首页
学习
活动
专区
圈层
工具
发布
    • 综合排序
    • 最热优先
    • 最新优先
    时间不限
  • 来自专栏debugeeker的专栏

    CISSP考试指南笔记:3.21 站点和设施安全

    The threats that an organization faces fall into these broad categories: Natural environmental threats earthquakes, storms and tornadoes, fires, extreme temperature conditions, and so forth Supply system threats interruptions, and interruption of other resources such as water, gas, air filtration, and so on Manmade threats employees, employee errors and accidents, vandalism, fraud, theft, and others Politically motivated threats

    38320发布于 2021-02-02
  • 来自专栏AI SPPECH

    MCP 的安全威胁模型

    = detector.detect_threats(normal_request, user_permissions=["echo"]) print(f"Normal request threats : {normal_threats}") # 测试伪造身份请求 spoofing_threats = detector.detect_threats(spoofing_request , user_permissions=["echo"]) print(f"Spoofing request threats: {spoofing_threats}") # 测试篡改参数请求 tampering_threats = detector.detect_threats(tampering_request, user_permissions=["echo"]) print = assessor.prioritize_threats(threats) print(f"Prioritized threats: {prioritized_threats}") if

    32110编辑于 2026-01-10
  • 来自专栏debugeeker的专栏

    CISSP考试指南笔记:1.13 风险评估和分析

    assessment, which is really a tool for risk management, is a method of identifying vulnerabilities and threats Risk analysis is used to ensure that security is cost effective, relevant, timely, and responsive to threats Identify vulnerabilities and threats. Quantify the probability and business impact of these potential threats.

    80620发布于 2020-12-21
  • 来自专栏Pseudoyu

    ECOM6013 Topic 6 E-Commerce Security

    engineering (non-technical attack, trick users to do some certain actions) Spam E-Commerce of Today Threats thefts Identity thefts Malware Solutions Authentication Intrusion checking Firewalls Education Security Threats points of vulnerability Client Server Communication pipeline (network channels) Most Common Security Threats eavesdropping program that monitors information traveling over a network) Insider jobs Single financial threats clients OS security Upgrades Patches Anti-virus software Easiest and least expensive way to prevent threats

    39410编辑于 2023-04-11
  • 来自专栏debugeeker的专栏

    CISSP考试指南笔记:3.22 站点规划过程

    Threats can be grouped into categories such as internal and external threats.

    60220发布于 2021-02-02
  • 来自专栏信数据得永生

    CEH v8~v11 Module Slides 和 Lab Manual 下载

    Reconnaissance CEH v9 03 Scanning Networks CEH v9 04 Enumeration CEH v9 05 System Hacking CEH v9 06 Malware Threats CEH v10 04 Enumeration CEH v10 05 Vulnerability Analysis CEH v10 06 System Hacking CEH v10 07 Malware Threats CEH v11 04 Enumeration CEH v11 05 Vulnerability Analysis CEH v11 06 System Hacking CEH v11 07 Malware Threats

    35520编辑于 2022-05-07
  • 来自专栏愷龍的Blog

    云计算第六章

    § IT security measures aim to defend against threats and interference that arise from both malicious 1.Both manually and automatically instigated(激起) threats are designed to exploit (利用 )known weaknesses Security Controls 安全控制 Security controls are countermeasures(对策) used to prevent or respond to security threats 一个威胁作俑者是一个构成威胁的实体 Cloud security threats can originate either internally or externally①, from ②humans human-driven attack is the workstation combined with a lightning(闪电) bolt 表示通过工作站发起攻击的记号 Cloud Security Threats

    56530编辑于 2022-09-26
  • 来自专栏Flink实战应用指南

    Flink Forward 2019--实战相关(14)--Arctic Wolf Networks分享事件流攻击

    our security engineers to quickly pick out the small subset of these events that represent security threats Together, Flink and Esper enhance our security engineers’ visibility into threats faced by our customers and reduce the time investment needed to identify these threats, allowing for more comprehensive and

    83030发布于 2019-08-06
  • 来自专栏猫头虎博客专区

    面试时的问题解决:展示你的逻辑思维与分析能力

    # SWOT分析示例代码 def swot_analysis(strengths, weaknesses, opportunities, threats): print("Strengths:" strengths) print("Weaknesses:", weaknesses) print("Opportunities:", opportunities) print("Threats :", threats) swot_analysis("Good at coding", "Poor communication", "New market", "High competition")

    46710编辑于 2024-04-09
  • 来自专栏AI SPPECH

    015_具身人工智能的安全防护体系:多层次防御与主动响应策略

    ': correlated_threats, 'threat_assessment': self. _assess_threats_severity(correlated_threats) } def update_detection_models(self, component_id _identify_relevant_threats(latest_threats, current_state), 'applicable_rules': [r['rule_id _collect_internal_threats(), 'external_threats': self. _collect_external_threats(), 'industry_alarms': self.

