{"id":9583,"date":"2018-04-16T16:34:14","date_gmt":"2018-04-16T08:34:14","guid":{"rendered":"https:\/\/www.kaspersky.com.cn\/blog\/?p=9583"},"modified":"2020-09-15T00:46:13","modified_gmt":"2020-09-14T16:46:13","slug":"endpoint-security-evolution","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/endpoint-security-evolution\/9583\/","title":{"rendered":"\u5361\u5df4\u65af\u57fa\u5b9e\u9a8c\u5ba4\u76f4\u9762\u6700\u65b0\u6311\u6218"},"content":{"rendered":"<p>\u8fd1\u4e9b\u5e74\u6765\u53d1\u751f\u7684\u5927\u89c4\u6a21\u75c5\u6bd2\u6d41\u884c\u3001\u6570\u636e\u6cc4\u6f0f\u548c\u6709\u9488\u5bf9\u6027\u653b\u51fb, \u6781\u5927\u5730\u6539\u53d8\u4e86\u4eba\u4eec\u5bf9\u5f85\u7f51\u7edc\u5b89\u5168\u7684\u6001\u5ea6\u3002\u73b0\u5728, \u518d\u4e0d\u4f1a\u6709\u4eba\u8ba4\u4e3a\u9632\u5fa1\u7f51\u7edc\u5a01\u80c1\u53ea\u662f\u7cfb\u7edf\u7ba1\u7406\u5458\u7684\u8d23\u4efb\uff1b\u6bcf\u5bb6\u516c\u53f8\u90fd\u9700\u8981\u5b9e\u65bd\u9632\u5fa1\u7b56\u7565\u3002\u4f46\u662f, \u7f51\u7edc\u5b89\u5168\u65e0\u6cd5\u4e00\u76f4\u91c7\u7528\u4e0d\u5e72\u9884\u65b9\u5f0f, \u4e5f\u4e0d\u53ef\u80fd\u5c40\u9650\u4e8e\u5b89\u88c5\u201d\u67d0\u4e9b\u53cd\u75c5\u6bd2\u8f6f\u4ef6\u201d\u3002\u73b0\u4ee3\u4f01\u4e1a\u8981\u60f3\u4fdd\u969c\u4eca\u5929\u548c\u672a\u6765\u7684\u5b89\u5168, \u9700\u8981\u80fd\u591f\u5e94\u5bf9\u5404\u79cd\u7f51\u7edc\u5a01\u80c1\u7684\u65b0\u4e00\u4ee3\u89e3\u51b3\u65b9\u6848\u3002<\/p>\n<p>\u4e00\u65b9\u9762, \u5fc5\u987b\u90e8\u7f72\u4e00\u4e2a\u6210\u719f\u5b8c\u5584\u7684\u9632\u5fa1\u6027\u89e3\u51b3\u65b9\u6848, \u4ee5\u5e94\u5bf9\u76ee\u524d\u7684\u6311\u6218\uff1b\u53e6\u4e00\u65b9\u9762\u8be5\u89e3\u51b3\u65b9\u6848\u5fc5\u987b\u80fd\u591f\u9002\u5e94\u7279\u5b9a\u4e1a\u52a1\u7684\u9700\u6c42\u3002\u4e0b\u9762\u6211\u4eec\u5c06\u5206\u6790\u4e00\u4e0b\u7f51\u7edc\u5b89\u5168\u9886\u57df\u7684\u4e3b\u8981\u53d1\u5c55\u8d8b\u52bf, \u7136\u540e\u770b\u770b\u6211\u4eec\u6700\u65b0\u7248\u672c\u7684\u6838\u5fc3B2B\u89e3\u51b3\u65b9\u6848\u201d\u5361\u5df4\u65af\u57fa\u4f01\u4e1a\u7f51\u7edc\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u201d\u80fd\u5982\u4f55\u5e94\u5bf9\u8fd9\u4e9b\u5c40\u9762\u3002<\/p>\n<h2>\u52d2\u7d22\u8f6f\u4ef6<\/h2>\n<p>\u5728\u8fc7\u53bb\u51e0\u5e74\u91cc, \u52d2\u7d22\u8f6f\u4ef6\u4e00\u76f4\u7a33\u5c45\u5341\u5927\u7f51\u7edc\u5a01\u80c1\u699c\u5355\u3002\u81f3\u5c11\u4e24\u6b21\u52d2\u7d22\u8f6f\u4ef6\u91cd\u5927\u7206\u53d1\uff08WannaCry\u548cExPetr\uff09\u4ee5\u53ca\u65e0\u6570\u7684\u5c0f\u578b\u52d2\u7d22\u4e8b\u4ef6, \u7ed9\u4e2d\u5c0f\u578b\u4f01\u4e1a\u9020\u6210\u4e86\u4e25\u91cd\u4f24\u5bb3\u3002\u636e\u6211\u4eec\u7684\u4e13\u5bb6<a