The Study of “Broken Authentication” Information Security Topic Training Base on Open Source Lab Tool
碩士 === 國防大學 === 網路安全碩士班 === 107 === Looking at the two major cyber attacks of the 2016 Mirai virus and the 2018 "Eternal Blue", they all exploited the weakness of the “Weak Password” and invaded the home network. The “Weak Password” has been classified by the OWASP organization in the “Ide...
Main Authors: | WNAG, JIUNG-SHUNG, 王俊雄 |
---|---|
Other Authors: | LU, YI-BIN |
Format: | Others |
Language: | zh-TW |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/4uzy5b |
Similar Items
-
The Study of “ Insufficient Logging & Monitoring ”Information Security Topic Training Base on Open Source Lab Tool.
by: 黃俊杰
Published: (2019) -
The Study of “Sensitive Data Exposure” Information Secutity Topic Training Base on Open Source Lab Tool
by: LU, CHIH-HAO, et al.
Published: (2019) -
Topics in spontaneous broken gauge symmetries
by: Fischler, Willy
Published: (1976) -
Secure distribution of open source information
by: Rogers, Jason Lee
Published: (Dece) -
Two Sequential Authentication Method on Locker Security System Using Open-Sourced Smartphone
by: Dodon Yendri
Published: (2019-09-01)