主页 / FreeBuf 2017 互联网安全创新大会 / How Cybercrime Bypasses common security controls in the enterprises
-
作者Richard Rushing CISO of Motorola Mobility (a Lenovo Company)
-
简介
- Definition of Bypass
- Items covered
- Network controls--Firewalls
- Network controls-- Firewalls
- Web Application Firewall (WAF)
- File Impersonation
- Browsers – Loading Files
- Sandbox
- Endpoint Proxy/VPN
- Bypassing Endpoints
- Hooking Issues
- Security Logging Tools
- Take Away
-
援引http://www.freebuf.com/news/topnews/124133.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-07-30 10:44:19
-
2018-09-17 14:17:47
-
2017-11-27 10:31:38
-
2017-01-20 11:53:58
附件下载
-
全球高峰会.Richard.Rushing.pptx