主页 / FreeBuf 2017 互联网安全创新大会 / How Cybercrime Bypasses common security controls in the enterprises

-
作者Richard Rushing CISO of Motorola Mobility (a Lenovo Company)
-
简介
- Definition of Bypass
- Items covered
- Network controls--Firewalls
- Network controls-- Firewalls
- Web Application Firewall (WAF)
- File Impersonation
- Browsers – Loading Files
- Sandbox
- Endpoint Proxy/VPN
- Bypassing Endpoints
- Hooking Issues
- Security Logging Tools
- Take Away
-
援引http://www.freebuf.com/news/topnews/124133.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-09-05 13:25:26
-
2017-07-23 16:01:02
-
2021-01-05 13:47:06.770578
-
2020-08-27 04:00:25.560322
附件下载
-
全球高峰会.Richard.Rushing.pptx