At 6 o'clock in the morning on Saturday, in the super-large gymnasium of Lakeside University, there are 200 companies to set up their booths here.

Including all kinds of high-tech products, the latest research and development products...

Soon, at nine o'clock in the capital time, the safety peak was officially held!

Accompanied by thunderous applause, Mr. Ebaoyun, Mr. Penguin Teng, Mr. Du Niang Li... Many bigwigs have come to the forefront.

Immediately afterwards, Ebaoyun always picked up the microphone and conveyed the main spirit of this security summit.

"Everyone knows about some of the things that have happened in the world recently. "

"What I want to say is that behind the scientific and technological war, there is still a cyber war! It is a kind of competition for network data!"

"The cyber security industry is related to the economic lifeblood of domestic enterprises!"

"So, this time, I call on you to come and get together and talk!"

"Longteng Security Summit, divided into two!"

"Enterprise Farm on Saturdays, Hacker Farm on the Weekend!"

"The enterprise field is a professional field focusing on enterprise security practice, and experienced technicians from well-known domestic enterprises are invited to share enterprise safety practice. "

"We have a total of four processes!"

"Point: Harnessing the power of users to drive security. "

Line: Set up the Longteng vulnerability platform, where hackers submit a large number of security vulnerabilities and find solutions. "

"Face: Hackers provide technical knowledge supplements to report more security issues!"

"Body: Establish a safe ecology of Longteng!"

Mr. Yun paused and continued: "In the Longteng security ecosystem to be built next, there are mainly four roles. Hackers, Internet users, businesses/technology practitioners, security companies/third-party organizations!"

"Each role is connected to each other and responds to each other, so as to promote the healthy development of the security industry ecology. "

"As we all know, with the intensifying trade war, in the near future, a new information war is about to begin!"

"In the past few days, I have communicated with some senior executives of enterprises, as well as our technical staff. also with Penguin Teng, Du Niang Li... They have all communicated. "

"We propose, form a threat intelligence alliance!!"

"Threat intelligence is the use of empirical knowledge of existing or emerging threats or risks, including context, operational mechanisms, identifiers, revealing and actionable recommendations. "

"For enterprises, data security and business security are two major pieces that cannot be ignored, such as the core data stored on the server side, the core code is stolen, woolen, and credential stuffing, etc., all of which pose a huge threat to the enterprise. "

"Longteng now proposes the Threat Intelligence Alliance, which aims to save future security costs by adopting existing new technologies and analyzing data on its own business data to prevent future threats before they occur. "

"In fact, for enterprises, the security landscape has changed a lot. In the past, corporate security was reactive and beaten, but now the role is slowly changing, taking the initiative and actively looking for countermeasures. "

Now, let's listen to the voices of the personnel of major Internet technology companies. As he spoke, Mr. Yun changed his words and said.

"First of all, I would like to invite Du Niang, a senior senior Internet technology scientist, Ding Yuan!"

"Please!" Mr. Yun made an invitation, and then slowly left the podium.

At this time, a middle-aged man in a suit walked quickly.

He is Du Niang's director of network security, Ding Yuan!

Half of the country has mastered the Internet security of Du Niang.

In Du Niang, his reputation is the same as that of Brother Dao in Ebao.

Ding Yuan stood in front of the podium, put down the manuscript that had been prepared for a long time in his hand, and then looked at the large and small Internet technology companies below, and said.

"The battle against malware has never stopped!"

"In view of the past two years, we have been working on the field of AI, as well as the field of big data!"

"My research found that using large-scale data and machine learning. Mining for malware behavior and DNS infrastructure protection. "

"The cat-and-mouse game between security personnel and malware authors is going to get more and more fun!"

"Mice no longer run to the honeypot and give their arms to the cat, they will use more sophisticated methods and strategies to hide themselves from the cat's tracking. "

"But cats aren't vegetarians either!"

"Next, I'll show you the new data science approach we're working on!"

As he spoke, Ding Yuan's baton tapped at the projector behind him.

Suddenly, a complex data graph popped up.

"This is domestic real-time data! We can build intelligent machines through big data!"

"By looking for associations between malware CC domains and building a domain reputation map, machine learning methods are used to expose these CC domains. "

"This method of auto-discovery of CC domain name groups does not require any prior knowledge of malware behavior behavior analysis and DGA algorithms. "

It can be another powerful tool in the hands of security personnel, in addition to honeypot capture and reverse engineering. "

......

After speaking for ten minutes, Ding Yuan bowed slightly to everyone and walked off the podium.

Mr. Yun walked up to the podium, was slightly polite, and then said: "Next, I would like to invite Wu Qing, director of network information security of Ebao." "

After Wu Qing walked up, he smiled at everyone, and he didn't be verbose, and went straight to the point.

"In recent years, security threats have been gradually transitioning from the system level to the application level. "

"The external APP and internal APP of the enterprise have appeared one after another, and the Ping An Group itself has 80 iOS applications and 72 Android applications. "

"But they put the security center on the external app of the enterprise, but ignore the app used by internal employees. "

"If the attacker gets the relevant permissions, it is equivalent to capturing the rear nest. "

"For example, there is an ultra vires loophole in the APP of a certain (Wang Zhao) airline, which can traverse all the information of the airline's employees, including flight attendants and flight attendants. This can be fatal for airlines. "

"Information leakage means that there is a great possibility of being replaced!"

"Therefore, we must trace the origin of Internet information!"

"The black industry has become more and more powerful, but it can endanger every general public, but fortunately, there are many security researchers who are studying the black industry. "

"But..."Saying this, Wu Qing's tone increased slightly, and then said: "Online prevention and control like antivirus software can't solve the fundamental problem. "

"Most of the black industry personnel carry out physical attacks, and if you want to find the mastermind behind the scenes, you need to do some network traceability!"

"There are many ways to trace the source, such as finding the IP address through the penguin and then searching for real people, and searching for relevant information through social information. "

......_

To see the ununderlined version of the novel, please download the Fei Lu novel

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like