检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:陈龙文 陈希 张恒 刘英豪 CHEN Long-wen;CHEN Xi;ZHANG Heng;LIU Ying-hao(China Mobile Group Fujian Co.,Ltd.,Fuzhou 350001,China)
机构地区:[1]中国移动通信集团福建有限公司,福州350001
出 处:《电信工程技术与标准化》2023年第7期22-27,共6页Telecom Engineering Technics and Standardization
摘 要:近年来企业收到的钓鱼邮件数量逐年攀升,钓鱼邮件攻击也成为攻击者突破企业网络安全防御体系最简单且最直接有效的攻击方式,给很多企业造成了巨大的甚至不可挽回的损失。传统孤岛式的技术防护手段无法形成有效防护,本文介绍了钓鱼邮件攻击的现状和主要技术防护手段,针对钓鱼邮件实施机制提出从网络安全防护手段建设和网络安全应急响应处置等方面建立立体化防御体系,能够在日常网络安全防护及实战攻防演练对抗中发挥重要作用。In recent years,the number of phishing emails received by companies has been steadily increasing.Phishing email attacks have become the simplest and most direct effective way for attackers to bypass enterprise network security defenses,causing significant,and sometimes irreparable,losses for many businesses.Traditional isolated technical protection measures fail to establish effective defense mechanisms.This article introduces the current situation of phishing email attacks and the main technical defense measures.It proposes the establishment of a comprehensive defense system from aspects such as network security protection measures and network security emergency response and handling,targeting the mechanisms employed in phishing emails.Such a system can play a crucial role in daily network security protection and real-world simulated attack-defense exercises.
分 类 号:TN918[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.38