Blockchain Adoption Ecosystem
Integration of blockchain technology by businesses for supply chain management, logistics, identity verification, and more. This involves collaboration with blockchain solution providers and consortia.
Based on my experience so far..Blockchain needs 10 Things to succeed -
1. Right Use cases at enterprises and Consortium ( Blockchain is not an immediate solution for all problem statements)
2. Ease Of Development, Test Tools and skills around Blockchain
3. Cost-Effective Deployment and Infrastructure; Today it might be very costly engagement for even small use cases.
4. Future Focused Mindset ( Leadership)
5. Technology Maturity around Scale, Security , Interoperability
6. Developer Community Push
7. Government Support for Large Use cases and Policy
8. Rapid Development and Deployment Platform
9. Community and Developer Involvement
10. Regulatory Environment based on use case types
"Blockchain technology is not just a tool; it's a new way of thinking about trust, transparency, and collaboration in the digital age. Its potential to revolutionize industries and empower individuals is only limited by our imagination and commitment to harnessing its true capabilities." - Prasanna Lohar
@OUPNarith
Integration of blockchain technology by businesses for supply chain management, logistics, identity verification, and more. This involves collaboration with blockchain solution providers and consortia.
Based on my experience so far..Blockchain needs 10 Things to succeed -
1. Right Use cases at enterprises and Consortium ( Blockchain is not an immediate solution for all problem statements)
2. Ease Of Development, Test Tools and skills around Blockchain
3. Cost-Effective Deployment and Infrastructure; Today it might be very costly engagement for even small use cases.
4. Future Focused Mindset ( Leadership)
5. Technology Maturity around Scale, Security , Interoperability
6. Developer Community Push
7. Government Support for Large Use cases and Policy
8. Rapid Development and Deployment Platform
9. Community and Developer Involvement
10. Regulatory Environment based on use case types
"Blockchain technology is not just a tool; it's a new way of thinking about trust, transparency, and collaboration in the digital age. Its potential to revolutionize industries and empower individuals is only limited by our imagination and commitment to harnessing its true capabilities." - Prasanna Lohar
@OUPNarith
❤3👍1
Forwarded from សន្តិសុខសាយប័រ (ISAC-Cambodia)
បទល្មេីសបច្ចេកវិទ្យាថ្មីប្លែកៗ ក្នុងយុគ្គសម័យឌីជីថល
ព័ត៌មានលំអិត
https://secudemy.com/cambodia-cybercrime-in-digital-economy-era/
* JOIN សន្តិសុខបច្ចេកវិទ្យា *
----------------------
Cyber Aware: @OUPNarith
#SecuDemy
#StaySafeOnlineCambodia
#CyberYouthCambodia
#ISACCambodia
#DigitalEconomyKH
ព័ត៌មានលំអិត
https://secudemy.com/cambodia-cybercrime-in-digital-economy-era/
* JOIN សន្តិសុខបច្ចេកវិទ្យា *
----------------------
Cyber Aware: @OUPNarith
#SecuDemy
#StaySafeOnlineCambodia
#CyberYouthCambodia
#ISACCambodia
#DigitalEconomyKH
❤2👍1
ChatGPT Prompting Techniques Unveiled
The secrets of ChatGPT Prompting Techniques, including the dynamic CLEAR (Challenge-Limitation-Effect-Action-Result).
The true magic unfolds when you seamlessly integrate it with PAR, STAR, SWOT, AIDA, and PEAS:
𝗖𝗟𝗘𝗔𝗥 (𝗖𝗵𝗮𝗹𝗹𝗲𝗻𝗴𝗲-𝗟𝗶𝗺𝗶𝘁𝗮𝘁𝗶𝗼𝗻-𝗘𝗳𝗳𝗲𝗰𝘁-𝗔𝗰𝘁𝗶𝗼𝗻-𝗥𝗲𝘀𝘂𝗹𝘁):
Craft crystal-clear prompts for ChatGPT. Navigate Challenges, explore Limitations, understand Effects, guide Action, and observe Results. Ensure precision in responses with the CLEAR technique.
