SlideShare a Scribd company logo
1 of 12
Download to read offline
 Security intelligence

āļŠāļ āļēāļžāļ›āļą āļˆāļˆāļļāļšāļąāļ™āđāļĨāļ°āļ›āļą āļāļŦāļēāđƒāļ™āļāļēāļĢāļĢāļąāļāļĐāļē
āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒ
āļ‚āļ­āļ‡āļŠāļēāļ™āļąāļāļ‡āļēāļ™āļ›āļĢāļ°āļāļąāļ™āļŠāļąāļ‡āļ„āļĄ

(C) Copyright, ACIS Professional Center Co., Ltd.
 Security intelligence

āļŦāļąāļ§āļ‚āđ‰ āļ­
 āļĢāļēāļĒāļ‡āļēāļ™āļāļēāļĢāđ‚āļˆāļĄāļ•āļĩāļˆāļēāļ Log Management
 āđ€āļŦāļ•āļļāļāļēāļĢāļ“āļ”āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđ€āļāļīāļ”āļ‚āļķāļ™āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ
āđˆ
āđˆ
āđ‰
āđŒ āđ‰
 Anti-Virus

(C) Copyright, ACIS Professional Center Co., Ltd.
 Security intelligence

āļĢāļēāļĒāļ‡āļēāļ™āļāļēāļĢāđ‚āļˆāļĄāļ•āļĩāļˆāļēāļ Log Management
46%

31%

15%

8%
0%
Internal Sweep Scan

External Sweep Scan

Port Scan

Worm Activity

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Denial of Service

Page 3
 Security intelligence

āđ€āļŦāļ•āļļāļāļēāļĢāļ“āđŒ āļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđˆāđ€āļāļīāļ”āļ‚āļķāļ™
āđ‰
āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ
 āļŠāļīāđˆ āļ‡āļ—āļĩāđ€āļāļīāļ”āļ‚āļķāļ™
āđˆ
āđ‰
– āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒāļ‚āļ­āļ‡ āļŠāļ›āļŠ. āđƒāļŦāđ‰āļšāļĢāļīāļāļēāļĢāđ„āļĄāđ„āļ”āđ‰
āđˆ
āđˆ
– āļĄāļĩāļ™āļēāļ„āļĄ 2556

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Page 4
 Security intelligence

āđ€āļŦāļ•āļļāļāļēāļĢāļ“āđŒ āļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđˆāđ€āļāļīāļ”āļ‚āļķāļ™
āđ‰
āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ
 āļŠāļēāđ€āļŦāļ•āļļ
– āđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļĨāļđāļāļ‚āļēāļĒāļ•āļīāļ”āđ„āļ§āļĢāļąāļŠ āđāļĨāļ°āđāļžāļĢāļāļĢāļ°āļˆāļēāļĒāđ„āļ›āļĒāļąāļ‡
āđˆ
āđˆ
āđˆ
āđŒ
āđ€āļ„āļĢāļ·āļ­āļ‡āļ­āļ·āļ™āđ†āļ āļēāļĒāđƒāļ™āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ
āđˆ
āđˆ
āđˆ
– āđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļĨāļđāļāļ‚āļēāļĒāļĄāļĩāļāļēāļĢāđ€āļŠāļ·āļ­āļĄāļ•āļ­āļ—āļąāļ‡āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒāļ‚āļ­āļ‡
āđˆ
āđˆ
āđˆ
āđˆ āđ‰
āđˆ
āđŒ
āļŠāļ›āļŠ. āđāļĨāļ°āđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ Internet (āļœāļēāļ™āļ­āļļāļ›āļāļĢāļ“āļŠāđˆāļ§āļ™āļ•āļąāļ§)
āđˆ
āđˆ
āđŒ

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Page 5
 Security intelligence

āđ€āļŦāļ•āļļāļāļēāļĢāļ“āđŒ āļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđˆāđ€āļāļīāļ”āļ‚āļķāļ™
āđ‰
āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ
 āļāļēāļĢāđāļāđ„āļ‚āđƒāļ™āļĢāļ°āļĒāļ°āļŠāļąāđ‰ āļ™
āđ‰
– āļ•āļąāļ”āđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļĨāļđāļāļ‚āļēāļĒāļ—āļĩāļ•āļ”āđ„āļ§āļĢāļąāļŠāļ­āļ­āļāļˆāļēāļāļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ
āđˆ
āđˆ āļī
āđˆ
āđˆ
āđŒ
āđāļĨāļ°āđāļžāļĢāļāļĢāļ°āļˆāļēāļĒāđ„āļ›āļĒāļąāļ‡āđ€āļ„āļĢāļ·āļ­āļ‡āļ­āļ·āļ™āđ†āļ āļēāļĒāđƒāļ™āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ
āđˆ
āđˆ
āđˆ
āđˆ
– āļāļēāļˆāļąāļ”āđ„āļ§āļĢāļąāļŠāļ­āļ­āļāļˆāļēāļāđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļĨāļđāļāļ‚āļēāļĒ
āđˆ
āđˆ
āđŒ
– āļ›āļĢāļąāļšāļ›āļĢāļļāļ‡ Pattern/Signature āđƒāļŦāđ‰āđ€āļ›āđ‡ āļ™āļ›āļąāļˆāļˆāļļāļšāļ™
āļą

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Page 6
 Security intelligence

