随笔分类 -  学问

1 2 3 4 5 ··· 13 下一页
摘要:# SAP System Security & Authorizations 1 ### Introduction to SAP and important concepts related to SAP Security ##### SAP & its components introductio 阅读全文
posted @ 2023-07-30 22:29 晨风_Eric 阅读(21) 评论(0) 推荐(0) 编辑
摘要:Wireshark for Ethical Hackers - 11 Capturing Traffic Where to capture traffic? Locally (GUI and CLI) Remotely Inline Hub - Half duplex Test Access Por 阅读全文
posted @ 2022-10-20 10:52 晨风_Eric 阅读(18) 评论(0) 推荐(0) 编辑
摘要:一些旧版本系统可能完全无法更换,这一现象对工业环境中的操作技术来说很常见。在这种情况下,风险从业人员应该谨记,其作用不是去否定特定的行为,而是与风险所有者一起建立可接受的风险水平。 阅读全文
posted @ 2022-09-29 11:52 晨风_Eric 阅读(17) 评论(0) 推荐(0) 编辑
摘要:To ensure accountability, the ownership of risk must be with an individual, not with a department or the organization as a whole. 阅读全文
posted @ 2022-07-20 16:46 晨风_Eric 阅读(27) 评论(0) 推荐(0) 编辑
摘要:Understanding risk includes understanding the goals, objectives, values and ethics of the organization. 阅读全文
posted @ 2022-06-19 18:26 晨风_Eric 阅读(21) 评论(0) 推荐(0) 编辑
摘要:CRISC Learning Notes 2 - Risk Governance Four main objectives of risk governance: Establish and maintain a common risk view. Integrate risk management 阅读全文
posted @ 2022-05-29 23:10 晨风_Eric 阅读(39) 评论(0) 推荐(0) 编辑
摘要:OSCP Security Technology - Gaining Root with Metasploit Analysis nmap scanning result. searchsploit samba 2.2 msfconsole search trans2open use exploit 阅读全文
posted @ 2021-07-07 08:21 晨风_Eric 阅读(34) 评论(0) 推荐(0) 编辑
摘要:Enterprise OAuth 2.0 - OAuth2.0OpenID Connect For the Enterprise(4) OAuth 2.0 and OpenID Connect OAuth 2.0 is for authorization Access token should co 阅读全文
posted @ 2021-05-05 20:29 晨风_Eric 阅读(47) 评论(0) 推荐(0) 编辑

1 2 3 4 5 ··· 13 下一页
点击右上角即可分享
微信分享提示