版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
2024DataBreach
InvestigationsReport
Phishing
Exploitvulnerabilities
Credentials
DesktopsharingEmailVPNWebapplications
Aboutthecover
Thisyear,thereportisdelvingdeeperintothepathwaytobreachesinan
efforttoidentifythemostlikelyActionandvectorgroupingsthatleadto
breachesgiventhecurrentthreat
landscape.Thecrackeddoorwayonthecoverismeanttorepresentthevariouswaysattackerscanmaketheirway
inside.Theopeninginthedoorshowsthepatternofourcombined“ways-in”percentages(seeFigure7foramorestraightforwardrepresentation),anditletsoutabandoflightdisplayingapatternoftheActionvectorquantities.Theinnercoverhighlightsandlabelsthequantitiesinalessabstractway.
Hopeyouenjoyourarthousephase.
2024DBIRTableofcontents4
Tableofcontents
1
Introduction5
Helpfulguidance6
Summaryoffindings7
2
Resultsandanalysis
Resultsandanalysis:Introduction
VERISActors
VERISActions
VERISAssets
VERISAttributes
3
11
15
18
23
25
IncidentClassificationPatterns
IncidentClassificationPatterns:
Introduction28
SystemIntrusion30
SocialEngineering36
BasicWebApplicationAttacks42
MiscellaneousErrors47
DenialofService49
LostandStolenAssets51
PrivilegeMisuse53
4
Industries
Industries:Introduction
56
AccommodationandFoodServices
60
EducationalServices
61
FinancialandInsurance
62
Healthcare
64
Information
66
Manufacturing
67
Professional,Scientificand
TechnicalServices
69
PublicAdministration
70
Retail
5
72
Regions
Regionalanalysis
6
75
Wrap-up
Yearinreview81
7
Appendices
AppendixA:Howtoreadthisreport86
AppendixB:Methodology88
AppendixC:U.S.SecretService92
AppendixD:UsingtheVERIS
CommunityDatabase(VCDB)
toEstimateRisk94
AppendixE:Contributingorganizations96
2024DBIRIntroduction5
Introduction
Greetings!WelcometoVerizon’s2024DataBreachInvestigationsReport(DBIR).
Thisyearmarksthe17theditionofthispublication,andwearethrilledtowelcome
backouroldfriendsandsayhellotonewreaders.Asalways,theaimoftheDBIRistoshinealightonthevariousActortypes,thetacticstheyutilizeandthetargetstheychoose.Thankstoourtalented,generousandcivic-mindedcontributorsfromaroundtheworldwhocontinuetostickwithusandsharetheirdataandinsight,anddeep
appreciationforourveryownVerizonThreatResearchAdvisoryCenter(VTRAC)
team(rockstarsthattheyare).Thesetwogroupsenableustoexamineandanalyzerelevanttrendsincybercrimethatplayoutonaglobalstageacrossorganizationsofallsizesandtypes.
Fromyeartoyear,weseenewandinnovativeattacksaswellasvariationsontried-and-trueattacksthatstillremainsuccessful.Fromtheexploitationofwell-known
andfar-reachingzero-dayvulnerabilities,suchastheonethataffectedMOVEit,tothemuchmoremundanebutstillincrediblyeffectiveRansomwareandDenialof
Service(DoS)attacks,criminalscontinuetodotheirutmosttoprovetheoldadage“crimedoesnotpay”wrong.
Theshiftinglandscapeofcyberthreatscanbeconfusingandoverwhelming.When,inadditiontotheattacktypesmentionedabove,onethrowsinfactorssuchasthe
humanelementand/orpoorlyprotectedpasswords,thingsbecomeevenmore
confused.Onemightbeforgivenforviewingthecurrentstateofcybersecurity
asacolorfulcyberMardiGrasparade.Enterprisefloatsofallshapesandsizes
cruisingpastalargecrowdofthreatactorswhoareshoutingoutgleefully“Throw
mesomecreds!”O(jiān)fcourse,humannaturebeingwhatitis,alltoooften,thefolks
onthefloatsdojustthat.And,aswithallsuchparades,whatisleftintheaftermathisn’tnecessarilypretty.Thepastyearhasbeenabusyoneforcybercrime.We
analyzed30,458real-worldsecurityincidents,ofwhich10,626wereconfirmeddatabreaches(arecordhigh!),withvictimsspanning94countries.