target=\"_blank\" href=\"https:\/\/securelist.com\/ksb-threat-predictions-for-2018\/83169\/\" rel=\"noopener noreferrer\">\u9884\u6d4b<\/a>, \u4eca\u5e74\u6211\u4eec\u4ecd\u5c06\u9762\u4e34\u52d2\u7d22\u8f6f\u4ef6\u7684\u5a01\u80c1\u3002\u72af\u7f6a\u5206\u5b50\u6e05\u695a\u5730\u770b\u5230, \u52d2\u7d22\u5bb6\u5ead\u7528\u6237\u8fdc\u6bd4\u4e0d\u5982\u52d2\u7d22\u4f01\u4e1a\u66b4\u5229, \u6240\u4ee5\u4ed6\u4eec\u7eb7\u7eb7\u628a\u6ce8\u610f\u529b\u8f6c\u5411\u4e86\u4f01\u4e1a\u3002\u6b64\u5916, \u4ee5\u524d\u72af\u7f6a\u5206\u5b50\u5173\u6ce8\u7684\u662f\u6700\u7ec8\u7528\u6237\u7684\u64cd\u4f5c\u7cfb\u7edf, \u800c\u73b0\u5728\u4ed6\u4eec\u628a\u66f4\u591a\u7cbe\u529b\u6295\u5165\u5230\u9488\u5bf9\u670d\u52a1\u5668\u64cd\u4f5c\u7cfb\u7edf\u7684\u6280\u672f\u4e0a\u3002<\/p>\n<p><strong>\u5bf9\u7b56\uff1a\u52a0\u5f3a\u9ad8\u5ea6\u4e13\u4e1a\u5316\u7684\u9632\u5fa1\u6280\u672f\u3002<\/strong>\u901a\u8fc7\u4e13\u4e3a\u9632\u5fa1\u52a0\u5bc6\u8f6f\u4ef6\u800c\u91cf\u8eab\u6253\u9020\u7684\u5b50\u7cfb\u7edf, \u652f\u6301\u76d1\u63a7\u6587\u4ef6\u8bbf\u95ee\u5c1d\u8bd5, \u68c0\u6d4b\u5e76\u963b\u6b62\u53ef\u7591\u6d3b\u52a8\u3002\u8fd9\u9879\u6280\u672f\u5bf9\u4e8e\u7528\u6237\u64cd\u4f5c\u7cfb\u7edf\u548c\u670d\u52a1\u5668\u64cd\u4f5c\u7cfb\u7edf\u540c\u6837\u6709\u6548\u3002\u6b64\u5916, \u5728\u5ba2\u6237\u57fa\u4e8eWindows\u7684\u8bbe\u5907\u4e0a\uff08\u901a\u5e38\u5b58\u50a8\u6709\u5927\u591a\u6570\u7528\u6237\u4fe1\u606f\uff09\u73b0\u5728\u652f\u6301\u56de\u6eda\u5bf9\u6587\u4ef6\u7684\u6076\u610f\u66f4\u6539, \u6062\u590d\u635f\u574f\u7684\u4fe1\u606f\u3002<\/p>\n<h2>\u65e0\u5b9e\u4f53\u548c\u65b0\u4e00\u4ee3\u5a01\u80c1<\/h2>\n<p>\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u4e0d\u65ad\u53d1\u660e\u65b0\u7684\u65b9\u6cd5\u6765\u8eb2\u907f\u68c0\u6d4b\u3002\u6709\u4e9b\u653b\u51fb\u4e0d\u4f7f\u7528\u6587\u4ef6\u3002\u8fd8\u6709\u4e9b\u4f7f\u7528\u590d\u6742\u7684\u4ee3\u7801\u6df7\u6dc6\u65b9\u6cd5\u3002\u4e5f\u6709\u4e00\u4e9b\u653b\u51fb\u4ecd\u7136\u53ea\u4f7f\u7528\u5408\u6cd5\u5de5\u5177, \u5229\u7528\u5458\u5de5\u758f\u5ffd\u6765\u5f97\u901e\u3002\u4e00\u4e9b\u6709\u521b\u610f\u7684\u7ec4\u7ec7\u751a\u81f3\u4f1a\u641c\u7d22\u96f6\u65e5\u6f0f\u6d1e, \u7136\u540e\u9488\u5bf9\u8fd9\u79cd\u6f0f\u6d1e\u521b\u5efa<a