




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
X-ForceThreat
IntelligenceIndex
2023
IBMSecurity
Tableofcontents
01→
Executivesummary
07→
Cyber-relateddevelopments
ofRussia’swarinUkraine
12→
Recommendations
02→
13→
Reporthighlights
08→
Themalwarelandscape
About
us
03→
14→
Keystats
09→
ThreatstoOTandindustrial
Contributors
04→
Topinitialaccessvectors
controlsystems
15→
Appendi
x
10→
05→
Topactionsonobjective
s
Geographictrends
11→
06→
Topimpacts
Industrytrends
3
01
Executivesummary
includesbillionsofdatapointsrangingfromnetworkandendpointdevices,incidentresponse(IR)engagements,vulnerabilityandexploitdatabasesandmore.ThisreportisacomprehensivecollectionofourresearchdatafromJanuaryto
December2022.
WeprovidethesefindingsasaresourcetoIBMclients,cybersecurityresearchers,policymakers,themediaandthe
largercommunityofsecurityindustryprofessionalsandindustryleaders.Today’svolatilelandscape,withitsincreasinglysophisticatedandmaliciousthreats,requiresacollaborativeefforttoprotectbusinessandcitizens.Morethanever,youneedtobearmedwiththreatintelligenceandsecurityinsightstostayaheadof
attackersandfortifyyourcriticalassets.
Soyoutoocanthrive.
Theyear2022wasanothertumultuous
oneforcybersecurity.Whiletherewasno
shortageofcontributingevents,amongthe
mostsignificantwerethecontinuingeffects
ofthepandemicandtheeruptionofthe
militaryconflictinUkraine.Disruption
made2022ayearofeconomic,geopolitical
andhumanupheavalandcost—creating
exactlythekindofchaosinwhich
cybercriminalsthrive.
Andthrivetheydid.
IBMSecurity?X-Force?witnessed
opportunisticthreatactorswhocapitalize
ondisorder,usingthelandscapetotheir
advantagetoinfiltrategovernmentsand
organizationsacrosstheglobe.
TheIBMSecurityX-ForceThreat
IntelligenceIndex2023tracksnewand
existingtrendsandattackpatternsand
3
Nextchapter
01Executivesummary
Howourdataanalysischanged
for2022
In2022,wemodifiedhowweexaminedportionsofourdata.Thechangesallowustooffermoreinsightfulanalysisandalignmorecloselytoindustrystandardframeworks.That,inturn,enablesyoutomakemoreinformedsecuritydecisionsandbetterprotectyourorganizationfromthreats.
Changestoouranalysisin2022included:
–Initialaccessvectors:AdoptingtheMITREATT&CKframeworktotrackinitialaccessvectorsmorecloselyalignsourresearchfindingswiththebroadercybersecurityindustryandallowsustoidentifyimportanttrendsatthetechniquelevel.
–Exploitsandzerodaycompromises:
Extrapolatingfromourrobust
vulnerabilitydatabase—whichincludes
nearly30yearsofdata—helpslend
contexttoouranalysisandidentifythe
actualthreatposedbyvulnerabilities.
Thisprocessalsolendscontexttothe
diminishingproportionofweaponizable
exploitsandimpactfulzerodays.
–Threatactormethodsandtheirimpact:Uncouplingthestepsthreatactorstakeduringanattackfromtheactualimpactofanincidentallowedustoidentifycriticalstagesofanincident.Thisprocess,inturn,uncoveredareasthatrespondersshouldbepreparedtohandleintheaftermathofanincident.
Nextchapter
4
02
Reporthighlights
Topactionsonobjectivesobserved:
Inalmostone-quarterofallincidentsremediatedin2022,thedeploymentofbackdoorsat21%wasthetopactiononobjective.Notably,anearlyyearspikeinEmotet,amultipurposemalware,contributedsignificantlytothejumpinbackdooractivityobservedyearoveryear.Despitethisspikeinbackdooractivity,ransomware,whichheldthetopspotsinceatleast2020,constitutedalargeshareoftheincidentsat17%,reinforcingtheenduringthreatthismalwareposes.
extortion,ascybercriminalscontinuedthe
trendofexploitingastrainedindustry.
