首页 > 最新文献

Network Security最新文献

英文 中文
The biggest challenges of manually managing PKI certificates 手动管理PKI证书的最大挑战
Pub Date : 2022-07-01 DOI: 10.12968/s1353-4858(22)70052-9
Anthony Ricci
Business processes have always been built on trust, and as digital transformation moves more devices and people online, the need for digital trust is rapidly increasing. Today, being able to trust the identity of endpoints, the people using them, and their data and documents, is fundamental to society.
业务流程一直建立在信任的基础上,随着数字化转型将更多的设备和人员转移到网上,对数字信任的需求正在迅速增加。今天,能够信任端点的身份,使用端点的人,以及他们的数据和文件,是社会的基础。
{"title":"The biggest challenges of manually managing PKI certificates","authors":"Anthony Ricci","doi":"10.12968/s1353-4858(22)70052-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70052-9","url":null,"abstract":"Business processes have always been built on trust, and as digital transformation moves more devices and people online, the need for digital trust is rapidly increasing. Today, being able to trust the identity of endpoints, the people using them, and their data and documents, is fundamental to society.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"138 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86514774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-enhancing technologies in the design of digital twins for smart cities 智能城市数字孪生体设计中的隐私增强技术
Pub Date : 2022-07-01 DOI: 10.12968/s1353-4858(22)70046-3
Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Amar Aggoun
Digital twin technologies – comprised of data-rich models and machine learning – allow the operators of smart city applications to gain an accurate representation of complex cyber-physical models. However, the implicit need for resilient data protection must be achieved by integrating privacy-preserving mechanisms into the DT system design as part of an effective defence-in-depth strategy.
数字孪生技术——由数据丰富的模型和机器学习组成——允许智慧城市应用的运营商获得复杂网络物理模型的准确表示。然而,必须通过将隐私保护机制集成到DT系统设计中,作为有效的深度防御策略的一部分,才能实现对弹性数据保护的隐性需求。
{"title":"Privacy-enhancing technologies in the design of digital twins for smart cities","authors":"Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Amar Aggoun","doi":"10.12968/s1353-4858(22)70046-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70046-3","url":null,"abstract":"Digital twin technologies – comprised of data-rich models and machine learning – allow the operators of smart city applications to gain an accurate representation of complex cyber-physical models. However, the implicit need for resilient data protection must be achieved by integrating privacy-preserving mechanisms into the DT system design as part of an effective defence-in-depth strategy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75341216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-trust architecture is creating a passwordless society 零信任架构正在创造一个无密码的社会
Pub Date : 2022-07-01 DOI: 10.12968/s1353-4858(22)70045-1
Jonas Iggbom
Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future.
在网站上输入传统密码并不罕见,大多数人至少有一个。但随着我们对数字的依赖程度提高,网络犯罪分子变得更加精通技术,密码可能不适合作为我们未来的主要身份验证形式。
{"title":"Zero-trust architecture is creating a passwordless society","authors":"Jonas Iggbom","doi":"10.12968/s1353-4858(22)70045-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70045-1","url":null,"abstract":"Entering traditional passwords on a website is not uncommon and most people have at least one. But as our digital reliance increases and cyber criminals become more tech savvy, passwords may not be suitable as our primary form of authentication in the future.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"89 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80695708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The case for threat modelling 威胁建模的案例
Pub Date : 2022-06-01 DOI: 10.12968/s1353-4858(22)70040-2
C. Tankard
{"title":"The case for threat modelling","authors":"C. Tankard","doi":"10.12968/s1353-4858(22)70040-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70040-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75317132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security service edge: choosing the right solution 安全服务优势:选择正确的解决方案
Pub Date : 2022-06-01 DOI: 10.12968/s1353-4858(22)70041-4
N. Howe
Security service edge (SSE) solutions are designed to address the fundamental security challenges that organisations face in the era of hybrid work, applications in multi-cloud environments, edge computing, and digitisation of their operational technology (OT). But how do you select the right solution?
安全服务边缘(SSE)解决方案旨在解决组织在混合工作、多云环境应用、边缘计算和运营技术(OT)数字化时代面临的基本安全挑战。但是如何选择正确的解决方案呢?