āđ€āļŦāļ•āļļāļāļēāļĢāļ“āđŒ āļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđˆāđ€āļāļīāļ”āļ‚āļķāļ™
āđ‰
āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ
 āđāļ™āļ§āļ—āļēāļ‡āļāļēāļĢāđāļāđ„āļ‚āđƒāļ™āļĢāļ°āļĒāļ°āļĒāļēāļ§
āđ‰
– āļ„āļ§āļšāļ„āļļ āļĄ āļāļēāļĢāđ€āļŠāļ·āđˆ āļ­ āļĄāļ•āđˆ āļ­āđ€āļ„āļĢāļ·āđˆāļ­ āļ‡āļ„āļ­āļĄāļžāļīāļ§ āđ€āļ•āļ­āļĢ āđŒāļĨāļđ āļ āļ‚āđˆ āļēāļĒāđ€āļ‚āđ‰ āļēāļāļąāļš āļĢāļ°āļšāļš
āđ€āļ„āļĢāļ·āļ­ āļ‚āđˆāļēāļĒ āđ‚āļ”āļĒāļ āļēāļŦāļ™āļ”āđƒāļŦāđ‰ āļĄāļĩāļ āļēāļĢāļžāļīāļŠāļđ āļˆ āļ™āđŒāļ•āļąāļ§ āļ•āļ™ āļ•āļĢāļ§āļˆāļŠāļ­āļšāļāļēāļĢ
āļ­āļąāļžāđ€āļ”āļ— Signature āļ‚āļ­āļ‡āđ‚āļ›āļĢāđāļāļĢāļĄāļ›āđ‰āļ­āļ‡āļāļąāļ™āđ„āļ§āļĢāļąāļŠāļ•āļĢāļ§āļˆāļŠāļ­āļšāļ„āļ§āļēāļĄ
āļ–āļđāļāļ•āđ‰āļ­āļ‡āļ‚āļ­āļ‡āđ‚āļ›āļĢāđāļāļĢāļĄāļ—āļĩāļ•āļ”āļ•āļąāļ‡āđƒāļŠāđ‰āļ‡āļēāļ™āļšāļ™āđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļāļ­āļ™
āđˆ āļī āđ‰
āđˆ
āđŒ āđˆ
āļ­āļ™āļļ āļāļēāļ•āđƒāļŦāđ‰āđƒāļŠāđ‰āļ‡āļēāļ™āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ
āđˆ

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Page 7
 Security intelligence

Anti-Virus
PC (āđ€āļ„āļĢāļ·āđˆāļ­āļ‡)

Notebook (āđ€āļ„āļĢāļ·āļ­āļ‡)
āđˆ

TrendMicro

4112

150

Kaspersky

260

-

Anti-Virus

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Page 8
 Security intelligence

āļŠāļ™āļīāļ”āđāļĨāļ°āļ›āļĢāļīāļĄāļēāļ“āļĄāļąāļĨāđāļ§āļĢāđŒ āļ—āđˆ āļ•āļĢāļ§āļˆāļžāļšāļŠāļđāļ‡āļŠāļļāļ”
āļĩ
25 āļ­āļąāļ™āļ”āļąāļš āđ€āļ”āļ·āļ­āļ™āļāļąāļ™āļĒāļēāļĒāļ™ (āļˆāļēāļ Trend Micro)
16,000

14,992

14,000

46,552

12,000
10,000
8,000

8,611
8,041

6,000
4,000

3,740
2,689

2,000

1,061 988

851 637 594 549 539
379 376 366 256 243 243 219 218 212 204 189 178 177

0

āļŠāļ·āđˆāļ­āļĄāļąāļĨāđāļ§āļĢāđŒ

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Page 9
 Security intelligence

āļŠāļ–āļēāļ™āļ°āļāļēāļĢāļ­āļąāļžāđ€āļ”āļ—
Pattern/Signature āļ‚āļ­āļ‡ Trend Micro
Pattern/Signature āđ€āļ”āļ·āļ­āļ™ āļāļąāļ™āļĒāļēāļĒāļ™ 2556
4,000

3,732

3,500
3,000

āđ€āļ›āđ‡āļ™āļ›āļąāļˆāļˆāļļāļšāļąāļ™

2,500

2,000
1,500
1,000

319

500

20

12

29

10.265-10.277

10.251-10.264

āļ•āđˆāļģāļāļ§āđˆāļģ 10.251

0
10.278-10.291

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Offline

Page 10
 Security intelligence

āđ€āļ„āļĢāļ·āđˆāļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāđŒ āļ—āđˆ āļ•āļĢāļ§āļˆāļžāļšāļĄāļąāļĨāđāļ§āļĢāđŒ āļŠāļđāļ‡āļŠāļļāļ”
āļĩ
25 āļ­āļąāļ™āļ”āļąāļš āđ€āļ”āļ·āļ­āļ™āļāļąāļ™āļĒāļēāļĒāļ™ (āļˆāļēāļ Trend Micro)
āđ€āļ„āļĢāļ·āđˆāļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāđŒ āļ—āļ•āļīāļ”āļĄāļąāļĨāđāļ§āļĢāđŒ āļŠāļđāļ‡āļŠāļļ āļ” 25 āļ­āļąāļ™āļ”āļąāļš
āļĩāđˆ

āļˆāļģāļ™āļ§āļ™āļ„āļĢāļąāđ‰āļ‡āļ—āļĩāđˆāļ•āļĢāļ§āļˆāļžāļš
18,000
16,000

15,877

14,000
12,000
10,000

8,855

8,000
6,000
4,237
4,000
2,000

3,977
3,235

578 563 562 545 541 520 479 399 371 355 338 315 280 270 255 233 204 202 201 195

0

āļŠāļ·āđˆāļ­āđ€āļ„āļĢāļ·āđˆāļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāđŒ

ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved

Page 11
 Security intelligence

Question and Answer

(C) Copyright, ACIS Professional Center Co., Ltd.