Whilethegeneralstructureofthereportremainsthesame,long-timereadersmaynoticeafewchanges.Forexample,the“first-timereader”sectionisnowlocatedinAppendixAratherthanatthebeginningofthereport.ButwedoencouragethosewhoarenewtotheDBIRtogiveitaread-throughbeforedivingintothereport.It
shouldhelpyougetyourbearings.
Last,butcertainlynotleast,weextendamostsincerethanksyetagaintoour
contributors(withoutwhomwecouldnotdothis)andtoourreaders(withoutwhomtherewouldbenopointindoingit).
Sincerely,
TheVerizonDBIRTeam
C.DavidHylender,PhilippeLanglois,AlexPinto,SuzanneWidup
Veryspecialthanksto:
–ChristopherNovakforhiscontinuedsupportandinsight
–DaveKennedyandErikaGiffordfromVTRAC
–KateKutchko,MarziyehKhanoukiandYoniFridmanfromtheVerizonBusinessProductDataScienceTeam
2024DBIRHelpfulguidance6
Helpfulguidance
Aboutthe2024DBIRincidentdataset
Eachyear,theDBIRtimelineforin-scopeincidentsisfromNovember1ofone
calendaryearthroughOctober31ofthenextcalendaryear.Thus,theincidents
describedinthisreporttookplacebetweenNovember1,2022,andOctober31,
2023.The2023caseloadistheprimaryanalyticalfocusofthe2024report,buttheentirerangeofdataisreferencedthroughout,notablyintrendinggraphs.Thetimebetweenthelatterdateandthedateofpublicationforthisreportisspentinacquiringthedatafromourglobalcontributors,anonymizingandaggregatingthatdata,analyzingthedataset,andfinallycreatingthegraphicsandwritingthereport.Thejokes,sadly,donotwritethemselves.
Creditwherecreditisdue
Turnsoutfolksenjoycitingthereport,andweoftengetaskedhowtogoaboutdoingit.
Youarepermittedtoincludestatistics,figuresandotherinformationfromthereport,providedthat(a)youcitethesourceas“Verizon2024DataBreachInvestigations
Report”and(b)thecontentisnotmodifiedinanyway.Exactquotesarepermitted,butparaphrasingrequiresreview.Ifyouwouldliketoprovidepeopleacopyofthereport,weaskthatyouprovidethemalinkto
/dbir
ratherthanthePDF.
Questions?Comments?Concerns?Lovetosharecutepetpictures?
Letusknow!Sendusanoteat
dbir@
,findusonLinkedIn,tweet
@VerizonBusiness
with#dbir.Gotadataquestion?
Tweet
@VZDBIR
!
IfyourorganizationaggregatesincidentorsecuritydataandisinterestedinbecomingacontributortotheannualVerizonDBIR(andwehopeyouare),theprocessisveryeasyandstraightforward.Pleaseemailusat
dbircontributor@
.
2024DBIRSummaryoffindings7
Summaryoffindings
Figure1.Selectways-inenumerationsinnon-Error,non-Misusebreaches(n=6,963)
Figure2.RansomwareandExtortionbreachesovertime
Ourways-inanalysiswitnesseda
substantialgrowthofattacksinvolvingtheexploitationofvulnerabilitiesasthecriticalpathtoinitiateabreachwhen
comparedtopreviousyears.Italmosttripled(180%increase)fromlastyear,whichwillcomeasnosurpriseto
anyonewhohasbeenfollowingthe
effectofMOVEitandsimilarzero-dayvulnerabilities.Theseattackswere
primarilyleveragedbyRansomware
andotherExtortion-relatedthreat
actors.Asonemightimagine,themainvectorforthoseinitialentrypointswasWebapplications.
Roughlyone-thirdofallbreaches
involvedRansomwareorsomeother
Extortiontechnique.PureExtortion
attackshaverisenoverthepastyear
andarenowacomponentof9%of
allbreaches.Theshiftoftraditional
ransomwareactorstowardthesenewertechniquesresultedinabitofadeclineinRansomwareto23%.However,whencombined,giventhattheysharethreatactors,theyrepresentastronggrowthto32%ofbreaches.Ransomwarewasatopthreatacross92%ofindustries.
2024DBIRSummaryoffindings8
Figure3.Selectkeyenumerationsinbreaches
Wehaverevisedourcalculationoftheinvolvementofthehumanelementto
excludemaliciousPrivilegeMisusein
anefforttoprovideaclearermetricofwhatsecurityawarenesscanaffect.Forthisyear’sdataset,thehumanelementwasacomponentof68%ofbreaches,roughlythesameasthepreviousperioddescribedinthe2023DBIR.
