Pub Date : 2023-06-01DOI: 10.12968/s1353-4858(23)70027-5
Thomas B. McVey
{"title":"Malware delivery is evolving through password-protected files","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70027-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70027-5","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83040319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.12968/s1353-4858(23)70025-1
M. Ibrahim, Nader Sohrabi Safa
Advanced driver assistance systems (ADAS) have gained widespread adoption in the automotive industry in recent years. Automatic parking assist (APA) is an important part of ADAS as it offers numerous benefits, such as safety improvements, space and time savings and fuel efficiency. However, it also introduces novel vulnerabilities, threats and risks that require attention. Vulnerabilities in the APA system may emerge as a result of its intricate design and the use of various communication protocols that adversaries could exploit to gain unauthorised systems access and undermine vehicle safety. Threats to the APA system may arise from diverse origins, including malicious actors, software defects and system malfunctions, which may lead to different types of attacks compromising the system's integrity and availability. The associated risks with the APA system can be considerable, potentially impacting the safety and confidentiality of the vehicle's occupants and other road users. It is crucial to systematically identify, assess and manage these risks by deploying appropriate controls.
{"title":"Vulnerabilities and risk in smart vehicle automatic parking assist systems","authors":"M. Ibrahim, Nader Sohrabi Safa","doi":"10.12968/s1353-4858(23)70025-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70025-1","url":null,"abstract":"Advanced driver assistance systems (ADAS) have gained widespread adoption in the automotive industry in recent years. Automatic parking assist (APA) is an important part of ADAS as it offers numerous benefits, such as safety improvements, space and time savings and fuel efficiency. However, it also introduces novel vulnerabilities, threats and risks that require attention. Vulnerabilities in the APA system may emerge as a result of its intricate design and the use of various communication protocols that adversaries could exploit to gain unauthorised systems access and undermine vehicle safety. Threats to the APA system may arise from diverse origins, including malicious actors, software defects and system malfunctions, which may lead to different types of attacks compromising the system's integrity and availability. The associated risks with the APA system can be considerable, potentially impacting the safety and confidentiality of the vehicle's occupants and other road users. It is crucial to systematically identify, assess and manage these risks by deploying appropriate controls.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88402614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.12968/s1353-4858(23)70026-3
Chrystal Taylor
Even the best security technology can't eliminate the threats to your organisation. Human error will always present a risk. It's important, then, that every organisation takes a careful look at its cyber security training to determine whether it's up to the job.
{"title":"Improving your company's cyber security training","authors":"Chrystal Taylor","doi":"10.12968/s1353-4858(23)70026-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70026-3","url":null,"abstract":"Even the best security technology can't eliminate the threats to your organisation. Human error will always present a risk. It's important, then, that every organisation takes a careful look at its cyber security training to determine whether it's up to the job.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"103 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76140808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.12968/s1353-4858(23)70021-4
Luke Potter
Twitter is going through tumultuous changes, many of them seemingly on a whim, as new owner Elon Musk struggles to monetise the platform. However, in the pursuit of profit, some of the modifications risk making the social network more dangerous for users.
{"title":"Has Twitter made a big mistake with 2FA?","authors":"Luke Potter","doi":"10.12968/s1353-4858(23)70021-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70021-4","url":null,"abstract":"Twitter is going through tumultuous changes, many of them seemingly on a whim, as new owner Elon Musk struggles to monetise the platform. However, in the pursuit of profit, some of the modifications risk making the social network more dangerous for users.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.12968/s1353-4858(23)70020-2
Gus Malezis
Digital transformation is disruptive at the best of times. But when you're a healthcare organisation struggling to cope with a pandemic, it's particularly difficult. In the midst of this maelstrom, cyber security can suffer. However, one specific aspect of security – digital identity – offers the potential to ease many of these woes.
{"title":"Digital identity: healthcare's path forward","authors":"Gus Malezis","doi":"10.12968/s1353-4858(23)70020-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70020-2","url":null,"abstract":"Digital transformation is disruptive at the best of times. But when you're a healthcare organisation struggling to cope with a pandemic, it's particularly difficult. In the midst of this maelstrom, cyber security can suffer. However, one specific aspect of security – digital identity – offers the potential to ease many of these woes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.12968/s1353-4858(23)70019-6
Sylvain Cortes
Organisations continue to be breached through the exploitation of known vulnerabilities for which patches were available. Keeping track of the threats is not easy, but this is an area where companies need to up their game, especially in the pharmaceutical sector.
{"title":"How the pharma industry can reinvent vulnerability management","authors":"Sylvain Cortes","doi":"10.12968/s1353-4858(23)70019-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70019-6","url":null,"abstract":"Organisations continue to be breached through the exploitation of known vulnerabilities for which patches were available. Keeping track of the threats is not easy, but this is an area where companies need to up their game, especially in the pharmaceutical sector.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.12968/s1353-4858(23)70022-6
Bharathasimha Reddy, Amit Nagal, Aditya K Sood, Ruthvik Reddy SL
The world is expanding digitally at an ever-accelerating rate. As networks become larger and data becomes more complex, cyber security challenges are growing rapidly. To combat cyber attacks, machine learning (ML) and other artificial intelligence (AI) solutions should be utilised to design and build robust security solutions. With the explosion in the number of new techniques and frameworks in the ML/AI space, it is tricky for organisations to identify the best frameworks and approaches to build robust ML/AI solutions. In this article, an empirical analysis has been performed on various ML/AI frameworks to determine the performance and effectiveness of running ML/AI algorithms in a distributed manner.
{"title":"Enhancing cyber security at scale with ML/AI frameworks","authors":"Bharathasimha Reddy, Amit Nagal, Aditya K Sood, Ruthvik Reddy SL","doi":"10.12968/s1353-4858(23)70022-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70022-6","url":null,"abstract":"The world is expanding digitally at an ever-accelerating rate. As networks become larger and data becomes more complex, cyber security challenges are growing rapidly. To combat cyber attacks, machine learning (ML) and other artificial intelligence (AI) solutions should be utilised to design and build robust security solutions. With the explosion in the number of new techniques and frameworks in the ML/AI space, it is tricky for organisations to identify the best frameworks and approaches to build robust ML/AI solutions. In this article, an empirical analysis has been performed on various ML/AI frameworks to determine the performance and effectiveness of running ML/AI algorithms in a distributed manner.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"24 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.12968/s1353-4858(23)70017-2
Steve Mansfield-Devine
Depending on who you ask, ChatGPT is either a great boon to humanity or an existential menace. In the cyber security world, however, it has been characterised as mostly a threat – one that will enable unskilled actors to become potent hackers. What truth is there in the hype? And could ChatGPT and other large language models actually be a force for good?
{"title":"Weaponising ChatGPT","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(23)70017-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70017-2","url":null,"abstract":"Depending on who you ask, ChatGPT is either a great boon to humanity or an existential menace. In the cyber security world, however, it has been characterised as mostly a threat – one that will enable unskilled actors to become potent hackers. What truth is there in the hype? And could ChatGPT and other large language models actually be a force for good?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91357427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}