首页> 外文期刊>eWeek >Chasing the culprits
【24h】

Chasing the culprits

机译:追凶

获取原文
获取原文并翻译 | 示例
           

摘要

When indications of a worm exploiting the LSASS vulnera-bility in Windows surfaced April 30, the staff at Microsoft Corp.'s Security Response Center didn't hesitate; they knew exactly what to do. Within an hour of the first reports of the worm, which would later come to be known as Sasser, Kevin Kean was on a conference call with the company's internal penetration testers, field representatives and partners in the Virus Information Alliance. The group went over details to determine whether the threat was serious enough to call out the heavy hitters and move into what's known as "immediate response" phase.
机译:4月30日,当有迹象表明蠕虫利用Windows中的LSASS漏洞时,微软公司安全响应中心的工作人员毫不犹豫。他们确切地知道该怎么办。在首次报告该蠕虫(此后被称为Sasser)的一个小时之内,Kevin Kean参加了与公司内部渗透测试人员,现场代表和病毒信息联盟合作伙伴的电话会议。该小组仔细研究了详细信息,以确定威胁是否严重到足以招募沉重的打击者,并进入所谓的“立即响应”阶段。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号