首页 > 最新文献

Network Security最新文献

英文 中文
The burden of keeping passwords secret 密码保密的负担
Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70027-0
Karen Renaud
{"title":"The burden of keeping passwords secret","authors":"Karen Renaud","doi":"10.12968/s1353-4858(24)70027-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70027-0","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"213 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141405542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interconnection, NIS2 and the mobile device 互联、NIS2 和移动设备
Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70023-3
Monique Becenti
NIS2 will soon come into force all over the EU and – much like the GDPR – it threatens large fines for those that don’t comply. However, it may serve as a much-needed wake up call for those who are overlooking the fastest-growing part of their attack surface – the mobile device.
NIS2 将很快在欧盟各地生效,与 GDPR 一样,它威胁对不遵守者处以巨额罚款。不过,对于那些忽视了攻击面中增长最快的部分--移动设备--的人来说,这可能是一个亟需敲响的警钟。
{"title":"Interconnection, NIS2 and the mobile device","authors":"Monique Becenti","doi":"10.12968/s1353-4858(24)70023-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70023-3","url":null,"abstract":"NIS2 will soon come into force all over the EU and – much like the GDPR – it threatens large fines for those that don’t comply. However, it may serve as a much-needed wake up call for those who are overlooking the fastest-growing part of their attack surface – the mobile device.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"198 S583","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is new legislation the answer to curbing cybercrime? 新立法是遏制网络犯罪的答案吗?
Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70026-9
Vincent Lomba
Cyber attacks are on the increase, in terms of both the number of attacks and the damage they cause. Encouraging organisations to improve their cyber security has had only a limited effect. Now it’s the turn of legislation and regulation, with the Cyber Resilience Act (CRA) and Network and Information Security Directive (NIS2) coming into force in the EU. But what kind of impact are they likely to have?
网络攻击的数量和造成的损失都在不断增加。鼓励企业提高网络安全的效果有限。现在轮到立法和监管了,《网络复原力法案》(CRA)和《网络与信息安全指令》(NIS2)即将在欧盟生效。但它们会产生什么样的影响呢?
{"title":"Is new legislation the answer to curbing cybercrime?","authors":"Vincent Lomba","doi":"10.12968/s1353-4858(24)70026-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70026-9","url":null,"abstract":"Cyber attacks are on the increase, in terms of both the number of attacks and the damage they cause. Encouraging organisations to improve their cyber security has had only a limited effect. Now it’s the turn of legislation and regulation, with the Cyber Resilience Act (CRA) and Network and Information Security Directive (NIS2) coming into force in the EU. But what kind of impact are they likely to have?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"87 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141408782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing network resilience against growing cyberthreats 增强网络复原力,应对日益增长的网络威胁
Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70024-5
Brendan Walsh
Networks are becoming ever-more complex, and people with the right skills to manage them securely are in desperately short supply. However, with the right network management environment – one that supports automation and operational efficiency – supported by relevant training, you can make your networks more resilient to current and future threats.
网络正变得越来越复杂,而具备安全管理网络的正确技能的人才却非常短缺。然而,有了正确的网络管理环境--一个支持自动化和运营效率的环境--并辅以相关培训,您就能使网络更能抵御当前和未来的威胁。
{"title":"Enhancing network resilience against growing cyberthreats","authors":"Brendan Walsh","doi":"10.12968/s1353-4858(24)70024-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70024-5","url":null,"abstract":"Networks are becoming ever-more complex, and people with the right skills to manage them securely are in desperately short supply. However, with the right network management environment – one that supports automation and operational efficiency – supported by relevant training, you can make your networks more resilient to current and future threats.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"43 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141403489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber threats and key mitigation strategies 网络威胁和主要缓解策略
Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70028-2
Chris Waynforth
UK organisations – and perhaps most notably the National Health Service (NHS) – are the focus of serious overhauls in IT provision and strategy. But it seems that far too little of the effort and expense is geared towards security. While increased efficiency and productivity are important, any gains in those areas are doomed to be undermined if security is not an intrinsic part of IT improvement programmes.
英国各机构,尤其是国家医疗卫生服务系统(NHS),都是信息技术供应和战略全面改革的重点。但是,在安全方面所做的努力和花费似乎太少了。提高效率和生产力固然重要,但如果不将安全作为 IT 改进计划的固有组成部分,那么在这些领域取得的任何成果都注定会被削弱。
{"title":"Cyber threats and key mitigation strategies","authors":"Chris Waynforth","doi":"10.12968/s1353-4858(24)70028-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70028-2","url":null,"abstract":"UK organisations – and perhaps most notably the National Health Service (NHS) – are the focus of serious overhauls in IT provision and strategy. But it seems that far too little of the effort and expense is geared towards security. While increased efficiency and productivity are important, any gains in those areas are doomed to be undermined if security is not an intrinsic part of IT improvement programmes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 S8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141391156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring that cyber security is fit for the future of manufacturing 确保网络安全适应未来制造业的需要
Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70025-7
Dominic Carroll
A cyber attack can have particularly devastating results on manufacturing organisations. More than half have turned to external providers to fully manage their security, while many more outsource at least some operations. But are the security service providers up to the task? And how can a manufacturer better align security with the organisation and its specific requirements?
