当前位置:网站首页>Tencent Business Security Post IDP Talk Summary
Tencent Business Security Post IDP Talk Summary
2022-08-05 07:10:00 【Love Meow Big Carp】
Article table of contents
In the evening of 20170928, during the IDP (Individual Development Plan) conversation, Leader Bear generously shared and taught me by words and deeds, which benefited me a lot.
1. Brief review
I joined the company for more than 6 months. From being ignorant about the security business to now being independently responsible for adding friends and Tianyu system, I encountered many problems along the way. With the guidance and help of bear, otis, dongdong and colleagues, I have overcomeAnd after solving the problem, have a deeper understanding of business security work.
My memory is still fresh. After taking over the safe operation of adding friends, I encountered a case where coati was always harassed.When I first encountered a case, I was at a loss.When dealing with this case, bear and dongdong turned the tide and responded in a timely manner, from reviewing, to summarizing, resynchronizing the conclusion, and then optimizing the attack model afterwards.I only participated in the last step, and I deeply felt that safety is no small matter, and online is the most urgent.For the handling of safety cases, it is necessary to respond in a timely manner, review the market, skip the inventory, and optimize the strategy.In terms of security work, it is owner awareness, data operation, and result orientation.
After I came into contact with the Tianyu system in August, I found that the friend-adding business I was in charge of was the tip of the iceberg of my security work. The Tianyu system that undertakes hundreds of large and small businesses on the line was handed over to me. The responsibility and pressureI paid equal attention to it. While feeling the pressure, I also felt the trust of the team in me.Compared with the separate security service of adding friends, the Tianyu system is much more complex and huge. After taking over, the malicious leakage of the two major live broadcast services came unexpectedly and was caught off guard.Under the guidance of Bear, he stayed up all night to fight, and after two days, he finally suppressed the maliciousness.In the handling of this online case, I understand that the importance of quickly solving problems, especially online business, affects the experience of hundreds of millions of users, affects the company's product reputation and development, and even affects the company.revenue and development.It will actually affect personal performance and development.
Pressure and challenges can make new people in the workplace grow rapidly.
2. Equal emphasis on operation and technology
At first, I didn't understand the work of business security. After nearly half a year of personal investment, I found that the work directly related to the business is complicated and trivial, and it is also a matter of both challenges and responsibilities.I began to feel that my work time and energy were occupied by cumbersome business cases, and then I gradually realized that this was part of the operational work.Every one of our security staff, connected to the product and business side, down to the specific development, faces not only the online product and the maliciousness behind it, but also all the things and people related to the product.From business access, online misjudgment, missed case processing, offline data auditing and pushing, online attack model optimization and addition, machine abolition and data storage, etc., the complicated matters may not be seen in development., but development and technology underpin the entire operation.Only by stripping the thread and pulling the cocoon, standing in a higher dimension, using technology to suppress maliciousness, such as AI, and seeking a balance between accuracy and coverage, can oneself be freed from the endless and incandescent security business confrontation.
For the front-line students who are working on business security, everyone must stand alone, and everyone is the main force.
3. Team
Team, individual understanding, is a group with common goals, beliefs and values.Groups are relative to individuals, but not just a few people can constitute a group.A group refers to a group of two or more people who, in order to achieve a common goal, are connected in a certain way to carry out activities.The same is true of teams. It is not just someone who can form a team, but someone who has a common goal and social interaction with each other to form a team.Specifically, a team is a formal group composed of a small number of people with complementary skills, common beliefs and values, and willing to work hard for the common purpose and performance goals of the organization.The significance of the team lies in that, through mutual communication, trust and responsibility, the members of the group generate a collaborative effect of the group, so as to obtain a team performance that is greater than the sum of individual performance.
Fortunate to be able to come to an efficient and mutual security team.
4. Keep the workplace motto in mind
Time flies, and I am no longer a newcomer. What I feel and what I have learned is remembered in my heart.
(1) Accurately determine the priority of events, online business misses and misjudgments are the most urgent, offline business follows, and new demands are placed in the back.
(2) Security incidents are not trivial, timely response and synchronization;
(3) Owner awareness, data operation, and result orientation;
(4) No matter black or white, a cat that catches a mouse is a good cat,Quickly solve the problem, no matter what method is used;
(5) Before the pros and cons, make a choice.
(6) Before committing, be cautious, and after committing, be cautious;
(7) Be a reliable person, account for everything, get it right, and respond to everything;
( 8) Improve your own ability, improve work efficiency, not hard work, but credit, and strive for normal commute to get off work;
(9) Go forward with gratitude.
Finally, I would like to thank bear, otis, dongdong and all my classmates for their selfless guidance and help during this time.
边栏推荐
猜你喜欢
typescript67-索引查询类型
FPGA parsing B code----serial 4
UDP group (multi)cast
UDP组(多)播
After working for 3 years, I recalled the comparison between the past and the present when I first started, and joked about my testing career
开源中国活动合作说明书
Hash 这些知识你也应该知道
概率与期望部分题解
Using printf function in STM32
RNote108---Display the running progress of the R program
随机推荐
一天学会从抓包到接口测试,通过智慧物业项目深度解析
Pytorch distributed parallel processing
Rapid Medical超小体积且唯一可调的取栓器获得FDA核准
【动态类型检测 Objective-C】
Vulnhub靶机:HA_ NARAK
香港国际珠宝展及香港国际钻石、宝石及珍珠展揭幕
访问被拒绝:“microsoft.web.ui.webcontrols”的解决办法
Unable to import torchvision. IO. Read_image
Week 8 Document Clustering(文本聚类)
Hong Kong International Jewellery Show and Hong Kong International Diamond, Gem and Pearl Show kick off
RNote108---Display the running progress of the R program
Shiny02---Shiny异常解决
栈与队列的基本介绍和创建、销毁、出入、计算元素数量、查看元素等功能的c语言实现,以及栈的压入、弹出序列判断,栈结构的链式表示与实现
真实字节跳动测试开发面试题,拿下年薪50万offer。
Libpq 是否支持读写分离配置
字节面试流程及面试题无私奉献,吐血整理
17-VMware Horizon 2203 virtual desktop-Win10 manual desktop pool floating (seventeen)
Put Cloudflare on the website (take Tencent Cloud as an example)
线程池的使用(结合Future/Callable使用)
专用机终端安装软件后报IP冲突