Phishingwasthetopinitialaccessvector:
Phishingremainstheleadinginfection
vector,identifiedin41%ofincidents,
followedbyexploitationofpublic-facing
applicationsin26%.Infectionsby
maliciousmacroshavefallenoutoffavor,
likelyduetoMicrosoft’sdecisiontoblock
macrosbydefault.MaliciousISOandLNK
filesuseescalatedastheprimarytacticto
delivermalwarethroughspamin2022.
modernwarfare.Althoughthedirestcyberspacepredictionshaven’tcometofruitionasofthispublication,therewasanotableresurgenceofhacktivismanddestructivemalware.X-Forcealsoobservedunprecedented
shiftsinthecybercriminal
world
withincreasedcooperationbetweencybercriminalgroups,andTrickbotgangstargetingUkrainianorganizations.
Extortionwasthemostcommonattackimpactonorganizations:At27%,extortionwastheclearimpactofchoicebythreatactors.Victimsinmanufacturingaccountedfor30%ofincidentsthatresultedin
Increaseinhacktivismanddestructive
malware:Russia’swarinUkraine
openedthedoortowhatmanyinthe
cybersecuritycommunityexpectedto
beashowcaseofhowcyberenables
Previouschapter
Nextchapter
5
03
Keystats
27%
Percentageofattackswithextortion
Threatactorssoughttoextortmoneyfromvictimsinmorethanone-
quarterofallincidentstowhichX-Forcerespondedin2022.The
tacticstheyusehaveevolvedinthelastdecade,atrendexpectedto
continueasthreatactorsmoreaggressivelyseekprofits.
2
1%
Shareofincidentsthatsaw
backdoorsdeployed
Deploymentofbackdoorswasthetopactiononobjectivelastyear,
occurringinmorethanoneinfivereportedincidentsworldwide.
Successfulinterventionbydefenderslikelypreventedthreatactors
fromfulfillingfurtherobjectivesthatmayhaveincludedransomware.
17%
Ransomware’sshareofattacks
Evenamidachaoticyearforsomeofthemostprolificransomware
syndicates,ransomwarewasthesecondmostcommonactionon
objective,followingcloselybehindbackdoordeploymentsand
continuingtodisruptorganizations’operations.Ransomware’sshare
ofincidentsdeclinedfrom21%in2021to17%in2022.
Previouschapter
Nextchapter
6
03Keystats
41%
Percentageofincidentsinvolvingphishingforinitialaccess
Phishingoperationscontinuedtobethetoppathwaytocompromisein2022,with41%ofincidentsremediatedbyX-Forceusingthistechniquetogaininitialaccess.
62%
Percentageofphishingattacksusingspearphishingattachments
Attackerspreferredweaponizedattachments,deployedbythemselvesorincombinationwithlinksorspearphishingviaservice.
100%
Increaseinthenumberofthread
hijackingattemptspermonth
Thereweretwiceasmanythreadhijackingattemptspermonthin2022,comparedto2021data.SpamemailleadingtoEmotet,QakbotandIcedIDmadeheavyuseofthreadhijacking.
26%
Shareof2022vulnerabilitieswith
knownexploits
Twenty-sixpercentof2022’svulnerabilitieshadknownexploits.AccordingtodatathatX-Forcehastrackedsincetheearly1990s,thatproportionhasbeendroppinginrecentyears,showcasingthebenefitofawell-maintainedpatchmanagementprocess.
52%
Dropinreportedphishingkitsseekingcreditcarddata
Almosteveryphishingkitanalyzedinthedatasoughttogathernamesat98%andemailaddressesat73%,followedbyhomeaddressesat66%andpasswordsat58%.Creditcardinformation,targeted61%ofthetimein2021,felloutoffavorforthreatactors—datashowsitwassoughtinonly29%ofphishingkitsin2022,a52%decline.
31%
ShareofglobalattacksthattargetedtheAsia-Pacificregion
Asia-Pacificretainedthetopspotasthemost-attackedregionin2022,accountingfor31%ofallincidents.ThisstatisticrepresentsafivepercentagepointincreasefromthetotalshareofattackstowhichX-Forcerespondedintheregionin2021.
