Pub Date : 2022-11-01DOI: 10.12968/s1353-4858(22)70065-7
J. Griffiths
Every business, no matter how large or small, has some form of supply chain. You could be a manufacturer that supplies goods to a business to sell, or you could be the office water cooler supplier. It really doesn't matter what size the business is – you will tend to have at least one supplier. This, unfortunately, opens all businesses up to the potential risk of cyber attacks and data breaches coming directly from their supplier or suppliers (or any other firms in their supply chain).
{"title":"Supply chain security – the biggest overlooked cyber risk","authors":"J. Griffiths","doi":"10.12968/s1353-4858(22)70065-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70065-7","url":null,"abstract":"Every business, no matter how large or small, has some form of supply chain. You could be a manufacturer that supplies goods to a business to sell, or you could be the office water cooler supplier. It really doesn't matter what size the business is – you will tend to have at least one supplier. This, unfortunately, opens all businesses up to the potential risk of cyber attacks and data breaches coming directly from their supplier or suppliers (or any other firms in their supply chain).","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"239 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80419098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.12968/s1353-4858(22)70063-3
Robbie Allen
It's hard to think of a bigger disruption to organisations’ overall IT infrastructure than hybrid working. Suddenly, but out of necessity, the comforting assumption that all devices and data would be protected by carefully planned protocols, well-configured firewalls and excellent staff training has gone. In its place is the anxiety of new risks, such as a USB stick with confidential data becoming lost in transit, family members borrowing a work laptop and accessing company files, passwords carelessly being shared, or networks being misused.
{"title":"Mission-critical data is more complex in a hybrid world","authors":"Robbie Allen","doi":"10.12968/s1353-4858(22)70063-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70063-3","url":null,"abstract":"It's hard to think of a bigger disruption to organisations’ overall IT infrastructure than hybrid working. Suddenly, but out of necessity, the comforting assumption that all devices and data would be protected by carefully planned protocols, well-configured firewalls and excellent staff training has gone. In its place is the anxiety of new risks, such as a USB stick with confidential data becoming lost in transit, family members borrowing a work laptop and accessing company files, passwords carelessly being shared, or networks being misused.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76204815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.12968/s1353-4858(22)70060-8
Dan Richings
Four decades after the first PC rolled off the production line, today's systems are an order of magnitude faster and more functional than the originals. But how vulnerable are they to attack?
{"title":"Rethinking endpoint management for the modern age","authors":"Dan Richings","doi":"10.12968/s1353-4858(22)70060-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70060-8","url":null,"abstract":"Four decades after the first PC rolled off the production line, today's systems are an order of magnitude faster and more functional than the originals. But how vulnerable are they to attack?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74800801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.12968/s1353-4858(22)70058-x
S. Whitburn
{"title":"Driving the legal GRC agenda in a brave new world of compliance","authors":"S. Whitburn","doi":"10.12968/s1353-4858(22)70058-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70058-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76059527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.12968/s1353-4858(22)70061-x
Richard Staynings
As the threat from cyber attacks originating from Russia continues to grow, every nation must remain vigilant and learn to adapt and respond quickly to the evolving strategies of Russian cyber attackers.
{"title":"The threat from Russia continues to loom large","authors":"Richard Staynings","doi":"10.12968/s1353-4858(22)70061-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70061-x","url":null,"abstract":"As the threat from cyber attacks originating from Russia continues to grow, every nation must remain vigilant and learn to adapt and respond quickly to the evolving strategies of Russian cyber attackers.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90403480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.12968/s1353-4858(22)70062-1
Ashley Stephenson
We see frequent headlines about distributed denial of service (DDoS) of ever greater volumes. But does this reflect a true image of the DDoS problem? We can look at recent history to gain some insights into this obsession with attack size.
{"title":"DDoS – does size matter?","authors":"Ashley Stephenson","doi":"10.12968/s1353-4858(22)70062-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70062-1","url":null,"abstract":"We see frequent headlines about distributed denial of service (DDoS) of ever greater volumes. But does this reflect a true image of the DDoS problem? We can look at recent history to gain some insights into this obsession with attack size.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76279977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-01DOI: 10.12968/s1353-4858(22)70055-4
Sujan Chegu, Gautam U Reddy, Bharath S Bhambore, KA Adeab, Prasad B. Honnavalli, Sivaraman Eswaran
Injection-based attacks have consistently made the Open Web Application Security Project (OWASP)Top 10 vulnerabilities for years. 1 Common types of injection attacks include SQL injection, cross-site scripting (XSS) and code injection. Filter engines are used to detect and sanitise user inputs for these malicious attacks. The user input is assumed to be tainted by default. Thus, the ability of a filter in terms of accuracy and latency is important. There exist various approaches to improve filters, primarily including techniques based on regular expressions (regexes), abstract syntax tree, machine learning and so on. However, the testing of modern solutions has achieved no more than 98.5% accuracy for XSS. This article looks at ways to improve accuracy.
{"title":"An improved filter against injection attacks using regex and machine learning","authors":"Sujan Chegu, Gautam U Reddy, Bharath S Bhambore, KA Adeab, Prasad B. Honnavalli, Sivaraman Eswaran","doi":"10.12968/s1353-4858(22)70055-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70055-4","url":null,"abstract":"Injection-based attacks have consistently made the Open Web Application Security Project (OWASP)Top 10 vulnerabilities for years. 1 Common types of injection attacks include SQL injection, cross-site scripting (XSS) and code injection. Filter engines are used to detect and sanitise user inputs for these malicious attacks. The user input is assumed to be tainted by default. Thus, the ability of a filter in terms of accuracy and latency is important. There exist various approaches to improve filters, primarily including techniques based on regular expressions (regexes), abstract syntax tree, machine learning and so on. However, the testing of modern solutions has achieved no more than 98.5% accuracy for XSS. This article looks at ways to improve accuracy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84042736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}