Inthisissue,weareintroducingan
expandedconceptofabreachinvolvingathirdpartythatincludespartner
infrastructurebeingaffectedand
directorindirectsoftwaresupplychainissues—includingwhenanorganizationisaffectedbyvulnerabilitiesinthird-
partysoftware.Inshort,thosearebreachesanorganizationcould
potentiallymitigateorpreventbytryingtoselectvendorswithbettersecuritytrackrecords.Weseethisfigureat
15%thisyear,a68%increasefromthepreviousyear,mostlyfueledbytheuseofzero-dayexploitsforRansomwareandExtortionattacks.
OurdatasetsawagrowthofbreachesinvolvingErrors,nowat28%,aswe
broadenedourcontributorbaseto
includeseveralnewmandatorybreachnotificationentities.Thisvalidates
oursuspicionthaterrorsaremoreprevalentthanmediaortraditionalincidentresponse-drivenbiaswouldleadustobelieve.
2024DBIRSummaryoffindings9
15%
10%
Didnotclickclicked
5%
0%
2016201820202022
year
Figure4.Phishingemailreportratebyclickstatus
Figure5.SelectactionvarietiesinFinancialmotiveovertime
TheoverallreportingrateofPhishing
hasbeengrowingoverthepastfew
years.Insecurityawarenessexercise
datacontributedbyourpartnersduring2023,20%ofusersreportedphishinginsimulationengagements,and11%
oftheuserswhoclickedtheemail
alsoreported.Thisiswelcomenews
becauseontheflipside,themedian
timetoclickonamaliciouslinkaftertheemailisopenedis21secondsandthenonlyanother28secondsforthepersoncaughtinthephishingschemetoentertheirdata.Thisleadstoanalarming
finding:Themediantimeforusers
tofallforphishingemailsislessthan60seconds.
Financiallymotivatedthreatactorswilltypicallysticktotheattacktechniquesthatwillgivethemthemostreturn
oninvestment.
Overthepastthreeyears,the
combinationofRansomwareand
otherExtortionbreachesaccountedforalmosttwo-thirds(fluctuating
between59%and66%)ofthose
attacks.AccordingtotheFBI’s
InternetCrimeComplaintCenter
(IC3)ransomwarecomplaintdata,
themedianlossassociatedwiththecombinationofRansomwareand
otherExtortionbreacheshasbeen$46,000,rangingbetween$3(three
dollars)and$1,141,467for95%ofthecases.Wealsofoundfromransomwarenegotiationdatacontributorsthat
themedianratioofinitiallyrequested
ransomandcompanyrevenueis1.34%,butitfluctuatedbetween0.13%and
8.30%for80%ofthecases.
Similarly,overthepasttwoyears,we
haveseenincidentsinvolvingPretexting(themajorityofwhichhadBusiness
EmailCompromise[BEC]asthe
outcome)accountingforone-fourth(rangingbetween24%and25%)of
financiallymotivatedattacks.Inbothyears,themediantransactionamountofaBECwasaround$50,000,alsoaccordingtotheFBIIC3dataset.
2
Results
andanalysis
2024DBIRResultsandanalysis11
Results
andanalysis:Introduction
Hello,friends,andwelcometothe“Resultsandanalysis”section.Thisiswherewecoverthehighlightswefoundinthedatathisyear.Thisdatasetiscollectedfromavarietyofsources,includingourownVTRACinvestigators,reportsprovidedbyourdatacontributorsandpubliclydisclosedsecurityincidents.1
Becausedatacontributorscomeandgo,oneofourprioritiesistomakesure
wecangetbroadrepresentationondifferenttypesofsecurityincidentsandthe
countrieswheretheyoccur.Thisebbandflowofcontributorsobviouslyinfluencesourdataset,andwewilldoourbesttoprovidecontextonthosepotentialbiases
whereapplicable.
Thisyearweonboardedagoodnumberofnewcontributorsandreachedan
excitingmilestoneofmorethan10,000breachesanalyzedinasingleedition.2
Itisanenormousamountofworktoorganizeandanalyze,butitisalsoincrediblygratifyingtobeabletopresenttheseresultstoyou.
Inanattempttobemoreactionable,wewouldliketousethissectiontodiscusssomehigh-levelfindingsthattranscendthefixedstructureoftheVocabulary
forEventRecordingandIncidentSharing(VERIS)4As(Actor,Action,AssetandAttribute)andexpandonsomeofthekeyfindingswehavebeenhighlightingoverthepastfewyears.