Previouschapter
Nextchapter
7
Tpiitilt2022
8
04
Topinitialaccessvectors
Topinitialaccessvectors2022
Exploitpublic-facingapplication
Phishing-Spearphishingattachment
26%
25%
Phishing-Spearphishinglink
Externalremoteservices
Validaccounts-Local
Validaccounts-Domain
Hardwareadditions
Validaccounts-Default
Phishing-Spearphishingviaservice
Validaccounts-Cloud
14%
12%
7%
In2022,X-Forcemovedfromtracking
initialaccessvectorsasbroadercategories,
suchasphishingandstolencredentials,to
theinitialaccesstechniqueslistedwithin
the
MITREATT&CKMatrix
forEnterprise
framework.ThisshiftallowsX-Forceto
trackimportanttrendsmoregranularlyat
thetechniquelevel.Italsoprovidesmore
readilyconsumableandcross-comparable
dataandalignswiththebroaderindustry’s
standardizationefforts.
5%
3%
2%
2%
2%
Figure1:TopinitialaccessvectorsX-Forceobservedin2022.Source:X-Force
Nextchapter
8
Previouschapter
04Topinitialaccessvectors
Phishing
Phishingtypeseenas%oftotalphishingcases
5%
33%
PhishingLinkAttachment
viaservice
62%
Phishing(T1566)
,whetherthroughattachment,linkorasaservice,remainstheleadinfectionvector,whichcomprised41%ofallincidentsremediatedbyX-Forcein2022.Thispercentageholdssteadyfrom
2021afterhavingincreasedfrom33%in
2020.Lookingatallphishingincidents,
spearphishingattachments(T1566.001)
wereusedin62%ofthoseattacks,
spear
phishinglinks(T1566.002)
in33%and
spearphishingasaservice(T1566.003)
in5%.X-Forcealsowitnessedthreatactorsuseattachmentsalongsidephishingasaserviceorlinksinsomeinstances.
IBMX-ForceReddatafrom2022further
highlightsthevalueofphishingand
mishandledcredentialstothreatactors.
Across2022’spenetrationtestsforclients,X-ForceRedfoundthatapproximately54%oftestsrevealedimproperauthenticationorhandlingofcredentials.TheX-ForceRedAdversarySimulationteamregularlyperformedspearphishingwithQRcodestargetingmultifactorauthentication(MFA)tokens.Manyorganizationslackedvisibilityintoapplicationsandendpointsexposedthroughidentityaccessmanagementandsinglesign-on(SSO)portals,suchasOkta.
Insecondplace,
exploitationofpublic-
facingapplications(T1190)
—defined
asadversariestakingadvantageofa
weaknessinaninternet-facingcomputer
orprogram—wasidentifiedin26%of
incidentstowhichX-Forceresponded.
ThiscorrelatestowhatpastThreatIntelligenceIndexreportsreferredtoas“vulnerabilityexploitation”andmarksadropfrom34%in2021.
Inthirdplace,
abuseofvalidaccounts
(T1078)
wasidentifiedin16%oftheobservedincidents.Thesearecaseswhereadversariesobtainedandabusedcredentialsofexistingaccountsasameansofgainingaccess.Theseincidentsincludedcloudaccounts
(T1078.004)
anddefaultaccounts
(T1078.001)
at2%each,domainaccounts
(T1078.002)
at5%,andlocalaccounts
(T1078.003)
at7%.
Figure2:Typesofphishingsubtechniquesasa
percentageoftotalphishingcasesobservedby
X-Forcein2022.Source:X-Force
Previouschapter
Nextchapter
9
04Topinitialaccessvectors
Creditcardinformation
droppedsignificantlyfrom
beingtargeted61%ofthe
timein2021to29%of
phishingkitsin2022.
Phishingkitslastinglonger,targetingPIIovercreditcarddata
IBMSecurityanalyzedthousandsofphishingkitsfromaroundtheworldforthesecondyearinarowanddiscoveredkitdeploymentsareoperationallongerandreachingmoreusers.Thedataindicatesthatthelifespanofphishingkitsobservedhasmorethandoubledyearoveryear,whilethemediandeploymentacrossthedatasetremainedrelativelylowat3.7days.
Overall,theshortestdeploymentlasted
minutesandthelongest,discoveredin
2022,ranlongerthanthreeyears.Our
investigationfoundthefollowing:
–One-thirdofdeployedkitslasted
approximately2.3dayslastyear,more
thandoublethelengthoftheyearprior
whenthesameproportionlastedno
longerthanoneday.
