The Strongest Hacker in the City
Chapter 248
Chapter 248 Establish a Threat Intelligence Alliance! (3 more, please order!)
At six o’clock in the morning on Saturday, in the large gymnasium of Lakeside University, a total of two hundred companies set up their booths here.
Including a variety of high-tech products, the latest research and development products
Soon, at nine o’clock in the capital, the safety peak was officially held!
Accompanied by thunderous applause, President E Baoyun, President Penguin Teng, President Du Niang Li and many other bigwigs stepped onto the front desk.
Immediately afterwards, E Baoyun always picked up the microphone to convey the main spirit of this security summit.
“Everyone knows some things that have happened in the world recently.”
“What I want to say is that behind the technological war, there is still a network war! It is a battle for network data!”
“The cyber security industry is related to the economic lifeline of domestic enterprises!
“So, this time I call on you all to come and gather together and have a talk!”
“The Longteng Security Summit is divided into two sessions!”
“Business field on Saturday, hacker field on weekend!”
“The enterprise field is a professional field that focuses on corporate safety practices. We have invited experienced technical personnel from well-known domestic companies to share corporate safety practices.”
“We have four processes!
“Point: Use the power of users to promote the development of safety.”
“Line: The Longteng vulnerability platform was established. Hackers submit a large number of security vulnerabilities on the platform and find solutions.”
“Face: Hackers provide technical knowledge supplements so that they can feed back more security issues!”
“Body: Build Longteng’s Safe Ecosystem!”
President Yun paused and continued: “The Dragon Security Ecosystem to be built next will mainly have four roles. Hackers, Internet users, enterprises/technical practitioners, security companies/tripartite institutions!”
“Each role connects and responds to each other, so as to promote the sound development of the safety industry ecology.
“As we all know, with the intensifying trade war, in the near future, a brand-new information war is about to unfold!”
“In the past few days, I have communicated with some corporate executives and our technical personnel. I have also communicated with President Penguin Teng and President Du Niang Li.”
“We propose to establish a threat intelligence alliance!!”
“Threat intelligence is to adopt a corresponding empirical knowledge for existing or new threats or risks, including background, operating mechanism, identification, revelatory and operational recommendations.”
“For enterprises, data security and business security are two major pieces that cannot be ignored. For example, the core data stored on the server side, the core code is stolen, fleeed, and the library is rammed, all pose a huge threat to the enterprise. ”
“Longteng now proposes the Threat Intelligence Alliance, which aims to prevent future threats before they occur and save future security costs by adopting existing new technologies and analyzing its own business data.
“In fact, for enterprises, the security situation has changed a lot. The security of enterprises used to be passive and beaten. Nowadays, the role is slowly changing, starting to change from passive to active, and actively looking for countermeasures.”
“Now, let us listen to the aspirations of corporate security personnel of major Internet technology companies.” After that, Mr. Yun turned his head.
“First of all, I would like to ask, Du Niang, senior senior internet technology scientist, Ding Yuan!’
“Please!” President Yun made a please gesture, and then slowly left the podium.
At this time, a middle-aged man in a suit underneath walked up quickly.
He is Du Niang’s cyber security director, Ding Yuan!
Master half of Duniang Internet security.
In Du Niang, his reputation is the same as that of Brother Dao in Ebao.
Ding Yuan stood in front of the podium, put down the manuscript he had prepared for a long time, and then looked at the large and small Internet technology companies underneath, said.
“We have never stopped fighting against malware!”
“In view of the past two years, we have been studying the A1 field! And the field of big data!”
“My research found that large-scale data and machine learning are used to conduct malware behavior mining and DNS infrastructure protection.
“The cat and mouse game between security personnel and malware authors will become more and more interesting!”
“The mice will no longer take the initiative to run to the honeypot and hug the cat. They will use more complicated methods and strategies to hide themselves and avoid the cat’s tracking.”
“But cats are not vegetarian!”
“Next, let me show you the brand new data science method we are conquering!”
As he said, Ding Yuan’s baton pointed at the projector behind him.
Suddenly, a complicated data graph jumped out.
“This is domestic real-time data! We can use big data to construct intelligent machines!”
“By looking for the associations between malicious software CC domain names and establishing domain name reputation maps, machine learning methods are used to expose these cc domain names to themselves.
“This method of automatically discovering cc domain names does not require any prior knowledge about malware behavior analysis and DGA algorithms.
*^ “It can be another powerful tool in the hands of security personnel in addition to honeypot capture and reverse engineering.”
After speaking for a full ten minutes, Ding Yuan bowed slightly to everyone and walked off the stage.
President Yun stepped onto the podium, slightly polite, and then said: “Next, I will invite Ebao Network Information Security Director-Wu Qing.”
After Wu Qing walked up, he smiled at everyone without trembling, and went straight to the point.
“In recent years, security threats have gradually transitioned from the system level to the application level.”
“Enterprises’ external apps and internal apps have appeared one after another. The Pingan Group itself has 80 iOS apps and 72 Android apps.”
“But they put the security center on the external APP of the company, but ignored the APP used by internal employees.”
“If the attacker obtains the relevant authority, it is equivalent to having captured the rear nest.”
“For example, a certain (Zhao Nuo’s) airline APP has an unauthorized loophole that can traverse all airline employee information, including flight attendants and flight attendants. This is fatal for airlines.”
“Information leakage means that the possibility of being replaced is extremely high!’
“So, we have to trace the source of Internet information!”
“Black production has become more and more magical, which can endanger every general public. Fortunately, there are already many security researchers studying the issue of black production.”
“But” said Wu Qing’s tune slightly improved a lot, and then said: “Online prevention and control such as anti-virus software can’t solve the fundamental problem.”
“Most of the black production personnel perform physical attacks. If you want to find the black hand behind the scenes, you need to do some network traceability!”
“There are many ways to trace the source, such as finding the IP address through Penguin, and then searching for real people; searching for relevant information through social information, etc.,
You'll Also Like
-
Villain: Master Forbidden Empress, I am invincible!
Chapter 465 10 hours ago -
Villain: You were the one who suggested breaking off the engagement, why are you crying now?
Chapter 656 10 hours ago -
I, the fighting party, became Xiaozhi's golden finger
Chapter 948 10 hours ago -
Young man on white horse, I am in the human world, who dares to call himself an immortal?
Chapter 240 10 hours ago -
Starting from not paying back debts to start technological hegemony
Chapter 513 10 hours ago -
Pirates: Beginning with the Patrolman
Chapter 213 10 hours ago -
I'm the villain! Why are all the heroines surrounding me?
Chapter 131 10 hours ago -
The real young master was reborn and went crazy, and the whole family regretted and cried
Chapter 465 10 hours ago -
Let you be a policeman and arrest the chief
Chapter 522 10 hours ago -
Weird: To avoid disaster and seek good fortune, start by watching the red moon at night
Chapter 110 10 hours ago