首页> 外文期刊>SC magazine >Dangerous exploitations
【24h】

Dangerous exploitations

机译:危险操作

获取原文
获取原文并翻译 | 示例
           

摘要

One of the most common questions my clients ask me is what tools will I use to carry out the security assessment of their system or application. In some cases, this question may be driven by a fear that, owing to the fact that my parent organization is well known for producing vulnerability scanning products, I would restrict my investigation to only these tools. In more competitive situations, the client has decided to focus on the type and number of tools that will be utilized - the classic 'mine's bigger than yours' contest of, "so and so says they can detect 5,465 vulnerabilities against your 3,891."
机译:客户问我的最常见问题之一是,我将使用哪些工具来对其系统或应用程序进行安全评估。在某些情况下,这个问题可能是由于担心,由于我的上级组织以生产漏洞扫描产品而闻名,因此,我将调查仅限于这些工具。在更具竞争性的情况下,客户已决定将重点放在将要使用的工具的类型和数量上-经典的“地雷大于您的”,“某某说他们可以检测到3,891个中的5,465个漏洞。”

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号