target=\"_blank\" href=\"https:\/\/securelist.com\/threats\/zero-day-exploit-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">\u653b\u51fb<\/a>\u3002\u6700\u540e, \u8fd8\u6709\u4e9b\u9ed1\u5ba2\u628a\u6240\u6709\u8fd9\u4e9b\u65b9\u6cd5\u6574\u5408\u5728\u4e00\u8d77\u4f7f\u7528\u3002\u4e3a\u4e86\u5e94\u5bf9\u8fd9\u4e9b\u5c42\u51fa\u4e0d\u7a77\u7684\u5a01\u80c1, \u4ec5\u4ec5\u4f9d\u9760\u4e00\u4e2a\u591a\u5c42\u89e3\u51b3\u65b9\u6848\u662f\u4e0d\u591f\u7684\u3002<\/p>\n<p><strong>\u5bf9\u7b56\uff1a\u591a\u5c42\u673a\u5668\u5b66\u4e60\uff08<\/strong><strong>ML<sup>2<\/sup><\/strong><strong>\uff09\u548c\u975e\u7b7e\u540d\u68c0\u6d4b\u6cd5\u3002<\/strong>\u6211\u4eec\u7684\u65b0\u4e00\u4ee3\u9632\u5fa1\u6280\u672f\u57fa\u4e8e\u4ee5\u9759\u6001\u6a21\u5f0f\uff08\u7528\u4e8e\u68c0\u6d4b\u6267\u884c\u524d\u9636\u6bb5\u7684\u5a01\u80c1\uff09\u548c\u52a8\u6001\u6a21\u5f0f\uff08\u6355\u6349\u6fc0\u6d3b\u7684\u7f51\u7edc\u5a01\u80c1\uff09\u5de5\u4f5c\u7684\u673a\u5668\u5b66\u4e60\u7b97\u6cd5\u3002\u4e3a\u4e86\u68c0\u6d4b\u5230\u6700\u65b0\u5a01\u80c1, \u6211\u4eec\u91c7\u7528\u7684\u662f\u7cc5\u5408\u4e86\u884c\u4e3a\u5f15\u64ce\u3001\u81ea\u52a8\u5316\u6f0f\u6d1e\u9632\u5fa1\u5b50\u7cfb\u7edf\u3001\u57fa\u4e8e\u4e3b\u673a\u7684\u5165\u4fb5\u9632\u5fa1\u4ee5\u53ca\u4e0d\u4f9d\u8d56\u4e8e\u5b9a\u671f\u66f4\u65b0\u7684\u4e91\u7aef\u6280\u672f\u7684\u65b9\u6cd5\u3002<\/p>\n<h2>\u6709\u9488\u5bf9\u6027\u653b\u51fb<\/h2>\n<p>\u9488\u5bf9\u7279\u5b9a\u4f01\u4e1a\u5b9e\u65bd\u6709\u9488\u5bf9\u6027\u7684\u653b\u51fb\u7684\u6210\u672c\u5df2\u7ecf\u5927\u5927\u964d\u4f4e, \u6240\u4ee5\u8fd9\u7c7b\u4e8b\u4ef6\u76f8\u6bd4\u4ee5\u524d\u66f4\u4e3a\u5e38\u89c1\u3002\u867d\u7136\u76f8\u6bd4\u666e\u904d\u6492\u7f51, \u72af\u7f6a\u5206\u5b50\u4ecd\u7136\u9700\u8981\u66f4\u591a\u8d44\u6e90, \u51c6\u5907\u5de5\u4f5c\u8981\u505a\u5f97\u66f4\u5145\u5206, \u4f46\u4ece\u4e2d\u80fd\u83b7\u5f97\u7684\u5229\u6da6\u4e5f\u53ef\u80fd\u66f4\u4e30\u539a\u3002\u8d22\u529b\u96c4\u539a\u7684\u5927\u578b\u4f01\u4e1a\u5e76\u4e0d\u662f\u552f\u4e00\u7684\u76ee\u6807\u3002\u5c31\u7b97\u662f\u5c0f\u516c\u53f8\u4e5f\u6709\u53ef\u80fd\u6210\u4e3a\u4f9b\u5e94\u94fe\u653b\u51fb\u4e2d\u4e0d\u7ecf\u610f\u88ab\u6d89\u53ca\u7684\u4e00\u73af, \u6240\u4ee5\u4f01\u4e1a\u4e0d\u8981\u8ba4\u4e3a\u81ea\u5df1\u80fd\u591f\u5e78\u514d\u4e8e\u8fd9\u7c7b\u5a01\u80c1\u3002<\/p>\n<p><strong>\u5bf9\u7b56\uff1a\u91c7\u7528\u591a\u79cd\u4e92\u8865\u7684\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u6765\u6784\u5efa\u7efc\u5408\u5b89\u5168\u7b56\u7565\u3002\u5728<\/strong>\u6211\u4eec\u89e3\u51b3\u65b9\u6848\u4e2d, \u5ba2\u6237\u7aef\u90e8\u5206\u5b89\u88c5\u5728\u6bcf\u4e2a\u5de5\u4f5c\u7ad9\u4e0a, \u53ef\u4ee5\u4e0e\u201d\u5361\u5df4\u65af\u57fa\u5b89\u5168\u7f51\u7edc\u201d\u6216\u201d\