版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
2024DataBreach
InvestigationsReport
Phishing
Exploitvulnerabilities
Credentials
DesktopsharingEmailVPNWebapplications
Aboutthecover
Thisyear,thereportisdelvingdeeperintothepathwaytobreachesinan
efforttoidentifythemostlikelyActionandvectorgroupingsthatleadto
breachesgiventhecurrentthreat
landscape.Thecrackeddoorwayonthecoverismeanttorepresentthevariouswaysattackerscanmaketheirway
inside.Theopeninginthedoorshowsthepatternofourcombined“ways-in”percentages(seeFigure7foramorestraightforwardrepresentation),anditletsoutabandoflightdisplayingapatternoftheActionvectorquantities.Theinnercoverhighlightsandlabelsthequantitiesinalessabstractway.
Hopeyouenjoyourarthousephase.
2024DBIRTableofcontents4
Tableofcontents
1
Introduction5
Helpfulguidance6
Summaryoffindings7
2
Resultsandanalysis
Resultsandanalysis:Introduction
VERISActors
VERISActions
VERISAssets
VERISAttributes
3
11
15
18
23
25
IncidentClassificationPatterns
IncidentClassificationPatterns:
Introduction28
SystemIntrusion30
SocialEngineering36
BasicWebApplicationAttacks42
MiscellaneousErrors47
DenialofService49
LostandStolenAssets51
PrivilegeMisuse53
4
Industries
Industries:Introduction
56
AccommodationandFoodServices
60
EducationalServices
61
FinancialandInsurance
62
Healthcare
64
Information
66
Manufacturing
67
Professional,Scientificand
TechnicalServices
69
PublicAdministration
70
Retail
5
72
Regions
Regionalanalysis
6
75
Wrap-up
Yearinreview81
7
Appendices
AppendixA:Howtoreadthisreport86
AppendixB:Methodology88
AppendixC:U.S.SecretService92
AppendixD:UsingtheVERIS
CommunityDatabase(VCDB)
toEstimateRisk94
AppendixE:Contributingorganizations96
2024DBIRIntroduction5
Introduction
Greetings!WelcometoVerizon’s2024DataBreachInvestigationsReport(DBIR).
Thisyearmarksthe17theditionofthispublication,andwearethrilledtowelcome
backouroldfriendsandsayhellotonewreaders.Asalways,theaimoftheDBIRistoshinealightonthevariousActortypes,thetacticstheyutilizeandthetargetstheychoose.Thankstoourtalented,generousandcivic-mindedcontributorsfromaroundtheworldwhocontinuetostickwithusandsharetheirdataandinsight,anddeep
appreciationforourveryownVerizonThreatResearchAdvisoryCenter(VTRAC)
team(rockstarsthattheyare).Thesetwogroupsenableustoexamineandanalyzerelevanttrendsincybercrimethatplayoutonaglobalstageacrossorganizationsofallsizesandtypes.
Fromyeartoyear,weseenewandinnovativeattacksaswellasvariationsontried-and-trueattacksthatstillremainsuccessful.Fromtheexploitationofwell-known
andfar-reachingzero-dayvulnerabilities,suchastheonethataffectedMOVEit,tothemuchmoremundanebutstillincrediblyeffectiveRansomwareandDenialof
Service(DoS)attacks,criminalscontinuetodotheirutmosttoprovetheoldadage“crimedoesnotpay”wrong.
Theshiftinglandscapeofcyberthreatscanbeconfusingandoverwhelming.When,inadditiontotheattacktypesmentionedabove,onethrowsinfactorssuchasthe
humanelementand/orpoorlyprotectedpasswords,thingsbecomeevenmore
confused.Onemightbeforgivenforviewingthecurrentstateofcybersecurity
asacolorfulcyberMardiGrasparade.Enterprisefloatsofallshapesandsizes
cruisingpastalargecrowdofthreatactorswhoareshoutingoutgleefully“Throw
mesomecreds!”Ofcourse,humannaturebeingwhatitis,alltoooften,thefolks
onthefloatsdojustthat.And,aswithallsuchparades,whatisleftintheaftermathisn’tnecessarilypretty.Thepastyearhasbeenabusyoneforcybercrime.We
analyzed30,458real-worldsecurityincidents,ofwhich10,626wereconfirmeddatabreaches(arecordhigh!),withvictimsspanning94countries.
