主页 / FreeBuf 2017 互联网安全创新大会 / How Cybercrime Bypasses common security controls in the enterprises
-
作者Richard Rushing CISO of Motorola Mobility (a Lenovo Company)
-
简介
- Definition of Bypass
- Items covered
- Network controls--Firewalls
- Network controls-- Firewalls
- Web Application Firewall (WAF)
- File Impersonation
- Browsers – Loading Files
- Sandbox
- Endpoint Proxy/VPN
- Bypassing Endpoints
- Hooking Issues
- Security Logging Tools
- Take Away
-
援引http://www.freebuf.com/news/topnews/124133.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2020-10-16 11:02:52.148551
-
2019-04-29 06:04:12
-
2017-12-05 13:16:58
-
2021-01-05 08:00:06.326518
附件下载
-
全球高峰会.Richard.Rushing.pptx