𝗣𝗔𝗥 (𝗣𝗿𝗼𝗯𝗹𝗲𝗺-𝗔𝗴𝗶𝘁𝗮𝘁𝗲-𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻):
Elevate prompts using PAR. Identify Problems, agitate their impact, present Solutions. Guide ChatGPT for comprehensive responses.
𝗦𝗧𝗔𝗥 (𝗦𝗶𝘁𝘂𝗮𝘁𝗶𝗼𝗻-𝗧𝗮𝘀𝗸-𝗔𝗰𝘁𝗶𝗼𝗻-𝗥𝗲𝘀𝘂𝗹𝘁):
Structure prompts with STAR. Break down into Situation, Task, Action, Result for detailed responses.
𝗦𝗪𝗢𝗧 (𝗦𝘁𝗿𝗲𝗻𝗴𝘁𝗵𝘀-𝗪𝗲𝗮𝗸𝗻𝗲𝘀𝘀𝗲𝘀-𝗢𝗽𝗽𝗼𝗿𝘁𝘂𝗻𝗶𝘁𝗶𝗲𝘀-𝗧𝗵𝗿𝗲𝗮𝘁𝘀):
Analyse and strategize with SWOT prompts. Use ChatGPT to assess Strengths, Weaknesses, Opportunities, and Threats.
𝗔𝗜𝗗𝗔 (𝗔𝘁𝘁𝗲𝗻𝘁𝗶𝗼𝗻-𝗜𝗻𝘁𝗲𝗿𝗲𝘀𝘁-𝗗𝗲𝘀𝗶𝗿𝗲-𝗔𝗰𝘁𝗶𝗼𝗻):
Create engaging prompts with AIDA. Capture Attention, spark Interest, generate Desire, prompt Action.
𝗣𝗘𝗔𝗦 (𝗣𝗲𝗿𝗳𝗼𝗿𝗺𝗮𝗻𝗰𝗲 𝗺𝗲𝗮𝘀𝘂𝗿𝗲-𝗘𝗻𝘃𝗶𝗿𝗼𝗻𝗺𝗲𝗻𝘁-𝗔𝗰𝘁𝘂𝗮𝘁𝗼𝗿𝘀-𝗦𝗲𝗻𝘀𝗼𝗿𝘀):
Tailor prompts with the PEAS model. Understand Performance measures, Environment, Actuators, Sensors for varied responses.
@OUPNarith
The secrets of ChatGPT Prompting Techniques, including the dynamic CLEAR (Challenge-Limitation-Effect-Action-Result).
The true magic unfolds when you seamlessly integrate it with PAR, STAR, SWOT, AIDA, and PEAS:
𝗖𝗟𝗘𝗔𝗥 (𝗖𝗵𝗮𝗹𝗹𝗲𝗻𝗴𝗲-𝗟𝗶𝗺𝗶𝘁𝗮𝘁𝗶𝗼𝗻-𝗘𝗳𝗳𝗲𝗰𝘁-𝗔𝗰𝘁𝗶𝗼𝗻-𝗥𝗲𝘀𝘂𝗹𝘁):
Craft crystal-clear prompts for ChatGPT. Navigate Challenges, explore Limitations, understand Effects, guide Action, and observe Results. Ensure precision in responses with the CLEAR technique.
𝗣𝗔𝗥 (𝗣𝗿𝗼𝗯𝗹𝗲𝗺-𝗔𝗴𝗶𝘁𝗮𝘁𝗲-𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻):
Elevate prompts using PAR. Identify Problems, agitate their impact, present Solutions. Guide ChatGPT for comprehensive responses.
𝗦𝗧𝗔𝗥 (𝗦𝗶𝘁𝘂𝗮𝘁𝗶𝗼𝗻-𝗧𝗮𝘀𝗸-𝗔𝗰𝘁𝗶𝗼𝗻-𝗥𝗲𝘀𝘂𝗹𝘁):
Structure prompts with STAR. Break down into Situation, Task, Action, Result for detailed responses.
