2019 网络安全观察 Cybersecurity Insights u th i g 5 b m o .c 英特尔 Oracle 沙箱 安全漏洞 NSA 医院 以色列 逃逸 CPU 供应链 内存 团伙 通信 广告 研究 警告 AV APP 提权 取证 缓冲区 代码执行 定向 渗透 勒索软件 Shell 沙盒 发送 监控 工控 凭据 卡巴斯基 预警 SSH 托管 印度 工具包 帐户 HTTP IoT 工业 滥用 思科 朝鲜 IOS 信任 命令 特权 智能 英国 计算机 扫描 解密 英国 披露内核 网关bug RCE 风险 标准 俄罗斯 邮件 安卓 Apache 实战 垃圾邮件 行为 欺骗 泄露 暗网 芯片 邮件 中国人 公开 后门 协议 命令执行 苹果 勒索 脚本 攻击者 XXE API XSS 补丁 FBI 缓冲区 绕过 损失 账户 溢出DNS 世界 Cisco 权限 团队 窃取 支付 5G 逃避 证书 自动化 破坏 RDP Facebook 行为 APP IOS VPN 执行 警告 开源 谷歌 扫描 隐私 入侵 起诉威胁 政府 虚假 上传 远程 高危 高级 最大 调试 巴西 挖矿 逆向 木马 代码 Web 僵尸网络 趋势 黑客 IT Offi 流量 攻击者 策略 文档 Android 动态 C2 Google 固件 网络钓鱼 金融Microsoft 样本 静态进程 数据泄露 CMS 篡改 感染 通道 WiFi 恶意流量 数字 注入 编写 比特币 root PDF 中国 移动 蠕虫 劫持 SQL注入 AWS 跟踪 安全性 韩国 行业 数据 Mac伊朗 Adobe 华为 钓鱼 缺陷 NET 医疗 DoS 加密货币 数据安全 漏洞 PC Edge 数据库 GitHub 凭证 思科 泄漏 Chrome EDC 密钥 Python 审计 爆光 WordPress macOS 任意 拒绝服务 变种 监控 加密 商店 SQL 函数 恶意软件 GDPR IBM 创新 控制 Ryuk IT168 DDoS 诈骗 严重 模块安全更新 挖掘 物联网 隐藏 游戏 保护 患者 引擎 密码 敏感 IPv6 APT Server配置 病毒 穿越 PHP 修复 传播 网络攻击 权限提升 服务器 Linux 网络安全 安全厂商 Window 关于绿盟科技 北京神州绿盟信息安全科技股份有限公司(以下简称绿盟科技公司),成立于 2000 年 4 月, 总部位于北京。公司于 2014 年 1 月 29 日在深圳证券交易所创业板上市,证券代码:300369。 绿盟科技在国内设有 40 多个分支机构,为政府、运营商、金融、能源、互联网以及教育、医疗 等行业用户,提供全线网络安全产品、全方位安全解决方案和体系化安全运营服务。公司在美国 硅谷、日本东京、英国伦敦、新加坡设立海外子公司,深入开展全球业务,打造全球网络安全行 业的中国品牌。 u th i g 特别声明 5 b 为避免合作伙伴及客户数据泄露,所有数据在进行分析前都已经过匿名化处理,不会在中 间环节出现泄露,任何与客户有关的具体信息,均不会出现在本报告中。 m o .c 2019 网络安全观察 目录 CONTENTS 目录 1. 执行摘要 ·······························································································································································1 2. 重要观点 ·······························································································································································4 3. 宏观态势 ·······························································································································································7 3.1 中美战略下大国博弈 ·································································································································································· 8 3.2 暗战:APT“明暗交织”支撑“网络威慑”战略 ·················································································································· 8 m o .c 3.3 治理:网络空间内容治理成为新挑战 ······································································································································ 9 3.4 重器:关键基础设施保护 ························································································································································ 10 3.5 隐私:公民隐私保护 ································································································································································ 11 4. 威胁态势 ·····························································································································································12 5 b 4.1 攻击类型分布············································································································································································· 13 4.2 地域分布····················································································································································································· 14 u th 5. 热点态势 ·····························································································································································16 5.1 漏洞态势····················································································································································································· 17 i g 5.1.1 漏洞态势 ····································································································································································································17 5.1.2 漏洞利用态势 ····························································································································································································19 5.2 恶意软件观察············································································································································································· 22 5.2.1 勒索软件(Ransomeware) ·······················································································

pdf文档 绿盟 2019年网络安全观察

文档预览
中文文档 84 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共84页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
绿盟 2019年网络安全观察 第 1 页 绿盟 2019年网络安全观察 第 2 页 绿盟 2019年网络安全观察 第 3 页
下载文档到电脑,方便使用
本文档由 路人甲 于 2022-07-17 01:17:45上传分享
加微信群 有优惠
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。