[20150323]IF10159_网络安全.pdf

上传人:任我行 文档编号:24893 上传时间:2022-06-24 发布时间:2019-09-03 格式:PDF 页数:3 大小:543.49KB
下载 相关 举报
[20150323]IF10159_网络安全.pdf_第1页
第1页 / 共3页
[20150323]IF10159_网络安全.pdf_第2页
第2页 / 共3页
[20150323]IF10159_网络安全.pdf_第3页
第3页 / 共3页
亲,该文档总共3页,全部预览完了,如果喜欢就下载吧!
资源描述

1、 https:/crsreports.congress.gov Updated March 23, 2015CybersecurityOverview Information and communications technology (ICT) has evolved greatly over the last half-century. ICT devices and components now form a highly interdependent system of networks, infrastructure, and resident dataknown as cybers

2、pacethat has become ubiquitous and increasingly integral to almost every facet of modern society. Experts and policymakers are increasingly concerned about cybersecurityprotecting cyberspace from attack by criminals and other adversaries. The risks associated with any attack depend on three factors:

3、 threats (who is attacking), vulnerabilities (how they are attacking), and impacts (what the attack does). What are the threats? People who perform cyberattacks include criminals intent on monetary gain from crimes such as theft or extortion; spies intent on stealing information used by government o

4、r private entities; nation-state warriors who develop capabilities and undertake cyberattacks to support strategic objectives; “hacktivists” who perform cyberattacks for nonmonetary reasons; and terrorists who engage in cyberattacks as a form of non-state or state-sponsored warfare. What are the vul

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 法规条令 > CRS 美国国会研究处报告