版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Cisco
CybersecurityReadiness
IndexResilience
ina
Hybrid
WorldMarch2023ContentsExecutiveSummaryBenchmarking
ReadinessProtectingIdentity368ProtectingDevices10121416182021ProtectingNetworksProtectingApplication
WorkloadsProtectingDataIndustry
and
SizeMattersConclusionAbout
theResearchCiscoCybersecurityReadinessIndexResilienceinaHybridWorld2Executive
SummaryIn
apost
COVIDworld,therequirementsofcybersecurityhavechangedas
thelandscape
forbusinesses
hasbeenspunonits
head.Organizationshavemovedfromanoperatingmodel
thatwaslargelystatic
–wherepeople
operatedfromsingledevicesfromone
location,connectingtoastatic
network
–toahybridworldinwhichweincreasinglyoperatefrommultipledevicesinmultiplelocations,connecting
tomultiple
networks.While
thereis
broadconsensusthatthemovetohybridis
heretostay,its
long-termsuccess
hingesgreatlyonorganizations’ability
tosafeguardthemselvesagainst
newand
rapidly
evolvingthreats.Set
against
this,
wewanted
to
understand
how
readyorganizations
around
the
world
are
to
meet
these
modernsecurity
challenges.
To
do
this,
we
developed
the
CiscoCybersecurity
Readiness
Index.
It
categorizes
companiesinto
four
stages
ofreadiness:
from
Beginner,
to
Formative,Progressive,
and
finally
Mature,
based
on
their
preparednessacross
five
keypillars
and
the
state
ofdeployment
of19security
solutions
within
those.
More
details
on
the
scoringmethodology
can
be
found
in
the
following
section.Amere
15%
of
organizationsgloballyaredeemedto
have
amaturelevel
of
preparednessto
handlethesecurityrisksofourhybridworld.The
Global
Cybersecurity
Readiness
GapThe
resultsarestark:
accordingtotheindex,amere15%oforganizationsgloballyaredeemedtohaveamatureCiscoCybersecurityReadinessIndexResilienceinaHybridWorld3levelofpreparednesstohandlethesecurity
risks
ofourhybridworld.Mapping
Readiness
Around
the
WorldAs
youmightexpect,therearevariationsinprivatecompanycybersecurity
readinessacrossmarkets,but
notinthewaywemightordinarilyexpect.In
ourindex,privatesectorcompaniesinless
developednationsoutperformtheirpeers
inwealthiercountriesbyaconsiderablemargin,especiallyinAsia-Pacificand
theAmericas.This
is
despite
most
companies
being
awarethatthe
threatis
real.Fouroutoffive(82%)
security
leaders
wespoketogloballybelievecybersecurity
incidentsarelikelytodisrupttheirbusinesses
overthe
next12
to24
months.And
theconsequencesofnotbeingpreparedhaveneverbeengreater.Almost
60%ofrespondentssaid
theyhadexperiencedsome
kind
ofcybersecurity
incidentinthelast
12
months.The
incidentscost
71%
oforganizationsaffectedatleast
US$100,000,with
41%
sayingtheoverallcost
wasUS$500,000or
more.In
the
Americas,
Brazil
stands
outas
thecountry
wherecompaniesaremost
readytotackle
today’ssecuritychallenges,with
26%ofcompaniesconsideredinamaturestage
ofpreparedness.Meanwhile,companiesinCanada(9%
inMaturestage),theUSA(13%
inMaturestage)andMexico(12%
inMaturestage)demonstratelowlevelsofreadiness
comparedtothe
globalaverage.We
haveanalarming
cybersecurity
readiness
gap,and
it’sonly
goingtowidenifglobalbusiness
and
security
leadersdon’tpivotquickly.In
Asia-Pacific,organizationsinIndonesia
(39%
inMaturestage),thePhilippines,and
Thailand
(27%
eachinMaturestage)topthechart
bothregionallyand
globally.On
theotherhand,companiesinrichercountrieslikeJapan
(5%inMaturestage)and
South
Korea
(7%
inMaturestage)arelanguishingatthebottom.Almost60%ofrespondents
saidthey
hadexperiencedsomekindofcybersecurityincidentinthelast12
months.Markets
most
mature
in
their
overall
cybersecurity
readinessMature
stage39%Indonesia27%The
Philippines27%Thailand26%BrazilThis
variancecouldbe
largelyexplainedbythefact
thatcompaniesinemergingmarketsstarted
theirdigitizationjourneysmorerecentlycomparedtotheirpeers
indevelopedmarkets.Thatmeansmanyofthese
companiesdo
nothavelegacysystemsholdingthemback,making
itrelativelyeasiertodeployand
integratesecurity
solutionsacrosstheirentireIT
infrastructure.While
awarenessofsecurity
risks
and
theirimpacton
business
has
neverbeenhigher,thisfindinghighlightsthat‘techdebt’
continuestobe
amajordriverofthereadinessgap.This
trendis
notseenacrossEurope,though,wherecompaniesarelaggingtheglobalaverageon
readiness.CiscoCybersecurityReadinessIndexResilienceinaHybridWorld4In
almostallcountriesless
than10%
ofcompaniesaredeemedmatureenoughtotackle
today’scybersecurityissues.
The
UK
and
Germany
aretwo
exceptions,with17%
and
11%
companiesinamaturestateofreadinessrespectively.ratherthanlater.Giventheenvironmentthatbusinessesoperateinand
thecurrentreadinessgap,a12-month
waitis
fartoolong.As
these
companiesinvestintheircybersecurityreadiness,confidenceintheirability
tostayresilientwillimprove.Of
thecompaniesthatwererankedMature,53%said
theywere‘very
confident’
intheability
tostayresilientagainst
potentialcyberattacks
inthenext12
to24
months.On
theotherhand,only
30%ofcompaniesintheBeginnerstage
and
34%
intheFormativestage
said
thesame.ReadinessbySize
and
IndustryReadiness
varies
across
company
sizes
in
an
interestingway.The
data
shows
that
globally
mid-sized
firms
ofbetween
250and
1,000employees
are
best
prepared,with
over
19%
ofsuch
firms
at
a
mature
stage
ofoverallreadiness
compared
to
17%
oflarger
businesses
(1,000+employees).This
suggests
that
while
larger
organizationsmay
have
bigger
budgets,
they
typically
require
morecomplex
deployments,
which
can
take
longer
toimplement.But
as
theydeploybudgets,companiesdo
needtothinkabout
security
differently.Because
threatsareeverywhere,stand-alonesecurity
strategiesareno
longereffective;theyfocustoomuchon
threatprevention,createsiloesthatcan
be
exploited,and
don’taccountforthefullbusiness
impact.Smallerorganizationsarethe
least
well-preparedwithjust
10%
beingmatureintheirreadiness.While
thisis
notsurprising,it
is
anareaofconcern,as
smallcompaniesfallingbelowthis‘security
poverty
line’bring
wide-reachingexternalities–they’reincreasinglypart
ofsupplychainsoflargerorganizations,making
themanattractivetargetformaliciousactors.In
today’shyper-connectedworld,it
is
critical
toensurethereareno
weaklinksthatbad
actors
can
exploit.What
organizationsneed
is
security
resilience,wheresecurity
is
foundationaltobusiness
strategyand
iscollectivelyprioritizedthroughoutthe
organization,allowingcompaniestobetter
anticipatethreatsandbouncebackfasterwhenathreatbecomes
real.Mostorganizationsarealreadythinking
about
resilienceintheirfinancial,operational,organizational,and
supplychainfunctions.Security
resiliencecuts
across
allofthem.Resilienceis
about
verifying
threats,understandingconnections
across
the
organization,and
seeingthe
fullcontextofanysituationsoteamscan
prioritizeand
ensuretheirnextaction
is
the
best
one.Of
course,readinessis
alsodependenton
thetypeofindustry
inwhichourrespondentsworkin.Thoseinsectorswith
themost
tolose
tendtohavemorecompaniesintheMaturestateofreadiness,includinghealthcare(18%)
and
financialservices
(19%).