𝗦𝗪𝗢𝗧 (𝗦𝘁𝗿𝗲𝗻𝗴𝘁𝗵𝘀-𝗪𝗲𝗮𝗸𝗻𝗲𝘀𝘀𝗲𝘀-𝗢𝗽𝗽𝗼𝗿𝘁𝘂𝗻𝗶𝘁𝗶𝗲𝘀-𝗧𝗵𝗿𝗲𝗮𝘁𝘀):
Analyse and strategize with SWOT prompts. Use ChatGPT to assess Strengths, Weaknesses, Opportunities, and Threats.
𝗔𝗜𝗗𝗔 (𝗔𝘁𝘁𝗲𝗻𝘁𝗶𝗼𝗻-𝗜𝗻𝘁𝗲𝗿𝗲𝘀𝘁-𝗗𝗲𝘀𝗶𝗿𝗲-𝗔𝗰𝘁𝗶𝗼𝗻):
Create engaging prompts with AIDA. Capture Attention, spark Interest, generate Desire, prompt Action.
𝗣𝗘𝗔𝗦 (𝗣𝗲𝗿𝗳𝗼𝗿𝗺𝗮𝗻𝗰𝗲 𝗺𝗲𝗮𝘀𝘂𝗿𝗲-𝗘𝗻𝘃𝗶𝗿𝗼𝗻𝗺𝗲𝗻𝘁-𝗔𝗰𝘁𝘂𝗮𝘁𝗼𝗿𝘀-𝗦𝗲𝗻𝘀𝗼𝗿𝘀):
Tailor prompts with the PEAS model. Understand Performance measures, Environment, Actuators, Sensors for varied responses.
@OUPNarith
Audio
❤3👍1
The Swiss Air Force has been victim to a malicious cyber attack. The group allegedly responsible for the data breach is suspected to originate from Russia.
A US security company, providing communication technology to defence firms globally, fell victim to a cyberattack. The Swiss Air Force was among the entities affected. Switzerland’s Federal Department of Defence has officially confirmed the data breach and is currently investigating the incident.
Hackers are believed to have stolen tens of thousands of documents from the US company "Ultra Intelligence & Communications". Around 30 gigabytes of partly sensitive and classified documents are believed to have ended up on the darknet and are therefore generally accessible to the public.
https://www.swissinfo.ch/eng/business/cyberattack-exposes-swiss-air-force-documents-on-the-darknet/49100914
@OUPNarith
A US security company, providing communication technology to defence firms globally, fell victim to a cyberattack. The Swiss Air Force was among the entities affected. Switzerland’s Federal Department of Defence has officially confirmed the data breach and is currently investigating the incident.
Hackers are believed to have stolen tens of thousands of documents from the US company "Ultra Intelligence & Communications". Around 30 gigabytes of partly sensitive and classified documents are believed to have ended up on the darknet and are therefore generally accessible to the public.
https://www.swissinfo.ch/eng/business/cyberattack-exposes-swiss-air-force-documents-on-the-darknet/49100914
@OUPNarith
👍1
Ukrainian arrested for infecting US cloud provider with cryptomining malware. Here's what you need to know:
1. A Ukrainian hacker was arrested for allegedly infecting a prominent American cloud service provider's servers with cryptomining malware, from which he illicitly mined over $2 million in cryptocurrency over two years.
2. The arrest followed months of collaboration between Ukrainian authorities, Europol, and the cloud provider affected by the attack, demonstrating the importance of global cooperation in combating cybercrime.
3. Cloud services are increasingly being targeted by hackers for cryptomining due to the potential profit and the reduced costs of not having to maintain servers or power supplies. Previous examples include attacks on Amazon Web Services and the distribution of malware through pirated software and JavaScript libraries.
https://www.europol.europa.eu/media-press/newsroom/news/cryptojacker-arrested-in-ukraine-over-eur-1.8-million-mining-scheme
@OUPNarith
1. A Ukrainian hacker was arrested for allegedly infecting a prominent American cloud service provider's servers with cryptomining malware, from which he illicitly mined over $2 million in cryptocurrency over two years.