–Approximatelyhalfofallreportedkitsimpacted93users,whereasin2021,eachdeploymentonaveragehadnogreaterthan75potentialvictims.
–Themaximumtotalvictimsofonereportedphishingattackwasjustover4,000,althoughthiswasanoutlier.
–Almosteveryreportedphishingkitanalyzedsoughttogathernamesat98%.Thiswasfollowedbyemailaddressesat73%,homeaddressesat66%and
passwordsat58%.
–Creditcardinformationdroppedsignificantlyfrombeingtargeted61%ofthetimein2021to29%ofphishingkitsin2022.
–Lowerinstancesofphishingkitsseekingcreditcarddataindicatethatphishersareprioritizingpersonallyidentifiableinformation(PII),whichallowsthembroaderandmorenefariousoptions.PIIcaneitherbegatheredandsoldonthedarkweborotherforumsorusedtoconductfurtheroperationsagainsttargets.
Previouschapter
Nextchapter
10
04Topinitialaccessvectors
Topspoofedbrands
Thetopbrandsobservedbeingspoofed
aremadeupmostlyofthebiggestnames
intech.X-Forcebelievesthisshiftfrom
2021’ssomewhatmorediverselistis
duetoimprovedabilitytoidentifythe
brandsthatakitisconfiguredtospoof,
notjusttheoneit’stargetingbydefault.
Manyphishingkitsaremultipurpose,and
thebrandbeingspoofedcanbechanged
byalteringasimpleparameter.For
example,akitcanspoofGmailbydefault,
butaone-lineupdatechangesitintoan
attackspoofingMicrosoft.
Stolencredentialsforsuchservicesarevaluable.Gainingaccesstoaccountsthatvictimsusetomanageentireportionsoftheironlinepresencecanopenthedoorforaccesstootheraccounts.Attackers’focusonthisformofinitialaccessishighlightedinthe
2022CloudThreatLandscape
Report
,whichfoundamorethanthreefoldincreaseat200%ofthenumberofcloudaccountsbeingadvertisedforsaleonthedarkweboverwhatwasobservedin2021.
Topspoofedbrandsyearoveryear
2022
2021
1
Microsoft
Microsoft
2
Apple
3
Yahoo
4
BMOHarrisBank
5
Outlook
Chase
6
Apple
Amazon
7
Adobe
Dropbox
8
AOL
DHL
9
PayPal
CNN
10Office365Hotmail
Figure3:Thischartidentifiesthe
topspoofedbrandsin2021and
2022,demonstratingthatthreat
actorsareincreasinglyfocusing
onlargetechnologybrands.
Source:IBMphishingkitdata
Previouschapter
Nextchapter
11
04Topinitialaccessvectors
Vulnerabilities
Shareofincidentsresultingfromvulnerabilityexploitationoverthelastfouryears
2022
2021
2020
35%
2019
26%
34%
30%
Vulnerabilityexploitation—capturedfor
2022as
exploitationofpublic-facing
applications(T1190)
—placedsecond
amongtopinfectionvectorsandhasbeen
apreferredmethodofcompromiseby
attackerssince2019.Vulnerabilitieswere
exploitedin26%ofattacksthatX-Force
remediatedin2022,34%in2021,35%in
2020and30%in2019.
Noteveryvulnerabilityexploitedby
threatactorsresultsinacyberincident.
Thenumberofincidentsresulting
fromvulnerabilityexploitationin2022
decreased19%from2021,afterrising
34%from2020.X-Forceassessedthat
thisswingwasdrivenbythewidespread
Log4Jvulnerabilityattheendof2021.
Exploitationforaccessisakeyareaof
researchthattheteamatX-ForceRed
AdversarySimulationServicespursued
tokeepsimulatingadvancedthreats.
Theteamincreaseditsfocuson
vulnerabilityresearchforexploitationof
operatingsystems(OS)andapplications
toexpandaccessandperformprivilege
escalation.Thisfocuswaslargelydueto
pastexerciseswithlong-standingclients
whohavehardenedtraditionalActive
Directoryattackpathsandtheneedto
pursuenewattackpaths.
