{"id":7339,"date":"2020-05-04T11:12:22","date_gmt":"2020-05-04T03:12:22","guid":{"rendered":"https:\/\/aqzt.com\/7339.html"},"modified":"2020-10-29T21:03:58","modified_gmt":"2020-10-29T13:03:58","slug":"microsoft%e3%80%81linux-%e5%92%8c-mac-%e8%b5%84%e4%ba%a7%e9%a3%8e%e9%99%a9%e7%8a%b6%e5%86%b5%e7%a0%94%e7%a9%b6%ef%bc%9amicrosoft-%e6%bc%8f%e6%b4%9e%e6%9c%80%e5%a4%9a","status":"publish","type":"post","link":"https:\/\/aqzt.com\/7339.html","title":{"rendered":"Microsoft\u3001Linux \u548c Mac \u8d44\u4ea7\u98ce\u9669\u72b6\u51b5\u7814\u7a76\uff1aMicrosoft \u6f0f\u6d1e\u6700\u591a"},"content":{"rendered":"<p><a href=\"https:\/\/www.oschina.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u6587\u7ae0\u8f6c\u8f7d\u5f00\u6e90\u4e2d\u56fd<\/a><\/p>\n<p><a href=\"https:\/\/www.kennasecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kenna Security<\/a>&nbsp;\u53d1\u5e03\u4e86\u4e00\u4efd\u65b0\u7684\u62a5\u544a\uff0c\u5176\u4e2d\u5bf9&nbsp;Microsoft\u3001Linux \u548c Mac \u8d44\u4ea7\u7684\u98ce\u9669\u72b6\u51b5\u8fdb\u884c\u4e86\u7814\u7a76\u3002<\/p>\n<p>Cyentia \u7814\u7a76\u6240\u64b0\u5199\u4e86\u300a <a href=\"https:\/\/www.kennasecurity.com\/resources\/prioritization-to-prediction-report-volume-five\" target=\"_blank\" rel=\"noopener noreferrer\">Prioritization to Prediction: Volume 5: In Search of Assets at Risk<\/a>\u300b\u62a5\u544a\uff0c\u8be5\u62a5\u544a\u57fa\u4e8e Kenna Security \u6765\u81ea 450 \u4e2a\u7ec4\u7ec7\u7684 900 \u4e07\u8d44\u4ea7\u7684\u6570\u636e\u3002<\/p>\n<p>\u62a5\u544a\u6307\u51fa\uff0c\u5fae\u8f6f\u8d44\u4ea7\u7684 70\uff05 \u81f3\u5c11\u5177\u6709\u4e00\u4e2a\u9ad8\u98ce\u9669\u6f0f\u6d1e\u3002\u5728\u6574\u4e2a\u7814\u7a76\u671f\u95f4\uff0c\u7814\u7a76\u4eba\u5458\u5171\u53d1\u73b0\u4e86 Microsoft \u8d44\u4ea7\u4e2d\u7684 2.15 \u4ebf\u4e2a\u6f0f\u6d1e\uff0c\u5176\u4e2d\u5df2\u5b8c\u6210\u4fee\u590d\u7684\u6f0f\u6d1e\u6709 1.79 \u4ebf\u4e2a\uff0c\u5360\u6bd4 83\uff05\u3002\u6839\u636e Kenna Security \u7684\u8bf4\u6cd5\uff0c\u5176\u4f59\u672a\u4fee\u8865\u7684&nbsp;3600 \u4e07\u4e2a\u6f0f\u6d1e\u8981\u9ad8\u4e8e Max\u3001Linux \u548c Unix \u8d44\u4ea7\u7684\u603b\u548c\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" height=\"308\" src=\"https:\/\/aqzt.com\/wp-content\/uploads\/img\/up-3cf0d5a3f4c9d6adc95fe31c4fc27a5eb4b.png\" width=\"700\" \/><\/p>\n<p>\u5fae\u8f6f\u8fd8\u62e5\u6709\u6700\u9ad8\u7684\u5c01\u95ed\u5f0f\u9ad8\u98ce\u9669\u6f0f\u6d1e\u767e\u5206\u6bd4\uff0c\u4e3a 