Whilethegeneralstructureofthereportremainsthesame,long-timereadersmaynoticeafewchanges.Forexample,the“first-timereader”sectionisnowlocatedinAppendixAratherthanatthebeginningofthereport.ButwedoencouragethosewhoarenewtotheDBIRtogiveitaread-throughbeforedivingintothereport.It
shouldhelpyougetyourbearings.
Last,butcertainlynotleast,weextendamostsincerethanksyetagaintoour
contributors(withoutwhomwecouldnotdothis)andtoourreaders(withoutwhomtherewouldbenopointindoingit).
Sincerely,
TheVerizonDBIRTeam
C.DavidHylender,PhilippeLanglois,AlexPinto,SuzanneWidup
Veryspecialthanksto:
–ChristopherNovakforhiscontinuedsupportandinsight
–DaveKennedyandErikaGiffordfromVTRAC
–KateKutchko,MarziyehKhanoukiandYoniFridmanfromtheVerizonBusinessProductDataScienceTeam
2024DBIRHelpfulguidance6
Helpfulguidance
Aboutthe2024DBIRincidentdataset
Eachyear,theDBIRtimelineforin-scopeincidentsisfromNovember1ofone
calendaryearthroughOctober31ofthenextcalendaryear.Thus,theincidents
describedinthisreporttookplacebetweenNovember1,2022,andOctober31,
2023.The2023caseloadistheprimaryanalyticalfocusofthe2024report,buttheentirerangeofdataisreferencedthroughout,notablyintrendinggraphs.Thetimebetweenthelatterdateandthedateofpublicationforthisreportisspentinacquiringthedatafromourglobalcontributors,anonymizingandaggregatingthatdata,analyzingthedataset,andfinallycreatingthegraphicsandwritingthereport.Thejokes,sadly,donotwritethemselves.
Creditwherecreditisdue
Turnsoutfolksenjoycitingthereport,andweoftengetaskedhowtogoaboutdoingit.
Youarepermittedtoincludestatistics,figuresandotherinformationfromthereport,providedthat(a)youcitethesourceas“Verizon2024DataBreachInvestigations
Report”and(b)thecontentisnotmodifiedinanyway.Exactquotesarepermitted,butparaphrasingrequiresreview.Ifyouwouldliketoprovidepeopleacopyofthereport,weaskthatyouprovidethemalinkto
/dbir
ratherthanthePDF.
Questions?Comments?Concerns?Lovetosharecutepetpictures?
Letusknow!Sendusanoteat
dbir@
,findusonLinkedIn,tweet
@VerizonBusiness
with#dbir.Gotadataquestion?
Tweet
@VZDBIR
!
IfyourorganizationaggregatesincidentorsecuritydataandisinterestedinbecomingacontributortotheannualVerizonDBIR(andwehopeyouare),theprocessisveryeasyandstraightforward.Pleaseemailusat
dbircontributor@
.
2024DBIRSummaryoffindings7
Summaryoffindings
Figure1.Selectways-inenumerationsinnon-Error,non-Misusebreaches(n=6,963)
Figure2.RansomwareandExtortionbreachesovertime
Ourways-inanalysiswitnesseda
substantialgrowthofattacksinvolvingtheexploitationofvulnerabilitiesasthecriticalpathtoinitiateabreachwhen
comparedtopreviousyears.Italmosttripled(180%increase)fromlastyear,whichwillcomeasnosurpriseto
anyonewhohasbeenfollowingthe
effectofMOVEitandsimilarzero-dayvulnerabilities.Theseattackswere
primarilyleveragedbyRansomware
andotherExtortion-relatedthreat
actors.Asonemightimagine,themainvectorforthoseinitialentrypointswasWebapplications.
Roughlyone-thirdofallbreaches
involvedRansomwareorsomeother
Extortiontechnique.PureExtortion
attackshaverisenoverthepastyear
andarenowacomponentof9%of
allbreaches.Theshiftoftraditional
ransomwareactorstowardthesenewertechniquesresultedinabitofadeclineinRansomwareto23%.However,whencombined,giventhattheysharethreatactors,theyrepresentastronggrowthto32%ofbreaches.Ransomwarewasatopthreatacross92%ofindustries.
2024DBIRSummaryoffindings8
Figure3.Selectkeyenumerationsinbreaches
Wehaverevisedourcalculationoftheinvolvementofthehumanelementto
excludemaliciousPrivilegeMisusein
anefforttoprovideaclearermetricofwhatsecurityawarenesscanaffect.Forthisyear’sdataset,thehumanelementwasacomponentof68%ofbreaches,roughlythesameasthepreviousperioddescribedinthe2023DBIR.
