Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 3|回復: 0

the damage could be that the infected computer

[複製鏈接]

1

主題

1

帖子

5

積分

新手上路

Rank: 1

積分
5
發表於 2024-3-5 18:56:51 | 顯示全部樓層 |閱讀模式
Although it is difficult to completely block them, in order to prevent information from being leaked or tampered with without your knowledge, it is possible to minimize the damage in the unlikely event that it occurs by introducing tools to detect such actions. . For example, at GIG, we use the following tools to ensure safety during development. Tampering detection tool (AWS AIDE: The tampered part is recorded in a log file, allowing you to track the content of the tampering and the date and time it occurred ) WAF (AWS WAF: A web application firewall that can detect and block communications that meet conditions at the application level.

Effective against SQL injection, cross-site scripting, and DDoS attacks on applications .) Monitoring tools (CloudWatch) allow you to monitor applications, detect and troubleshoot abnormal behavior in your environment, configure and execute automated Phone Number List actions, and discover insights. They also collect data in specific formats and monitor your entire system. (Can also be used for analysis) Threat 3. Malware attacks Malware is a general term that refers to malicious software, including computer viruses.





In addition to information leakage, of a third party is taken over and used as a stepping stone to attack other computers. Be careful, as there are some that prompt the user to execute the program themselves and perform fraudulent processing behind the scenes. For countermeasures, you can use the tampering detection tools, WAF, and monitoring tools introduced in the section on cyber attacks. Additionally, to reduce the risk of computer virus infection, it is important not to install programs from unknown sources unnecessarily.

回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

Archiver|手機版|自動贊助|GameHost抗攻擊論壇

GMT+8, 2025-5-25 09:03 , Processed in 0.032814 second(s), 18 queries .

抗攻擊 by GameHost X3.4

© 2001-2017 Comsenz Inc.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |