Professional Documents
Culture Documents
09:30~10:00
10:00~10:30 GCB
10:30~10:50
10:50~12:30 GCB
Windows 7
12:30~13:30
13:30~14:10 IE 8
14:10~14:30
14:30~16:10
GCB
16:10~16:30 2
(GCB)
()
GCB
4
(GCB)
Intel IT2012200
32
6
2013Twenty Critical
Security Controls for Effective Cyber Defense (V4.1)
Security Controls
1 Inventory of Authorized and
Unauthorized Devices BYOD
2 Inventory of Authorized and
Unauthorized Software
3 Secure Configurations for Hardware
and Software on Mobile Devices,
Laptops, Workstations, and Servers
4 Continuous Vulnerability Assessment
and Remediation
5 Malware Defenses
7
Windows
8
GCB
GCB(1/4)
10253024
(GCB)
(102)Windows7IE8
(GCB)ActiveX
ActiveX
10
GCB(2/4)
25
Windows(LinuxFirefoxChrome)
()
(Active XPlugins)
11
GCB(3/4)
Windows 7
IE 8
10311Active X
1027
12
GCB(4/4)
102121825
(GCB)
Windows 7 IE8 GCB
()AD
Active X
(103)
13
Active X(1/3)
Active X
(GCA)
14
Active X(2/3)
Active X
Active X IE
15
Active X (3/3)
1
2
3
4
5
16
Windows 7IE 8
(GCB)
18
10271
CCE-
ID
CCE- XX XX
1043
3-1 ActiveX 3
ActiveX
19
CCE-ID(/)
IE()
20
GPO
(www.icst.org.tw)
(GCB)
21
22