83\uff05\u3002\u7d27\u968f\u5176\u540e\u7684\u662f&nbsp;Apple OSX\uff0c\u5176\u6b21\u662f Linux\/unix \u548c\u7f51\u7edc\u8bbe\u5907\/IoT \u8bbe\u5907\u3002\u6b64\u5916\uff0c40\uff05 \u7684 Linux \u548c Unix \u8d44\u4ea7\u4ee5\u53ca 30\uff05 \u7684\u7f51\u7edc\u8bbe\u5907\u5177\u6709\u5df2\u77e5\u6f0f\u6d1e\u3002&nbsp;<\/p>\n<p>\u4e0d\u8fc7\uff0cKenna Security \u4e5f\u6307\u51fa\uff0c\u8f83\u5c11\u7684\u6f0f\u6d1e\u4e0d\u4e00\u5b9a\u8868\u793a\u8bbe\u5907\u66f4\u5b89\u5168\u3002\u5728\u4e00\u4e2a\u5355\u4e2a\u9ad8\u98ce\u9669\u6f0f\u6d1e\u53ef\u80fd\u9020\u6210\u707e\u96be\u6027\u540e\u679c\u7684\u4e16\u754c\u4e2d\uff0c\u6709\u6548\u7684\u8865\u4e01\u7a0b\u5e8f\u4f18\u5148\u7ea7\u548c\u901f\u5ea6\u662f\u5b89\u5168\u6027\u7684\u5173\u952e\uff0c\u800c\u4e0e\u8bbe\u5907\u6216\u8f6f\u4ef6\u7c7b\u578b\u65e0\u5173\u3002<\/p>\n<p>\u5c3d\u7ba1 Microsoft \u5177\u6709\u6bd4\u5176\u4ed6\u6f0f\u6d1e\u66f4\u591a\u7684\u6f0f\u6d1e\uff0c\u4f46\u8fd9\u4e0d\u4e00\u5b9a\u8868\u793a\u5176\u5b58\u5728\u603b\u98ce\u9669\uff0c\u56e0\u4e3a Microsoft \u8fd8\u53ef\u4ee5\u66f4\u5feb\u5730\u4fee\u590d\u6f0f\u6d1e\u3002\u8be5\u62a5\u544a\u53d1\u73b0\uff0c\u57fa\u4e8e Windows \u7684\u8d44\u4ea7\u6bcf\u6708\u5e73\u5747\u6709 119 \u4e2a\u6f0f\u6d1e\uff0c\u5e76\u4e14\u5e73\u5747\u6bcf 36 \u5929\u4fee\u8865\u4e00\u6b21\u8fd9\u4e9b\u6f0f\u6d1e\u3002\u4e0e\u6b64\u76f8\u6bd4\uff0c\u7f51\u7edc\u8bbe\u5907\u6bcf\u6708\u5e73\u5747\u53ea\u6709 3.6 \u4e2a\u6f0f\u6d1e\uff0c\u4f46\u8fd9\u4e9b\u6f0f\u6d1e\u5219\u5927\u7ea6\u9700\u8981\u4e00\u5e74\u7684\u65f6\u95f4\u624d\u80fd\u5b8c\u6210\u4fee\u8865\u3002<\/p>\n<ul>\n<\/ul>\n<p>\u82f9\u679c\u7684\u8865\u4e01\u7387\u4f4d\u5217\u7b2c\u4e8c\u9ad8\uff0c\u4e3a 79\uff05\u3002Linux\u3001Unix \u548c\u5176\u4ed6\u7f51\u7edc\u8bbe\u5907\u7684\u8865\u4e01\u7387\u5219\u4e3a 66\uff05\u3002&nbsp;<\/p>\n<p>Cyentia Institute \u7684\u5408\u4f19\u4eba\u517c\u521b\u59cb\u4eba Wade Baker&nbsp;\u8868\u793a\uff1a&ldquo;\u901a\u8fc7\u81ea\u52a8\u4fee\u8865\u548c&#039;Patch Tuesdays&#039;\uff0cMicrosoft \u80fd\u591f\u89e3\u51b3\u5176\u7cfb\u7edf\u4e0a\u7684\u5173\u952e\u6f0f\u6d1e\u7684\u901f\u5ea6\u975e\u5e38\u51fa\u8272\uff0c\u4f46\u5176\u4ecd\u7136\u5b58\u5728\u5f88\u591a\u6f0f\u6d1e\u3002 &ldquo;\u53e6\u4e00\u65b9\u9762\uff0c\u6211\u4eec\u770b\u5230\u8bb8\u591a\u8d44\u4ea7\uff0c\u4f8b\u5982 