IT 와 Social 이야기/Security419 [US-CERT: Bulletin(SB15-089)] 2015년 3월 23일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 3. 31. [Yashin Mehaboobe] Making and breaking security in embedded devices Making and breaking security in embedded devices from Yashin Mehaboobe 2015. 3. 30. [ENISA] The Internet of Things: Privacy and Security Issues The Internet of Things: Privacy and Security Issues from European Union Agency for Network and Information Security (ENISA) 2015. 3. 29. Security Auditing(내부보안감사) vs. Penetration Test(모의침투/해킹) 2015. 3. 24. 이전 1 ··· 40 41 42 43 44 45 46 ··· 105 다음