More Related Content

Viewers also liked

āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāļ—āļēāļ‡āļ”āđ‰āļēāļ™āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļ‚āļ­āļ‡āļŠāļēāļ•āļī
āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāļ—āļēāļ‡āļ”āđ‰āļēāļ™āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļ‚āļ­āļ‡āļŠāļēāļ•āļīāļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāļ—āļēāļ‡āļ”āđ‰āļēāļ™āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļ‚āļ­āļ‡āļŠāļēāļ•āļī
āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāļ—āļēāļ‡āļ”āđ‰āļēāļ™āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļ‚āļ­āļ‡āļŠāļēāļ•āļīStrategic Challenges
 
Construction safety management
Construction safety managementConstruction safety management
Construction safety managementNantawit Boondesh
 
āļšāļ—āļšāļēāļ—āļĄāļŦāļēāļ­āļģāļ™āļēāļˆāļ‚āļ­āļ‡āđ‚āļĨāļ Cmmu
āļšāļ—āļšāļēāļ—āļĄāļŦāļēāļ­āļģāļ™āļēāļˆāļ‚āļ­āļ‡āđ‚āļĨāļ Cmmuāļšāļ—āļšāļēāļ—āļĄāļŦāļēāļ­āļģāļ™āļēāļˆāļ‚āļ­āļ‡āđ‚āļĨāļ Cmmu
āļšāļ—āļšāļēāļ—āļĄāļŦāļēāļ­āļģāļ™āļēāļˆāļ‚āļ­āļ‡āđ‚āļĨāļ CmmuTaraya Srivilas
 
Unconventional Warfare and Insurgency
Unconventional Warfare and InsurgencyUnconventional Warfare and Insurgency
Unconventional Warfare and InsurgencyTeeranan
 
Terrorism@Info_Age
Terrorism@Info_AgeTerrorism@Info_Age
Terrorism@Info_AgeTeeranan
 
āđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡ āļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļāļģāļŦāļ™āļ” āđāļĨāļ°āļžāļąāļ’āļ™āļēāļĒāļļāļ—āļ˜āļĻāļēāļŠāļ•āļĢāđŒāļ—āļŦāļēāļĢ
āđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡ āļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļāļģāļŦāļ™āļ” āđāļĨāļ°āļžāļąāļ’āļ™āļēāļĒāļļāļ—āļ˜āļĻāļēāļŠāļ•āļĢāđŒāļ—āļŦāļēāļĢāđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡ āļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļāļģāļŦāļ™āļ” āđāļĨāļ°āļžāļąāļ’āļ™āļēāļĒāļļāļ—āļ˜āļĻāļēāļŠāļ•āļĢāđŒāļ—āļŦāļēāļĢ
āđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡ āļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļāļģāļŦāļ™āļ” āđāļĨāļ°āļžāļąāļ’āļ™āļēāļĒāļļāļ—āļ˜āļĻāļēāļŠāļ•āļĢāđŒāļ—āļŦāļēāļĢTaraya Srivilas
 
1āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī ndc2556
1āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī ndc25561āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī ndc2556
1āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī ndc2556Taraya Srivilas
 
āļšāļĢāļĢāļĒāļēāļĒāļŠāļ‡āļ„āļĢāļēāļĄāļŠāļĄāļąāļĒāđƒāļŦāļĄāđˆ
āļšāļĢāļĢāļĒāļēāļĒāļŠāļ‡āļ„āļĢāļēāļĄāļŠāļĄāļąāļĒāđƒāļŦāļĄāđˆāļšāļĢāļĢāļĒāļēāļĒāļŠāļ‡āļ„āļĢāļēāļĄāļŠāļĄāļąāļĒāđƒāļŦāļĄāđˆ
āļšāļĢāļĢāļĒāļēāļĒāļŠāļ‡āļ„āļĢāļēāļĄāļŠāļĄāļąāļĒāđƒāļŦāļĄāđˆWashirasak Poosit
 
āļāļ­āļ‡āļ—āļąāļžāđ„āļ—āļĒāđƒāļ™āļĻāļ•āļ§āļĢāļĢāļĐāļ—āļĩāđˆ 21
āļāļ­āļ‡āļ—āļąāļžāđ„āļ—āļĒāđƒāļ™āļĻāļ•āļ§āļĢāļĢāļĐāļ—āļĩāđˆ 21āļāļ­āļ‡āļ—āļąāļžāđ„āļ—āļĒāđƒāļ™āļĻāļ•āļ§āļĢāļĢāļĐāļ—āļĩāđˆ 21
āļāļ­āļ‡āļ—āļąāļžāđ„āļ—āļĒāđƒāļ™āļĻāļ•āļ§āļĢāļĢāļĐāļ—āļĩāđˆ 21Teeranan
 
War and Peace
War and PeaceWar and Peace
War and PeaceTeeranan
 
āļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
āļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļīāļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
āļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļīTeeranan
 
āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļīāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļīTeeranan
 
āļ āļđāļĄāļīāļĢāļąāļāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī Ndc2558
āļ āļđāļĄāļīāļĢāļąāļāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī Ndc2558āļ āļđāļĄāļīāļĢāļąāļāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī Ndc2558
āļ āļđāļĄāļīāļĢāļąāļāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī Ndc2558Taraya Srivilas
 
āļŦāļĨāļąāļāļāļēāļĢāļŠāļ‡āļ„āļĢāļēāļĄ
āļŦāļĨāļąāļāļāļēāļĢāļŠāļ‡āļ„āļĢāļēāļĄāļŦāļĨāļąāļāļāļēāļĢāļŠāļ‡āļ„āļĢāļēāļĄ
āļŦāļĨāļąāļāļāļēāļĢāļŠāļ‡āļ„āļĢāļēāļĄminiindy
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)a16z
 

Viewers also liked (16)

āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāļ—āļēāļ‡āļ”āđ‰āļēāļ™āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļ‚āļ­āļ‡āļŠāļēāļ•āļī
āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāļ—āļēāļ‡āļ”āđ‰āļēāļ™āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļ‚āļ­āļ‡āļŠāļēāļ•āļīāļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāļ—āļēāļ‡āļ”āđ‰āļēāļ™āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļ‚āļ­āļ‡āļŠāļēāļ•āļī
āļāļēāļĢāļŠāļĢāđ‰āļēāļ‡āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāļ—āļēāļ‡āļ”āđ‰āļēāļ™āļ§āļīāļ—āļĒāļēāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļ‚āļ­āļ‡āļŠāļēāļ•āļī
 
3
33
3
 
Construction safety management
Construction safety managementConstruction safety management
Construction safety management
 
āļšāļ—āļšāļēāļ—āļĄāļŦāļēāļ­āļģāļ™āļēāļˆāļ‚āļ­āļ‡āđ‚āļĨāļ Cmmu
āļšāļ—āļšāļēāļ—āļĄāļŦāļēāļ­āļģāļ™āļēāļˆāļ‚āļ­āļ‡āđ‚āļĨāļ Cmmuāļšāļ—āļšāļēāļ—āļĄāļŦāļēāļ­āļģāļ™āļēāļˆāļ‚āļ­āļ‡āđ‚āļĨāļ Cmmu
āļšāļ—āļšāļēāļ—āļĄāļŦāļēāļ­āļģāļ™āļēāļˆāļ‚āļ­āļ‡āđ‚āļĨāļ Cmmu
 
Unconventional Warfare and Insurgency
Unconventional Warfare and InsurgencyUnconventional Warfare and Insurgency
Unconventional Warfare and Insurgency
 
Terrorism@Info_Age
Terrorism@Info_AgeTerrorism@Info_Age
Terrorism@Info_Age
 
āđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡ āļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļāļģāļŦāļ™āļ” āđāļĨāļ°āļžāļąāļ’āļ™āļēāļĒāļļāļ—āļ˜āļĻāļēāļŠāļ•āļĢāđŒāļ—āļŦāļēāļĢ
āđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡ āļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļāļģāļŦāļ™āļ” āđāļĨāļ°āļžāļąāļ’āļ™āļēāļĒāļļāļ—āļ˜āļĻāļēāļŠāļ•āļĢāđŒāļ—āļŦāļēāļĢāđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡ āļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļāļģāļŦāļ™āļ” āđāļĨāļ°āļžāļąāļ’āļ™āļēāļĒāļļāļ—āļ˜āļĻāļēāļŠāļ•āļĢāđŒāļ—āļŦāļēāļĢ
āđ‚āļ„āļĢāļ‡āļŠāļĢāđ‰āļēāļ‡ āļāļĢāļ°āļšāļ§āļ™āļāļēāļĢāļāļģāļŦāļ™āļ” āđāļĨāļ°āļžāļąāļ’āļ™āļēāļĒāļļāļ—āļ˜āļĻāļēāļŠāļ•āļĢāđŒāļ—āļŦāļēāļĢ
 
1āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī ndc2556
1āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī ndc25561āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī ndc2556
1āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī ndc2556
 
āļšāļĢāļĢāļĒāļēāļĒāļŠāļ‡āļ„āļĢāļēāļĄāļŠāļĄāļąāļĒāđƒāļŦāļĄāđˆ
āļšāļĢāļĢāļĒāļēāļĒāļŠāļ‡āļ„āļĢāļēāļĄāļŠāļĄāļąāļĒāđƒāļŦāļĄāđˆāļšāļĢāļĢāļĒāļēāļĒāļŠāļ‡āļ„āļĢāļēāļĄāļŠāļĄāļąāļĒāđƒāļŦāļĄāđˆ
āļšāļĢāļĢāļĒāļēāļĒāļŠāļ‡āļ„āļĢāļēāļĄāļŠāļĄāļąāļĒāđƒāļŦāļĄāđˆ
 
āļāļ­āļ‡āļ—āļąāļžāđ„āļ—āļĒāđƒāļ™āļĻāļ•āļ§āļĢāļĢāļĐāļ—āļĩāđˆ 21
āļāļ­āļ‡āļ—āļąāļžāđ„āļ—āļĒāđƒāļ™āļĻāļ•āļ§āļĢāļĢāļĐāļ—āļĩāđˆ 21āļāļ­āļ‡āļ—āļąāļžāđ„āļ—āļĒāđƒāļ™āļĻāļ•āļ§āļĢāļĢāļĐāļ—āļĩāđˆ 21
āļāļ­āļ‡āļ—āļąāļžāđ„āļ—āļĒāđƒāļ™āļĻāļ•āļ§āļĢāļĢāļĐāļ—āļĩāđˆ 21
 
War and Peace
War and PeaceWar and Peace
War and Peace
 
āļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
āļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļīāļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
āļ āļąāļĒāļ„āļļāļāļ„āļēāļĄāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
 
āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļīāļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āđāļŦāđˆāļ‡āļŠāļēāļ•āļī
 
āļ āļđāļĄāļīāļĢāļąāļāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī Ndc2558
āļ āļđāļĄāļīāļĢāļąāļāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī Ndc2558āļ āļđāļĄāļīāļĢāļąāļāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī Ndc2558
āļ āļđāļĄāļīāļĢāļąāļāļĻāļēāļŠāļ•āļĢāđŒāđāļĨāļ°āļāļģāļĨāļąāļ‡āļ­āļģāļ™āļēāļˆāđāļŦāđˆāļ‡āļŠāļēāļ•āļī Ndc2558
 
āļŦāļĨāļąāļāļāļēāļĢāļŠāļ‡āļ„āļĢāļēāļĄ
āļŦāļĨāļąāļāļāļēāļĢāļŠāļ‡āļ„āļĢāļēāļĄāļŦāļĨāļąāļāļāļēāļĢāļŠāļ‡āļ„āļĢāļēāļĄ
āļŦāļĨāļąāļāļāļēāļĢāļŠāļ‡āļ„āļĢāļēāļĄ
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Similar to Csd 2013 sso_session_1_14112013