However,itis
retail,with
21%
oforganizationsintheMaturecategory,thatcomesouton
top.This
likelyreflectsthesubstantialnumberofcyberattacks
thisindustry
has
facedovertheyears,as
bad
actors
regularlytargetthepersonal
andfinancialdata
heldbythese
organizations.Forbusiness
leaders
tobuildsecureand
resilientorganizations,theymust
establish
abaselineofhow‘ready’theyareacrossthefivemajorsecurity
pillars.Thematurity
ofsecurity
infrastructure,particularly
inrelationtolocal
and
globalpeers,
willhelporganizationsidentifywhatareastheyarestronginand
wheretheycan
bestprioritizeresourcestoimprovetheirability
tobe
resilient.Our
hope
is
thatthisCybersecurity
ReadinessIndexwillact
as
awake-upcallforseniorbusiness
leaders.Closingthecybersecurity
readinessgapmust
become
aglobalimperative.We
cannotaffordtofallfurther
behindas
theshift
tohybridcontinuestoaccelerate.The
impactonbusinesses,
customersand
society
willonly
increaseamidanexplosionofhybridthreatvectorsand
anincreasinglycomplexthreatlandscape.While
some
progress
has
beenmade,notenoughfirms
arecybersecurity-readytotakeonthechallengesthatourhybridworldhas
created.Closing
the
Cybersecurity
Readiness
Gap–Our
Global
Security
Resilience
ImperativeWhile
thecybersecurity
readiness
gapmaybe
alarminglylarge,businesses
arenotstanding
still.Security
leaders
areawareoftherisks
and
arekeentoinvestintheircybersecurity
readiness:86%oforganizationshaveplans
toincreasetheircybersecuritybudgetbymorethan10%
overthenext12
months.It
iscrucialthatthese
budgetincreasesaredeliveredsoonerCiscoCybersecurityReadinessIndexResilienceinaHybridWorld5Benchmarking
ReadinessWhile
most
ofus
arebroadlyawareoftheincreasedsecurity
risks
broughtabout
bythemovetohybridworking,whatisn’twidelyunderstood
is
howreadyorganizationsaretoface
those
risks.We
askedrespondentswhethertheircompanieshadsolutionsinplace
tomeetthechallengesofeachpillar,andhowfaralongtheyweretowardsfulldeployment.The
data
wasthenorganizedand
categorizedintoastateofreadiness,whererespondentswererankedfromBeginner,toFormative,Progressive,and
finallyMaturebasedon
theweightedscoresofeachpillarreflectingtheirimportance:
network
(25%);
identity
(20%);
devices(20%);data
(20%);
and
applicationworkloads
(15%).Cisco’sCybersecurity
ReadinessIndexis
anewwayofassessing
howreadybusinesses
are.It
is
sourced
from
a
double-blind
survey
of6,700
privatesector
cybersecurity
leaders
in
27global
markets.
Theindex
is
based
on
five
pillars:
Identity,
Devices,
Network,Application
Workloads,
and
Data.
Fromwithin
those
pillars,weexamined
19
different
solutions
required
to
address
them.Afullerexplanationofthemethodologycan
be
foundattheendofthisreport.IdentityDevicesNetworkApplicationWorkloadsDataIn
the
hybrid
workThere
are
two
aspects
tothis.
First
are
the
devicesthat
employees
use
to
logon
to
a
company
network.These
can
be
both
officialand
personal.
Second
areother
devices
within
theinfrastructure
–
rangingfrom
security
camerasto
smart
printers,
whichare
all
connected
to
thenetwork.
Companies
needcapabilities
to
verify
thesedevices
and
protect
themfrom
being
accessed
bybad
actors.In
today’swayofworking,the
network
lies
at
theheart
ofacomprehensiveapproach
tosecurity
giventhat
people,
devices,
data,and
applications
all
moveacross
it.
Safeguarding
thenetwork
from
maliciousactors,
insider
threats,
andthird-party
risks
is
criticaltothe
viability
oftheAs
companies
movesomeor
all
oftheir
operationstothe
cloud,
they
arealso
experiencing
ashiftin
the
waythey
manageand
deploy
applications.Fromcontainerization
toserverless
architectures,and
microservices,protecting
applicationworkloads
is
crucial
intoday’sdigital
landscape.Attacks
against
theseplatforms
and
servicescan
lead
tosensitiveOften
described
asenvironment,
it
is
criticalfor
companies
tobe
abletoverify
the
identity
ofeveryone
who
tries
toaccess
network
resourcesand
information.
One
canargue
that
this
is
the
firstline
ofdefence
from
asecurity
perspective.‘newcurrency,’data
hasemerged
as
one
ofthemost
valuable
assets
forbusinesses.
It
is
critical
fororganizations
toprotectdata
from
unauthorizedaccess,
use,
disclosure,disruption,
modification,or
destruction.
