主页 / FreeBuf 2017 互联网安全创新大会 / How Cybercrime Bypasses common security controls in the enterprises
-
作者Richard Rushing CISO of Motorola Mobility (a Lenovo Company)
-
简介
- Definition of Bypass
- Items covered
- Network controls--Firewalls
- Network controls-- Firewalls
- Web Application Firewall (WAF)
- File Impersonation
- Browsers – Loading Files
- Sandbox
- Endpoint Proxy/VPN
- Bypassing Endpoints
- Hooking Issues
- Security Logging Tools
- Take Away
-
援引http://www.freebuf.com/news/topnews/124133.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2017-06-22 15:20:04
-
2017-11-27 10:31:38
-
2018-08-19 12:42:55
-
2017-11-25 08:58:06
附件下载
-
全球高峰会.Richard.Rushing.pptx