Summary of EU GDPR stakeholders
Summary of EU GDPR stakeholders
Summary of EU GDPR stakeholders 더 읽기"
Summary of EU GDPR stakeholders
Summary of EU GDPR stakeholders 더 읽기"
CLIENT A company (oil refinery) BACKGROUND AND TOPIC As a global company, it operates a large number of information systems and is obliged to comply with legal regulations in the Information and Communication Network Act, it regularly explores vulnerabilities and hacks to professional firms every year. As the social issue of APT attack became big in
APT VULNERABILITY CHECK CONSULTING CASE 더 읽기"
There was a consulting request from the client company for the AD security policy. AD security policy can be seen from various points of view from design of AD to account management, but since the total number of accounts is over 100,000, this consulting focused on identifying the latest issue, abnormal account, and suggesting improvement
CONSULTING CASE OF SECURITY TEST ON AD SECURITY POLICY 더 읽기"
CLIENT The Ministry of Information and Communication of Moldova NATIONAL ICT STATUS The Republic of Moldova, which is a developing country in Eastern Europe, is centered on the Ministry of Information and Communication (MITC), the Ministry of Information Technology and Communication (MITC), which establishes a national e-government plan called e-Moldova and invests about 8% Digital
NATIONAL CYBER SECURITY STRATEGY PLANNING CONSULTING 더 읽기"
CLIENT A refinery (refinery) PROJECT BACKGROUND AND TOPIC As a representative company in the petroleum industry, the customer is a representative company of the oil industry. In order to secure the security of the process control system of the large refinery owned by the province, based on the objective related standards at the international level,
A REFINERY PROCESS CONTROL SYSTEM CONSULTING CASE 더 읽기"
Most of the application source vulnerability diagnoses will receive a large number of source files and perform vulnerability diagnostics. Most of them are static diagnosis using a tool for diagnosing source vulnerabilities such as Fortify and dynamic manual diagnosis of a professional consultant. In this situation, it is common to utilize some useful tools because
USEFUL TOOLS FOR APPLICATION SOURCE CODE REVIEW 더 읽기"
SUMMARY VPN has various methods such as remote access from site-to-site. However, from the viewpoint of an attacker, it is an attractive hacking object that can penetrate into an important path to enter an internal network only if a VPN is penetrated. Actually, site: vpn. * Com is a lot of domestic sites starting with vpn
A PENETRATION TEST CASE ON “A” COMPANY’S VPN 더 읽기"
## There are many purposes to hide your IP – When Google pulled out of China, there were a lot of Chinese who used public VPNs to bypass blocking– There is a situation where you have to hide your IP inevitably in order to execute Real PT composed of Red Team– It may be used
A SIMPLE PROGRAM TO HIDE YOUR IP WITH OPENVPN 더 읽기"