Inthisissue,weareintroducingan
expandedconceptofabreachinvolvingathirdpartythatincludespartner
infrastructurebeingaffectedand
directorindirectsoftwaresupplychainissues—includingwhenanorganizationisaffectedbyvulnerabilitiesinthird-
partysoftware.Inshort,thosearebreachesanorganizationcould
potentiallymitigateorpreventbytryingtoselectvendorswithbettersecuritytrackrecords.Weseethisfigureat
15%thisyear,a68%increasefromthepreviousyear,mostlyfueledbytheuseofzero-dayexploitsforRansomwareandExtortionattacks.
OurdatasetsawagrowthofbreachesinvolvingErrors,nowat28%,aswe
broadenedourcontributorbaseto
includeseveralnewmandatorybreachnotificationentities.Thisvalidates
oursuspicionthaterrorsaremoreprevalentthanmediaortraditionalincidentresponse-drivenbiaswouldleadustobelieve.
2024DBIRSummaryoffindings9
15%
10%
Didnotclickclicked
5%
0%
2016201820202022
year
Figure4.Phishingemailreportratebyclickstatus
Figure5.SelectactionvarietiesinFinancialmotiveovertime
TheoverallreportingrateofPhishing
hasbeengrowingoverthepastfew
years.Insecurityawarenessexercise
datacontributedbyourpartnersduring2023,20%ofusersreportedphishinginsimulationengagements,and11%
oftheuserswhoclickedtheemail
alsoreported.Thisiswelcomenews
becauseontheflipside,themedian
timetoclickonamaliciouslinkaftertheemailisopenedis21secondsandthenonlyanother28secondsforthepersoncaughtinthephishingschemetoentertheirdata.Thisleadstoanalarming
finding:Themediantimeforusers
tofallforphishingemailsislessthan60seconds.
Financiallymotivatedthreatactorswilltypicallysticktotheattacktechniquesthatwillgivethemthemostreturn
oninvestment.
Overthepastthreeyears,the
combinationofRansomwareand
otherExtortionbreachesaccountedforalmosttwo-thirds(fluctuating
between59%and66%)ofthose
attacks.AccordingtotheFBI’s
InternetCrimeComplaintCenter
(IC3)ransomwarecomplaintdata,
themedianlossassociatedwiththecombinationofRansomwareand
otherExtortionbreacheshasbeen$46,000,rangingbetween$3(three
dollars)and$1,141,467for95%ofthecases.Wealsofoundfromransomwarenegotiationdatacontributorsthat
themedianratioofinitiallyrequested
ransomandcompanyrevenueis1.34%,butitfluctuatedbetween0.13%and
8.30%for80%ofthecases.
Similarly,overthepasttwoyears,we
haveseenincidentsinvolvingPretexting(themajorityofwhichhadBusiness
EmailCompromise[BEC]asthe
outcome)accountingforone-fourth(rangingbetween24%and25%)of
financiallymotivatedattacks.Inbothyears,themediantransactionamountofaBECwasaround$50,000,alsoaccordingtotheFBIIC3dataset.
2
Results
andanalysis
2024DBIRResultsandanalysis11
Results
andanalysis:Introduction
Hello,friends,andwelcometothe“Resultsandanalysis”section.Thisiswherewecoverthehighlightswefoundinthedatathisyear.Thisdatasetiscollectedfromavarietyofsources,includingourownVTRACinvestigators,reportsprovidedbyourdatacontributorsandpubliclydisclosedsecurityincidents.1
Becausedatacontributorscomeandgo,oneofourprioritiesistomakesure
wecangetbroadrepresentationondifferenttypesofsecurityincidentsandthe
countrieswheretheyoccur.Thisebbandflowofcontributorsobviouslyinfluencesourdataset,andwewilldoourbesttoprovidecontextonthosepotentialbiases
whereapplicable.
Thisyearweonboardedagoodnumberofnewcontributorsandreachedan
excitingmilestoneofmorethan10,000breachesanalyzedinasingleedition.2
Itisanenormousamountofworktoorganizeandanalyze,butitisalsoincrediblygratifyingtobeabletopresenttheseresultstoyou.
