You are on page 1of 22

(GCB)

09:30~10:00
10:00~10:30 GCB

10:30~10:50
10:50~12:30 GCB
Windows 7
12:30~13:30
13:30~14:10 IE 8
14:10~14:30
14:30~16:10
GCB


16:10~16:30 2
(GCB)
()




GCB

4


(GCB)



Intel IT2012200

32

6

2013Twenty Critical
Security Controls for Effective Cyber Defense (V4.1)
Security Controls
1 Inventory of Authorized and
Unauthorized Devices BYOD
2 Inventory of Authorized and
Unauthorized Software

3 Secure Configurations for Hardware
and Software on Mobile Devices,
Laptops, Workstations, and Servers
4 Continuous Vulnerability Assessment
and Remediation
5 Malware Defenses

7






Windows



8
GCB
GCB(1/4)
10253024


(GCB)
(102)Windows7IE8
(GCB)ActiveX
ActiveX

10
GCB(2/4)

25


Windows(LinuxFirefoxChrome)
()
(Active XPlugins)

11
GCB(3/4)


Windows 7
IE 8



10311Active X


1027

12
GCB(4/4)
102121825
(GCB)

Windows 7 IE8 GCB
()AD
Active X
(103)

13
Active X(1/3)


Active X


(GCA)

14
Active X(2/3)

Active X

Active X IE

15
Active X (3/3)


1


2


3


4


5

16


Windows 7IE 8
(GCB)

18

10271

CCE-

ID
CCE- XX XX
1043
3-1 ActiveX 3

ActiveX






19



CCE-ID(/)



IE()

20

GPO
(www.icst.org.tw)
(GCB)

21

22