[20150323]IF10159_网络安全.pdf
https:/crsreports.congress.gov Updated March 23, 2015CybersecurityOverview Information and communications technology (ICT) has evolved greatly over the last half-century. ICT devices and components now form a highly interdependent system of networks, infrastructure, and resident dataknown as cyberspacethat has become ubiquitous and increasingly integral to almost every facet of modern society. Experts and policymakers are increasingly concerned about cybersecurityprotecting cyberspace from attack by criminals and other adversaries. The risks associated with any attack depend on three factors: threats (who is attacking), vulnerabilities (how they are attacking), and impacts (what the attack does). What are the threats? People who perform cyberattacks include criminals intent on monetary gain from crimes such as theft or extortion; spies intent on stealing information used by government or private entities; nation-state warriors who develop capabilities and undertake cyberattacks to support strategic objectives; “hacktivists” who perform cyberattacks for nonmonetary reasons; and terrorists who engage in cyberattacks as a form of non-state or state-sponsored warfare. What are the vul
展开阅读全文
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 20150323 IF10159_ 网络安全

关于本文