首页 > 最新文献

Network Security最新文献

英文 中文
The M-P of cyber security 网络安全的M-P
Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70035-4
K. Renaud
{"title":"The M-P of cyber security","authors":"K. Renaud","doi":"10.12968/s1353-4858(23)70035-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70035-4","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82867108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The shadow of 2022 is still shaping cyberthreats 2022年的阴影仍在影响着网络威胁
Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70038-x
Colin Sheppard
Recent research has shown how the global events of 2022 are still affecting the nature of cyberthreats today and possibly into the future. This article takes a closer look at the findings and what they mean for businesses, including a detailed rundown of the most prevalent threats, methods and attack vectors used.
最近的研究表明,2022年的全球事件仍在影响着今天甚至未来网络威胁的性质。本文将详细介绍这些发现及其对企业的意义,包括最普遍的威胁、方法和攻击媒介的详细概述。
{"title":"The shadow of 2022 is still shaping cyberthreats","authors":"Colin Sheppard","doi":"10.12968/s1353-4858(23)70038-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70038-x","url":null,"abstract":"Recent research has shown how the global events of 2022 are still affecting the nature of cyberthreats today and possibly into the future. This article takes a closer look at the findings and what they mean for businesses, including a detailed rundown of the most prevalent threats, methods and attack vectors used.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"134 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91076403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defensive cyber security: continuous controls enforcement and infrastructure hygiene 防御性网络安全:持续控制执行和基础设施卫生
Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70039-1
Aditya K. Sood
With the exponential rise in cyber attacks, organisations need to implement mature cyber security strategies for handling cyberthreats at scale and minimising the risk to the business. In this article, we look at the cyber security model of continuous assessment and controls enforcement (CACE), including the importance of maintaining infrastructure cyber hygiene.
随着网络攻击呈指数级增长,组织需要实施成熟的网络安全策略来处理大规模的网络威胁,并将业务风险降至最低。在本文中,我们将研究持续评估和控制执行(CACE)的网络安全模型,包括维护基础设施网络卫生的重要性。
{"title":"Defensive cyber security: continuous controls enforcement and infrastructure hygiene","authors":"Aditya K. Sood","doi":"10.12968/s1353-4858(23)70039-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70039-1","url":null,"abstract":"With the exponential rise in cyber attacks, organisations need to implement mature cyber security strategies for handling cyberthreats at scale and minimising the risk to the business. In this article, we look at the cyber security model of continuous assessment and controls enforcement (CACE), including the importance of maintaining infrastructure cyber hygiene.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"177 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78151878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting the UK's national infrastructure 保护英国的国家基础设施
Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70030-5
Tom Egglestone
Of all the industries targeted by cyber attackers, critical national infrastructure (CNI) is among the most concerning. The potential disruption not just to business but to our daily lives and even our physical safety means that governments, including the UK, are taking the threat seriously. But it's also important that individual organisations working in this area ramp up their cyber security and adopt a position of cyber resilience.
在所有被网络攻击者盯上的行业中,关键国家基础设施(CNI)是最令人担忧的。不仅对商业,而且对我们的日常生活甚至人身安全的潜在破坏意味着,包括英国在内的各国政府正在认真对待这一威胁。但同样重要的是,在这一领域工作的个人组织要加强网络安全,采取网络弹性的立场。
{"title":"Protecting the UK's national infrastructure","authors":"Tom Egglestone","doi":"10.12968/s1353-4858(23)70030-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70030-5","url":null,"abstract":"Of all the industries targeted by cyber attackers, critical national infrastructure (CNI) is among the most concerning. The potential disruption not just to business but to our daily lives and even our physical safety means that governments, including the UK, are taking the threat seriously. But it's also important that individual organisations working in this area ramp up their cyber security and adopt a position of cyber resilience.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83869398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Removing passwords doesn't remove risk 删除密码并不能消除风险
Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70031-7
Gemma Moore
{"title":"Removing passwords doesn't remove risk","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70031-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70031-7","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81496445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XeGroup's evolving attack methods XeGroup不断发展的攻击方法
Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70034-2
Thomas B. McVey
{"title":"XeGroup's evolving attack methods","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70034-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70034-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77343164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How SMBs can defeat the threat of ransomware 中小企业如何战胜勒索软件的威胁
Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70033-0
Tyler Moffitt
Ransomware is not going away. In fact, it has become one of the most common and devastating forms of attack against organisations. Small and medium-size businesses (SMBs) are among the most vulnerable, as they often lack the resources to cope with a breach. But there are things they can do to improve their resilience.