Inanattempttobemoreactionable,wewouldliketousethissectiontodiscusssomehigh-levelfindingsthattranscendthefixedstructureoftheVocabulary
forEventRecordingandIncidentSharing(VERIS)4As(Actor,Action,AssetandAttribute)andexpandonsomeofthekeyfindingswehavebeenhighlightingoverthepastfewyears.
Figure6.Selectways-inenumerationsinnon-Error,non-Misusebreachesovertime
Waysinto
yoursensitivedata’sheart
Oneoftheactionableperspectives
wehavecreatedhasbeentheways-
inanalysis,inwhichwetrytomake
senseoftheinitialstepsintobreachestohelppredicthowtobestavoidor
preventthem.Westillhaveplenty
ofunknownActionsandvectors
dispersedthroughoutthedatasetas
investigationprocessesanddisclosurepatternswidelydifferacrossourdatacontributors,3butthisviewofwhatweknowforsurehasremainedstableandrepresentativeovertheyears.
Figure6paintsaclearpictureofwhathasbeenthebiggestpainpointfor
everyonethisyear.This180%increaseintheexploitationofvulnerabilities
asthecriticalpathactiontoinitiatea
breachwillbeofnosurprisetoanyonewhohasbeenfollowingtheMOVEit
vulnerabilityandotherzero-dayexploitsthatwereleveragedbyRansomware
andExtortion-relatedthreatactors.
Thiswasthesortofresultwewere
expectinginthe2023DBIRwhen
weanalyzedtheimpactoftheLog4j
vulnerabilities.Thatanticipatedworst
casescenariodiscussedinthelast
reportmaterializedthisyearwiththis
lesserknown—butwidelydeployed—
product.WewillbedivingintoadditionaldetailsofMOVEitandvulnerability
exploitationinthe“Action”and“SystemIntrusion”patternsections.
1HaveyoucheckedouttheVERISCommunityDatabase(VCDB)yet?Youshould,it’sawesome!(
/vcdb.html
)
2Wealsopassedourcumulative1millionincidentmilestoneasweforecastinthe2023DBIR,butweareonlymentioningthishereinthefootnotetonotaggravatethereport;itwasvery
disappointedthat1millionisnotenoughtoretireoninthiseconomy.
3We’renotthrowingshade—differenttypesofcontributingorganizationsfocusonwhatismostrelevantforthem,aswelltheyshould.
2024DBIRResultsandanalysis12
Todigfurtherintothisconceptofthewaysin,wearepresentinganewsliceofthedata,whereweareoverlayingthosedifferenttypesofActionswiththeirmostpopularvectorstohelp
focusresponseandplanningefforts.YoucantakeapeekatthoseresultsinFigure7.
Phishingattacksmostlyhavingan
Emailvectorisratherself-explanatory,4sowewouldliketofocusonthe
concentrationoftheWebapplication
vectorprevalenceforbothcredentialsandexploitvulnerability.ThepresenceofCredentialsinthegraphicshould
notbesurprisingasitcarriesalarge
shareoftheguiltforourBasicWeb
ApplicationAttackspattern(i.e.,gettingunauthorizedaccesstocloud-based
emailandcollaborationaccounts).
Butrecencybiasmightmakefolks
doubttheprevalenceofexploitationofvulnerabilities.Becausethisreportisbeingwritteninthebeginningof2024,thefocushasbeenonzero-day(or
near-zero-day)vulnerabilitiesinvirtualprivatenetwork(VPN)software.5
Naturally,theshareofVPNvectorintheexploitvulnvarietywilllikelyincrease
forour2025reporttoreflectthose
trends,butthebottomlineisagainself-evidentandself-explanatory.Anythingthataddstoyourattacksurfaceontheinternetcanbetargetedandpotentiallybethefirstfootholdforanexternal
threatactor,andassuch,thefocusshouldbetotrytokeepfootholdstoaminimum.
NomatterhowyoufeelaboutyourVPNsoftwarerightnow,havingasmany
ofyourwebapplicationsaspossiblebehinditmightbeabetterstrategy
thanhavingtoworryaboutemergencyovernightpatchingofthesoftware—
andalltheotherdependencies
thatpowerthewebapplications
themselves.Thiswillnotcompletelymitigatetheriskandwillnotbethe
Figure7.Selectways-invarietyandvectorenumerationsinnon-Error,non-Misusebreaches(n=2,770)
rightfitforallorganizations,butintheworst-casescenario,theCybersecurityInfrastructureandSecurityAgency
(CISA)mighthaveyouripoutonlyonetoolfromyournetworkasopposed
toseveral.
