主页 / FreeBuf 2017 互联网安全创新大会 / How Cybercrime Bypasses common security controls in the enterprises
-
作者Richard Rushing CISO of Motorola Mobility (a Lenovo Company)
-
简介
- Definition of Bypass
- Items covered
- Network controls--Firewalls
- Network controls-- Firewalls
- Web Application Firewall (WAF)
- File Impersonation
- Browsers – Loading Files
- Sandbox
- Endpoint Proxy/VPN
- Bypassing Endpoints
- Hooking Issues
- Security Logging Tools
- Take Away
-
援引http://www.freebuf.com/news/topnews/124133.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2021-12-03 13:56:26.349304
-
2020-08-26 13:54:24.141325
-
2019-08-29 06:50:08
-
2020-08-24 04:42:04.760475
附件下载
-
全球高峰会.Richard.Rushing.pptx