Figure6.Selectways-inenumerationsinnon-Error,non-Misusebreachesovertime
Waysinto
yoursensitivedata’sheart
Oneoftheactionableperspectives
wehavecreatedhasbeentheways-
inanalysis,inwhichwetrytomake
senseoftheinitialstepsintobreachestohelppredicthowtobestavoidor
preventthem.Westillhaveplenty
ofunknownActionsandvectors
dispersedthroughoutthedatasetas
investigationprocessesanddisclosurepatternswidelydifferacrossourdatacontributors,3butthisviewofwhatweknowforsurehasremainedstableandrepresentativeovertheyears.
Figure6paintsaclearpictureofwhathasbeenthebiggestpainpointfor
everyonethisyear.This180%increaseintheexploitationofvulnerabilities
asthecriticalpathactiontoinitiatea
breachwillbeofnosurprisetoanyonewhohasbeenfollowingtheMOVEit
vulnerabilityandotherzero-dayexploitsthatwereleveragedbyRansomware
andExtortion-relatedthreatactors.
Thiswasthesortofresultwewere
expectinginthe2023DBIRwhen
weanalyzedtheimpactoftheLog4j
vulnerabilities.Thatanticipatedworst
casescenariodiscussedinthelast
reportmaterializedthisyearwiththis
lesserknown—butwidelydeployed—
product.WewillbedivingintoadditionaldetailsofMOVEitandvulnerability
exploitationinthe“Action”and“SystemIntrusion”patternsections.
1HaveyoucheckedouttheVERISCommunityDatabase(VCDB)yet?Youshould,it’sawesome!(
/vcdb.html
)
2Wealsopassedourcumulative1millionincidentmilestoneasweforecastinthe2023DBIR,butweareonlymentioningthishereinthefootnotetonotaggravatethereport;itwasvery
disappointedthat1millionisnotenoughtoretireoninthiseconomy.
3We’renotthrowingshade—differenttypesofcontributingorganizationsfocusonwhatismostrelevantforthem,aswelltheyshould.
2024DBIRResultsandanalysis12
Todigfurtherintothisconceptofthewaysin,wearepresentinganewsliceofthedata,whereweareoverlayingthosedifferenttypesofActionswiththeirmostpopularvectorstohelp
focusresponseandplanningefforts.YoucantakeapeekatthoseresultsinFigure7.
Phishingattacksmostlyhavingan
Emailvectorisratherself-explanatory,4sowewouldliketofocusonthe
concentrationoftheWebapplication
vectorprevalenceforbothcredentialsandexploitvulnerability.ThepresenceofCredentialsinthegraphicshould
notbesurprisingasitcarriesalarge
shareoftheguiltforourBasicWeb
ApplicationAttackspattern(i.e.,gettingunauthorizedaccesstocloud-based
emailandcollaborationaccounts).
Butrecencybiasmightmakefolks
doubttheprevalenceofexploitationofvulnerabilities.Becausethisreportisbeingwritteninthebeginningof2024,thefocushasbeenonzero-day(or
near-zero-day)vulnerabilitiesinvirtualprivatenetwork(VPN)software.5
Naturally,theshareofVPNvectorintheexploitvulnvarietywilllikelyincrease
forour2025reporttoreflectthose
trends,butthebottomlineisagainself-evidentandself-explanatory.Anythingthataddstoyourattacksurfaceontheinternetcanbetargetedandpotentiallybethefirstfootholdforanexternal
threatactor,andassuch,thefocusshouldbetotrytokeepfootholdstoaminimum.
NomatterhowyoufeelaboutyourVPNsoftwarerightnow,havingasmany
ofyourwebapplicationsaspossiblebehinditmightbeabetterstrategy
thanhavingtoworryaboutemergencyovernightpatchingofthesoftware—
andalltheotherdependencies
thatpowerthewebapplications
themselves.Thiswillnotcompletelymitigatetheriskandwillnotbethe
Figure7.Selectways-invarietyandvectorenumerationsinnon-Error,non-Misusebreaches(n=2,770)
rightfitforallorganizations,butintheworst-casescenario,theCybersecurityInfrastructureandSecurityAgency
(CISA)mighthaveyouripoutonlyonetoolfromyournetworkasopposed
toseveral.
Anyway,allthisnuancedoesnotaffectouropinionofhavingdesktopsharingsoftwaredirectlyconnectedtothe
internet.Gofixthatpronto,please.
Weareonly
humanafterall.
