中国IDC产业年度大典---数据泄露报告--下

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

©2010Verizon.AllRightsReserved.PTE1462607/102010DataBreachInvestigationsReport2HackingTypes3HackingPathways4MalwareInfectionVector5MalwareFunctionality6MalwareCustomization8MisuseTypes9TimelineofEvents10Assets&Data11Assets&Data12Conclusions&Recommendations13Conclusions&RecommendationsAssetsMostdatacompromisedfromservers&appsDesktops/laptopsincreasing;relatedtostolencredentialsMostcriminalsinterestedincashableformsofdataDiscovery&ResponseDiscoverystilltakesalongtimeandislargelyduetothirdpartiesResponseandcontainmentslowandpronetomishapMitigationThebasics–ifdoneconsistently–aresufficientinmostcasesKeepoutsidersout;theyareincreasinglydifficulttocontrolonceinRestrictandmonitorinsiders;disableaccesswhentheyleaveInmonitoringevents:lookoutforhaystacks–notneedlesPlan,prepare,train,andtestforatimelyandeffectiveresponse14DBIR:::securityblog.verizonbusiness.comEmail:dbir@lists.verizonbusiness.com

1 / 13
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功