Download Top 4 Strategies to Mitigate Targeted Cyber Intrusions: Mandatory Requirement Explained (2.1Mb PDF), July 2013
要点:
1. 应用白名单;
2. 应用(含应用框架)补丁;
3. 系统补丁;
4. 管理特权最小化。
Download Top 4 Strategies to Mitigate Targeted Cyber Intrusions: Mandatory Requirement Explained (2.1Mb PDF), July 2013
要点:
1. 应用白名单;
2. 应用(含应用框架)补丁;
3. 系统补丁;
4. 管理特权最小化。