With
theincreasing
amount
ofsensitive
informationbeing
stored
and
sharedelectronically,
robustsecurity
capabilities
andmeasures
are
foundationaltoachieving
thiscompany.data
breaches,
lossofproductivity,
andirreparable
damage
toanorganization’s
reputation.protection.CiscoCybersecurityReadinessIndexResilienceinaHybridWorld6Based
on
theoverallscore,organizationsarecategorizedintoone
offourstages
ofreadiness:•Beginner(Lessthan10):
Organizationsatthe
initialstages
ofdeploymentofsolutions.•Formative
(11
–44):
Organizationsthathavesomelevelofdeploymentbut
performing
belowaverageoncybersecurity
readiness.•Progressive(45
–75):
Organizationswith
considerablelevelofdeploymentand
performing
aboveaverageoncybersecurity
readiness.•Mature(76
and
higher):
Organizationsthathaveachievedadvancedstages
ofdeploymentand
aremostreadytoaddress
security
risks.Looking
at
the
overall
picture,
nearly
half
ofour
respondents(47%)
and
their
organizations
fall
into
the
Formativecategory,
where
they
have
taken
some
ofthe
much-neededsteps
toprotect
themselves
but
cannot
be
classified
asready
tomeet
the
challenges
ofour
new
hybrid
world.Progressives
form
the
next
largest
cohort
at
30%.Nearlyhalfof
ourOnly
15%
fall
into
the
Mature
category,
with
a
high
level
ofreadiness.
Less
than
one
in
ten
(8%)
are
in
the
Beginnercategory,
representing
the
first
step
on
the
readiness
ladder.respondents(47%)
andtheirorganizationsfall
into
theFormative
category,
wherethey
have
taken
someof
themuch-needed
steps
to
protectthemselvesbutcannotbeclassifiedasreadyto
meetthechallenges
of
ournewhybridworld.This
report
representsthefirst
study
ofits
kind
andprovidesacomprehensivecybersecurity
readinessassessment
forcompanies
across
27
marketsglobally.Overall
cybersecurity
readiness
of
organizations
globally15%Mature30%Progressive47%Formative8%BeginnerCiscoCybersecurityReadinessIndexResilienceinaHybridWorld7Protecting
IdentityTraditionally,cybersecurity
operations
focuson
creatingastrongperimetertokeepoutthreats.The
assumptionbeingthatanyonewhowas‘insidethewire’wasauthorizedtobe
there.However,inthehybridworkingmodel,data
can
be
spreadacross
limitless
services,devices,applications,and
users,
making
traditionalperimeterapproachesinadequate.movedtoremoteand
hybridworkarrangements,manyhavestarted
toadd
asecondlayerofverification.TheseareIntegratedIdentity
and
AccessManagement(IAM)solutions,suchas
MultifactorAuthentication,whereevenwhenauserenterstherightusernameand
passwordcombination,theyarethengivenasecondprompttoprovethattheyarewhotheysaytheyare.This
callsforanewsecurity
strategywhereno-oneandnothingis
trusted
untiltheiridentity
has
been
proactivelyverified.Our
researchunderlinesthechallenge:aquarter(24%)
ofallrespondentsrankedIdentity
Managementasthenumberonerisk
forcyberattacks.Giventhatidentity
managementis
rankedbyourrespondentsas
thenumberonerisk,
it
is
no
surprise
that95%haveimplementedsome
kind
ofidentity
managementsolution,with
IAM
provingmost
popular,with
two-thirdssayingtheyhavedeployedthese
solutions.Foryears,companieshavereliedonidentity
managementsolutionslikeData
Stores,whichareastorageofthingslikeidentity
ofaperson,theirusername,and
theirpassword.Aperson
uses
these
tologin,and
iftheymatch,theyaregrantedentry.However,as
companieshaveSome
companiesareadding
yetanotherlayerofsecuritytoidentity
management–Privileged
AccessManagement.This
is
where,evenafter
thefirst
two
layersofidentityverification,access
is
grantedbasedonpre-assignedprivileges,
suchas
the
user’srolewithin
thecompany,theCiscoCybersecurityReadinessIndexResilienceinaHybridWorld8devicetheyareusingtolog
in,and
thelocation
theyarelogginginfrom.The
good
newsis
thatforalltheidentitymanagementsolutions
–TraditionalData
Stores,IAM
andPrivileged
AccessManagement–ourrespondentsarewellprogressed
with
most
havingfullydeployedwhicheversolutiontheyhavedecidedtouse.However,it
is
ofconcernthatforthosethathavenotyetrolledoutidentity
solutions,morethantwo
thirds(69%)said
theyhaveno
intentiontodo
so.Forthosethatdointendtorolloutidentity
solutions,most
willtakefromonetoas
manyas
fiveyearstocompletetheirimplementation.Giventhatidentitymanagementisranked
