[20150323]IF10159_网络安全.pdf
-
资源ID:24893
资源大小:543.49KB
全文页数:3页
- 资源格式: PDF
下载:注册后免费下载
快捷下载

账号登录下载
微信登录下载
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
|
[20150323]IF10159_网络安全.pdf
1、 https:/crsreports.congress.gov Updated March 23, 2015CybersecurityOverview Information and communications technology (ICT) has evolved greatly over the last half-century. ICT devices and components now form a highly interdependent system of networks, infrastructure, and resident dataknown as cybers
2、pacethat has become ubiquitous and increasingly integral to almost every facet of modern society. Experts and policymakers are increasingly concerned about cybersecurityprotecting cyberspace from attack by criminals and other adversaries. The risks associated with any attack depend on three factors:
3、 threats (who is attacking), vulnerabilities (how they are attacking), and impacts (what the attack does). What are the threats? People who perform cyberattacks include criminals intent on monetary gain from crimes such as theft or extortion; spies intent on stealing information used by government o
4、r private entities; nation-state warriors who develop capabilities and undertake cyberattacks to support strategic objectives; “hacktivists” who perform cyberattacks for nonmonetary reasons; and terrorists who engage in cyberattacks as a form of non-state or state-sponsored warfare. What are the vul