{"id":3563,"date":"2017-08-20T00:04:39","date_gmt":"2017-08-19T16:04:39","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=3563"},"modified":"2017-08-20T00:04:39","modified_gmt":"2017-08-19T16:04:39","slug":"%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e6%88%90%e7%86%9f%e5%ba%a6%e6%a8%a1%e5%9e%8b%e8%af%84%e4%bc%b0","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/3563.html","title":{"rendered":"\u7f51\u7edc\u5b89\u5168\u6210\u719f\u5ea6\u6a21\u578b\/\u8bc4\u4f30"},"content":{"rendered":"<p>=Start=<\/p>\n<h4 id=\"id-\u6a21\u677f-\u7f18\u7531\uff1a\">\u7f18\u7531\uff1a<\/h4>\n<p>\u603b\u7ed3\u3001\u63d0\u9ad8\u9700\u8981<\/p>\n<h4 id=\"id-\u6a21\u677f-\u6b63\u6587\uff1a\">\u6b63\u6587\uff1a<\/h4>\n<h5 id=\"id-\u6a21\u677f-\u53c2\u8003\u89e3\u7b54\uff1a\">\u53c2\u8003\u89e3\u7b54\uff1a<\/h5>\n<figure style=\"width: 1354px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full\" src=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/cn\/Images\/inline_images\/serv-risk\/cn-ra-cyberrisk-compliance-model-1.jpg\" width=\"1354\" height=\"884\" \/><figcaption class=\"wp-caption-text\">\u7f51\u7edc\u5b89\u5168\u6210\u719f\u5ea6\u8bc4\u4f30<\/figcaption><\/figure>\n<p>&amp;<\/p>\n<figure style=\"width: 1630px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full\" src=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/cn\/Images\/inline_images\/serv-risk\/cn-ra-cyberrisk-compliance-model-3.jpg\" width=\"1630\" height=\"767\" \/><figcaption class=\"wp-caption-text\">\u7f51\u7edc\u5b89\u5168\u5408\u89c4\u6210\u719f\u5ea6\u793a\u610f\u56fe<\/figcaption><\/figure>\n<h5 id=\"id-\u6a21\u677f-\u53c2\u8003\u94fe\u63a5\uff1a\">\u53c2\u8003\u94fe\u63a5\uff1a<\/h5>\n<p><span style=\"color: #ff0000;\"><strong>\u7f51\u7edc\u5b89\u5168\u6cd5\u5373\u5c06\u751f\u6548\uff0c\u4f01\u4e1a\u5982\u4f55\u8bc6\u522b\u5dee\u8ddd\u5e76\u91c7\u53d6\u884c\u52a8\uff1f<\/strong><\/span>#nice<br \/>\n<a href=\"https:\/\/www2.deloitte.com\/cn\/zh\/pages\/risk\/articles\/cybersecurity-law-self-assessing-maturity-model.html\">https:\/\/www2.deloitte.com\/cn\/zh\/pages\/risk\/articles\/cybersecurity-law-self-assessing-maturity-model.html<\/a><\/p>\n<p><strong>\u4f01\u4e1a\u4fe1\u606f\u5b89\u5168\u7684\u4e24\u4e2a\u6210\u719f\u5ea6\u6a21\u578b<\/strong><br \/>\n<a href=\"http:\/\/www.ctocio.com\/ccnews\/18447.html\">http:\/\/www.ctocio.com\/ccnews\/18447.html<\/a><br \/>\n<a href=\"https:\/\/krebsonsecurity.com\/\">https:\/\/krebsonsecurity.com\/<\/a><br \/>\n<a href=\"http:\/\/www.esg-global.com\/\">http:\/\/www.esg-global.com\/<\/a><br \/>\n<a href=\"http:\/\/blue-lava.net\/\">http:\/\/blue-lava.net\/<\/a><\/p>\n<p><strong>\u9996\u5c4a\u4e2d\u56fd\u6570\u636e\u5b89\u5168\u5cf0\u4f1a\u4e0a\u963f\u91cc\u548c\u534e\u4e3a\u90fd\u8bb2\u4e86\u5565<\/strong> #nice<br \/>\n<a href=\"http:\/\/www.aqniu.com\/industry\/26134.html\">http:\/\/www.aqniu.com\/industry\/26134.html<\/a><\/p>\n<p>2.0\u65b0\u9632\u5fa1\u4f53\u7cfb\u4e0b\uff0c\u7f51\u7edc\u5b89\u5168\u6210\u719f\u5ea6\u6a21\u578b\u4ee5\u53ca\u5404\u7ea7\u522b\u5b89\u5168\u5173\u952e\u5b9e\u8df5<br \/>\n<a href=\"https:\/\/zhuanlan.zhihu.com\/p\/28325198\">https:\/\/zhuanlan.zhihu.com\/p\/28325198<\/a><br \/>\n<a href=\"https:\/\/www.zhihu.com\/people\/LeoPerfect\/posts\">https:\/\/www.zhihu.com\/people\/LeoPerfect\/posts<\/a><\/p>\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u603b\u7ed3\u3001\u63d0\u9ad8\u9700\u8981 \u6b63\u6587\uff1a \u53c2\u8003\u89e3\u7b54\uff1a &amp; \u53c2\u8003\u94fe\u63a5\uff1a \u7f51\u7edc\u5b89\u5168\u6cd5\u5373\u5c06\u751f\u6548\uff0c\u4f01\u4e1a\u5982 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25],"tags":[724,924,923],"class_list":["post-3563","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","tag-724","tag-924","tag-923"],"views":17645,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/3563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=3563"}],"version-history":[{"count":1,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/3563\/revisions"}],"predecessor-version":[{"id":3564,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/3563\/revisions\/3564"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=3563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=3563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=3563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}