2. The arrest followed months of collaboration between Ukrainian authorities, Europol, and the cloud provider affected by the attack, demonstrating the importance of global cooperation in combating cybercrime.
3. Cloud services are increasingly being targeted by hackers for cryptomining due to the potential profit and the reduced costs of not having to maintain servers or power supplies. Previous examples include attacks on Amazon Web Services and the distribution of malware through pirated software and JavaScript libraries.
https://www.europol.europa.eu/media-press/newsroom/news/cryptojacker-arrested-in-ukraine-over-eur-1.8-million-mining-scheme
@OUPNarith
This media is not supported in your browser
VIEW IN TELEGRAM
Here's a summary of Scrum framework, incorporating visuals to enhance understanding:
Key Components:
1. Scrum Team:
👉Product Owner: Manages the product backlog, prioritizes features, and communicates customer needs.
👉Developers: Cross-functional team responsible for building the product increments.
2. Scrum Events:
👉Sprint Planning: Team plans work for the upcoming sprint.
👉Daily Scrum: 15-minute daily meeting for team synchronization.
👉Sprint Review: Team demonstrates work to stakeholders and gathers feedback.
👉Sprint Retrospective: Team reflects on the sprint and identifies improvements.
3. Scrum Artifacts:
👉Product Backlog: Prioritized list of features to be developed.
👉Increment: Potentially shippable product at the end of each sprint.
Key Principles:
👉Iterative Development: Work is broken down into small, time-boxed sprints.
👉Transparency: Progress and challenges are visible to everyone.
👉Adaptability: Teams respond quickly to change.
👉Self-Organization: Teams manage their own work.
👉Inspection and Adaptation: Regular feedback cycles ensure continuous improvement.
Benefits:
👉Improved product quality
👉Increased customer satisfaction
👉Faster time to market
👉Greater team productivity
👉Enhanced adaptability to change
@OUPNarith
Key Components:
1. Scrum Team:
👉Product Owner: Manages the product backlog, prioritizes features, and communicates customer needs.
👉Developers: Cross-functional team responsible for building the product increments.
2. Scrum Events:
👉Sprint Planning: Team plans work for the upcoming sprint.
👉Daily Scrum: 15-minute daily meeting for team synchronization.
👉Sprint Review: Team demonstrates work to stakeholders and gathers feedback.
👉Sprint Retrospective: Team reflects on the sprint and identifies improvements.
3. Scrum Artifacts:
👉Product Backlog: Prioritized list of features to be developed.
👉Increment: Potentially shippable product at the end of each sprint.
Key Principles:
👉Iterative Development: Work is broken down into small, time-boxed sprints.
👉Transparency: Progress and challenges are visible to everyone.
👉Adaptability: Teams respond quickly to change.
👉Self-Organization: Teams manage their own work.
👉Inspection and Adaptation: Regular feedback cycles ensure continuous improvement.