Csd 2013 sso_session_2_14112013
Csd 2013 sso_session_2_14112013Csd 2013 sso_session_2_14112013
Csd 2013 sso_session_2_14112013Nozumu Tee
 
Privacy, Confidentiality & Security (April 28, 2018)
Privacy, Confidentiality & Security (April 28, 2018)Privacy, Confidentiality & Security (April 28, 2018)
Privacy, Confidentiality & Security (April 28, 2018)Nawanan Theera-Ampornpunt
 
Health Information Privacy and Security (March 30, 2016)
Health Information Privacy and Security (March 30, 2016)Health Information Privacy and Security (March 30, 2016)
Health Information Privacy and Security (March 30, 2016)Nawanan Theera-Ampornpunt
 
Health Information Privacy and Security Management
Health Information Privacy and Security ManagementHealth Information Privacy and Security Management
Health Information Privacy and Security ManagementNawanan Theera-Ampornpunt
 
Cybersecurity workforce development toolkit
Cybersecurity workforce development toolkit Cybersecurity workforce development toolkit
Cybersecurity workforce development toolkit Settapong_CyberSecurity
 
Business Driver and Cyber Security DT @TOT
Business Driver and Cyber Security DT @TOTBusiness Driver and Cyber Security DT @TOT
Business Driver and Cyber Security DT @TOTTanya Sattaya-aphitan
 
Cybersecurity āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒ
Cybersecurity āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒCybersecurity āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒ
Cybersecurity āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒmaruay songtanin
 
āļ‚ āļēāļ§āđ„āļ­āļ—
āļ‚ āļēāļ§āđ„āļ­āļ— āļ‚ āļēāļ§āđ„āļ­āļ—
āļ‚ āļēāļ§āđ„āļ­āļ— Pp'dan Phuengkun
 
āļĒāļ·āļ™āļĒāļąāļ™āļ•āļąāļ§āļ•āļ™āđƒāļ™āđ‚āļĨāļāļ­āļīāļ™āđ€āļ•āļ­āļĢāđŒāđ€āļ™āđ‡āļ•āļ”āđ‰āļ§āļĒ Symantec validation and identity protection...
āļĒāļ·āļ™āļĒāļąāļ™āļ•āļąāļ§āļ•āļ™āđƒāļ™āđ‚āļĨāļāļ­āļīāļ™āđ€āļ•āļ­āļĢāđŒāđ€āļ™āđ‡āļ•āļ”āđ‰āļ§āļĒ Symantec validation and  identity protection...āļĒāļ·āļ™āļĒāļąāļ™āļ•āļąāļ§āļ•āļ™āđƒāļ™āđ‚āļĨāļāļ­āļīāļ™āđ€āļ•āļ­āļĢāđŒāđ€āļ™āđ‡āļ•āļ”āđ‰āļ§āļĒ Symantec validation and  identity protection...
āļĒāļ·āļ™āļĒāļąāļ™āļ•āļąāļ§āļ•āļ™āđƒāļ™āđ‚āļĨāļāļ­āļīāļ™āđ€āļ•āļ­āļĢāđŒāđ€āļ™āđ‡āļ•āļ”āđ‰āļ§āļĒ Symantec validation and identity protection...NetwayClub
 
Health Information Privacy and Security (August 28, 2021)
Health Information Privacy and Security (August 28, 2021)Health Information Privacy and Security (August 28, 2021)
Health Information Privacy and Security (August 28, 2021)Nawanan Theera-Ampornpunt
 
Health Information Privacy and Security (September 13, 2020)
Health Information Privacy and Security (September 13, 2020)Health Information Privacy and Security (September 13, 2020)
Health Information Privacy and Security (September 13, 2020)Nawanan Theera-Ampornpunt
 
Health Information Privacy and Security (October 7, 2018)
Health Information Privacy and Security (October 7, 2018)Health Information Privacy and Security (October 7, 2018)
Health Information Privacy and Security (October 7, 2018)Nawanan Theera-Ampornpunt
 
Health Information Privacy and Security (June 18, 2021)
Health Information Privacy and Security (June 18, 2021)Health Information Privacy and Security (June 18, 2021)
Health Information Privacy and Security (June 18, 2021)Nawanan Theera-Ampornpunt
 
āđ„āļ­āđ€āļ‹āļ­āļĢāđŒāđ€āļ§āļĒāđŒ
āđ„āļ­āđ€āļ‹āļ­āļĢāđŒāđ€āļ§āļĒāđŒāđ„āļ­āđ€āļ‹āļ­āļĢāđŒāđ€āļ§āļĒāđŒ
āđ„āļ­āđ€āļ‹āļ­āļĢāđŒāđ€āļ§āļĒāđŒSarocha Makranit
 
Exploiting Blind Vulnerabilities
Exploiting Blind VulnerabilitiesExploiting Blind Vulnerabilities
Exploiting Blind VulnerabilitiesPichaya Morimoto
 
āļĢāļēāļĒāļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģāļ›āļĩāđ„āļ—āļĒāđ€āļ‹āļīāļĢāđŒāļ• 2556
āļĢāļēāļĒāļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģāļ›āļĩāđ„āļ—āļĒāđ€āļ‹āļīāļĢāđŒāļ• 2556āļĢāļēāļĒāļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģāļ›āļĩāđ„āļ—āļĒāđ€āļ‹āļīāļĢāđŒāļ• 2556
āļĢāļēāļĒāļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģāļ›āļĩāđ„āļ—āļĒāđ€āļ‹āļīāļĢāđŒāļ• 2556etdano112
 

Similar to Csd 2013 sso_session_1_14112013 (20)

