IT 와 Social 이야기/Security419 [re4lfl0w] How to automate webhacking.kr with Python - 파이썬을 활용한 웹해킹 자동화 20150904 (cyber security)_how_to_automate_webhacking.kr_with_python_presentation from re4lfl0w 2015. 10. 1. [Clare Nelson] The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Technology is Irresponsible 보안 인증체계의 중요성 The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Technology is Irresponsible from Clare Nelson, CISSP 2015. 9. 30. [Cybrary] Vulnerabilities vs Penetration Testing - 보안 취약점 분석과 모의 해킹 Vulnerabilities vs Penetration Testing from Cybrary 2015. 9. 29. [US-CERT: Bulletin(SB15-271)] 2015년 9월 21일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 9. 29. 이전 1 ··· 3 4 5 6 7 8 9 ··· 105 다음