{"id":3798,"date":"2010-12-08T04:58:00","date_gmt":"2010-12-08T03:58:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=3798"},"modified":"2024-08-29T12:27:26","modified_gmt":"2024-08-29T10:27:26","slug":"how-to-perform-information-security-risk-assessment-efficiently","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/how-to-perform-information-security-risk-assessment-efficiently\/","title":{"rendered":"\u5982\u4f55\u9ad8\u6548\u5730\u6267\u884c\u4fe1\u606f\u5b89\u5168\u98ce\u9669\u8bc4\u4f30"},"content":{"rendered":"\n
atsec\u9ad8\u5411\u4e1c<\/strong><\/p>\n\n\n\n \u5173\u952e\u8bcd\uff1a<\/strong>PCI DSS<\/p>\n\n\n\n \u672c\u6587\u4e3aatsec\u548c\u4f5c\u8005\u6280\u672f\u5171\u4eab\u7c7b\u6587\u7ae0\uff0c\u65e8\u5728\u5171\u540c\u63a2\u8ba8\u4fe1\u606f\u5b89\u5168\u7684\u76f8\u5173\u8bdd\u9898\u3002\u8f6c\u8f7d\u8bf7\u6ce8\u660e\uff1aatsec\u548c\u4f5c\u8005\u540d\u79f0\u3002<\/p>\n\n\n\n …<\/p>\n\n\n\n