routers&nbsp;\u548c&nbsp;printers\uff0c\u5b83\u4eec\u7684\u9ad8\u98ce\u9669\u6f0f\u6d1e\u5177\u6709\u66f4\u957f\u7684\u4fdd\u8d28\u671f\u3002\u516c\u53f8\u9700\u8981\u56f4\u7ed5\u8fd9\u4e9b\u6743\u8861\u56e0\u7d20\u8c03\u6574\u5176\u98ce\u9669\u627f\u53d7\u80fd\u529b\uff0c\u7b56\u7565\u548c\u6f0f\u6d1e\u7ba1\u7406\u529f\u80fd\u3002&rdquo;<\/p>\n<p>\u62a5\u544a\u5730\u5740\uff1a<a href=\"https:\/\/www.kennasecurity.com\/resources\/prioritization-to-prediction-report-volume-five\">https:\/\/www.kennasecurity.com\/resources\/prioritization-to-prediction-report-volume-five<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6587\u7ae0\u8f6c\u8f7d\u5f00\u6e90\u4e2d\u56fd Kenna Security&nbsp;\u53d1\u5e03\u4e86\u4e00\u4efd\u65b0\u7684\u62a5\u544a\uff0c\u5176\u4e2d\u5bf9&nbsp;Microsoft\u3001Linux \u548c Mac \u8d44\u4ea7\u7684\u98ce\u9669\u72b6\u51b5\u8fdb\u884c\u4e86\u7814\u7a76\u3002 Cyentia \u7814\u7a76\u6240\u64b0\u5199\u4e86\u300a Prioritization to Prediction: Volume 5: In Search of Assets at Risk\u300b\u62a5\u544a\uff0c\u8be5\u62a5\u544a\u57fa\u4e8e Kenna Security \u6765\u81ea 450 \u4e2a\u7ec4\u7ec7\u7684 900 \u4e07\u8d44\u4ea7\u7684\u6570\u636e\u3002 \u62a5\u544a\u6307\u51fa\uff0c\u5fae\u8f6f\u8d44\u4ea7\u7684 70\uff05 \u81f3\u5c11\u5177\u6709\u4e00\u4e2a\u9ad8\u98ce\u9669\u6f0f\u6d1e\u3002\u5728\u6574\u4e2a\u7814\u7a76\u671f\u95f4\uff0c\u7814\u7a76\u4eba\u5458\u5171\u53d1\u73b0\u4e86<\/p>\n","protected":false},"author":1,"featured_media":6522,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[27],"tags":[292,9,21,11,235,54],"collection":[319],"_links":{"self":[{"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/posts\/7339"}],"collection":[{"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/comments?post=7339"}],"version-history":[{"count":1,"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/posts\/7339\/revisions"}],"predecessor-version":[{"id":11215,"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/posts\/7339\/revisions\/11215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/media\/6522"}],"wp:attachment":[{"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/media?parent=7339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/categories?post=7339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/tags?post=7339"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/aqzt.com\/wp-json\/wp\/v2\/collection?post=7339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}