
A Brief Discussion on the Establishment of Special Security Management Organizations for Operators of Key Information Infrastructure
IntroductionTheauthorbelievesthat,whetheritistheoperatorofkeyinformationinfrastructure(...

A Brief Discussion on the Application of API Security
TheoreticalFoundationAPI,whosefullnameisApplicationProgrammingInterface,alsoknownasAppli...

A brief discussion on security detection in the context of security attack and defense scenarios
Background:0x0Theessenceofsecurityistheconfrontationbetweenpeople,andtheupdateanditera...

A brief discussion on how to ensure the security of information assets during the termination of information systems
PrefaceIsitokaytojustputtheinformationsystemthatcarriesandsupportsbusinessoperationss...

A brief discussion on how key information infrastructure operators should revise and improve security management systems
PrefaceInthearticle'OntheEstablishmentofSpecialSecurityManagementOrganizationsforOperato...

A brief discussion on enterprise security and the security risks under cloud-native
PrefaceIhavereadsomeknowledgeaboutDevOpsbefore,andmanyarticleshavementionedcloud-native...

A Brief Discussion on Data Security Governance and Hierarchical Classification Implementation
IntroductionWiththerapiddevelopmentofthedigitalageandtheexplosivegrowthofdatavolume,t...

A brief analysis of Windows Access Token and its exploitation methods
1PreliminaryConceptsAboutWindowsAccessTokenWindowsAccessToken(AccessToken),itisanobject...
A brief analysis of the Fire绒 mistakenly killing explorer.exe event.
Afewdaysago,therewasabigmisunderstandingontheInternet.AftertheWindowsupdate,manyWin...

A brief analysis of the 10 core elements of data security protection strategy
DatashowsthatglobalcorporateorganizationshaveinvestedmorethanonetrillionUSdollarsannua...