{"id":2294,"date":"2022-11-03T15:09:36","date_gmt":"2022-11-03T07:09:36","guid":{"rendered":"http:\/\/0.0.0.0:8801\/?p=2294"},"modified":"2022-11-09T15:10:52","modified_gmt":"2022-11-09T07:10:52","slug":"%e7%be%8e%e5%9c%8b%e7%99%bd%e5%ae%ae%e5%8f%ac%e9%96%8b%e5%9c%8b%e9%9a%9b%e6%9c%83%e8%ad%b0%ef%bc%8c%e5%85%b1%e5%90%8c%e5%b0%8d%e6%8a%97%e5%8b%92%e8%b4%96%e6%94%bb%e6%93%8a","status":"publish","type":"post","link":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=2294","title":{"rendered":"\u7f8e\u570b\u767d\u5bae\u53ec\u958b\u570b\u969b\u6703\u8b70\uff0c\u5171\u540c\u5c0d\u6297\u52d2\u8d16\u653b\u64ca"},"content":{"rendered":"\n<p><strong>\u7f8e\u570b\u767d\u5bae\u65e5\u524d\u5ba3\u5e03\uff0c\u5c07\u65bc 2022 \u5e74 10 \u6708 31 \u65e5\u8d77\uff0c\u8209\u8fa6\u7b2c\u4e8c\u5c46\u300c\u555f\u52d5\u5c0d\u6297\u52d2\u8d16\u653b\u64ca\u570b\u969b\u9ad8\u5cf0\u6703\u300d\uff08International Counter Ransomware Initiative Summit\uff09\uff0c\u7d50\u5408\u5404\u570b\u529b\u91cf\uff0c\u5171\u540c\u52a0\u5f37\u5c0d\u65bc\u52d2\u8d16\u653b\u64ca\u7684\u9632\u79a6\u8207\u6253\u64ca\u529b\u91cf\u3002<\/strong><\/p>\n\n\n\n<p>\u64da\u7f8e\u570b\u767d\u5bae\u5728\u8a18\u8005\u6703\u4e0a\u7684\u8aaa\u660e\uff0c\u9019\u6b21\u70ba\u671f\u5169\u5929\u7684\u9ad8\u5cf0\u6703\uff0c\u5c07\u4ee5\u5be6\u9ad4\u65b9\u5f0f\u8209\u8fa6\uff0c\u9080\u8acb\u591a\u9054 36 \u500b\u570b\u5bb6\u4ee5\u53ca\u6b50\u76df\u7684\u8cc7\u5b89\u9818\u57df\u5c08\u5bb6\u548c\u76f8\u95dc\u9818\u5c0e\u4eba\u58eb\uff0c\u5206\u70ba\u4e94\u7d44\uff0c\u8a0e\u8ad6\u4e0d\u540c\u9818\u57df\u9593\u5982\u4f55\u5f37\u5316\u5c0d\u6297\u65e5\u76ca\u7316\u7357\u7684\u52d2\u8d16\u653b\u64ca\uff0c\u4e26\u4e14\u5687\u963b\u5728\u5e55\u5f8c\u767c\u52d5\u52d2\u8d16\u653b\u64ca\u7684\u72af\u7f6a\u5206\u5b50\u3002<\/p>\n\n\n\n<p>\u4e00\u4f4d\u7f8e\u570b\u653f\u5e9c\u9ad8\u5c64\u4eba\u58eb\u5728\u8a18\u8005\u6703\u4e0a\u6307\u51fa\uff0c\u300c\u52d2\u8d16\u653b\u64ca\u78ba\u5be6\u662f\u5168\u7403\u6027\u7684\u554f\u984c\uff0c\u5df2\u7d93\u898b\u5230\u52d2\u8d16\u653b\u64ca\u4e0d\u8ad6\u5728\u8907\u96dc\u5ea6\u6216\u653b\u64ca\u767c\u751f\u6b21\u6578\u7684\u6210\u9577\uff0c\u90fd\u9060\u8f03\u9632\u79a6\u8207\u9632\u6cbb\u80fd\u529b\u7684\u6210\u9577\u70ba\u5feb\u300d\u3002<\/p>\n\n\n\n<p>\u5b98\u54e1\u4e5f\u6307\u51fa\uff0c\u9019\u6b21\u9ad8\u5cf0\u6703\u4e0d\u53ea\u662f\u653f\u5e9c\u5c0d\u653f\u5e9c\u9593\u7684\u6703\u8ac7\uff0c\u540c\u6642\u4e5f\u9080\u8acb\u79c1\u90e8\u9580\u5171\u540c\u53c3\u8207\uff0c\u6709 13 \u5bb6\u5168\u7403\u5927\u578b\u4f01\u696d\u6307\u6d3e\u4ee3\u8868\u8207\u6703\uff0c\u5305\u62ec Microsoft\u3001Palo Auto Networks\u3001Siemens\u3001SAP\u3001Crowdstrike\u3001Mandiant \u7b49\uff0c\u5e0c\u671b\u80fd\u4fc3\u6210\u516c\u79c1\u90e8\u9580\u5728\u5c0d\u6297\u52d2\u8d16\u653b\u64ca\u6642\uff0c\u5408\u4f5c\u80fd\u5920\u66f4\u52a0\u5bc6\u5207\u3002<\/p>\n\n\n\n<p>\u9019\u6b21\u6703\u8b70\u5206\u6210\u4e94\u500b\u5c0f\u7d44\u9032\u884c\u8a0e\u8ad6\uff0c\u300c\u976d\u6027\u300d\u8b70\u984c\u7531\u5370\u5ea6\u8207\u7acb\u9676\u5b9b\u4e3b\u6301\u3001\u300c\u9632\u6cbb\u300d\u8b70\u984c\u7531\u6fb3\u6d32\u4e3b\u6301\u3001\u300c\u865b\u64ec\u8ca8\u5e63\u300d\u8b70\u984c\u7531\u65b0\u52a0\u5761\u8207\u82f1\u570b\u4e3b\u6301\u3001\u300c\u516c\u79c1\u90e8\u9580\u5408\u4f5c\u300d\u8b70\u984c\u7531\u897f\u73ed\u7259\u4e3b\u6301\u3001\u300c\u570b\u969b\u5408\u4f5c\u300d\u8b70\u984c\u7531\u5fb7\u570b\u4e3b\u6301\u3002<\/p>\n\n\n\n<p>\u53c3\u52a0\u672c\u6b21\u9ad8\u5cf0\u6703\u7684\u570b\u5bb6\u9664\u4e3b\u8fa6\u570b\u7f8e\u570b\u5916\uff0c\u4e5f\u5305\u62ec\u5967\u5730\u5229\u3001\u6bd4\u5229\u6642\u3001\u5df4\u897f\u3001\u4fdd\u52a0\u5229\u4e9e\u3001\u52a0\u62ff\u5927\u3001\u514b\u7f85\u57c3\u897f\u4e9e\u3001\u6377\u514b\u3001\u591a\u660e\u5c3c\u52a0\u5171\u548c\u570b\u3001\u611b\u6c99\u5c3c\u4e9e\u3001\u6b50\u76df\u3001\u6cd5\u570b\u3001\u611b\u723e\u862d\u3001\u4ee5\u8272\u5217\u3001\u7fa9\u5927\u5229\u3001\u65e5\u672c\u3001\u80af\u4e9e\u3001\u7acb\u9676\u5b9b\u3001\u58a8\u897f\u54e5\u3001\u8377\u862d\u3001\u7d10\u897f\u862d\u3001\u5948\u53ca\u5229\u4e9e\u3001\u632a\u5a01\u3001\u6ce2\u862d\u3001\u5357\u97d3\u3001\u7f85\u99ac\u5c3c\u4e9e\u3001\u5357\u975e\u3001\u745e\u5178\u3001\u745e\u58eb\u3001\u70cf\u514b\u862d\u3001\u963f\u62c9\u4f2f\u806f\u5408\u5927\u516c\u570b\u3002<\/p>\n\n\n\n<p>\u767c\u5e03\u55ae\u4f4d:TWCERT\/CC \u66f4\u65b0\u65e5\u671f:2022-11-03<\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a<a href=\"https:\/\/www.twcert.org.tw\/tw\/cp-104-6676-bb7e9-1.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.twcert.org.tw\/tw\/cp-104-6676-bb7e9-1.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u7f8e\u570b\u767d\u5bae\u65e5\u524d\u5ba3\u5e03\uff0c\u5c07\u65bc 2022 \u5e74 10 \u6708 31 \u65e5\u8d77\uff0c\u8209\u8fa6\u7b2c\u4e8c\u5c46\u300c\u555f\u52d5\u5c0d\u6297\u52d2\u8d16\u653b\u64ca\u570b\u969b\u9ad8\u5cf0\u6703\u300d\uff08International Counter Ransomware Initia&hellip;<\/p>\n","protected":false},"author":3,"featured_media":2295,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[352],"tags":[468,455],"class_list":["post-2294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-468","tag-455"],"gutentor_comment":0,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/aict.nkust.edu.tw\/digitrans\/wp-content\/uploads\/2022\/11\/1107-6-10.jpg?fit=1654%2C1654&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/2294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2294"}],"version-history":[{"count":1,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/2294\/revisions"}],"predecessor-version":[{"id":2296,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/2294\/revisions\/2296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/media\/2295"}],"wp:attachment":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}