Oneothercombinedmetricwe
havebeentrackingforafewyears
isrelatedtothehumanelementin
breaches.Thereisalotoffocuson
howfullyautomatedattackscanruinanorganization’sday,6butitisoften
surprisinghowmuchthepeopleinsidethecompanycanhaveapositiveeffectonsecurityoutcomes.
Thisyear,wehavetweakedourhumanelementmetricabitsoitsimpactandactionopportunitiesareclearer.You
see,whenDBIRauthors(andthewholeindustryingeneral)woulddiscuss
thismetric,itwouldbealongsidean
opportunitygapforsecuritytraining
andawareness.Itisnotperfect,butifyouhadaclearinvestmentpaththat
couldpotentiallyimprovetheoutcomesofmorethantwo-thirdsofpotential
breaches,youmightatleastsitdownandlisten.
Itturnsoutthatouroriginalformula
forwhatwasincludedinthehuman
elementmetricbuiltinPrivilege
Misusepatternbreaches,which
arethecasesinvolvingmalicious
insiders.Havingthosemixedwith
honestmistakesbyemployeesdid
notmakesenseifouraimwasto
suggestthatthosecouldbemitigatedbysecurityawarenesstraining.7
4AndanincredibleLforthe*ishingportmanteauenthusiasts
5Unlessbynowwehavesuccessfullyrippedthemoutofournetworksentirelyandarebacktooursmokesignalsandcarrierpigeonways.
6Weourselveswerejusttalkingaboutthegrowthofexploitationofvulnerabilitiesasapathwayintobreaches.
7Wedreadtothinkwhat“awarenesstraining”formaliciousinsiderswouldlooklike.
2024DBIRResultsandanalysis13
Figure8showcasesthenewhumanelementovertime(withmalicious
insidersremoved)toprovideabetterframeofreferenceforourreaders
goingforward.Itispresentinmore
thantwo-thirdsofbreachesas
foreshadowedtwoparagraphsago,
morepreciselyin68%ofbreaches.
Itisstatisticallysimilartoourfindingslastyear,whichmeansthatina
certainway,theincreaseswehad
acrosstheboardintheMiscellaneousErrorspattern(human-centric)and
asaresultoftheMOVEitvulnerability(automated)weresimilarinscope
asfarasthismetricisconcerned.
Fansofthe“originalflavor”human
elementarenotmissingmuchbecausetheinclusionoftheMisuseaction
wouldhavebroughtthepercentage
to76%,statisticallyonlyslightlymorethanthepreviousreport’s74%.Still,
weprefertheclearerdefinitiongoingforward,andwewillleavetheanalysisofthosebothersomeinsidersandtheirmisdeedstothe“PrivilegeMisuse”
patternsection.
Theweakestlinksinthe
chainofinter-connection
Finally,aswereviewthebigpictureofhowthethreatlandscapechangedthisyear,8wewouldliketointroduceanewmetricthatwewillbetrackinggoing
forward.Asthegrowthofexploitationofvulnerabilitiesandsoftwaresupplychainattacksmakethemmore
commonplaceinsecurityriskregisterdiscussions,wewouldliketosuggestanewthird-partymetricwherewe
embracethebroadestpossible
interpretationoftheterm.9HaveapeekatFigure9,wherewecalculateda
supplychaininterconnectioninfluencein15%ofthebreacheswesaw,a
significantgrowthfrom9%lastyear.A68%year-over-yeargrowthisreallysolid,butwhatdowemeanbythis?
Forabreachtobeapartofthesupplychaininterconnectionmetric,itwill
havetakenplacebecauseeitherabusinesspartnerwasthevectorofentryforthebreach(likethenow
fabledheating,ventilatingandair-conditioning[HVAC]companyentrypointinthe2013Targetbreach)orifthedatacompromisehappened
Figure8.Humanelementenumerationinbreachesovertime
Figure9.Supplychaininterconnectioninbreachesovertime
8Numberoftimestheword“MOVEit”ismentionedinthisreport:25
9Inasurprisingrolereversal,asweareoftenverypedanticinourdefinitions
2024DBIRResultsandanalysis14
inathird-partydataprocessoror
custodiansite(fairlycommonintheMOVEitcases,forinstance).Less
frequentlyfoundinourdataset,butalsoincluded,arephysicalbreachesinapartnercompanyfacilityorevenpartnervehicleshijackedtogain
entrytoanorganization’sfacilities.10
Sofar,thisseemslikeaprettystandard
third-partybreachrecipe,butwearealsoaddingcases,suchasSolarWindsand3CX,inwhichtheirsoftware
developmentprocesseswerehijackedandmalicioussoftwareupdates
werepushedtotheircustomersto
bepotentiallyleveragedinasecondstepescalationbythethreatactors.Thosebreachesareultimatelycausedbytheinitialincidentinthesoftwaredevelopmentpartner,andsoweareaddingthosetothistab.
