Security dog attack and defense competition: to "WU" friends, to show the charm of attack and defense

Source: Internet
Author: User
Keywords Safe safe dog.
Tags asia-pacific computer computer network computer virus information information security internet internet +

By the National Computer Network Emergency Management Coordination Center, China Information Security Evaluation Center, National Computer virus Emergency treatment center and China Internet Association guidance, 360 The China Internet Security Congress (ISC2014), sponsored by the Internet Security Center and the China Internet Association Network and Information Security Working Committee, was held in September 24-25th at the Beijing National Convention Center. As the most authoritative annual summit of the Asia-Pacific Information Security, the Conference brings together the father of computer virus, the father of Chinese Internet security, the top security experts at home and abroad in China's information security field, and many manufacturers in the exhibition area are prepared a wonderful game.

September 25 Morning 10, "the Security dog attack and Defense tournament" as the special event of this Conference finale debut! The attack and defense tournament by the security dog launched to Web security, server penetration and attack and defense technology, and integrated the security of the dog on the server protection technology. The entry of the martial arts need to pass 6 checkpoints, respectively, for Tsing Lung Guan, white Tiger Guan, Rosefinch Guan, Xuanwu Guan, Kirin Guan and Peng Guan, from low to high, each checkpoint has different difficulty tasks, and some checkpoints also set up a security dog protection. The competition is limited to 2 hours, and finally according to the number of people to arrive or break through the level of the order determines the final ranking!

Security Dog in the field of server protection for many years, the product focused on the solution of server, cloud host system and application security issues; Since the release of products has been using a free strategy, has been recognized by many users and sought after, users often call the security dog as "Server 360."

Competition scene

The contest mainly tested the participants in the Web security and penetration of the actual combat capability, designed to provide a platform for everyone through attack and defense, the contestants are from all over the country excellent players, can also take this opportunity to you technology Daniel learning experience, exchange ideas. At the same time, several of the games added security dog protection barriers, but also a great challenge to the safety of the dog protection capabilities.

A total of five groups of contestants participated in the competition, after fierce competition, the final wild Wolf team won the first place, the I-sec and the five-pointed team won the second and third, the EG team and forget the love team won the winning prize. The safety dog has prepared a huge reward for each contestant, the top three will receive 10000, 5000, 3000 yuan cash prize respectively, 4th and 5th person each obtains the millet box one.


Zhao, deputy general manager of Cupressaceae, awarded the prize


Famous network security Media FREEBUF founder Jing Jinsong Award for second prize winners


Alibaba senior security expert wins award for third prize winners

Finally, the contestants have said that there is a safe dog protection, the difficulty of overcoming a lot, so many players bypassed the security dog protection of the second and fourth clearance. The first wild World team had a hard time bypassing the second, but the fourth was helpless when the site's security dogs were uploaded to defend themselves, and eventually had to give up.

All of this is due to the importance of safe dogs in the field of security and defense. Security Dog founder Chen Yu in an interview with CSDN said: "Security products to be able to defend against a variety of actual attacks, you need to be very understanding of the various means of attack; Therefore, we need to build a variety of attack environments in the development process, simulation of different types of attack scenarios , the attack means are analyzed and restored, so as to develop a more practical safety protection product. ”

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.