网络攻击对制造企业的破坏尤为严重。半数以上的企业已经求助于外部供应商来全面管理其安全,而更多的企业至少将部分业务外包。但是,安全服务提供商能胜任这项任务吗?制造商如何才能更好地将安全与组织及其具体要求相结合?
{"title":"Ensuring that cyber security is fit for the future of manufacturing","authors":"Dominic Carroll","doi":"10.12968/s1353-4858(24)70025-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70025-7","url":null,"abstract":"A cyber attack can have particularly devastating results on manufacturing organisations. More than half have turned to external providers to fully manage their security, while many more outsource at least some operations. But are the security service providers up to the task? And how can a manufacturer better align security with the organisation and its specific requirements?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"196 S567","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimising the risks and maximising the opportunities of generative AI 最小化生成式人工智能的风险,最大化其机遇
Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70022-1
Ben Walker
It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.
威胁行为者热衷于采用生成式人工智能系统来帮助他们发动更有效的网络攻击,这已经不是什么秘密了。幸运的是,用人工智能对抗人工智能是可能的。现在有越来越多的新工具可以帮助企业保护数据和网络。但是,您需要知道在哪里使用它们,何时使用它们,以及哪些是最适合每项任务的工具。
{"title":"Minimising the risks and maximising the opportunities of generative AI","authors":"Ben Walker","doi":"10.12968/s1353-4858(24)70022-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70022-1","url":null,"abstract":"It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"7 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141029340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forging identity in the cloud – dissecting Silver SAML 在云中伪造身份--剖析银 SAML
Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70020-8
Tomer Nahum, Eric Woodruff
An attack method used to forge identities by faking Security Assertion Markup Language (SAML) has been with us for years. But now threat actors have raised their game, targeting Microsoft's Entra ID service, which is extensively used by major cloud services.
通过伪造安全断言标记语言(SAML)来伪造身份的攻击方法已经存在多年。但现在,威胁行为者提高了他们的游戏水平,将目标对准了微软的 Entra ID 服务,该服务被各大云服务广泛使用。
{"title":"Forging identity in the cloud – dissecting Silver SAML","authors":"Tomer Nahum, Eric Woodruff","doi":"10.12968/s1353-4858(24)70020-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70020-8","url":null,"abstract":"An attack method used to forge identities by faking Security Assertion Markup Language (SAML) has been with us for years. But now threat actors have raised their game, targeting Microsoft's Entra ID service, which is extensively used by major cloud services.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"137 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141034262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a human firewall to keep your organisation secure 建立人力防火墙,确保组织安全
Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70019-1
Richard Menear
It's easy – perhaps too easy – to see cyber security as a technical issue. In fact, it's something that requires human effort from everyone within the organisation. It's something that needs to be baked in to every process, and every person needs to understand the risks and how to deal with them. This article look at the importance of positive cyber hygiene within businesses and how leaders can effectively create a culture of cyber security awareness.
将网络安全视为技术问题很容易,也许是太容易了。事实上,这需要组织内每个人的努力。它需要融入每个流程,每个人都需要了解风险以及如何应对风险。本文探讨了企业内部积极的网络卫生的重要性,以及领导者如何有效地创建网络安全意识文化。
{"title":"Building a human firewall to keep your organisation secure","authors":"Richard Menear","doi":"10.12968/s1353-4858(24)70019-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70019-1","url":null,"abstract":"It's easy – perhaps too easy – to see cyber security as a technical issue. In fact, it's something that requires human effort from everyone within the organisation. It's something that needs to be baked in to every process, and every person needs to understand the risks and how to deal with them. This article look at the importance of positive cyber hygiene within businesses and how leaders can effectively create a culture of cyber security awareness.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"78 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141045624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Putting cyber-safety first for Industry 4.0 将网络安全放在工业 4.0 的首位
Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70018-x
Nils Gerhardt
The adoption of the Industry 4.0 paradigm means embracing all the benefits that the most advanced technologies can bring. Yet manufacturing remains the most-attacked sector in cyber, and those same technologies could massively increase organisations’ threat surfaces, putting many of them at severe risk. It's essential that cyber security becomes an intrinsic part of any company's Industry 4.0 strategy.
采用工业 4.0 范式意味着拥抱最先进技术所能带来的所有好处。然而,制造业仍然是网络攻击最多的行业,而这些技术可能会大幅增加企业的威胁面,使许多企业面临严重风险。网络安全必须成为任何公司工业 4.0 战略的内在组成部分。
{"title":"Putting cyber-safety first for Industry 4.0","authors":"Nils Gerhardt","doi":"10.12968/s1353-4858(24)70018-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70018-x","url":null,"abstract":"The adoption of the Industry 4.0 paradigm means embracing all the benefits that the most advanced technologies can bring. Yet manufacturing remains the most-attacked sector in cyber, and those same technologies could massively increase organisations’ threat surfaces, putting many of them at severe risk. It's essential that cyber security becomes an intrinsic part of any company's Industry 4.0 strategy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141023682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1