您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 公司方案 > 中国IDC产业年度大典---数据泄露报告--下
©2010Verizon.AllRightsReserved.PTE1462607/102010DataBreachInvestigationsReport2HackingTypes3HackingPathways4MalwareInfectionVector5MalwareFunctionality6MalwareCustomization8MisuseTypes9TimelineofEvents10Assets&Data11Assets&Data12Conclusions&Recommendations13Conclusions&RecommendationsAssetsMostdatacompromisedfromservers&appsDesktops/laptopsincreasing;relatedtostolencredentialsMostcriminalsinterestedincashableformsofdataDiscovery&ResponseDiscoverystilltakesalongtimeandislargelyduetothirdpartiesResponseandcontainmentslowandpronetomishapMitigationThebasics–ifdoneconsistently–aresufficientinmostcasesKeepoutsidersout;theyareincreasinglydifficulttocontrolonceinRestrictandmonitorinsiders;disableaccesswhentheyleaveInmonitoringevents:lookoutforhaystacks–notneedlesPlan,prepare,train,andtestforatimelyandeffectiveresponse14DBIR:::securityblog.verizonbusiness.comEmail:dbir@lists.verizonbusiness.com
本文标题:中国IDC产业年度大典---数据泄露报告--下
链接地址:https://www.777doc.com/doc-7865675 .html