{"title":"Security service edge: choosing the right solution","authors":"N. Howe","doi":"10.12968/s1353-4858(22)70041-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70041-4","url":null,"abstract":"Security service edge (SSE) solutions are designed to address the fundamental security challenges that organisations face in the era of hybrid work, applications in multi-cloud environments, edge computing, and digitisation of their operational technology (OT). But how do you select the right solution?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"155 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76891826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The great security convergence: joining physical devices and cyber security 安全大融合:物理设备和网络安全的融合
Pub Date : 2022-06-01 DOI: 10.12968/s1353-4858(22)70043-8
Scot Sturges
With the convergence of the physical and digital worlds comes a heightened risk of security threats. Cyber security can no longer be placed on the back burner as organisations continue to incorporate physical security solutions; the likelihood and severity of an information breach rise dramatically as additional devices are contributed to one ubiquitous network.
随着物理世界和数字世界的融合,安全威胁的风险也随之增加。随着企业不断采用物理安全解决方案,网络安全不能再被置于次要地位;随着越来越多的设备加入到一个无处不在的网络中,信息泄露的可能性和严重性急剧上升。
{"title":"The great security convergence: joining physical devices and cyber security","authors":"Scot Sturges","doi":"10.12968/s1353-4858(22)70043-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70043-8","url":null,"abstract":"With the convergence of the physical and digital worlds comes a heightened risk of security threats. Cyber security can no longer be placed on the back burner as organisations continue to incorporate physical security solutions; the likelihood and severity of an information breach rise dramatically as additional devices are contributed to one ubiquitous network.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83286905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DGAs die hard: detecting malicious domains using AI DGAs死路一条:使用AI检测恶意域
Pub Date : 2022-06-01 DOI: 10.12968/s1353-4858(22)70042-6
Bharathasimha Reddy D, Srilekha Talluri, Ruthvik Reddy SL, Amit Nagal, Aditya K. Sood
Cyber attacks are occurring at an exponential rate. Adversaries are opting for advanced techniques to abuse network protocols for conducting unauthorised operations. Domain generation algorithms (DGAs) are designed by malware authors to trigger malicious DNS communication. This article looks at the current state of DNS-based threats and how to detect DGA-based malicious DNS communication.
网络攻击正以指数级的速度发生。攻击者正在选择先进的技术来滥用网络协议进行未经授权的操作。域生成算法(DGAs)是由恶意软件作者设计的,用于触发恶意DNS通信。本文介绍了基于DNS的威胁的当前状态,以及如何检测基于dga的恶意DNS通信。
{"title":"DGAs die hard: detecting malicious domains using AI","authors":"Bharathasimha Reddy D, Srilekha Talluri, Ruthvik Reddy SL, Amit Nagal, Aditya K. Sood","doi":"10.12968/s1353-4858(22)70042-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70042-6","url":null,"abstract":"Cyber attacks are occurring at an exponential rate. Adversaries are opting for advanced techniques to abuse network protocols for conducting unauthorised operations. Domain generation algorithms (DGAs) are designed by malware authors to trigger malicious DNS communication. This article looks at the current state of DNS-based threats and how to detect DGA-based malicious DNS communication.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74386346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The challenges of Log4j – and how to solve them Log4j的挑战——以及如何解决它们
Pub Date : 2022-05-01 DOI: 10.12968/s1353-4858(22)70038-4
Thomas B. McVey
{"title":"The challenges of Log4j – and how to solve them","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70038-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70038-4","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77558375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguard the future of your network 保护你网络的未来
Pub Date : 2022-05-01 DOI: 10.12968/s1353-4858(22)70039-6
Michael Wood
Widespread remote working has meant that organisations must be able to provide a high level of accessibility to users scattered across potentially thousands of individual locations. They must also deliver a high level of security assurance against threat actors seeking to take advantage of more diffuse networks.
广泛的远程工作意味着组织必须能够为分散在可能数千个单独地点的用户提供高水平的可访问性。他们还必须提供高水平的安全保证,防止威胁行为者试图利用更分散的网络。
{"title":"Safeguard the future of your network","authors":"Michael Wood","doi":"10.12968/s1353-4858(22)70039-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70039-6","url":null,"abstract":"Widespread remote working has meant that organisations must be able to provide a high level of accessibility to users scattered across potentially thousands of individual locations. They must also deliver a high level of security assurance against threat actors seeking to take advantage of more diffuse networks.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88429842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incident response: test, don't improvise 事件响应:测试,不要即兴发挥
Pub Date : 2022-05-01 DOI: 10.12968/s1353-4858(22)70037-2
Andrew Cooke
{"title":"Incident response: test, don't improvise","authors":"Andrew Cooke","doi":"10.12968/s1353-4858(22)70037-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70037-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73798135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1