书签 分享 收藏 举报 版权申诉 / 3
1

类型[20150323]IF10159_网络安全.pdf

  • 上传人:任**
  • 文档编号:24893
  • 上传时间:2022-06-24
  • 发布时间:2019-09-03
  • 格式:PDF
  • 页数:3
  • 大小:543.49KB
  • https:/crsreports.congress.gov Updated March 23, 2015CybersecurityOverview Information and communications technology (ICT) has evolved greatly over the last half-century. ICT devices and components now form a highly interdependent system of networks, infrastructure, and resident dataknown as cyberspacethat has become ubiquitous and increasingly integral to almost every facet of modern society. Experts and policymakers are increasingly concerned about cybersecurityprotecting cyberspace from attack by criminals and other adversaries. The risks associated with any attack depend on three factors: threats (who is attacking), vulnerabilities (how they are attacking), and impacts (what the attack does). What are the threats? People who perform cyberattacks include criminals intent on monetary gain from crimes such as theft or extortion; spies intent on stealing information used by government or private entities; nation-state warriors who develop capabilities and undertake cyberattacks to support strategic objectives; “hacktivists” who perform cyberattacks for nonmonetary reasons; and terrorists who engage in cyberattacks as a form of non-state or state-sponsored warfare. What are the vul
    展开阅读全文
    特殊限制:

    部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。

    关 键  词:
    20150323 IF10159_ 网络安全
    1
    提示  联参智库所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
    关于本文
    本文标题:[20150323]IF10159_网络安全.pdf
    链接地址:https://www.lianhezuozhan.com/doc/24893.html
    1

    客服:010-66465788   北京联参科技有限公司版权所有  工业和信息化部备案/许可证编号:京ICP备2022007273号-1



    联参智库