<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          USEUROPEAFRICAASIA 中文雙語(yǔ)Fran?ais
          Home / World

          All must share security burden

          China Daily | Updated: 2013-01-09 07:23

          Internet | Art Coviello

          Strong cyber security cannot be achieved by any of us in isolation: It's a group condition, a group responsibility.

          International cooperation is needed. Chinese companies that are concerned about the safety of their digital assets must reach out to organizations they trust to exchange security information.

          They need to learn what their business partners - and the partners of their business partners - are doing to protect this interconnected community's digital assets.

          These three points are often true about cyber attacks: an enemy prefers to target a group's weakest members, the best places to strike are connection points, and a group is only as strong as its weakest link.

          These points have been noticeable as companies and government organizations across the world face increasingly frequent cyber attacks.

          We've heard about some of them, but most go unreported. Because the attacks are often executed with stealth, organizations whose security has been breached often aren't aware of it. Also, many organizations won't admit that they have been attacked.

          All must share security burden

          Besieged organizations also may not realize that even the most up-to-date anti-virus programs, firewalls and other prevention technologies amount to nothing in the face of advanced cyber security attacks. Attackers can still get in.

          To truly make their information more secure, organizations that have suffered cyber attacks should talk to other organizations - not just providers of information security products and services, but also close business partners and competitors. They'll often find that those they speak to have encountered attacks in which similar, or even identical, techniques were employed.

          Through such exchanges, organizations can assemble more pieces of the puzzle and gain a deeper understanding of how such attacks are carried out. They may also come to be more aware of who their attackers are and what they're ultimately after. The ultimate hope is they will be able to change the outcomes of future attacks.

          When organizations gain a broader perspective on cyber threats, they become less reliant on preventive technologies that are easily evaded by sophisticated attackers. They instead turn their attention to identifying and protecting their most important information assets. They invest their security resources in technical and procedural solutions that result in a faster detection of attacks and quicker responses to them.

          Some organizations may believe they are unlikely targets of cyber attacks. Consider, though, that attackers often wage cyber attacks against companies in order to get at their business partners.

          Cyber attackers prey on the vulnerabilities of our digital connections and are often far more aware of those vulnerabilities than we are ourselves.

          In 2013, cyber security will continue to be challenged in the following ways:

          Hackers are more likely to become even more sophisticated.

          Our attack surfaces will expand and any remaining semblance of a perimeter will continue to wither.

          Changes will occur whether security teams are ready or not.

          Governments will continue to struggle to write rules concerning evidence, information sharing and the reform of privacy laws.

          Nation states will continue to move past intrusion and deliberately attempt to disrupt and destroy.

          Responsible people in organizations will move beyond being aware of the seriousness of the situation and obtain a genuine understanding of it.

          Adopting an intelligence-based security model that includes big data and analytics will prove essential in the formation of a true defense-in-depth strategy.

          This year will be one to witness our efforts toward achieving greater cooperation. The continued growth of our interconnected global economies will depend on it.

          The author is the executive chairman of RSA, the security civision of EMC.

          (China Daily 01/09/2013 page16)

          Today's Top News

          Editor's picks

          Most Viewed

          Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 亚洲中文字幕一区二区| 国产区一区二区现看视频| 久久久精品94久久精品| 国产精品人成在线观看免费| 东方四虎av在线观看| 强奷漂亮少妇高潮伦理| 国产精品亚洲二区在线播放| 亚洲日本一区二区一本一道| 欧美国产综合视频| 久久国内精品自在自线91| 国产剧情视频一区二区麻豆 | 天堂www在线中文| 日韩精品卡一卡二卡三卡四| 少妇人妻真实偷人精品| 中文字幕有码免费视频| 国产日韩综合av在线| 日韩欧美亚洲一区二区综合| 久久精品波多野结衣| 久久亚洲精品11p| 精品黑人一区二区三区| 国产精品美女一区二三区| 亚洲男人精品青春的天堂| 国产丝袜在线精品丝袜不卡 | 韩国美女福利视频在线观看| 亚洲欧美日韩愉拍自拍美利坚| 日韩av爽爽爽久久久久久| 亚洲自拍另类| 国产无人区码一区二区| 亚洲久久色成人一二三区| 无码日韩精品一区二区三区免费| 国产AV巨作丝袜秘书| 国产18禁一区二区三区| 91国产超碰在线观看| 狠狠躁夜夜躁人人爽天天古典| 大地资源免费视频观看| 亚洲精中文字幕二区三区| 亚洲精品在线+在线播放| 久久综合亚洲鲁鲁九月天| 国产精品一区二区人人爽| 国产线播放免费人成视频播放| 国产免费一区二区三区在线观看|