u5361\u5df4\u65af\u57fa\u53cd\u5b9a\u5411\u653b\u51fb\u5e73\u53f0\u201d\u96c6\u6210, \u4ee5\u63d0\u9ad8\u7aef\u70b9\u53ef\u89c1\u6027, \u81ea\u52a8\u6267\u884c\u4e8b\u4ef6\u54cd\u5e94\u8fc7\u7a0b\u3002<\/p>\n<h2>\u6570\u636e\u6cc4\u9732<\/h2>\n<p>\u5728\u4e00\u4e9b\u884c\u4e1a\u4e2d, \u6570\u636e\u6cc4\u9732\u6700\u7ec8\u5f15\u53d1\u4e86\u771f\u6b63\u7684\u707e\u96be\u3002\u5ba2\u6237\u548c\u5458\u5de5\u8bb0\u5f55\u6210\u4e3a\u9ed1\u5e02\u4e0a\u7684\u6700\u7545\u9500\u5546\u54c1\u3002\u968f\u7740\u300a\u6b27\u6d32\u901a\u7528\u6570\u636e\u4fdd\u62a4\u6761\u4f8b\u300b\uff08GDPR\uff09\u7684\u751f\u6548, \u8fd9\u4e00\u72b6\u51b5\u5c24\u5176\u4ee4\u4eba\u8b66\u60d5\u3002<\/p>\n<p><strong>\u5bf9\u7b56\uff1a\u52a0\u5f3a\u5bf9\u52a0\u5bc6\u6280\u672f\u7684\u91cd\u89c6\u3002<\/strong>\u201c\u5361\u5df4\u65af\u57fa\u5b89\u5168\u4e2d\u5fc3\u63a7\u5236\u53f0\u201d\u53ef\u7528\u4e8e\u5bf9\u5927\u591a\u6570\u6d41\u884c\u7684\u79fb\u52a8\u548c\u684c\u9762\u5e73\u53f0\uff08\u5305\u62ecFileVault 2 for macOS\uff09\u4e0a\u7684\u5404\u79cd\u6570\u636e\u52a0\u5bc6\u7cfb\u7edf\u8fdb\u884c\u8fdc\u7a0b\u96c6\u4e2d\u7ba1\u7406\u3002\u800c\u4e14, \u6211\u4eec\u81ea\u5df1\u7684\u52a0\u5bc6\u6280\u672f\u53ef\u4ee5\u57fa\u4e8e\u6587\u4ef6\u6216\u6574\u4e2a\u78c1\u76d8\u6765\u4fdd\u62a4\u60a8\u7684\u6570\u636e\u3002<\/p>\n<p>\u5f53\u7136, \u4e0a\u8ff0\u529f\u80fd\u5e76\u4e0d\u90fd\u662f\u5168\u65b0\u7684\u3002\u65b0\u7248\u201d\u5361\u5df4\u65af\u57fa\u4f01\u4e1a\u7f51\u7edc\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u201d\u5305\u542b\u4f17\u591a\u5347\u7ea7\u548c\u65b0\u5f15\u5165\u7684\u529f\u80fd, \u53ef\u589e\u5f3a\u4fdd\u62a4\u7ea7\u522b, \u7b80\u5316\u7ba1\u7406\u548c\u53ef\u6269\u5c55\u6027, \u5e2e\u52a9\u964d\u4f4e\u5b9e\u65bd\u548c\u652f\u6301\u6210\u672c\u3002\u8981\u4e86\u89e3\u8be5\u4ea7\u54c1\u7684\u5b9e\u9645\u5de5\u4f5c\u65b9\u5f0f\u4ee5\u53ca\u80fd\u4e3a\u4f01\u4e1a\u5e26\u6765\u54ea\u4e9b\u4f18\u52bf, \u8bf7\u8bbf\u95ee<a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.cn\/small-to-medium-business-security\/endpoint-advanced?redef=1&amp;reseller=cn_endpointseca_acq_ona_smm__onl_b2c_kasperskydaily_lnk____kesba___\" rel=\"noopener noreferrer\">\u6211\u4eec\u516c\u53f8\u5b98\u7f51\u4e0a\u7684\u4ea7\u54c1\u9875\u9762<\/a>\u3002<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-cn\">\n","protected":false},"excerpt":{"rendered":"<p>\u5361\u5df4\u65af\u57fa\u4f01\u4e1a\u7f51\u7edc\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u5982\u4f55\u62b5\u5fa1\u6700\u65b0\u5a01\u80c1\u3002<\/p>\n","protected":false},"author