期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
使用跨站伪造请求(CSRF)来攻击网络设备 被引量:1
1
作者 钱伟俊 《信息安全与通信保密》 2014年第8期115-117,共3页
文中详细阐述了攻击者利用跨站伪造请求(CSRF)的方法来远程对网络设备开展攻击渗透的具体方法与步骤,阐明通过用户浏览器提交相关命令的操作过程,相关漏洞攻击的例子可有利于建立安全研究和安全审计的概念。
关键词 CSRF 浏览器安全 网络设备攻击
原文传递
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
2
作者 Xiaoqin Song 《International Journal of Technology Management》 2015年第10期50-52,共3页
In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network... In this paper, we conduct research on the essential network equipment risk assessment method based on vulnerability scanning technology. A growing number of hackers wanton invasion of the computer, through the network to steal important information, or destroy the network, the paralyzed which caused huge losses to the state and society. Find a known vulnerability rather than to find the unknown vulnerabilities much easier, which means that most of the attacker' s use is common vulnerabilities. Therefore, we adopt the advantages of the technique to finalize the methodology for the essential network equipment risk assessment which will be meaningful. 展开更多
关键词 Risk Assessment Vulnerability Scanning Network Security Essential Equipment.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部