Whilevulnerabilitiesareacommoninitialaccessvector,andtheindustryrespondstoseveralmajoronesinanygivenyear,noteveryvulnerabilityisthesame.It’simportantfordecisionmakerstotakeafullviewofthevulnerabilitylandscapeandensurethey’reequippedwiththenecessarycontexttounderstandtherealthreatagivenvulnerabilityposestotheirnetworks.
Almost30yearsagoandpredatingtheadventoftheCommonVulnerabilitiesandExposures(CVE)system,X-Forcebeganbuildingarobustvulnerabilitydatabase.Thisdatabaseisnowoneofthemostcomprehensiveinthecybersecurityindustry.Whilevulnerabilitiesareamajorrisktosecurity,therearefarmorereportedvulnerabilitiesthanthereareknownweaponizedexploits.Further,despitepublicattentiononzerodays,theactualnumberofknownzerodaysisdwarfedbythetotalnumberofknownvulnerabilities.
Previouschapter
Nextchapter
12
04Topinitialaccessvectors
TotalX-Forcedatabaseofvulnerabilitiesversusexploits
30,000
23,964
25,000
17,92318,11519,391
15,000
10,000
6,5056,0905,4795,7166,290
5,000
0
20182019202020212022
SumoftotalexploitsSumoftotalvulnerabilities
20,000
21,518
Everyyearseesanewrecordnumber
ofvulnerabilitiesdiscovered.Thetotal
numberofvulnerabilitiestrackedin2022
was23,964comparedto21,518in2021.
Thetrendofyear-to-yearvulnerability
increaseshaspersistedoverthelast
decade.Tothebenefitofdefenders,
analysisofourvulnerabilitydatabase
showedtheproportionofknown,viable
exploitstoreportedvulnerabilities
decreasinginrecentyears—36%in2018,
34%in2019,28%in2020,27%in2021
and26%in2022.
Thesenumberscanshiftwiththeexposureofzerodaysandexploitsbeingdevelopedforoldervulnerabilities—sometimesyearsafterthey’reidentified—andthereareseveralpotentialexplanationsbehindthis
decline.First,theestablishmentofformalbugbountyprogramshasincentivizedtheproactivediscoveryofvulnerabilitieswithinapplications.Additionally,ahandfulofwidelypopularandwell-establishedvulnerabilitiesexistthatalreadyserveasameansofsystemexploitationforattackers,reducingtheneedforthreatactorstodevelopnewexploits.Thedropislikelyduetoacombinationofmultiplefactorsbutdoesn’tpointtovulnerabilityexploitationbecominglessofathreat.
Whiletheproportionofexploitstovulnerabilitiesdrops,theseverityofthoseexploitsX-Forcetrackshasincreasedinthelastfiveyears.In2018,58%ofvulnerabilitieshadaCommonVulnerabilityScoringSystem(CVSS)scoreofmedium,
Figure4:X-Forcevulnerabilitydatabaseviewshowing
vulnerabilitiesandexploitsoverthepastfiveyears.
Source:X-Force
Previouschapter
Nextchapter
13
04Topinitialaccessvectors
CVSSscoresofvulnerabilitiesinX-Forcedatabase
58%
55%
47%
42%
36%
4%
0.4%
20182019202020212022
CriticalHighMediumLow
0.4%
0.4%
0.6%
0.5%
47%
46%
49%
49%
38%
4%
4%
6%
6%
4.0-6.9outof10,comparedtojustunder36%high,7.0-9.9.Thespreadbetweenthosetwoinvertedin2021,andhighseverityvulnerabilitiesnowaccountforfivepercentagepointsmorethanthosethatscoredmedium.
Still,ofallthevulnerabilitiesX-Forcehastrackedsince1988,38%ofthemrankhigh,withonly1%cominginatthecriticalscoreof10.Halfoftrackedvulnerabilitiesrankmediumwiththeremaining11%cominginatlow,3.9andbelow.Thesescoresalonedon’tcorrelatetothereal-worldseverityofanyoneCVE,sinceitdoesn’taccountfor
howexploitationisaccomplishedorifanexploitevenexists.However,thescoresdohelpdefenderscomparevulnerabilitiesandprioritizehowquicklytoaddressthem.TheFigure6graphiconthefollowingpagehelpstoputintoperspectivethetruenatureofthevulnerabilityproblemfacingthecybersecurityindustry.
Figure5:X-Forcevulnerabilitydatabaseshowing
severityofvulnerabilitiestrackedinoursystem.