by
ourrespondentsasthenumberonerisk,itisnosurprisethat95%
have
implementedsomekindof
identitymanagementsolution,withIntegrated
IdentityandAccessManagementprovingmostpopular.Overall,companiesneedtostepupfurther
tomeetthechallengeofidentity
verification.Despitetheclearthreatpresentedbyidentity
management,most
ofourrespondentsareattheFormative(38%)
or
Beginner(20%)stage.Only
20%fallintotheMaturecategory,with
afurther
22%intheProgressivesegment.Surprisingly
it
ismarketsthatarebiggerand
morematurethatlagwith
theNetherlands(31%),
France(35%)
and
Japan(50%)
showingthehighestpercentageofBeginners.Readiness
to
protect
identity20%Mature22%Progressive38%Formative20%BeginnerCiscoCybersecurityReadinessIndexResilienceinaHybridWorld9Protecting
DevicesLonggone
arethedayswhenemployeesaccessed
acorporatenetwork
fromasingledesktop
PC.The
needtoaccess
data
on
themoveand
inavariety
offormshascreatedanexplosioninthenumberofdevicesemployeesuse.The
pandemichas
alsoadded
tothelist
ofdeviceswealluseregularlywith
cameras
and
microphones,forexample,helpingmakevideo
conferencingabetterexperience.Forourrespondents,protectingdevicesranksthirdoutoffiveintheirlist
ofrisk
potential,behindidentitymanagementand
thenetwork
itself.It
alsoseemstobeless
challengingformost
with
it
ranking
thirdon
theirlistfordifficulty.Threequarters
(73%)
ofourrespondentshavechosentouse
enhancedanti-virussolutions
as
theirkeysolution
toprotectdevices.Building
protectionsintotheoperatingsystem,suchas
host
controls,is
anotherwayorganizationsareprotectingtheirdevices,with
65%sayingtheyhavedeployedthistype
ofsolution.Endpointprotectionplatforms
–firewalls,malware,and
processvisibility
etc.–rank
thirdinthesolutionscompanieshavedeployed.However,employeedevicesarenottheonly
thingsaccessing
networks
and
data.Everything
fromsoilmoisturedetectorstoplantmachinery,and
evendoorsecurity
systemsareconnectedtocorporatenetworks,providingimportant
and
insightful
data.Whateverthedevice,it
needstobe
protected.We
haveseensignificantdata
breachesinthepast
originatingfromunprotecteddevices.However,therearetwo
keytrendstotakenoteof.
Firstly,thescale
ofdeploymentis
partial.
This
is
why,
despiteahighnumberofrespondentssayingtheyhavetheseCiscoCybersecurityReadinessIndexResilienceinaHybridWorld10solutionsintheirposture,morethanhalf(56%)
ofthecompaniesareeitheratthevery
start
oftheirjourney,oronly
ashort
waydownthepath.The
secondis
thatamongthosewhodo
nothavethesesolutions
intheirposture,devicemanagementdoes
notseemtorank
highinthe
list
ofcybersecurity
priorities.
Twothirdsofthese
respondentssaid
theirorganizationhas
noplans
atalltodeployasolution.This
showsthatthereis
considerable
workformanytodotoensurethatdevicesdo
notbecome
thevulnerablepointintheircybersecurity
strategy.Japanis
languishingatthebottom
ofthereadinessleaguetable
with
56%ofits
companiesfallingintotheBeginnercategory.NewZealand(45%)
and
South
Korea(48%)
donotfaremuchbetter
and
companiesinallthreecountriesshouldtakenoteofthepotentialrisks
theyrun
iftheydonotacceleratetheirdevicesecurity
strategy.The
risks
areparticularly
acuteinJapanwith
80%ofcompaniesstillnotplanningtodo
soforatleast
12
monthsand
many(60%)arestilltosecurethebudgetforthese
programs.By
contrast,Indonesia
is
along
wayinfrontofthereadinessstakeswith
threeoutoffivecompanies(59%)fallingintotheMaturecategory.Brazil(45%)
and
SouthAfrica
(44%)
areothernotable
performers.Despite
ahigh
numberofrespondentssayingthey
havethesesolutionsin
theirposture,morethanhalf(56%)
of
thecompanies
are
eitherat
theverystart
of
theirjourney,oronlyashortway
downthepath.Readiness
to
protect
devices31%Mature13%Progressive28%Formative28%BeginnerCiscoCybersecurityReadinessIndexResilienceinaHybridWorld11Protecting
NetworksGlobally,cyberattacks
areon
therise.Fromtelecomstotechnologyorganizationsand
retailers,attacks
haveleftnetworks
vulnerabletoexploitation.The
result:billionsofdata
setshavebeenexposedacrosstheworld.Fortunately,
our
respondents
recognize
the
risk;
networkprotection
ranks
second
in
the
list
oftheir
top
five
priorities.Most
haveoptedtousefirewallswith
built-inIntrusionPreventionSystems(IPS).
