|
Although it is difficult to completely block them, in order to prevent information from being leaked or tampered with without your knowledge, it is possible to minimize the damage in the unlikely event that it occurs by introducing tools to detect such actions. . For example, at GIG, we use the following tools to ensure safety during development. Tampering detection tool (AWS AIDE: The tampered part is recorded in a log file, allowing you to track the content of the tampering and the date and time it occurred ) WAF (AWS WAF: A web application firewall that can detect and block communications that meet conditions at the application level.
Effective against SQL injection, cross-site scripting, and DDoS attacks on applications .) Monitoring tools (CloudWatch) allow you to monitor applications, detect and troubleshoot abnormal behavior in your environment, configure and execute automated Phone Number List actions, and discover insights. They also collect data in specific formats and monitor your entire system. (Can also be used for analysis) Threat 3. Malware attacks Malware is a general term that refers to malicious software, including computer viruses.

In addition to information leakage, of a third party is taken over and used as a stepping stone to attack other computers. Be careful, as there are some that prompt the user to execute the program themselves and perform fraudulent processing behind the scenes. For countermeasures, you can use the tampering detection tools, WAF, and monitoring tools introduced in the section on cyber attacks. Additionally, to reduce the risk of computer virus infection, it is important not to install programs from unknown sources unnecessarily.
|
|