勒索软件不会消失。事实上,它已成为针对组织的最常见和最具破坏性的攻击形式之一。中小型企业(smb)是最容易受到攻击的企业之一,因为它们通常缺乏应对违规行为的资源。但他们可以做一些事情来提高他们的适应力。
{"title":"How SMBs can defeat the threat of ransomware","authors":"Tyler Moffitt","doi":"10.12968/s1353-4858(23)70033-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70033-0","url":null,"abstract":"Ransomware is not going away. In fact, it has become one of the most common and devastating forms of attack against organisations. Small and medium-size businesses (SMBs) are among the most vulnerable, as they often lack the resources to cope with a breach. But there are things they can do to improve their resilience.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73578197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging the cyber skills gap 弥合网络技能差距
Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70029-9
Paul Caron
It has long been accepted that one of the greatest threats to your cyber security lies within your own organisation – your staff. Cyber security training is a challenge, as is keeping people aware of and alert to emerging threats. And this has been complicated further by new organisational structures and ways of working, in no small part imposed by the Covid pandemic. Solving this problem requires effort and investment.
长期以来,人们一直认为,网络安全的最大威胁之一在于你自己的组织内部——你的员工。网络安全培训是一项挑战,保持人们对新出现的威胁的意识和警惕也是一项挑战。新的组织结构和工作方式使情况进一步复杂化,这在很大程度上是由新冠疫情造成的。解决这个问题需要努力和投资。
{"title":"Bridging the cyber skills gap","authors":"Paul Caron","doi":"10.12968/s1353-4858(23)70029-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70029-9","url":null,"abstract":"It has long been accepted that one of the greatest threats to your cyber security lies within your own organisation – your staff. Cyber security training is a challenge, as is keeping people aware of and alert to emerging threats. And this has been complicated further by new organisational structures and ways of working, in no small part imposed by the Covid pandemic. Solving this problem requires effort and investment.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76147838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why zero trust should start at the endpoint 为什么零信任应该从端点开始
Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70032-9
Henry b. Harrison
The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?
零信任概念正在迅速普及,特别是随着混合工作实践的兴起和传统网络边界的持续侵蚀。但是,在实施零信任策略时,从哪里开始呢?
{"title":"Why zero trust should start at the endpoint","authors":"Henry b. Harrison","doi":"10.12968/s1353-4858(23)70032-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70032-9","url":null,"abstract":"The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81263093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Where identity governance really belongs 身份治理真正属于哪里
Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70028-7
Cengiz Tuztas
When companies decide to initiate an identity governance and administration (IGA) project, it raises a number of questions. This primarily concerns the selection of products and solutions to manage digital identities and the permissions associated with them. Sometimes, however, it is helpful to take a step back and examine the extent to which the prerequisites for comprehensive governance are actually in place and where this should start from – because a number of others are grouped around the concept of identity and not necessarily uniformly or sharply.
当公司决定启动身份治理和管理(IGA)项目时,会产生许多问题。这主要涉及到管理数字身份的产品和解决方案的选择以及与之相关的权限。然而,有时后退一步并检查全面治理的先决条件实际到位的程度以及应该从哪里开始是有帮助的,因为许多其他因素都围绕着身份的概念分组,而且不一定是一致的或尖锐的。
{"title":"Where identity governance really belongs","authors":"Cengiz Tuztas","doi":"10.12968/s1353-4858(23)70028-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70028-7","url":null,"abstract":"When companies decide to initiate an identity governance and administration (IGA) project, it raises a number of questions. This primarily concerns the selection of products and solutions to manage digital identities and the permissions associated with them. Sometimes, however, it is helpful to take a step back and examine the extent to which the prerequisites for comprehensive governance are actually in place and where this should start from – because a number of others are grouped around the concept of identity and not necessarily uniformly or sharply.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80252982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1