首页 > 最新文献

Network Security最新文献

英文 中文
Poor cyber hygiene puts the UK at risk 网络卫生状况差使英国面临风险
Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70021-x
Steve Mansfield-Devine
The UK's businesses and charities could be sitting ducks, according to the Government's latest ‘Cyber Security Breaches Survey’. Too many organisations are failing to deploy even the most basic cyber security measures. Equally, few are prepared for the new wave of AI-driven attacks or the consequences of being breached.
根据英国政府最新的 "网络安全漏洞调查",英国的企业和慈善机构可能会成为坐以待毙的对象。太多的组织甚至没有部署最基本的网络安全措施。同样,对于新一轮人工智能驱动的攻击或被攻破后的后果,很少有人做好准备。
{"title":"Poor cyber hygiene puts the UK at risk","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70021-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70021-x","url":null,"abstract":"The UK's businesses and charities could be sitting ducks, according to the Government's latest ‘Cyber Security Breaches Survey’. Too many organisations are failing to deploy even the most basic cyber security measures. Equally, few are prepared for the new wave of AI-driven attacks or the consequences of being breached.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141032321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain phishing: staying a step ahead of the threats 域名网络钓鱼:领先一步应对威胁
Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70063-9
Brian Lonergan
Domain hijacking and cybersquatting have become popular techniques among threat actors, especially those engaged in phishing. Organisations need to pay attention to domain security – to protect themselves and their partners and customers. Fortunately, there are tools organisations can use to keep their domains, and their brands, safe.
域名劫持和域名抢注已成为威胁行为者,尤其是从事网络钓鱼的威胁行为者常用的技术。企业需要关注域名安全,以保护自身及其合作伙伴和客户。幸运的是,企业可以使用一些工具来保护其域名和品牌的安全。
{"title":"Domain phishing: staying a step ahead of the threats","authors":"Brian Lonergan","doi":"10.12968/s1353-4858(23)70063-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70063-9","url":null,"abstract":"Domain hijacking and cybersquatting have become popular techniques among threat actors, especially those engaged in phishing. Organisations need to pay attention to domain security – to protect themselves and their partners and customers. Fortunately, there are tools organisations can use to keep their domains, and their brands, safe.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"407 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139020182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can vulnerability disclosure be timely, detailed and coordinated? 漏洞披露是否及时、详细和协调?
Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70062-7
Michael Isbitski
Vulnerability disclosure is a tricky subject. Organisations need early and detailed information about vulnerabilities in order to fix them. At the same time, threat actors can use the same information to develop exploits that could devastate organisations that don't move fast enough to protect themselves. So how can we balance the need for disclosure against the threats posed?
漏洞披露是一个棘手的问题。组织需要尽早获得有关漏洞的详细信息,以便修复漏洞。与此同时,威胁方也可以利用同样的信息来开发漏洞利用程序,如果组织没有足够快的速度来保护自己,这些漏洞利用程序就会对组织造成毁灭性的打击。那么,我们该如何平衡信息披露的需求与所带来的威胁呢?
{"title":"Can vulnerability disclosure be timely, detailed and coordinated?","authors":"Michael Isbitski","doi":"10.12968/s1353-4858(23)70062-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70062-7","url":null,"abstract":"Vulnerability disclosure is a tricky subject. Organisations need early and detailed information about vulnerabilities in order to fix them. At the same time, threat actors can use the same information to develop exploits that could devastate organisations that don't move fast enough to protect themselves. So how can we balance the need for disclosure against the threats posed?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"137 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139021625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to strengthen the software supply chain 如何加强软件供应链
Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70061-5
Brian Trzupek
Defenders against software supply chain attacks have to keep upping their game, as the attackers do.
软件供应链攻击的防御者必须与攻击者一样,不断提高自己的游戏水平。
{"title":"How to strengthen the software supply chain","authors":"Brian Trzupek","doi":"10.12968/s1353-4858(23)70061-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70061-5","url":null,"abstract":"Defenders against software supply chain attacks have to keep upping their game, as the attackers do.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"674 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI – bedazzled by its allure, blinded to its risks 人工智能--被其诱惑所迷惑,对其风险视而不见
Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70060-3
Akber Datoo, Jake Pope
You can't escape generative AI. It is being applied to so many parts of our lives and is the source of much excitement and speculation. But how many organisations fully understand its ramifications? It seems that few have properly delineated policies and standards for its application, and this could lead to serious problems.
