Copy of photo two _jpg_ Photo Credit: ACW SOUTH Sharon Information Security Service Base Active defense becomes obvious learning, reversing the asymmetric situation of offense and defense Enterprises look at information security, and it is too slow to take action when they are passively waiting for the enemy to come to the door! In the seminar on "New Generation Information Security Defense - Cyber Threats and Defense Trends" hosted by the Industrial Bureau of the Ministry of Economic Affairs in June this year, Lin Zhihong, head of the Taiwan Network Information Center, first mentioned the types of malware attacks on Taiwan's ICT equipment. , mainly covering the Conflicker virus in the IoT category, QSnatch infection in the NAS category, and Android hummer in the mobile device category.
The related malware has long occupied the top three. Image Manipulation Service Among them, the common hacking methods are DDoS, destructive data deletion, spyware, website replacement, false information, and False Flag as the mainstream. In order to avoid problems before finding solutions, ACW SOUTH Information Security Base has designed a "Testbed Training and Testing Base" in the application multi-exhibition area on the first floor. At present, there a