{"id":57,"date":"2008-03-20T00:07:11","date_gmt":"2008-03-19T16:07:11","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/03\/20\/cism-2\/"},"modified":"2008-03-20T00:07:11","modified_gmt":"2008-03-19T16:07:11","slug":"cism-2","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=57","title":{"rendered":"\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u76f2\u9ede"},"content":{"rendered":"<p>\u99ed\u5ba2\u8207\u8a50\u9a19\u96c6\u5718\u5229\u7528\u793e\u4ea4\u5de5\u7a0b\u8207\u7db2\u8def\u91e3\u9b5a\u624b\u6cd5\uff0c\u8fd1\u5e74\u4f86\u5728\u53f0\u7063\u793e\u6703\u9020\u6210\u6975\u5927\u5a01\u8105\u8207\u91d1\u9322\u640d\u5931\uff0c\u60e1\u610f\u4eba\u58eb\u4e0d\u9700\u8981\u5177\u5099\u9802\u5c16\u7684\u96fb\u8166\u5c08\u696d\u6280\u8853\uff0c\u7576\u53d7\u5bb3\u8005\u5c0d\u65bc\u9632\u7bc4\u8a50\u9a19\u6c92\u6709\u8db3\u5920\u7684\u8a8d\u77e5\uff0c\u8b93\u53d7\u5bb3\u8005\u4e0a\u7576\uff0c\u8f15\u6613\u907f\u904e\u4f01\u696d\u3001\u500b\u4eba\u96fb\u8166\u7684\u8edf\u786c\u9ad4\u5b89\u5168\u9632\u8b77\uff0c\u5f9e\u800c\u9a19\u53d6\u5230\uff1a\u5bc6\u78bc\u3001\u500b\u4eba\u96b1\u79c1\u8cc7\u6599\u3001\u4f01\u696d\u6a5f\u5bc6\u8cc7\u6599\u7b49\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u7576\u60a8\u5f9e\u7db2\u8def\u4e0a\u4e0b\u8f09\u7834\u89e3\u8edf\u9ad4\u3001MP3\u3001WMV\u96fb\u5f71\u5f71\u7247\u6642\uff0c\u5ee3\u544a\u8edf\u9ad4\uff08Adware\uff09\u8207\u9593\u789f\u8edf\u9ad4\uff08Spyware\uff09\u53ef\u80fd\u6703\u4e58\u6a5f\u9032\u5165\u60a8\u7684\u96fb\u8166\uff0c\u5f9e\u800c\u7aca\u53d6\u5bc6\u78bc\u8207\u79c1\u5bc6\u8cc7\u6599\u7b49\uff0c\u6216\u662f\u5c07\u60a8\u7684\u96fb\u8166\u8b8a\u6210\u6bad\u5c4d\u96fb\u8166\uff0c\u5229\u7528\u60a8\u7684\u96fb\u8166\u5f9e\u4e8b\u72af\u7f6a\u884c\u70ba\u7b49\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u793e\u4ea4\u5de5\u7a0b\uff08Social Engineering\uff09\u3001\u7db2\u8def\u91e3\u9b5a\uff08Phishing\uff09\u3001\u5ee3\u544a\u8edf\u9ad4\u548c\u9593\u8adc\u8edf\u9ad4\uff0c\u9019\u4e9b\u73fe\u4ee3\u4eba\u5bb9\u6613\u53d7\u50b7\u5bb3\u7684\u653b\u64ca\u8207\u8a50\u9a19\u884c\u70ba\uff0c\u8cfd\u535a\u97d3\u7279\u9867\u554f\u7fa4\u63d0\u4f9b2007\u5e74\u5c0d\u5916\u6f14\u8b1b\u8207\u6559\u80b2\u8a13\u7df4\u7684\u8b1b\u7fa9\uff0c\u5206\u4eab\u7d66\u60f3\u8981\u5b78\u7fd2\u7684\u670b\u53cb\u5011\uff0c\u8b93\u5927\u5bb6\u5c0d\u793e\u4ea4\u5de5\u7a0b\u3001\u7db2\u8def\u91e3\u9b5a\u3001\u5ee3\u544a\u8edf\u9ad4\u548c\u9593\u8adc\u8edf\u9ad4\u6709\u66f4\u6df1\u4e00\u5c64\u7684\u4e86\u89e3\uff0c\u4ee5\u53ca\u77e5\u9053\u7c21\u6613\u7684\u4fdd\u8b77\u65b9\u6cd5\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u8ab2\u7a0b\u8b1b\u7fa9\uff1a<a href=\"docs\/cism.pdf\" target=\"_blank\" title=\"\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u76f2\u9ede\" rel=\"noopener\">\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u76f2\u9ede<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u99ed\u5ba2\u8207\u8a50\u9a19\u96c6\u5718\u5229\u7528\u793e\u4ea4\u5de5\u7a0b\u8207\u7db2\u8def\u91e3\u9b5a\u624b\u6cd5\uff0c\u8fd1\u5e74\u4f86\u5728\u53f0\u7063\u793e\u6703\u9020\u6210\u6975\u5927\u5a01\u8105\u8207\u91d1\u9322\u640d\u5931\uff0c\u60e1\u610f\u4eba\u58eb\u4e0d\u9700\u8981\u5177\u5099\u9802\u5c16\u7684\u96fb\u8166 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-57","post","type-post","status-publish","format-standard","hentry","category-security-awareness"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/57","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=57"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/57\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=57"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=57"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}