Source:X-Force
Previouschapter
Nextchapter
14
15
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
Cumlativevulnerabilities,exploitsandzerodayssince1988
%
N/A
34%
Number
228,167
78,156
Category
Totalvulnerabilities
Totalexploited
vulnerabilities
Totalunexploited
vulnerabilities
Totalzerodays
Critical
High
Medium
Low
ProxyNotShellSpring4ShellSynLapse
Shellshock
2008
Conficker
2011
Beast
2012
Crime
1993
XFDBprecursor
1997
XFDB(ISS)founded
1999
CVEfounded
Meltdown
2019
BlueKeep
2020
SunburstSupernovaZerologon
2003
Metasploitcreated
2004
ExploitDBcreated
2015
Freak
2016
Sweet32
150,011
66%
7,327
2,746
86,595
114,480
24,274
3%1%38%50%
11%
04Topinitialaccessvectors
Operationaltechnology(OT)
vulnerabilities
Industrialcontrolsystems(ICS)
vulnerabilitiesdiscoveredin2022
decreasedforthefirsttimeintwo
years—457in2022comparedto715in
2021and472in2020.Oneexplanation
forthismaybefoundinICSlifecycles
andhowthey’regenerallymanagedand
patched.Attackersknowthatwith
demandforminimaldowntime,
longequipmentlifecyclesandolder,
less-supportedsoftware,manyICS
componentsandOTnetworksarestill
atriskofoldervulnerabilities.
Infrastructureisusuallyinplacefor
manyyearslongerthanstandardoffice
workstations,whichextendsthelifespan
ofICS-specificvulnerabilitiesbeyond
thosethatcanexploitIT.
Thevulnerabilityproblem
300,000
2021
2017
Log4JWreckSudo
2022
Follina
280,000
EternalBlue
260,000
2018
2013
Breach
2014
HeartbleedPoodle
240,000
Spectre
220,000
200,000
180,000
160,000
140,000
120,000
100,000
80,000
60,000
40,000
20,000
0
VulnerabilitiesWeaponizedexploitsZeroday
Figure6:Graphicshowingthegrowthofvulnerabilities,exploitsandzerodayssince1988.Also
includedisatimelineofmajoreventinvolvingvulnerabilitiessince1993.XFDBstandsforX-Force
DatabaseandExploitDBstandsforExploitDatabase.Source:X-Force
Nextchapter
15
Previouschapter
16
05
Topactionsonobjectives
Previously,theX-ForceThreatIntelligence
Indexexaminedthebroadcategoryoftop
attacks.For2022,X-Forcedissectedthis
classificationintotwodistinctcategories:
thespecificactionsthreatactorstookon
victimnetworks,oradversaryactionon
objective,andtheintendedor
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 5-12序列信號發生器2-m序列信號發生器的分析
- 1-7碼制-BCD的加減法運算
- 2025年北京海淀區中考一模英語試卷試題(含答案詳解)
- 食品企業產品檢驗管理制度
- 上海行健職業學院《創新創業基礎(社會實踐)》2023-2024學年第二學期期末試卷
- 天津渤海職業技術學院《能源與環境》2023-2024學年第二學期期末試卷
- 四川省射洪縣2024-2025學年初三下學期第一次聯合模擬考試數學試題含解析
- 國開2025年《漢語通論》形成性考核1-4答案
- 江蘇省無錫江陰市要塞片2025屆初三第一次模擬(5月)物理試題含解析
- 江漢大學《試驗設計方法》2023-2024學年第一學期期末試卷
- 2025年刑法模擬檢測試卷(罪名認定與刑罰適用)
- 健康廚房-家庭飲食指南
- 初中生物重要識圖填空速記54個-2025年中考生物一輪復習知識清單
- T-SCCX A 0010-2024 T-CQXS A 0001-2024 信息技術應用創新項目建設規范
- 合作合同范本 英文
- 四年級數學上冊口算題1000道
- 2025年中國腰果行業市場深度分析及發展前景預測報告
- 工業機器人集成應用(ABB) 高級 課件 1.2.3 PLC設備選型方法與工作站PLC選型
- 《危險作業審批制度》知識培訓
- 新國際物流知識培訓課件
- 關節置換感染預防與控制
評論
0/150
提交評論