Cyber Threats and Defense Trends" hosted by the Industrial Bureau of the Ministry of Economic Affairs in June this year, Lin Zhihong, head of the Taiwan Network Information Center, first mentioned the types of malware attacks on Taiwan's ICT equipment. , mainly covering the Conflicker virus in the IoT category, QSnatch infection in the NAS category, and Android hummer in the mobile device category. The related malware has long occupied the top three. Among them, the common hacking methods are DDoS, destructive data deletion, spyware, website replacement, false information, and False Flag as the mainstream. In order to avoid problems and find solutions,
ACW SOUTH Information Security Base has designed a "Testbed Training and Test Base" in the application multi-exhibition area on the first floor. At present, there are key infrastructure, smart manufacturing and smart green energy and other themes. This year, there sms services will be two new emerging themed exhibition areas: Smart Internet of Things and the semiconductor industry. There are visits every day and courses every week. Through the empirical field, specific information security incidents, information security attack scenarios, information security protection solutions, and information security incident response are deduced. By building an ACW SOUTH information security
base in 30 minutes, you will be able to understand the base characteristics of the importance of information security. Sharon Base Human Training Course Schedule Sharon Base Human Training Course Schedule / Photo Credit: ACW SOUTH Sharon Information Security Service Base Establish "Hain's Law" information security thinking, find loopholes from the dark web faster than hackers The seminar "New Generation Information Security Defense - Cyber Threats and Defense Trends" also invited the two companies to share their observations on the current information security situation. Huang Qiongying, vice president of technology of Anqi Information Co., Ltd.,