Taking struts2 as an example, teach you to build a security defense with Internet thinking | Hard creation open class preview
Xiao Ming and Xiao Hong are neighbors.
Xiao Ming has some technical skills and he has a crush on Xiao Hong.
However, Xiao Ming, who has low emotional intelligence, hacked into his neighbor Xiao Hong's network without Xiao Hong's knowledge, stole Xiao Hong's various daily photos from her computer, and made a sensational confession website, attached these pictures, and sent them to Xiao Hong, thinking he had successfully done so.
Xiao Ming, dead.
It's not a big deal if your confession fails. The most painful thing in the world is that someone hacked into your home network without you knowing it. The Internet has long become a battlefield without the smoke of gunpowder.
For individual users, it may be the theft of private information and electronic property, etc. For corporate networks, the situation may be even more serious.
All the time, there are thousands of scanners scanning non-stop, and various systems, middleware, and web programs are exposed to vulnerabilities . There is a group of people who launch crazy attacks in order to steal user data, launch DDoS attacks , and extort money.
In fact, attacks are not terrible. According to statistics, 98% of attacks are tentative. What is terrible is the success of attacks - intrusion. How to resist intrusion, detect intrusion early, and even prevent intrusion in its infancy is extremely important for an enterprise network.
On March 15, follow Baidu Security Senior Security Engineer Xiao Huihui to build an effective enterprise-level security defense.
Guest Profile
Xiao Huihui, a senior security engineer at Baidu Security, is mainly responsible for Baidu's business emergency response, intrusion investigation, 0Day analysis, etc. He is also the technical leader of Baidu's security monitoring system construction. His main technical research directions are Web security and hardware security.
brief introduction
-
The current security situation of enterprises and common defense methods and shortcomings, as well as an introduction to related fields at this year's RSA;
-
My philosophy of defense (sweep, defend, monitor);
-
About monitoring: How to perceive common high-risk vulnerabilities from a fundamental level with Internet thinking;
-
About monitoring: some ideas and effects of intrusion detection on traffic;
-
Effective emergency response process (taking the recently popular struts2 as an example).
Event Details
Event time: March 15 at 8 pm
Activity format: Douyu live broadcast (room number: 788495) + WeChat group and guest Q&A interaction
This special open class for hard entrepreneurship will have two parts: [Douyu live broadcast + WeChat group Q&A]. Readers can apply to join the WeChat group for this event. After the live lecture by the guest, they will have a Q&A session with group members in the WeChat group.
How to register: Scan the QR code on the poster below, follow the "Leiphone.com" public account, and reply "142" in the public account to register.