More
thantwo-thirds(69%)
offirms
inoursurvey
said
theyhad
deployedthiscapability,with
network
segmentationpolicies
based
on
identityranking
numbertwo
(61%
said
theyhavedeployedthis),and
Network
BehaviorAnomaly
detectiontoolsclosebehindat60%.PacketCaptureand
SensorTools,though,comeadistant
fourth
at31%.Atthelast
count,therehad
beenmorethan4,000publiclydiscloseddata
breaches
inthefirst
threequarters
of20221alone–asignificantincreaseon
thepreviousyear.
Andthelikelihoodis
thatthisis
just
thetipoftheiceberg–withthousands
moredata
breachestaking
place
inless
well-knownorganizations.Today’s
hybrid
working
environment
calls
for
flexibility
not
only
inthe
number
and
type
ofdevices
that
employees
use,
but
also
inwhere
they
log
in
from,
and
where
the
data
they
need
to
accessis
stored
and
processed.
The
growth
ofcloud
strategies
–
abedrock
ofhybrid
working
–
means
that
employees
need
tobe
able
to
roam
across
multiple
networks
throughout
their
day,rendering
the
network
more
vulnerable
to
cyberattacks.However,theissue
is
thatthescale
ofdeploymentis
notkeepingpace.Of
thosecompaniesthathavefirewallswithbuilt-inIPS,only
56%havefullydeployed,and
only
64%ofcompanieshavefullydeployednetwork
segmentationpolicies.1.
/attacks/articles/the-biggest-data-breaches-and-leaks-of-2022CiscoCybersecurityReadinessIndexResilienceinaHybridWorld12Regardlessofwherecompaniessit
intheirdeployment,and
whichtechnologytheyuse,therearesome
very
realissues
highlightedbyourindexwhichshowsthatdespitecompaniesratingnetwork
protectionas
theirnumbertwopriority,most
(56%)
areeitherintheFormativeorBeginnercategory
and
just
19%
sit
intheMaturecategory
–themost
advancedstateofreadiness.The
problemis
most
acuteinJapanwhere82%ofbusinesses
fallintotheleast
preparedcategories.HongKongand
Italy
arenottoofarbehindwith
72%
intheFormativeor
Beginnerclassification.By
contrast,some
oftheless
developednationsinourresearcharemost
readytoprotecttheirnetwork.
Perhapsthisstemsfromtherecognitionthatfailingtoprotecttheirnetworks
presentsanexistentialthreat.Whateverthetrigger,though,Indonesia
topsthereadiness
rankingswith
seveninten(69%)
fallingintothetoptwo
categories.Thailand
is
secondbest
preparedwith
six
inten(60%)readytomeetthethreat.This
shouldbe
aclearsignaltoCISOs,CTOsand
evenCEOst
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 三、连通器教学设计初中物理北师大版北京八年级全一册-北师大版北京2013
- 建筑工程图概述教学设计中职专业课-建筑识图与构造-建筑类-土木建筑大类
- 第9课 对外开放(教学设计)2023-2024学年八年级历史下册同步教学设计(统编版)
- 宠物医院管理公司毒麻药品专项管理制度
- 第18课 杭州和西湖教学设计-2025-2026学年小学地方、校本课程浙教版人·自然·社会
- 高教版·第四版教学设计-2025-2026学年中职中职专业课职业素养公共课程
- 第28课 近现代的职业教育教学设计中职历史中国历史高教版
- 海鲜汤类制作教学设计中职专业课-西餐热菜制作-中餐烹饪-旅游大类
- 赣美版三年级下册第4课 瓜果飘香教学设计及反思
- 地理必修 第二册第三节 城镇化进程及其影响教案
- 110kV-GIS安装专项方案内容
- AQ-T 2081-2023 金属非金属矿山在用带式输送机安全检测检验规范
- 犹太复国主义
- 销售培训:利用故事营造销售情境
- 绿色建材评价 室内木门
- 漫画人物表情画法
- 贵州省情教程 第一章 特殊的地理环境
- 给水管道施工专项方案
- 《劳动合同书》范本下载
- 危大工程验收记录表(其它工程)
- 《灭火器维修》GA95-2015(全文)
评论
0/150
提交评论