Csd 2013 sso_session_2_14112013
Csd 2013 sso_session_2_14112013Csd 2013 sso_session_2_14112013
Csd 2013 sso_session_2_14112013
 
Privacy, Confidentiality & Security (April 28, 2018)
Privacy, Confidentiality & Security (April 28, 2018)Privacy, Confidentiality & Security (April 28, 2018)
Privacy, Confidentiality & Security (April 28, 2018)
 
Health Information Privacy and Security (March 30, 2016)
Health Information Privacy and Security (March 30, 2016)Health Information Privacy and Security (March 30, 2016)
Health Information Privacy and Security (March 30, 2016)
 
5
55
5
 
Health Information Privacy and Security Management
Health Information Privacy and Security ManagementHealth Information Privacy and Security Management
Health Information Privacy and Security Management
 
Cybersecurity workforce development toolkit
Cybersecurity workforce development toolkit Cybersecurity workforce development toolkit
Cybersecurity workforce development toolkit
 
e-Commerce Security mict-tu_21oct15_Dr.Arnut
e-Commerce Security mict-tu_21oct15_Dr.Arnute-Commerce Security mict-tu_21oct15_Dr.Arnut
e-Commerce Security mict-tu_21oct15_Dr.Arnut
 
Business Driver and Cyber Security DT @TOT
Business Driver and Cyber Security DT @TOTBusiness Driver and Cyber Security DT @TOT
Business Driver and Cyber Security DT @TOT
 
Cybersecurity āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒ
Cybersecurity āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒCybersecurity āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒ
Cybersecurity āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāđƒāļ™āđ‚āļĨāļāđ„āļ‹āđ€āļšāļ­āļĢāđŒ
 
Ch8
Ch8Ch8
Ch8
 
āļ‚ āļēāļ§āđ„āļ­āļ—
āļ‚ āļēāļ§āđ„āļ­āļ— āļ‚ āļēāļ§āđ„āļ­āļ—
āļ‚ āļēāļ§āđ„āļ­āļ—
 
āļĒāļ·āļ™āļĒāļąāļ™āļ•āļąāļ§āļ•āļ™āđƒāļ™āđ‚āļĨāļāļ­āļīāļ™āđ€āļ•āļ­āļĢāđŒāđ€āļ™āđ‡āļ•āļ”āđ‰āļ§āļĒ Symantec validation and identity protection...
āļĒāļ·āļ™āļĒāļąāļ™āļ•āļąāļ§āļ•āļ™āđƒāļ™āđ‚āļĨāļāļ­āļīāļ™āđ€āļ•āļ­āļĢāđŒāđ€āļ™āđ‡āļ•āļ”āđ‰āļ§āļĒ Symantec validation and  identity protection...āļĒāļ·āļ™āļĒāļąāļ™āļ•āļąāļ§āļ•āļ™āđƒāļ™āđ‚āļĨāļāļ­āļīāļ™āđ€āļ•āļ­āļĢāđŒāđ€āļ™āđ‡āļ•āļ”āđ‰āļ§āļĒ Symantec validation and  identity protection...
āļĒāļ·āļ™āļĒāļąāļ™āļ•āļąāļ§āļ•āļ™āđƒāļ™āđ‚āļĨāļāļ­āļīāļ™āđ€āļ•āļ­āļĢāđŒāđ€āļ™āđ‡āļ•āļ”āđ‰āļ§āļĒ Symantec validation and identity protection...
 
Health Information Privacy and Security (August 28, 2021)
Health Information Privacy and Security (August 28, 2021)Health Information Privacy and Security (August 28, 2021)
Health Information Privacy and Security (August 28, 2021)
 
Health Information Privacy and Security (September 13, 2020)
Health Information Privacy and Security (September 13, 2020)Health Information Privacy and Security (September 13, 2020)
Health Information Privacy and Security (September 13, 2020)
 
Health Information Privacy and Security (October 7, 2018)
Health Information Privacy and Security (October 7, 2018)Health Information Privacy and Security (October 7, 2018)
Health Information Privacy and Security (October 7, 2018)
 
Health Information Privacy and Security (June 18, 2021)
Health Information Privacy and Security (June 18, 2021)Health Information Privacy and Security (June 18, 2021)
Health Information Privacy and Security (June 18, 2021)
 
āđ„āļ­āđ€āļ‹āļ­āļĢāđŒāđ€āļ§āļĒāđŒ
āđ„āļ­āđ€āļ‹āļ­āļĢāđŒāđ€āļ§āļĒāđŒāđ„āļ­āđ€āļ‹āļ­āļĢāđŒāđ€āļ§āļĒāđŒ
āđ„āļ­āđ€āļ‹āļ­āļĢāđŒāđ€āļ§āļĒāđŒ
 
Exploiting Blind Vulnerabilities
Exploiting Blind VulnerabilitiesExploiting Blind Vulnerabilities
Exploiting Blind Vulnerabilities
 
2013 ThaiCERT ANNUAL REPORT
2013 ThaiCERT ANNUAL REPORT2013 ThaiCERT ANNUAL REPORT
2013 ThaiCERT ANNUAL REPORT
 
āļĢāļēāļĒāļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģāļ›āļĩāđ„āļ—āļĒāđ€āļ‹āļīāļĢāđŒāļ• 2556
āļĢāļēāļĒāļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģāļ›āļĩāđ„āļ—āļĒāđ€āļ‹āļīāļĢāđŒāļ• 2556āļĢāļēāļĒāļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģāļ›āļĩāđ„āļ—āļĒāđ€āļ‹āļīāļĢāđŒāļ• 2556
āļĢāļēāļĒāļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģāļ›āļĩāđ„āļ—āļĒāđ€āļ‹āļīāļĢāđŒāļ• 2556
 

