaxl/files/pdfs/prc-guidelines/prc-1/prc1702emergencyresponseteamsandincidentmgmtsystemsv1.pdf

Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief: Practical theory for crime prevention. Home Office, Policing and Reducing Crime Unit, Research, Development and Statistics Directorate.

Crowe, T. D., & Zahm, D. L. (1994). Crime prevention through environmental design. Land Development, Fall, 22–27.

Adiyono, A., Mandasari, K., Laila, N. A., & Suryani, N. (2024). School facility security: An evaluation of surveillance technologies and efforts to improve physical security. International Education Trend Issues, 2(1). https://doi.org/10.56442/ieti.v2i1.430

Opris, C., Axinte, S., & Petrica, G. (2023). Physical security risk management and enhancements. In Proceedings of SPIE (Vol. 12493, p. 124930Q). https://doi.org/10.1117/12.2643123

Jones, N. (2018). Development of a model to predict security incidents in high secure psychiatric care [Doctoral thesis, University of Nottingham].

Paula, J., & Shives, T. (2025). Enhancing cybersecurity through a revised risk management framework [Conference presentation]. International Conference on Cyber Warfare and Security. https://doi.org/10.34190/iccws.20.1.3443

Ashok, A., Manimaran, G., & Wang, J. (2017). Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid. Proceedings of the IEEE,105(7), 1389–1407. https://doi.org/10.1109/JPROC.2017.2686394

Al-Shammari, R., Al-Mai, N., Robert, H., & Charife, T. (2019). Secure and Resilient Digital Oil Fields in Kuwait Oil Company. In SPE Offshore Europe Conference and Exhibition. Society of Petroleum Engineers. https://doi.org/10.2118/198089-MS

Salih, A. A.& Abd al-Aziz, M.. 2017. Designing a physical security system for risk reduction in a hypothetical nuclear facility. Arab Journal of Nuclear Sciences and Applications،Vol. 50, no. 2, pp.241-249.

https://search.emarefa.net/detail/BIM-777384

Choi, S., Chavez, A., Torres, M., Kwon, C., & Hwang, I. (2017). Trustworthy design architecture: Cyber-physical system. 2017 International Carnahan Conference on Security Technology (ICCST), 1–9. https://doi.org/10.1109/CCST.2017.8167827

Leroy, I., & Zolotaryova, I. (2023). Critical infrastructure defense: perspectives from the EU and USA cyber experts. Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. https://doi.org/10.33271/nvngu/2023-5/165

Gupta, D., Bajramovic, E., Hoppe, H., & Ciriello, A. (2018). The need for integrated cybersecurity and safety training. Journal of Nuclear Engineering and Radiation Science, 4(4). https://doi.org/10.1115/1.4040372

United States Department of Defense. (2016). Cybersecurity activities support to DoD information network operations (Instruction Number 8530.01). DoD CIO. https://nsarchive.gwu.edu/media/21575/ocr

ダウンロード

公開済


投稿日時: 2026-01-20 11:44:41 UTC

公開日時: 2026-02-17 05:37:09 UTC
研究分野
社会学