    42110编辑于 2025-11-19
  • 来自专栏公共互联网反网络钓鱼(APCN)

    账户入侵应急响应机制与身份恢复策略的时效性研究

    = self.account.owner_verified_email: threats.append("Recovery Email Changed Recently") (f"Suspicious OAuth App: {app.app_name}") self.risk_score += 20 return threats True return False# 模拟运行user = AccountSystem("victim_user")engine = AccountRecoveryEngine(user)threats = engine.scan_persistence_mechanisms()if threats: print(f"Threats found: {threats}") engine.execute_emergency_lockdown ()else: print("No immediate persistence threats detected.")该逻辑模型强调了自动化扫描与即时阻断的重要性。

    24310编辑于 2026-03-23
  • 来自专栏Biometrics

    Digital Identity Verification and its Pros and Cons

    This rapid growth is primarily due to the increased number of fraudulence cases and security threats diligence and install strong verification mechanisms to prevent identity proofing and data breaching threats

    1K00发布于 2020-01-20
  • 来自专栏Khan安全团队

    Microsoft Windows Defender / 检测绕过

    [参考] Trojan:Win32/Powessere.G https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description 2FPowessere.G%21lnk&ThreatID=2147752427 Backdoor:JS /Relvelshe.A https://www.microsoft.com/en-us/wdsi/threats

    1.5K10编辑于 2022-01-14
  • 来自专栏用户4822892的专栏

    5 Plugins You Must Install In Your WordPress Theme

    WordPress is the content management system with the most occurrence of security threats. This plugin helps detect security threats and alerts you via mail.

    47730发布于 2020-01-13
  • 来自专栏时空探索之旅

    AAAI 2026 | 图基础模型(GFM)&文本属性图(TAG)论文总结

    Towards Robust Text-Attributed Federated Graph Learning: Multimodal Threats and Defense3. Xiwei Xu 关键词:动态文本图,多模态,链接预测 2 Towards Robust Text-Attributed Federated Graph Learning: Multimodal Threats

    22210编辑于 2026-03-10
  • 来自专栏AI SPPECH

    AI-Security-Guardian:2025年AI安全防护框架的技术突破与实践

    self.anomaly_detector = AnomalyDetector() def detect(self, monitoring_data): # 检测威胁 threats (anomaly_threat) return threats def update_detection_models(self): IsolationMechanism() self.remediation_advisor = RemediationAdvisor() def respond(self, threats , ai_system): # 响应威胁 responses = [] for threat in threats: 12-30"}) print("\n安全报告摘要:") print(f"检测到的威胁数量:{report['threat_count']}") print(f"主要威胁类型:{report['top_threats

    50410编辑于 2026-01-01
  • 来自专栏红蓝对抗

    人工智能攻势:如何优化在网络安全的投资,利用人工智能技术预防和检测攻击

    C-level executives, directors, and managers worldwide to understand how they are addressing the cyber threats sources of anomalies that could create potential risks such as fraud, money laundering, and insider threats Quickly search for new threats by importing known tactics, techniques, procedures, and attack patterns , along with vulnerability details and remediation information, to help neutralize threats early in the analytics can also lift your company’s cyber capabilities to the next level by giving you visibility on the threats

    21010编辑于 2026-01-25
  • 来自专栏AI SPPECH

    016_具身人工智能的安全开发生命周期:从需求分析到部署运维的全流程安全保障

    (self, threat_list): """识别潜在威胁""" for threat in threat_list: self.threats.append 未定义") }) def assess_risks(self): """进行风险评估""" for threat in self.threats "assets": self.assets, "attack_surfaces": self.attack_surfaces, "threats ": self.threats, "risks": sorted(self.risks, key=lambda x: x["risk_score"], reverse=True) "category": "物理攻击", "target": "运动控制系统", "impact": "物理伤害"} ] threat_model.identify_threats

    29310编辑于 2025-11-19
  • 来自专栏FreeBuf

    2月以来,欧洲移动恶意软件激增 500%

    参考来源 https://www.proofpoint.com/us/blog/email-and-cloud-threats/mobile-malware-surging-europe-look-biggest-threats

    72420编辑于 2022-04-11
  • 来自专栏公共互联网反网络钓鱼(APCN)

    AI 赋能下新型网络钓鱼攻击演进与多维度防御技术研究

    ""一体化检测入口""" img, gray = preprocess_image(image_path) qr_list = detect_and_decode_qr(gray) threats ://', url) and is_malicious_url(url, vt_api_key): threats.append({"url": url, "bbox": qr[" bbox"], "risk": "malicious"}) return threats# 调用示例if __name__ == "__main__": VT_API_KEY = "your_virustotal_api_key " threats = scan_email_qr_threat("email_attachment.png", VT_API_KEY) for t in threats: print

    19010编辑于 2026-04-03
领券