Csd 2013 sso_session_1_14112013

  • 1.  Security intelligence āļŠāļ āļēāļžāļ›āļą āļˆāļˆāļļāļšāļąāļ™āđāļĨāļ°āļ›āļą āļāļŦāļēāđƒāļ™āļāļēāļĢāļĢāļąāļāļĐāļē āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒ āļ‚āļ­āļ‡āļŠāļēāļ™āļąāļāļ‡āļēāļ™āļ›āļĢāļ°āļāļąāļ™āļŠāļąāļ‡āļ„āļĄ (C) Copyright, ACIS Professional Center Co., Ltd.
  • 2.  Security intelligence āļŦāļąāļ§āļ‚āđ‰ āļ­  āļĢāļēāļĒāļ‡āļēāļ™āļāļēāļĢāđ‚āļˆāļĄāļ•āļĩāļˆāļēāļ Log Management  āđ€āļŦāļ•āļļāļāļēāļĢāļ“āļ”āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđ€āļāļīāļ”āļ‚āļķāļ™āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ āđˆ āđˆ āđ‰ āđŒ āđ‰  Anti-Virus (C) Copyright, ACIS Professional Center Co., Ltd.
  • 3.  Security intelligence āļĢāļēāļĒāļ‡āļēāļ™āļāļēāļĢāđ‚āļˆāļĄāļ•āļĩāļˆāļēāļ Log Management 46% 31% 15% 8% 0% Internal Sweep Scan External Sweep Scan Port Scan Worm Activity ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Denial of Service Page 3
  • 4.  Security intelligence āđ€āļŦāļ•āļļāļāļēāļĢāļ“āđŒ āļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđˆāđ€āļāļīāļ”āļ‚āļķāļ™ āđ‰ āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ  āļŠāļīāđˆ āļ‡āļ—āļĩāđ€āļāļīāļ”āļ‚āļķāļ™ āđˆ āđ‰ – āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒāļ‚āļ­āļ‡ āļŠāļ›āļŠ. āđƒāļŦāđ‰āļšāļĢāļīāļāļēāļĢāđ„āļĄāđ„āļ”āđ‰ āđˆ āđˆ – āļĄāļĩāļ™āļēāļ„āļĄ 2556 ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Page 4
  • 5.  Security intelligence āđ€āļŦāļ•āļļāļāļēāļĢāļ“āđŒ āļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđˆāđ€āļāļīāļ”āļ‚āļķāļ™ āđ‰ āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ  āļŠāļēāđ€āļŦāļ•āļļ – āđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļĨāļđāļāļ‚āļēāļĒāļ•āļīāļ”āđ„āļ§āļĢāļąāļŠ āđāļĨāļ°āđāļžāļĢāļāļĢāļ°āļˆāļēāļĒāđ„āļ›āļĒāļąāļ‡ āđˆ āđˆ āđˆ āđŒ āđ€āļ„āļĢāļ·āļ­āļ‡āļ­āļ·āļ™āđ†āļ āļēāļĒāđƒāļ™āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ āđˆ āđˆ āđˆ – āđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļĨāļđāļāļ‚āļēāļĒāļĄāļĩāļāļēāļĢāđ€āļŠāļ·āļ­āļĄāļ•āļ­āļ—āļąāļ‡āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒāļ‚āļ­āļ‡ āđˆ āđˆ āđˆ āđˆ āđ‰ āđˆ āđŒ āļŠāļ›āļŠ. āđāļĨāļ°āđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ Internet (āļœāļēāļ™āļ­āļļāļ›āļāļĢāļ“āļŠāđˆāļ§āļ™āļ•āļąāļ§) āđˆ āđˆ āđŒ ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Page 5
  • 6.  Security intelligence āđ€āļŦāļ•āļļāļāļēāļĢāļ“āđŒ āļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđˆāđ€āļāļīāļ”āļ‚āļķāļ™ āđ‰ āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ  āļāļēāļĢāđāļāđ„āļ‚āđƒāļ™āļĢāļ°āļĒāļ°āļŠāļąāđ‰ āļ™ āđ‰ – āļ•āļąāļ”āđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļĨāļđāļāļ‚āļēāļĒāļ—āļĩāļ•āļ”āđ„āļ§āļĢāļąāļŠāļ­āļ­āļāļˆāļēāļāļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ āđˆ āđˆ āļī āđˆ āđˆ āđŒ āđāļĨāļ°āđāļžāļĢāļāļĢāļ°āļˆāļēāļĒāđ„āļ›āļĒāļąāļ‡āđ€āļ„āļĢāļ·āļ­āļ‡āļ­āļ·āļ™āđ†āļ āļēāļĒāđƒāļ™āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ āđˆ āđˆ āđˆ āđˆ – āļāļēāļˆāļąāļ”āđ„āļ§āļĢāļąāļŠāļ­āļ­āļāļˆāļēāļāđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļĨāļđāļāļ‚āļēāļĒ āđˆ āđˆ āđŒ – āļ›āļĢāļąāļšāļ›āļĢāļļāļ‡ Pattern/Signature āđƒāļŦāđ‰āđ€āļ›āđ‡ āļ™āļ›āļąāļˆāļˆāļļāļšāļ™ āļą ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Page 6