Benefits:
👉Improved product quality
👉Increased customer satisfaction
👉Faster time to market
👉Greater team productivity
👉Enhanced adaptability to change
@OUPNarith
❤4
សេចក្ដីជូនដំណឹង
សូមបងប្អូនមានការប្រុងប្រយ័ត្ន! ការឆបោកក្រោមរូបភាព“ប្រាក់-កម្ចីអនឡាញ” ។
ថ្មីៗនេះមានជនខិលខូចមួយចំនួនបានបង្កើតគណនីហ្វេសប៊ុកក្លែងក្លាយ “ក្រោមរូបភាពការផ្តល់កម្ចីប្រាក់តាមអនឡាញ” ដែលមានល្ខណៈងាយស្រួលខ្ចី ដើម្បីទាក់ទាញអោយ បងប្អូនអ្នកប្រើប្រាស់បណ្តាញសង្គមហ្វេសបុកចាប់អារម្មណ៍ និងធ្វើការស្នើសុំខ្ចីលុយពីគណនីហ្វេសបុកក្លែងក្លាយទាំងនោះ ក្រោយមកពួកវាធ្វើជាយល់ព្រមផ្តល់ប្រាក់កម្ចីតាមការស្នើសុំរបស់យើង ដោយតម្រូវឱ្យយើងថតឯកសារមួយចំនួន ដូចជាអត្តសញ្ញាណរបស់ខ្លួន និងតម្រូវឱ្យយើងវេរលុយទៅឱ្យពួកវាជាថ្លៃសេវាផ្សេងៗជាច្រើនលើក ច្រើនសារ តែទីបំផុតប្រាក់កម្ចីក៍មិនបាន ថែមទាំងបាត់បង់លុយដែលបានវេរទៅអោយពួកវាថែមទៀត។
នាយកដ្ឋានប្រឆាំងបទល្មើសបច្ចេកវិទ្យា សូមក្រើនរំលឹកដល់បងប្អូនប្រជាពលរដ្ឋ ដែលមានតម្រូវការប្រាក់កម្ចី ជាពិសេសតាមរយៈអនទ្បាញ សូមមានការប្រុងប្រយ័ត្ន និងពិនិត្យអោយបានល្អិតល្អន់មុននឹងសំរេចចិត្តក្នុងការស្នើសុំកម្ចីពីស្ថាប័នណាមួយ។
@OUPNarith
សូមបងប្អូនមានការប្រុងប្រយ័ត្ន! ការឆបោកក្រោមរូបភាព“ប្រាក់-កម្ចីអនឡាញ” ។
ថ្មីៗនេះមានជនខិលខូចមួយចំនួនបានបង្កើតគណនីហ្វេសប៊ុកក្លែងក្លាយ “ក្រោមរូបភាពការផ្តល់កម្ចីប្រាក់តាមអនឡាញ” ដែលមានល្ខណៈងាយស្រួលខ្ចី ដើម្បីទាក់ទាញអោយ បងប្អូនអ្នកប្រើប្រាស់បណ្តាញសង្គមហ្វេសបុកចាប់អារម្មណ៍ និងធ្វើការស្នើសុំខ្ចីលុយពីគណនីហ្វេសបុកក្លែងក្លាយទាំងនោះ ក្រោយមកពួកវាធ្វើជាយល់ព្រមផ្តល់ប្រាក់កម្ចីតាមការស្នើសុំរបស់យើង ដោយតម្រូវឱ្យយើងថតឯកសារមួយចំនួន ដូចជាអត្តសញ្ញាណរបស់ខ្លួន និងតម្រូវឱ្យយើងវេរលុយទៅឱ្យពួកវាជាថ្លៃសេវាផ្សេងៗជាច្រើនលើក ច្រើនសារ តែទីបំផុតប្រាក់កម្ចីក៍មិនបាន ថែមទាំងបាត់បង់លុយដែលបានវេរទៅអោយពួកវាថែមទៀត។
នាយកដ្ឋានប្រឆាំងបទល្មើសបច្ចេកវិទ្យា សូមក្រើនរំលឹកដល់បងប្អូនប្រជាពលរដ្ឋ ដែលមានតម្រូវការប្រាក់កម្ចី ជាពិសេសតាមរយៈអនទ្បាញ សូមមានការប្រុងប្រយ័ត្ន និងពិនិត្យអោយបានល្អិតល្អន់មុននឹងសំរេចចិត្តក្នុងការស្នើសុំកម្ចីពីស្ថាប័នណាមួយ។
@OUPNarith
👍3❤1
Audio
❤2