":40,"featured_media":9584,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1745,1413],"tags":[1668,165,1670,1669,1483,890],"class_list":{"0":"post-9583","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-smb","8":"category-business","9":"tag-1668","10":"tag-165","11":"tag-1670","12":"tag-1669","13":"tag-1483","14":"tag-890"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/endpoint-security-evolution\/9583\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/endpoint-security-evolution\/13236\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/endpoint-security-evolution\/11054\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/endpoint-security-evolution\/15194\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/endpoint-security-evolution\/13462\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/endpoint-security-evolution\/12748\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/endpoint-security-evolution\/15853\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/endpoint-security-evolution\/15395\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/endpoint-security-evolution\/20249\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/endpoint-security-evolution\/4974\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/endpoint-security-evolution\/22035\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/endpoint-security-evolution\/10267\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/endpoint-security-evolution\/10251\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/endpoint-security-evolution\/9148\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/endpoint-security-evolution\/16441\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/endpoint-security-evolution\/20281\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/endpoint-security-evolution\/20210\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/%e4%bc%81%e4%b8%9a%e7%bd%91%e7%bb%9c\/","name":"\u4f01\u4e1a\u7f51\u7edc"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/9583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=9583"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/9583\/revisions"}],"predecessor-version":[{"id":10305,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/9583\/revisions\/10305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/9584"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=9583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=9583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=9583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}