  • 7.  Security intelligence āđ€āļŦāļ•āļļāļāļēāļĢāļ“āđŒ āļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļĄāļąāđˆāļ™āļ„āļ‡āļ›āļĨāļ­āļ”āļ āļąāļĒāļ—āļĩāđˆāđ€āļāļīāļ”āļ‚āļķāļ™ āđ‰ āļ āļēāļĒāđƒāļ™ āļŠāļ›āļŠ  āđāļ™āļ§āļ—āļēāļ‡āļāļēāļĢāđāļāđ„āļ‚āđƒāļ™āļĢāļ°āļĒāļ°āļĒāļēāļ§ āđ‰ – āļ„āļ§āļšāļ„āļļ āļĄ āļāļēāļĢāđ€āļŠāļ·āđˆ āļ­ āļĄāļ•āđˆ āļ­āđ€āļ„āļĢāļ·āđˆāļ­ āļ‡āļ„āļ­āļĄāļžāļīāļ§ āđ€āļ•āļ­āļĢ āđŒāļĨāļđ āļ āļ‚āđˆ āļēāļĒāđ€āļ‚āđ‰ āļēāļāļąāļš āļĢāļ°āļšāļš āđ€āļ„āļĢāļ·āļ­ āļ‚āđˆāļēāļĒ āđ‚āļ”āļĒāļ āļēāļŦāļ™āļ”āđƒāļŦāđ‰ āļĄāļĩāļ āļēāļĢāļžāļīāļŠāļđ āļˆ āļ™āđŒāļ•āļąāļ§ āļ•āļ™ āļ•āļĢāļ§āļˆāļŠāļ­āļšāļāļēāļĢ āļ­āļąāļžāđ€āļ”āļ— Signature āļ‚āļ­āļ‡āđ‚āļ›āļĢāđāļāļĢāļĄāļ›āđ‰āļ­āļ‡āļāļąāļ™āđ„āļ§āļĢāļąāļŠāļ•āļĢāļ§āļˆāļŠāļ­āļšāļ„āļ§āļēāļĄ āļ–āļđāļāļ•āđ‰āļ­āļ‡āļ‚āļ­āļ‡āđ‚āļ›āļĢāđāļāļĢāļĄāļ—āļĩāļ•āļ”āļ•āļąāļ‡āđƒāļŠāđ‰āļ‡āļēāļ™āļšāļ™āđ€āļ„āļĢāļ·āļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāļāļ­āļ™ āđˆ āļī āđ‰ āđˆ āđŒ āđˆ āļ­āļ™āļļ āļāļēāļ•āđƒāļŦāđ‰āđƒāļŠāđ‰āļ‡āļēāļ™āļĢāļ°āļšāļšāđ€āļ„āļĢāļ·āļ­āļ‚āļēāļĒ āđˆ ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Page 7
  • 8.  Security intelligence Anti-Virus PC (āđ€āļ„āļĢāļ·āđˆāļ­āļ‡) Notebook (āđ€āļ„āļĢāļ·āļ­āļ‡) āđˆ TrendMicro 4112 150 Kaspersky 260 - Anti-Virus ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Page 8
  • 9.  Security intelligence āļŠāļ™āļīāļ”āđāļĨāļ°āļ›āļĢāļīāļĄāļēāļ“āļĄāļąāļĨāđāļ§āļĢāđŒ āļ—āđˆ āļ•āļĢāļ§āļˆāļžāļšāļŠāļđāļ‡āļŠāļļāļ” āļĩ 25 āļ­āļąāļ™āļ”āļąāļš āđ€āļ”āļ·āļ­āļ™āļāļąāļ™āļĒāļēāļĒāļ™ (āļˆāļēāļ Trend Micro) 16,000 14,992 14,000 46,552 12,000 10,000 8,000 8,611 8,041 6,000 4,000 3,740 2,689 2,000 1,061 988 851 637 594 549 539 379 376 366 256 243 243 219 218 212 204 189 178 177 0 āļŠāļ·āđˆāļ­āļĄāļąāļĨāđāļ§āļĢāđŒ ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Page 9
  • 10.  Security intelligence āļŠāļ–āļēāļ™āļ°āļāļēāļĢāļ­āļąāļžāđ€āļ”āļ— Pattern/Signature āļ‚āļ­āļ‡ Trend Micro Pattern/Signature āđ€āļ”āļ·āļ­āļ™ āļāļąāļ™āļĒāļēāļĒāļ™ 2556 4,000 3,732 3,500 3,000 āđ€āļ›āđ‡āļ™āļ›āļąāļˆāļˆāļļāļšāļąāļ™ 2,500 2,000 1,500 1,000 319 500 20 12 29 10.265-10.277 10.251-10.264 āļ•āđˆāļģāļāļ§āđˆāļģ 10.251 0 10.278-10.291 ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Offline Page 10
  • 11.  Security intelligence āđ€āļ„āļĢāļ·āđˆāļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāđŒ āļ—āđˆ āļ•āļĢāļ§āļˆāļžāļšāļĄāļąāļĨāđāļ§āļĢāđŒ āļŠāļđāļ‡āļŠāļļāļ” āļĩ 25 āļ­āļąāļ™āļ”āļąāļš āđ€āļ”āļ·āļ­āļ™āļāļąāļ™āļĒāļēāļĒāļ™ (āļˆāļēāļ Trend Micro) āđ€āļ„āļĢāļ·āđˆāļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāđŒ āļ—āļ•āļīāļ”āļĄāļąāļĨāđāļ§āļĢāđŒ āļŠāļđāļ‡āļŠāļļ āļ” 25 āļ­āļąāļ™āļ”āļąāļš āļĩāđˆ āļˆāļģāļ™āļ§āļ™āļ„āļĢāļąāđ‰āļ‡āļ—āļĩāđˆāļ•āļĢāļ§āļˆāļžāļš 18,000 16,000 15,877 14,000 12,000 10,000 8,855 8,000 6,000 4,237 4,000 2,000 3,977 3,235 578 563 562 545 541 520 479 399 371 355 338 315 280 270 255 233 204 202 201 195 0 āļŠāļ·āđˆāļ­āđ€āļ„āļĢāļ·āđˆāļ­āļ‡āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāđŒ ÂĐ Copyright, ACIS Professional Center Company Limited, All rights reserved Page 11
  • 12.  Security intelligence Question and Answer (C) Copyright, ACIS Professional Center Co., Ltd.