Nowforthecontroversialpart:
Exploitationofvulnerabilitiesiscountedinthismetricaswell.Asmuchaswe
canarguethatthesoftwaredevelopersarealsovictimswhenvulnerabilities
aredisclosedintheirsoftware(and
sure,theyare),theincentivesmight
notbealignedproperlyforthose
developerstohandlethisseemingly
interminabletask.Thesequalitycontrolfailurescandisproportionatelyaffect
thecustomerswhousethissoftware.Wecanclearlyseewhatpowerful
andwide-reachingeffectsahandful
ofzero-dayormismanagedpatching
rolloutshadonthegeneralthreat
landscape.Westoppedshortofadding
exploitationofmisconfigurationsininstalledsoftwarebecause,
althoughthosecouldbearesultofinsecuredefaults,systemadminscangetquitecreativesometimes.
Figure10showsthebreakdown
ofVERISactionsinthesupply
chainmetricand,asexpected,
itisdrivenbyExploitvuln,which
ushersRansomwareandExtortionattacksintoorganizations.
Thismetricultimatelyrepresentsa
failureofcommunityresilienceand
recognitionofhoworganizations
dependoneachother.Everytime
achoiceismadeonapartner(or
softwareprovider)byyourorganizationanditfailsyou,thismetricgoesup.
Werecommendthatorganizations
startlookingatwaysofmaking
betterchoicessoastonotreward
theweakestlinksinthechain.Ina
timewheredisclosureofbreachesisbecomingmandatory,wemightfinallyhavethetoolsandinformationtohelpmeasurethesecurityeffectivenessofourprospectivepartners.
Wewillkeepaclosewatchonthis
oneandseektoimproveitsdefinitionovertime.Wewelcomefeedback
andsuggestionsofalternative
angles,andwebelievetheonly
waythroughitistofindwaysto
holdrepeatoffendersaccountableandrewardresilientsoftwareandserviceswithourbusiness.
Figure10.Actionvarietiesinselectedsupplychaininterconnectionbreaches(n=1,075)
10Weshouldstopwatchingthose“Mission:Impossible”moviesduringDBIRwritingseason.
2024DBIRResultsandanalysis
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2023年辦公照明項(xiàng)目籌資方案
- 【電信終端產(chǎn)業(yè)協(xié)會(huì)】2024年終端智能化分級(jí)研究報(bào)告
- 國際物流題庫(含參考答案)
- 養(yǎng)老院老人生活?yuàn)蕵坊顒?dòng)組織人員行為規(guī)范制度
- 養(yǎng)老院老人健康檔案管理制度
- 《動(dòng)物簡(jiǎn)筆畫的步驟》課件
- 《電子技術(shù)基礎(chǔ)緒論》課件
- 2024年土地承包經(jīng)營(yíng)權(quán)流轉(zhuǎn)與農(nóng)業(yè)品牌建設(shè)合同范本3篇
- 提成協(xié)議書(2篇)
- 2024年版:高級(jí)管理職位聘任協(xié)議
- 音韻學(xué)入門智慧樹知到期末考試答案2024年
- 《煤礦重大事故隱患判定標(biāo)準(zhǔn)》解讀培訓(xùn)課件2024(中國煤礦安全技術(shù)培訓(xùn)中心)
- Q GDW 10115-2022 110kV~1000kV架空輸電線路施工及驗(yàn)收規(guī)范
- MOOC 家具·設(shè)計(jì)·生活-北京林業(yè)大學(xué) 中國大學(xué)慕課答案
- 大學(xué)生心理健康教育-第一章健康心理幸福人生
- 2023年考研政治真題(含答案及解析)
- 教育研究方法智慧樹知到期末考試答案2024年
- 農(nóng)村污水處理設(shè)施運(yùn)維方案特別維護(hù)應(yīng)急處理預(yù)案
- 會(huì)計(jì)學(xué)原理智慧樹知到期末考試答案2024年
- 學(xué)?;ㄌ幪庨L(zhǎng)述職報(bào)告
- 《血站業(yè)務(wù)場(chǎng)所建設(shè)指南 第3部分:獻(xiàn)血屋》
評(píng)論
0/150
提交評(píng)論