본문 바로가기

Solutions(솔루션)14

Analysis of Hacking Methods for Home Cams, IP Cameras, and CCTVs: How Security Guards Handle It Hello, TTools > Preferences > ports Enter port information to locate Inputs 80, 8080, and 23 that are commonly used by web camerasools > Preferences > ports Enter port information to locate Inputs 80, 8080, and 23 that are commonly used by web camerasTools > Preferences > ports Enter port information to locate Inputs 80, 8080, and 23 that are commonly used by web camerasI'm security defender PR... 2020. 5. 31.
Is a complete crime possible? Even using VPN, I can know who you are! Hello, I'm security defender PR. Can we hide behind anonymity today to find out who the increasingly aggressive and ugly comment unit and the modulated IP via VPN are?I'm going to talk about something. The conclusion is 100% clear. I'll let you know the reason for now. Today, we will not talk about anonymity guarantee on the Internet or about pros and cons of preventing damage from comment manip.. 2020. 5. 31.
Part 2 (middle level). Leverage network security equipment (firewall UTM next generation firewall) NFV and what happens to firewalls in the cloud environment? Hello, I'm security defender PR. We have unified the basic functions and terminology of firewalls through Part 1 Firewall (UTM). I hope you watch the first episode. Where are your important data? Not the USB. We're security defender. You're on your office NAS? You have a DB server in IDC and you're going to duplicate it with backup? And now you use clouds like Amazon, MS, and KT? This critical i.. 2020. 5. 29.
Part 1. Network security (UTM firewall router), next-generation firewall (NGFW), SSL firewall and NFV. Hello, I'm security defender PR. Before we begin, this firewall episode consists of two episodes. The first one is for beginners, and the purpose is to unify the information and terminology of the firewall. The second installment is a mid-level security guard who will talk about the future direction of firewall development. You can see. you can control All the security guys who are looking at th.. 2020. 5. 29.
Ransomware Realistically Defends (Enterprise) Hello, I'm security defender PR. Corporate administrators focused on how corporate IT assets and internal employees can prevent and recover from ransomware damage. There are many ransomware-specific solutions in the market, but ransomware is not something that can be solved only by a specific product. Where are important files kept? Is it not a network configuration that is vulnerable to ransomw.. 2020. 5. 29.
What about the Anti-DDoS attack? What keeps happening? Hello, I'm security defender PR. Although DDoS attacks seem to have decreased a lot recently, they have not been reported in the media since the '17 Armada Collective' financial DDoS attacks, and DDoS attacks are ongoing.​​ Why are you attacking DDoS today? Are you constantly coming in? We'd like to take some time to learn about what it's used for. What is a DDoS attack? Distributed Denial of Se.. 2020. 5. 29.
How does a security control company detect and defend hacking? (feat.IDS, IPS, NGIPS, SIEM) Hello, I'm security guard PR. There are many security control companies in Korea. Let's look at how multiple security equipment and solutions know and respond to network intrusions. There are a lot of detection solutions, but network security is the most important thing to do ➤ Respond to real-time monitoring and attacks with IDS/IPS + SIEM (ESM). [Real-time Attack Detection Process] 1. Setting .. 2020. 5. 29.
Information Security Specialist's Annual Salary Disclosure!!! Hello, I'm security defender PR. Many companies in Korea need information protection specialists. Just search the job site as 'Information Protection' and you'll see how many information protection professionals companies need. About 10,000 people are working as information protection experts in Korea, but the reality is that they are still lacking a lot. So, what is the most curious annual sala.. 2020. 5. 29.
How should a security officer at a small business set up a security plan? Hello, I'm security defender PR. For small and medium-sized businesses, it's very difficult to introduce a variety of solutions. Small businesses need to pay to deploy firewalls or UTMs, and managers don't approve them. For most small businesses, the security environment is too poor. The PC is outdated, and the vaccine manages documents in private and public networks, so data transfers and docum.. 2020. 5. 29.
Ransomware is targeting your PC Hello~ I'm PR, the security defender. I've got an interesting article on the security news. The article is as follows. 'Caution of large-scale virtual currency mining using NSA's hacking tools' The content is called "Beapy," an attack that focuses on "cribtojacking" aimed at virtual currencies targeting Chinese companies. Attackers try to infiltrate first through e-mail, plant virtual currency m.. 2020. 5. 29.