💢💢💢សូមមេត្តាប្រុងប្រយ័ត្ន! ព័ត៌មានក្លែងក្លាយ សូមកុំចុចតំណរភ្ជាប់ក្លែងក្លាយប្រភេទនេះ ជាតំណរភ្ជាប់ដែលត្រូវបានជនអនាមិកប្រើប្រាស់ ក្នុងការទាញយកទិន្នន័យផ្ទាល់ខ្លួនរបស់ជនរងគ្រោះ។ ហេតុដូច្នេះសូមសាធារណជនទាំងអស់មេត្តាជ្រាបជាព័ត៌មាន និងកុំធ្វើការចុចលើតំណរភ្ជាប់ខាងលើនេះ ជៀសវាងការបាត់បង់ទិន្នន័យ ឬឯកសារសំខាន់ផ្សេងៗ។
នាយកដ្ឋានប្រឆាំងបទល្មើសបច្ចេកវិទ្យា សូមក្រើនរំលឹកដល់សាធារណៈជនប្រើប្រាស់បណ្តាញសង្គមនានា សូមកុំចុចតំណរភ្ជាប់ទាំងឡាយណាដែលគ្មានប្រភពច្បាស់លាស់ ចៀសវាងការកើតឡើងនូវហនិភ័យផ្សេងៗ៕
https://www.facebook.com/anti.cyber.crime.department/posts/pfbid0njMAasQaAcAs1mQBzq6it9tLxB8skFJgFomHWmVZVuFNQKJTDPpfmyczVz7g4satl
@OUPNarith
នាយកដ្ឋានប្រឆាំងបទល្មើសបច្ចេកវិទ្យា សូមក្រើនរំលឹកដល់សាធារណៈជនប្រើប្រាស់បណ្តាញសង្គមនានា សូមកុំចុចតំណរភ្ជាប់ទាំងឡាយណាដែលគ្មានប្រភពច្បាស់លាស់ ចៀសវាងការកើតឡើងនូវហនិភ័យផ្សេងៗ៕
https://www.facebook.com/anti.cyber.crime.department/posts/pfbid0njMAasQaAcAs1mQBzq6it9tLxB8skFJgFomHWmVZVuFNQKJTDPpfmyczVz7g4satl
@OUPNarith
❤2👍1
ភាពខុសគ្នានៃការវាយប្រហារសាយប័រ និងការវាយប្រហារតាមបែបប្រពៃណី៖
១. ការវាយប្រហារសាយប័រ គឺវាមានទម្រង់ខុសគ្នាទៅនឹងការវាយប្រហារតាមបែបប្រពៃណី។ ការវាយប្រហារតាមសាយប័រគឺប្រើប្រាស់មធ្យោបាយឌីធីថល ឬនិយាយឱ្យខ្លីគឺកុំព្យូទ័រ។ នៅក្នុងលំហរសាយប័រ ការវាយប្រហារអាចធ្វើដំណើរក្នុងល្បឿនពន្លឺ ដោយមិនគិតពីកត្តាភូមិសាស្ត្រ និងព្រំដែននយោបាយ ហើយវាអាចលុកទៅកាន់ទីតាំងជាច្រើនក្នុងពេលតែមួយផងដែរ។
២. ការវាយប្រហារសាយប័រ គឺតែងតែប៉ៈពាល់ដំបូងទៅដល់កុំព្យូទ័រ ឬប្រព័ន្ធកុំព្យូទ័រ ឬទីន្នន័យដែលមានផ្ទុកក្នុងនោះ ទោះបីជាមានគោលដៅបំផ្លាញទីតាំងណាមួយជាក់ស្តែងក៏ដោយ (physical damage)។
៣. ការវាយប្រហារសាយប័រ គឺមានការលំបាកណាស់ក្នុងការចោទប្រកាន់ទៅលើជនបង្ករ ហើយនឹងទំហំនៃការរីកសាយភាយរបស់វា។ ជាមួយនឹងមេរោគកុំព្យូទ័រ អ្នកមានការលំបាកណាស់នឹងកំណត់ថា កុំព្យូទ័រណាមួយចុងក្រោយដែលនឹងទទួលរងគ្រោះ ទោះបីជាអ្នកមានការព្យាករណ៍កំណង់គោលដៅហើយក៏ដោយ។
៤. ការចំណាយភាគច្រើនគឺផ្តោតទៅលើការស្រាវជ្រាវ និងការអភិវឌ្ឍបង្កើតមេរោគថ្មីៗ ដែលមានតម្លៃទាបជាងច្រើនក្នុងការទិញអាវុធយុទ្ធភ័ណ្ឌ។ យើងអាចមានការបង្កើតមេរោគសម្រាប់មុខងារផ្សេងៗគ្នា ដូចជា DDoS សម្រាប់ធ្វើឱ្យគាំងសេវាអនឡាញ ឬឯ Stuxnet សម្រាប់ធ្វើឱ្យខូចខាតដល់ឧបករណ៍សម្រាប់ ចំរាញ់អ៊ុយរ៉ាញ៉ូមមិនដំណើរការជាដើម។
ចុះអ្នកយល់យ៉ាងដូចម្តេច?
