搜索资源列表

  1. forensics.tools.cybersecurity.pdf.tar

    0下载:
  2. cybersecurtiy handbook for forensic analyse
  3. 所属分类:软件工程

    • 发布日期:2024-05-13
    • 文件大小:5335040
    • 提供者:firelink
  1. survey-of-emerging-threats-in-cybersecurity

    0下载:
  2. survey of emerging threats in cybersecurity
  3. 所属分类:编程文档

    • 发布日期:2024-05-13
    • 文件大小:904192
    • 提供者:book123
  1. HubService

    0下载:
  2. SSH具备多种功能,可以用于很多场合。有些事情,没有它就是办不成。本文是我的学习笔记,总结和解释了SSH的常见用法,希望对大家有用。 虽然本文内容只涉及初级应用,较为简单,但是需要读者具备最基本的"Shell知识"和了解"公钥加密"的概念。(SSH Communications Security helps enterprises secure access today and tomorrow
  3. 所属分类:其他小程序

  1. 2 cyber crime-Lect 2- 120117

    0下载:
  2. Basics of cyber learning
  3. 所属分类:其他小程序

    • 发布日期:2024-05-13
    • 文件大小:71680
    • 提供者:Pikudi
  1. Industrial Control Systems

    0下载:
  2. Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
  3. 所属分类:软件工程类

    • 发布日期:2021-07-24
    • 文件大小:4273410
    • 提供者:Aminos2021
  1. Cybersecurity Strategy Implementation1

    0下载:
  2. The Attack-Centric Strategy had the highest Cybersecurity Fundamentals Scoring System (CFSS) estimated total score. It earned nearly a perfect score with 95 points out of a possible 100.
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:163819
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation2

    0下载:
  2. The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:166745
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation3

    0下载:
  2. An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:147114
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation4

    0下载:
  2. Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:147037
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation5

    0下载:
  2. Once the attackers have successfully installed their tools on the victim's system, they can send commands to their tools or to the system itself.
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:147692
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation6

    0下载:
  2. Knowing what the attacker's Intrusion Kill Chain looks like can help defenders make it much harder for attackers to be successful.
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:149835
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation7

    0下载:
  2. One consideration before implementing this fr a mework is whether defenders should use the original Intrusion Kill Chain fr a mework or update it. There are several ways this fr a mework can be modernized. I'll give y
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:152871
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation8

    0下载:
  2. Another modification to this approach worth considering is whether to update the phases and the actions in the Courses of Action Matrix. For example, the Reconnaissance phase of the Intrusion Kill Chain can be split i
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:147384
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation9

    0下载:
  2. The Weaponization phase is too opaque for most organizations to realistically influence. Put another way, CISOs typically do not have very effective controls for protection and detection prior to the Delivery phase; p
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:152532
    • 提供者:iwc2007008
  1. Cybersecurity Strategy Implementation10

    0下载:
  2. This mapping exercise can help expose optimistic assumptions about organizations' security capabilities. Some security professionals call this type of exercise cartography.
  3. 所属分类:软件工程

    • 发布日期:2022-02-27
    • 文件大小:146814
    • 提供者:iwc2007008
  1. Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

    0下载:
  2. The cybersecurity community is slowly leveraging machine learning (ML) to combat ever-evolving threats. One of the biggest drivers for the successful adoption of these models is how well domain experts and users can un
  3. 所属分类:其他书籍

    • 发布日期:2024-01-04
    • 文件大小:28830371
    • 提供者:iqzer0

源码中国 www.ymcn.org