<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          USEUROPEAFRICAASIA 中文雙語(yǔ)Fran?ais
          Home / World

          All must share security burden

          China Daily | Updated: 2013-01-09 07:23

          Internet | Art Coviello

          Strong cyber security cannot be achieved by any of us in isolation: It's a group condition, a group responsibility.

          International cooperation is needed. Chinese companies that are concerned about the safety of their digital assets must reach out to organizations they trust to exchange security information.

          They need to learn what their business partners - and the partners of their business partners - are doing to protect this interconnected community's digital assets.

          These three points are often true about cyber attacks: an enemy prefers to target a group's weakest members, the best places to strike are connection points, and a group is only as strong as its weakest link.

          These points have been noticeable as companies and government organizations across the world face increasingly frequent cyber attacks.

          We've heard about some of them, but most go unreported. Because the attacks are often executed with stealth, organizations whose security has been breached often aren't aware of it. Also, many organizations won't admit that they have been attacked.

          All must share security burden

          Besieged organizations also may not realize that even the most up-to-date anti-virus programs, firewalls and other prevention technologies amount to nothing in the face of advanced cyber security attacks. Attackers can still get in.

          To truly make their information more secure, organizations that have suffered cyber attacks should talk to other organizations - not just providers of information security products and services, but also close business partners and competitors. They'll often find that those they speak to have encountered attacks in which similar, or even identical, techniques were employed.

          Through such exchanges, organizations can assemble more pieces of the puzzle and gain a deeper understanding of how such attacks are carried out. They may also come to be more aware of who their attackers are and what they're ultimately after. The ultimate hope is they will be able to change the outcomes of future attacks.

          When organizations gain a broader perspective on cyber threats, they become less reliant on preventive technologies that are easily evaded by sophisticated attackers. They instead turn their attention to identifying and protecting their most important information assets. They invest their security resources in technical and procedural solutions that result in a faster detection of attacks and quicker responses to them.

          Some organizations may believe they are unlikely targets of cyber attacks. Consider, though, that attackers often wage cyber attacks against companies in order to get at their business partners.

          Cyber attackers prey on the vulnerabilities of our digital connections and are often far more aware of those vulnerabilities than we are ourselves.

          In 2013, cyber security will continue to be challenged in the following ways:

          Hackers are more likely to become even more sophisticated.

          Our attack surfaces will expand and any remaining semblance of a perimeter will continue to wither.

          Changes will occur whether security teams are ready or not.

          Governments will continue to struggle to write rules concerning evidence, information sharing and the reform of privacy laws.

          Nation states will continue to move past intrusion and deliberately attempt to disrupt and destroy.

          Responsible people in organizations will move beyond being aware of the seriousness of the situation and obtain a genuine understanding of it.

          Adopting an intelligence-based security model that includes big data and analytics will prove essential in the formation of a true defense-in-depth strategy.

          This year will be one to witness our efforts toward achieving greater cooperation. The continued growth of our interconnected global economies will depend on it.

          The author is the executive chairman of RSA, the security civision of EMC.

          (China Daily 01/09/2013 page16)

          Today's Top News

          Editor's picks

          Most Viewed

          Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 国产精品免费视频不卡| 韩国午夜理伦三级| 久久一日本道色综合久久| 久久精品丝袜高跟鞋| 99国产欧美另类久久片| 午夜成人亚洲理伦片在线观看| 亚洲一区二区三区高清在线观看| 亚洲精品中文幕一区二区| 久久91综合国产91久久精品| 午夜福利yw在线观看2020| 日本不卡码一区二区三区| 亚洲一品道一区二区三区| 亚洲成人av综合一区| 久草国产视频| 国产亚洲欧洲AⅤ综合一区| 亚洲自偷精品视频自拍| 内地偷拍一区二区三区| 少妇激情一区二区三区视频小说 | 青青草原国产精品啪啪视频| 天堂av网一区二区三区| a在线观看视频在线播放| 久久综合九色综合欧洲98| 黄色网站免费在线观看| 老鸭窝在线视频| 国产女人在线| 搡老熟女老女人一区二区| 黄色亚洲一区二区三区四区| 中国熟女仑乱hd| 国产第一页浮力影院入口| 乱中年女人伦av三区| 天堂mv在线mv免费mv香蕉| 成年无码av片在线蜜芽| 国产精品国产高清国产av| 亚洲欧美国产精品久久| 欧美做受视频播放| 麻豆天美东精91厂制片| 国99久9在线 | 免费| 国产成人免费高清激情视频| 伊人久久大香线蕉av色婷婷色| 永久免费不卡在线观看黄网站 | 精品中文字幕人妻一二|