你无法逃避生成式人工智能。它正被应用于我们生活的方方面面,并引发了许多激动人心的猜测。但有多少组织完全了解它的影响?似乎很少有机构为其应用制定了适当的政策和标准,这可能会导致严重的问题。
{"title":"AI – bedazzled by its allure, blinded to its risks","authors":"Akber Datoo, Jake Pope","doi":"10.12968/s1353-4858(23)70060-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70060-3","url":null,"abstract":"You can't escape generative AI. It is being applied to so many parts of our lives and is the source of much excitement and speculation. But how many organisations fully understand its ramifications? It seems that few have properly delineated policies and standards for its application, and this could lead to serious problems.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"90 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139017278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding legacy equipment 保护遗留设备
Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70064-0
Jeremy Whittingham
Manufacturers are frequently saddled with outdated technology and ageing equipment, making them uniquely vulnerable in the digital age. By understanding the implications and proactive steps that can be taken, manufacturers can protect their critical assets and ensure the integrity of their production processes.
制造商经常被过时的技术和老化的设备所困扰,这使他们在数字时代显得格外脆弱。通过了解其影响和可以采取的积极措施,制造商可以保护其关键资产,确保生产流程的完整性。
{"title":"Safeguarding legacy equipment","authors":"Jeremy Whittingham","doi":"10.12968/s1353-4858(23)70064-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70064-0","url":null,"abstract":"Manufacturers are frequently saddled with outdated technology and ageing equipment, making them uniquely vulnerable in the digital age. By understanding the implications and proactive steps that can be taken, manufacturers can protect their critical assets and ensure the integrity of their production processes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"494 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital trust is core to our relationship with technology 数字信任是我们与技术关系的核心
Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70047-0
Deepika Chauhan
Technology is now so central to our lives and to our businesses that it's essential that we can trust it. If we overlook this critical relationship, we stand in danger of being undermined or betrayed by the technology due to vulnerabilities and flaws, and we can never utilise it to its maximum potential. But how do you go about defining and achieving digital trust?
如今,科技在我们的生活和业务中如此重要,我们必须信任它。如果我们忽视了这种关键的关系,我们就有被技术破坏或背叛的危险,因为它的漏洞和缺陷,我们永远无法利用它的最大潜力。但是如何定义和实现数字信任呢?
{"title":"Digital trust is core to our relationship with technology","authors":"Deepika Chauhan","doi":"10.12968/s1353-4858(23)70047-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70047-0","url":null,"abstract":"Technology is now so central to our lives and to our businesses that it's essential that we can trust it. If we overlook this critical relationship, we stand in danger of being undermined or betrayed by the technology due to vulnerabilities and flaws, and we can never utilise it to its maximum potential. But how do you go about defining and achieving digital trust?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embracing an outcome-based approach to cyber security 坚持以结果为本的网络安全方针
Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70046-9
Paul Brucciani
Cyber security is often seen as an activity separate from an organisation's main business processes. It is something that only comes to the fore when an incident occurs – which may be too late. And this can create a gap between the true security needs of the organisation and its security posture. In contrast, outcome-based security creates direct links between business goals and security requirements.
网络安全通常被视为独立于企业主要业务流程的一项活动。这是一种只有在事件发生时才显现出来的东西——这可能已经太晚了。这可能会在组织的真实安全需求与其安全状况之间造成差距。相反,基于结果的安全性在业务目标和安全需求之间创建了直接的联系。
{"title":"Embracing an outcome-based approach to cyber security","authors":"Paul Brucciani","doi":"10.12968/s1353-4858(23)70046-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70046-9","url":null,"abstract":"Cyber security is often seen as an activity separate from an organisation's main business processes. It is something that only comes to the fore when an incident occurs – which may be too late. And this can create a gap between the true security needs of the organisation and its security posture. In contrast, outcome-based security creates direct links between business goals and security requirements.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The importance of practice for cyber security incident response 实践对网络安全事件响应的重要性
Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70048-2
Gemma Moore
{"title":"The importance of practice for cyber security incident response","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70048-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70048-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"33 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Best practices for combatting malvertising attacks 打击恶意广告攻击的最佳实践
Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70051-2
Tom McVey
{"title":"Best practices for combatting malvertising attacks","authors":"Tom McVey","doi":"10.12968/s1353-4858(23)70051-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70051-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1