Anyway,allthisnuancedoesnotaffectouropinionofhavingdesktopsharingsoftwaredirectlyconnectedtothe
internet.Gofixthatpronto,please.
Weareonly
humanafterall.
Oneothercombinedmetricwe
havebeentrackingforafewyears
isrelatedtothehumanelementin
breaches.Thereisalotoffocuson
howfullyautomatedattackscanruinanorganization’sday,6butitisoften
surprisinghowmuchthepeopleinsidethecompanycanhaveapositiveeffectonsecurityoutcomes.
Thisyear,wehavetweakedourhumanelementmetricabitsoitsimpactandactionopportunitiesareclearer.You
see,whenDBIRauthors(andthewholeindustryingeneral)woulddiscuss
thismetric,itwouldbealongsidean
opportunitygapforsecuritytraining
andawareness.Itisnotperfect,butifyouhadaclearinvestmentpaththat
couldpotentiallyimprovetheoutcomesofmorethantwo-thirdsofpotential
breaches,youmightatleastsitdownandlisten.
Itturnsoutthatouroriginalformula
forwhatwasincludedinthehuman
elementmetricbuiltinPrivilege
Misusepatternbreaches,which
arethecasesinvolvingmalicious
insiders.Havingthosemixedwith
honestmistakesbyemployeesdid
notmakesenseifouraimwasto
suggestthatthosecouldbemitigatedbysecurityawarenesstraining.7
4AndanincredibleLforthe*ishingportmanteauenthusiasts
5Unlessbynowwehavesuccessfullyrippedthemoutofournetworksentirelyandarebacktooursmokesignalsandcarrierpigeonways.
6Weourselveswerejusttalkingaboutthegrowthofexploitationofvulnerabilitiesasapathwayintobreaches.
7Wedreadtothinkwhat“awarenesstraining”formaliciousinsiderswouldlooklike.
2024DBIRResultsandanalysis13
Figure8showcasesthenewhumanelementovertime(withmalicious
insidersremoved)toprovideabetterframeofreferenceforourreaders
goingforward.Itispresentinmore
thantwo-thirdsofbreachesas
foreshadowedtwoparagraphsago,
morepreciselyin68%ofbreaches.
Itisstatisticallysimilartoourfindingslastyear,whichmeansthatina
certainway,theincreaseswehad
acrosstheboardintheMiscellaneousErrorspattern(human-centric)and
asaresultoftheMOVEitvulnerability(automated)weresimilarinscope
asfarasthismetricisconcerned.
Fansofthe“originalflavor”human
elementarenotmissingmuchbecausetheinclusionoftheMisuseaction
wouldhavebroughtthepercentage
to76%,statisticallyonlyslightlymorethanthepreviousreport’s74%.Still,
weprefertheclearerdefinitiongoingforward,andwewillleavetheanalysisofthosebothersomeinsidersandtheirmisdeedstothe“PrivilegeMisuse”
patternsection.
Theweakestlinksinthe
chainofinter-connection
Finally,aswereviewthebigpictureofhowthethreatlandscapechangedthisyear,8wewouldliketointroduceanewmetricthatwewillbetrackinggoing
forward.Asthegrowthofexploitationofvulnerabilitiesandsoftwaresupplychainattacksmakethemmore
commonplaceinsecurityriskregisterdiscussions,wewouldliketosuggestanewthird-partymetricwherewe
embracethebroadestpossible
interpretationoftheterm.9HaveapeekatFigure9,wherewecalculateda
supplychaininterconnectioninfluencein15%ofthebreacheswesaw,a
significantgrowthfrom9%lastyear.A68%year-over-yeargrowthisreallysolid,butwhatdowemeanbythis?
