<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          USEUROPEAFRICAASIA 中文雙語Fran?ais
          Home / World

          All must share security burden

          China Daily | Updated: 2013-01-09 07:23

          Internet | Art Coviello

          Strong cyber security cannot be achieved by any of us in isolation: It's a group condition, a group responsibility.

          International cooperation is needed. Chinese companies that are concerned about the safety of their digital assets must reach out to organizations they trust to exchange security information.

          They need to learn what their business partners - and the partners of their business partners - are doing to protect this interconnected community's digital assets.

          These three points are often true about cyber attacks: an enemy prefers to target a group's weakest members, the best places to strike are connection points, and a group is only as strong as its weakest link.

          These points have been noticeable as companies and government organizations across the world face increasingly frequent cyber attacks.

          We've heard about some of them, but most go unreported. Because the attacks are often executed with stealth, organizations whose security has been breached often aren't aware of it. Also, many organizations won't admit that they have been attacked.

          All must share security burden

          Besieged organizations also may not realize that even the most up-to-date anti-virus programs, firewalls and other prevention technologies amount to nothing in the face of advanced cyber security attacks. Attackers can still get in.

          To truly make their information more secure, organizations that have suffered cyber attacks should talk to other organizations - not just providers of information security products and services, but also close business partners and competitors. They'll often find that those they speak to have encountered attacks in which similar, or even identical, techniques were employed.

          Through such exchanges, organizations can assemble more pieces of the puzzle and gain a deeper understanding of how such attacks are carried out. They may also come to be more aware of who their attackers are and what they're ultimately after. The ultimate hope is they will be able to change the outcomes of future attacks.

          When organizations gain a broader perspective on cyber threats, they become less reliant on preventive technologies that are easily evaded by sophisticated attackers. They instead turn their attention to identifying and protecting their most important information assets. They invest their security resources in technical and procedural solutions that result in a faster detection of attacks and quicker responses to them.

          Some organizations may believe they are unlikely targets of cyber attacks. Consider, though, that attackers often wage cyber attacks against companies in order to get at their business partners.

          Cyber attackers prey on the vulnerabilities of our digital connections and are often far more aware of those vulnerabilities than we are ourselves.

          In 2013, cyber security will continue to be challenged in the following ways:

          Hackers are more likely to become even more sophisticated.

          Our attack surfaces will expand and any remaining semblance of a perimeter will continue to wither.

          Changes will occur whether security teams are ready or not.

          Governments will continue to struggle to write rules concerning evidence, information sharing and the reform of privacy laws.

          Nation states will continue to move past intrusion and deliberately attempt to disrupt and destroy.

          Responsible people in organizations will move beyond being aware of the seriousness of the situation and obtain a genuine understanding of it.

          Adopting an intelligence-based security model that includes big data and analytics will prove essential in the formation of a true defense-in-depth strategy.

          This year will be one to witness our efforts toward achieving greater cooperation. The continued growth of our interconnected global economies will depend on it.

          The author is the executive chairman of RSA, the security civision of EMC.

          (China Daily 01/09/2013 page16)

          Today's Top News

          Editor's picks

          Most Viewed

          Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 亚欧洲乱码视频在线专区| 国产激情无码一区二区三区| 人人妻人人做人人爽夜欢视频| 最新亚洲人成网站在线影院| 国产成人亚洲综合无码品善网| 99精品久久免费精品久久| 中文字幕午夜福利片午夜福利片97| 五月综合激情婷婷六月| 中文字幕无码中文字幕有码a| 色天使久久综合网天天| 夜夜偷天天爽夜夜爱| 熟女在线视频一区二区三区| 婷婷伊人久久| 天堂а√在线中文在线| 久久午夜无码鲁丝片直播午夜精品| 超碰成人人人做人人爽| 九九热在线精品视频观看| www.91在线播放| 国产成人精品久久性色av| 少妇激情一区二区三区视频小说| 亚洲人成亚洲人成在线观看| 啦啦啦高清在线观看视频www| 亚洲嫩模一区二区三区| 亚洲免费成人av一区| 福利视频一区二区在线| 亚洲另类丝袜综合网| 天堂va蜜桃一区二区三区| 国产卡一卡二卡三免费入口| 亚洲天堂视频网站| 精品人妻av区乱码| 午夜福利yw在线观看2020| 在国产线视频A在线视频| 两个人看的视频www| 日本视频一区二区三区1| 色综合久久中文综合久久激情| 图片区 小说区 区 亚洲五月 | 精品一区二区三区国产馆| 国产极品精品自在线不卡| 成人无码区在线观看| 国产精品老年自拍视频| 亚洲人成亚洲人成在线观看 |