https://www.facebook.com/infosecnarith/posts/pfbid023xkRXV6dasB5jWLRH1VsdKVWGaoLbdcXFhW8hPyhcvNnaqUV7JM9hxxjc8NmD7yal
@OUPNarith
១. ការវាយប្រហារសាយប័រ គឺវាមានទម្រង់ខុសគ្នាទៅនឹងការវាយប្រហារតាមបែបប្រពៃណី។ ការវាយប្រហារតាមសាយប័រគឺប្រើប្រាស់មធ្យោបាយឌីធីថល ឬនិយាយឱ្យខ្លីគឺកុំព្យូទ័រ។ នៅក្នុងលំហរសាយប័រ ការវាយប្រហារអាចធ្វើដំណើរក្នុងល្បឿនពន្លឺ ដោយមិនគិតពីកត្តាភូមិសាស្ត្រ និងព្រំដែននយោបាយ ហើយវាអាចលុកទៅកាន់ទីតាំងជាច្រើនក្នុងពេលតែមួយផងដែរ។
២. ការវាយប្រហារសាយប័រ គឺតែងតែប៉ៈពាល់ដំបូងទៅដល់កុំព្យូទ័រ ឬប្រព័ន្ធកុំព្យូទ័រ ឬទីន្នន័យដែលមានផ្ទុកក្នុងនោះ ទោះបីជាមានគោលដៅបំផ្លាញទីតាំងណាមួយជាក់ស្តែងក៏ដោយ (physical damage)។
៣. ការវាយប្រហារសាយប័រ គឺមានការលំបាកណាស់ក្នុងការចោទប្រកាន់ទៅលើជនបង្ករ ហើយនឹងទំហំនៃការរីកសាយភាយរបស់វា។ ជាមួយនឹងមេរោគកុំព្យូទ័រ អ្នកមានការលំបាកណាស់នឹងកំណត់ថា កុំព្យូទ័រណាមួយចុងក្រោយដែលនឹងទទួលរងគ្រោះ ទោះបីជាអ្នកមានការព្យាករណ៍កំណង់គោលដៅហើយក៏ដោយ។
៤. ការចំណាយភាគច្រើនគឺផ្តោតទៅលើការស្រាវជ្រាវ និងការអភិវឌ្ឍបង្កើតមេរោគថ្មីៗ ដែលមានតម្លៃទាបជាងច្រើនក្នុងការទិញអាវុធយុទ្ធភ័ណ្ឌ។ យើងអាចមានការបង្កើតមេរោគសម្រាប់មុខងារផ្សេងៗគ្នា ដូចជា DDoS សម្រាប់ធ្វើឱ្យគាំងសេវាអនឡាញ ឬឯ Stuxnet សម្រាប់ធ្វើឱ្យខូចខាតដល់ឧបករណ៍សម្រាប់ ចំរាញ់អ៊ុយរ៉ាញ៉ូមមិនដំណើរការជាដើម។
ចុះអ្នកយល់យ៉ាងដូចម្តេច?
https://www.facebook.com/infosecnarith/posts/pfbid023xkRXV6dasB5jWLRH1VsdKVWGaoLbdcXFhW8hPyhcvNnaqUV7JM9hxxjc8NmD7yal
@OUPNarith
😱3❤2
បច្ចេកវិទ្យាបញ្ញាសិប្បនិម្មិត ជាសំណុំរឿងធំក្នុងវេទិកាសេដ្ឋកិច្ចពិភពលោកក្រុងដាវូស
https://thmeythmey.com/m/?page=detail&id=133386
@OUPNarith
https://thmeythmey.com/m/?page=detail&id=133386
@OUPNarith