首页 > 最新文献

Infosecurity最新文献

英文 中文
Someone Like You 像你这样的人
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70060-2
Eleanor Dallaway (Editor)

We often talk about the importance of education in this industry — we ponder how best to educate our staff, and how to raise awareness about information security. What we dedicate less time to, at least as far as I'm aware, is how to nurture a new generation of information security professionals.

我们经常谈论教育在这个行业的重要性——我们思考如何最好地教育我们的员工,以及如何提高对信息安全的认识。至少就我所知,我们投入较少时间的是如何培养新一代的信息安全专业人员。
{"title":"Someone Like You","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70060-2","DOIUrl":"10.1016/S1754-4548(11)70060-2","url":null,"abstract":"<div><p>We often talk about the importance of education in this industry — we ponder how best to educate our staff, and how to raise awareness about information security. What we dedicate less time to, at least as far as I'm aware, is how to nurture a new generation of information security professionals.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70060-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"100027343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EU Notification Law Is Not Enough 欧盟通报法是不够的
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70070-5
Steve Brunswick
{"title":"EU Notification Law Is Not Enough","authors":"Steve Brunswick","doi":"10.1016/S1754-4548(11)70070-5","DOIUrl":"10.1016/S1754-4548(11)70070-5","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 44"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70070-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80321231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Is Critical to Your Infrastructure? 什么对你的基础设施至关重要?
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70064-X
Adrian Davis

Critical infrastructure means many things to many people. Adrian Davis, principal research analyst with the Information Security Forum (ISF), explains why determining which infrastructure elements are critical to a business is the first step in keeping them safe

关键基础设施对很多人来说意味着很多事情。信息安全论坛(ISF)的首席研究分析师Adrian Davis解释了为什么确定哪些基础设施元素对业务至关重要是保证其安全的第一步
{"title":"What Is Critical to Your Infrastructure?","authors":"Adrian Davis","doi":"10.1016/S1754-4548(11)70064-X","DOIUrl":"10.1016/S1754-4548(11)70064-X","url":null,"abstract":"<div><p>Critical infrastructure means many things to many people. <strong>Adrian Davis</strong>, principal research analyst with the Information Security Forum (ISF), explains why determining which infrastructure elements are critical to a business is the first step in keeping them safe</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 18-21"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70064-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85351235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Obstacles Facing the US Cybersecurity Initiatve 美国网络安全倡议面临的障碍
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70066-3
Fred Donovan

Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. Fred Donovan surveys the experts to get their take on where the nation's cybersecurity program is heading

尽管美国政府比以往任何时候都更加关注网络安全问题,但华盛顿最近围绕预算和紧缩措施的争斗意味着,资金可能会在瞬间枯竭。弗雷德·多诺万(Fred Donovan)对专家进行了调查,以了解他们对国家网络安全项目发展方向的看法
{"title":"Obstacles Facing the US Cybersecurity Initiatve","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70066-3","DOIUrl":"10.1016/S1754-4548(11)70066-3","url":null,"abstract":"<div><p>Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. <strong>Fred Donovan</strong> surveys the experts to get their take on where the nation's cybersecurity program is heading</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 26-30"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70066-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76731162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Spy Who Hacked Me 《黑客
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70063-8
Danny Bradbury

James Bond was more of a jock than a nerd, and he probably wouldn't have known how to use a computer, says Danny Bradbury. How things have changed…

丹尼·布拉德伯里说,詹姆斯·邦德更像一个运动员,而不是一个书呆子,他可能不会使用电脑。事情发生了怎样的变化……
{"title":"The Spy Who Hacked Me","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70063-8","DOIUrl":"10.1016/S1754-4548(11)70063-8","url":null,"abstract":"<div><p>James Bond was more of a jock than a nerd, and he probably wouldn't have known how to use a computer, says <strong>Danny Bradbury</strong>. How things have changed…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 14-17"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70063-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78048900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Education: A Lesson Learned? 安全教育:一个教训?
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70067-5
Stephen Pritchard

Despite users being the most integral part of information security, only one to two percent of security budgets are being spent on awareness and education. Stephen Pritchard reports

尽管用户是信息安全最重要的组成部分,但只有1%到2%的安全预算用于意识和教育。Stephen Pritchard报道
{"title":"Security Education: A Lesson Learned?","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70067-5","DOIUrl":"10.1016/S1754-4548(11)70067-5","url":null,"abstract":"<div><p>Despite users being the most integral part of information security, only one to two percent of security budgets are being spent on awareness and education. <strong>Stephen Pritchard</strong> reports</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 31-34"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70067-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"94847294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Persistent and Evasive Attacks Uncovered 发现持续和回避攻击
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70069-9
Davey Winder

APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger. Davey Winder reveals the truth behind the APT and AET headlines

apt——以及最近的aet——在业内专家的意见上存在分歧,并经常被用来散布危言耸听。戴维·温德揭示了APT和AET头条背后的真相
{"title":"Persistent and Evasive Attacks Uncovered","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70069-9","DOIUrl":"10.1016/S1754-4548(11)70069-9","url":null,"abstract":"<div><p><span>APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger. </span><strong>Davey Winder</strong><span> reveals the truth behind the APT and AET headlines</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70069-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80765727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scandal, Spyware and Trust 丑闻、间谍软件和信任
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70071-7
Gareth Maclachlan
{"title":"Scandal, Spyware and Trust","authors":"Gareth Maclachlan","doi":"10.1016/S1754-4548(11)70071-7","DOIUrl":"10.1016/S1754-4548(11)70071-7","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70071-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73225266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
You Dirty RAT 你这个肮脏的老鼠
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70061-4
Drew Amorosi

The latest APT to come to light is what McAfee has dubbed ‘Shady RAT’. But the folks at Kaspersky have voiced some objections. Drew Amorosi examines the threat…and the controversy

最新曝光的APT是McAfee所称的“Shady RAT”。但卡巴斯基的人表达了一些反对意见。德鲁·阿莫罗西将对这一威胁和争议进行分析
{"title":"You Dirty RAT","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70061-4","DOIUrl":"10.1016/S1754-4548(11)70061-4","url":null,"abstract":"<div><p>The latest APT to come to light is what McAfee has dubbed ‘Shady RAT’. But the folks at Kaspersky have voiced some objections. <strong>Drew Amorosi</strong> examines the threat…and the controversy</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 6-8"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70061-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87192676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Slack Space 松弛的空间
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70074-2
{"title":"Slack Space","authors":"","doi":"10.1016/S1754-4548(11)70074-2","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70074-2","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70074-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137401570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infosecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1