Download Top 4 Strategies to Mitigate Targeted Cyber Intrusions: Mandatory Requirement Explained (2.1Mb PDF), July 2013
要点:
1. 应用白名单;
2. 应用(含应用框架)补丁;
3. 系统补丁;
4. 管理特权最小化。
Top 4 Strategies to Mitigate Targeted Cyber Intrusions,布布扣,bubuko.com
Top 4 Strategies to Mitigate Targeted Cyber Intrusions
原文:http://www.cnblogs.com/-U2-/p/3574491.html