随笔分类 - 学问
摘要:What is Risk Risk is unavoidable, but it can be managed. With governance, risk, and compliance (GRC), businesses can strategically balance risk and op
阅读全文
摘要:Segregation of Duties - SoD Segregation of Duties (SoD) is a control avtivity where an activity or set of activities are divided among several people
阅读全文
摘要:Default Users in SAP Default Passwords in SAP Whenever a new SAP system is built, upgraded, copied, or restored from backup, one of the very first tas
阅读全文
摘要:Custom Auth Objects in SAP Often a security administrator comes across requirements where the exiting authorization objects delivered by SAP is not en
阅读全文
摘要:User Creation and Maintenance in SAP T-Code: SU01 Documentation Address Logon Data SNC Defaults Parameters Roles Profiles Groups User group examples:
阅读全文
摘要:Preparing for a Zero Trust Initiative-1 A Zero Trust security model when implemented by an organization reduces external and internal threats to syste
阅读全文
摘要:# SAP System Security & Authorizations 1 ### Introduction to SAP and important concepts related to SAP Security ##### SAP & its components introductio
阅读全文
摘要:Wireshark for Ethical Hackers - 11 Capturing Traffic Where to capture traffic? Locally (GUI and CLI) Remotely Inline Hub - Half duplex Test Access Por
阅读全文
摘要:一些旧版本系统可能完全无法更换,这一现象对工业环境中的操作技术来说很常见。在这种情况下,风险从业人员应该谨记,其作用不是去否定特定的行为,而是与风险所有者一起建立可接受的风险水平。
阅读全文
摘要:To ensure accountability, the ownership of risk must be with an individual, not with a department or the organization as a whole.
阅读全文
摘要:Understanding risk includes understanding the goals, objectives, values and ethics of the organization.
阅读全文
摘要:CRISC Learning Notes 2 - Risk Governance Four main objectives of risk governance: Establish and maintain a common risk view. Integrate risk management
阅读全文
摘要:OSCP Security Technology - Gaining Root with Metasploit Analysis nmap scanning result. searchsploit samba 2.2 msfconsole search trans2open use exploit
阅读全文
摘要:Enterprise OAuth 2.0 - OAuth2.0OpenID Connect For the Enterprise(4) OAuth 2.0 and OpenID Connect OAuth 2.0 is for authorization Access token should co
阅读全文
摘要:Enterprise OAuth 2.0 - Using okta(1) Okta Authorization Server Okta setup and Endpoints https://developer.okta.com/signup/ Custom Resource Server usin
阅读全文
摘要:Enterprise OAuth 2.0 - OAuth Basics The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP servic
阅读全文
摘要:Enterprise OAuth 2.0 - Enterprise and Social Media Application Landscape Security Basics - Providers User, Identity Where are the user credentials sto
阅读全文
摘要:Chapter 2 - Data Preparation Basics Segment 5 - Grouping and data aggregation import numpy as np import pandas as pd from pandas import Series, DataFr
阅读全文
摘要:Chapter 2 - Data Preparation Basics Segment 4 - Concatenating and transforming data import numpy as np import pandas as pd from pandas import Series,
阅读全文
摘要:Chapter 2 - Data Preparation Basics Segment 3 - Removing duplicates import numpy as np import pandas as pd from pandas import Series, DataFrame Removi
阅读全文

浙公网安备 33010602011771号