{"id":921,"date":"2010-09-29T10:41:13","date_gmt":"2010-09-29T02:41:13","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/09\/29\/cyber-storm-iii\/"},"modified":"2010-09-29T10:41:13","modified_gmt":"2010-09-29T02:41:13","slug":"cyber-storm-iii","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=921","title":{"rendered":"\u7f8e\u820712\u53cb\u90a6 \u6a21\u64ec\u99ed\u5ba2\u653b\u64ca"},"content":{"rendered":"<p>&nbsp;\u3010<a target=\"_blank\" href=\"http:\/\/tw.nextmedia.com\/applenews\/article\/art_id\/32847657\/IssueID\/20100929\" rel=\"noopener\">\u860b\u679c\u65e5\u5831<\/a>\u8521\u4f73\u6167\u2571\u7d9c\u5408\u5916\u96fb\u5831\u5c0e\u3011<\/p>\n<p>\u7f8e\u570b\u524d\u5929\u9996\u5ea6\u767c\u52d5\u4ee3\u865f\u70ba\u300c\u7db2\u8def\u98a8\u66b43\u300d\uff08Cyber Storm III\uff09\u7684\u7db2\u8def\u653b\u64ca\u6a21\u64ec\u6f14\u7fd2\uff0c\u52d5\u54e1\u5305\u62ec\u570b\u9632\u90e8\u7b497\u5927\u653f\u5e9c\u90e8\u9580\u3001\u5168\u7f8e11\u5dde\uff0c\u9084\u670960\u5bb6\u6c11\u9593\u4f01\u696d\uff0c\u4e26\u820712\u500b\u53cb\u90a6\u651c\u624b\u5408\u4f5c\uff0c\u5168\u9762\u6aa2\u9a57\u653f\u5e9c\u8207\u6c11\u9593\u96fb\u8166\u7db2\u8def\u5c0d\u65bc\u99ed\u5ba2\u653b\u64ca\u7684\u61c9\u8b8a\u80fd\u529b\u3002<br \/>\n\u300c\u9748\u6d3b\u5ea6\u662f\u6f14\u7fd2\u6838\u5fc3\u300d<\/p>\n<p>\u9019\u8d77\u6f14\u7fd2\u7531\u7f8e\u570b\u570b\u571f\u5b89\u5168\u90e8\uff08Department of Homeland Security\uff09\u7684\u570b\u5bb6\u7db2\u8def\u5b89\u5168\u8207\u901a\u8a0a\u6574\u5408\u4e2d\u5fc3\uff08National Cybersecurity and Communications Integration Center\uff09\u4e3b\u5c0e\uff0c\u70ba\u671f3\u5929\u3002\u5b98\u65b9\u8072\u660e\u6307\u51fa\uff0c\u300c\u9019\u6b21\u6f14\u7fd2\u7684\u6838\u5fc3\u662f\u9748\u6d3b\u5ea6\uff0c\u6aa2\u6e2c\u570b\u5bb6\u5728\u73fe\u4ee3\u751f\u6d3b\u57fa\u672c\u5c64\u9762\u53d7\u640d\u6216\u55aa\u5931\u6642\u7684\u56e0\u61c9\u80fd\u529b\u3002\u300d<br \/>\n\u6f14\u7fd2\u8a08\u5283\u7e3d\u76e3\u862d\u4f2f\uff08Brett Lambo\uff09\u5f37\u8abf\uff0c\u6240\u6709\u99ed\u5ba2\u653b\u64ca\u300c\u7d14\u5c6c\u6a21\u64ec\u300d\uff0c\u300c\u6211\u5011\u4e0d\u6703\u771f\u7684\u653b\u64ca\u4efb\u4f55\u7db2\u8def\u3002\u6211\u5011\u4e0d\u6703\u7671\u7613\u7db2\u8def\uff0c\u4e5f\u4e0d\u6703\u771f\u7684\u65bd\u52a0\u4efb\u4f55\u60e1\u610f\u8edf\u9ad4\u3002\u300d\u4ed6\u8868\u793a\uff0c\u6f14\u7fd2\u76ee\u7684\u5728\u65bc\u8a55\u4f30\u5404\u55ae\u4f4d\u60c5\u5831\u5206\u4eab\u3001\u5099\u6230\u80fd\u529b\uff0c\u4ee5\u53ca\u5c0d\u4e0d\u540c\u5a01\u8105\u7684\u56de\u61c9\u80fd\u529b\uff0c\u300c\u6211\u5011\u7684\u4f01\u5716\u662f\u52a0\u5f37\u6297\u58d3\u6027\u3002\u300d<br \/>\n\u9664\u4e86\u7f8e\u570b\u4e4b\u5916\uff0c\u53c3\u8207\u6f14\u7fd2\u7684\u570b\u5bb6\u9084\u5305\u62ec\u6fb3\u6d32\u3001\u82f1\u570b\u3001\u52a0\u62ff\u5927\u3001\u6cd5\u570b\u3001\u5fb7\u570b\u3001\u5308\u7259\u5229\u3001\u65e5\u672c\u3001\u7fa9\u5927\u5229\u3001\u8377\u862d\u3001\u7d10\u897f\u862d\u3001\u745e\u5178\u548c\u745e\u58eb\u3002 <br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;\u3010\u860b\u679c\u65e5\u5831\u8521\u4f73\u6167\u2571\u7d9c\u5408\u5916\u96fb\u5831\u5c0e\u3011 \u7f8e\u570b\u524d\u5929\u9996\u5ea6\u767c\u52d5\u4ee3\u865f\u70ba\u300c\u7db2\u8def\u98a8\u66b43\u300d\uff08Cyber Storm I [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-921","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=921"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/921\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}