Forabreachtobeapartofthesupplychaininterconnectionmetric,itwill
havetakenplacebecauseeitherabusinesspartnerwasthevectorofentryforthebreach(likethenow
fabledheating,ventilatingandair-conditioning[HVAC]companyentrypointinthe2013Targetbreach)orifthedatacompromisehappened
Figure8.Humanelementenumerationinbreachesovertime
Figure9.Supplychaininterconnectioninbreachesovertime
8Numberoftimestheword“MOVEit”ismentionedinthisreport:25
9Inasurprisingrolereversal,asweareoftenverypedanticinourdefinitions
2024DBIRResultsandanalysis14
inathird-partydataprocessoror
custodiansite(fairlycommonintheMOVEitcases,forinstance).Less
frequentlyfoundinourdataset,butalsoincluded,arephysicalbreachesinapartnercompanyfacilityorevenpartnervehicleshijackedtogain
entrytoanorganization’sfacilities.10
Sofar,thisseemslikeaprettystandard
third-partybreachrecipe,butwearealsoaddingcases,suchasSolarWindsand3CX,inwhichtheirsoftware
developmentprocesseswerehijackedandmalicioussoftwareupdates
werepushedtotheircustomersto
bepotentiallyleveragedinasecondstepescalationbythethreatactors.Thosebreachesareultimatelycausedbytheinitialincidentinthesoftwaredevelopmentpartner,andsoweareaddingthosetothistab.
Nowforthecontroversialpart:
Exploitationofvulnerabilitiesiscountedinthismetricaswell.Asmuchaswe
canarguethatthesoftwaredevelopersarealsovictimswhenvulnerabilities
aredisclosedintheirsoftware(and
sure,theyare),theincentivesmight
notbealignedproperlyforthose
developerstohandlethisseemingly
interminabletask.Thesequalitycontrolfailurescandisproportionatelyaffect
thecustomerswhousethissoftware.Wecanclearlyseewhatpowerful
andwide-reachingeffectsahandful
ofzero-dayormismanagedpatching
rolloutshadonthegeneralthreat
landscape.Westoppedshortofadding
exploitationofmisconfigurationsininstalledsoftwarebecause,
althoughthosecouldbearesultofinsecuredefaults,systemadminscangetquitecreativesometimes.
Figure10showsthebreakdown
ofVERISactionsinthesupply
chainmetricand,asexpected,
itisdrivenbyExploitvuln,which
ushersRansomwareandExtortionattacksintoorganizations.
Thismetricultimatelyrepresentsa
failureofcommunityresilienceand
recognitionofhoworganizations
dependoneachother.Everytime
achoiceismadeonapartner(or
softwareprovider)byyourorganizationanditfailsyou,thismetricgoesup.
Werecommendthatorganizations
startlookingatwaysofmaking
betterchoicessoastonotreward
theweakestlinksinthechain.Ina
timewheredisclosureofbreachesisbecomingmandatory,wemightfinallyhavethetoolsandinformationtohelpmeasurethesecurityeffectivenessofourprospectivepartners.
Wewillkeepaclosewatchonthis
oneandseektoimproveitsdefinitionovertime.Wewelcomefeedback
andsuggestionsofalternative
angles,andwebelievetheonly
waythroughitistofindwaysto
holdrepeatoffendersaccountableandrewardresilientsoftwareandserviceswithourbusiness.
Figure10.Actionvarietiesinselectedsupplychaininterconnectionbreaches(n=1,075)
10Weshouldstopwatchingthose“Mission:Impossible”moviesduringDBIRwritingseason.
2024DBIRResultsandanalysis
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2023年福建省莆田市公开招聘警务辅助人员(辅警)笔试经典练习卷(A)含答案
- 《儿科生命体征》课件
- 2023年甘肃省定西市公开招聘警务辅助人员(辅警)笔试专项训练题试卷(3)含答案
- 2024年浙江省衢州市公开招聘警务辅助人员(辅警)笔试摸底测试(1)卷含答案
- 《T课件制作技巧》课件
- 学习方法-主题班会课件
- 2024年海外高等教育机构合作与交流合同
- 2021年四川省广安市公开招聘警务辅助人员(辅警)笔试自考练习卷二含答案
- 《基于任务驱动模式的软件工程与UML建模技术》课件项目十二
- 《nicu现状和未来》课件
- 质保金返还合同范本
- RBA商业道德程序文件(系列)
- 医院培训课件:《静脉血栓栓塞症(VTE)专题培训》
- 幼儿园国旗下讲话《我长大了!》
- 机械设备供货、培训及售后服务方案
- 国开2024年《初级会计》形成性考核1-4答案
- 2024广西专业技术人员继续教育公需科目参考答案
- 思想道德与法治(山东联盟-青岛科技大学)智慧树知到期末考试答案章节答案2024年青岛科技大学
- 九十项症状自评量表
- 音韵学入门智慧树知到期末考试答案2024年
- 《煤矿重大事故隐患判定标准》解读培训课件2024(中国煤矿安全技术培训中心)
评论
0/150
提交评论