首页 > 最新文献

Network Security最新文献

英文 中文
headline 标题
Pub Date : 2022-09-01 DOI: 10.1002/ncr.4110201202
Peter Sloman
Für unser junges Team suchen wir ab Juli oder August 2019 eine/n engagierte/n Praktikantin/Praktikanten. Wir bieten einen thematisch breit gefächerten Einblick in die Grundlagen der PR von mittelständischen Unternehmen und technologieorientierten Organisationen sowie in anspruchsvolle strategische Projekte großer Konzerne wie Amazon. Hier kannst du dir einen aktuellen Überblick über unsere Projekte verschaffen: www.headlineaffairs.de/news
我们的年青团队将于2019年7月或8月招至实习生。我们给了广泛的既有理论依据,认为中小企业和技术相关组织的公共推广,也提出了亚马逊等大公司追求的复杂战略项目。在这里您可以浏览一下www.head句号/新闻报
{"title":"headline","authors":"Peter Sloman","doi":"10.1002/ncr.4110201202","DOIUrl":"https://doi.org/10.1002/ncr.4110201202","url":null,"abstract":"Für unser junges Team suchen wir ab Juli oder August 2019 eine/n engagierte/n Praktikantin/Praktikanten. Wir bieten einen thematisch breit gefächerten Einblick in die Grundlagen der PR von mittelständischen Unternehmen und technologieorientierten Organisationen sowie in anspruchsvolle strategische Projekte großer Konzerne wie Amazon. Hier kannst du dir einen aktuellen Überblick über unsere Projekte verschaffen: www.headlineaffairs.de/news","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73315433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Is anti-virus software up to the job? 杀毒软件能胜任这项工作吗?
Pub Date : 2022-09-01 DOI: 10.12968/s1353-4858(22)70056-6
C. Tankard
{"title":"Is anti-virus software up to the job?","authors":"C. Tankard","doi":"10.12968/s1353-4858(22)70056-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70056-6","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78637337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing campaign targets Japanese MICARD and Amex users 网络钓鱼活动针对日本MICARD和美国运通卡用户
Pub Date : 2022-09-01 DOI: 10.12968/s1353-4858(22)70054-2
Thomas B. McVey
{"title":"Phishing campaign targets Japanese MICARD and Amex users","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70054-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70054-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79741384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Driving best practice security in a hybrid working world 在混合工作环境中推动最佳安全实践
Pub Date : 2022-09-01 DOI: 10.12968/s1353-4858(22)70057-8
Simon Mullis
The UK is settling into its new hybrid working routine. This is introducing new cyber security challenges for organisations. To secure personal and sensitive data across this ever-growing, sprawling and increasingly insecure environment, organisations have stepped up their use of end-to-end encryption. But this has created visibility challenges for security and compliance teams. And to many IT security professionals, it feels like a Catch-22 as they try to secure the needs of this increasingly hybrid workforce.
英国正在适应新的混合工作模式。这给企业带来了新的网络安全挑战。为了在这个不断增长、不断扩展且日益不安全的环境中保护个人和敏感数据,组织已经加强了端到端加密的使用。但这给安全性和遵从性团队带来了可见性挑战。对于许多IT安全专业人员来说,当他们试图确保这种日益混合的劳动力的需求时,感觉就像第22条军规。
{"title":"Driving best practice security in a hybrid working world","authors":"Simon Mullis","doi":"10.12968/s1353-4858(22)70057-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70057-8","url":null,"abstract":"The UK is settling into its new hybrid working routine. This is introducing new cyber security challenges for organisations. To secure personal and sensitive data across this ever-growing, sprawling and increasingly insecure environment, organisations have stepped up their use of end-to-end encryption. But this has created visibility challenges for security and compliance teams. And to many IT security professionals, it feels like a Catch-22 as they try to secure the needs of this increasingly hybrid workforce.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82713816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Now is the time to strengthen cyber defences 现在是加强网络防御的时候了
Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70047-5
Matias Madou
Thanks in part to the Covid-19 pandemic, cybercrime is at an all-time high and many organisations are struggling to cope. A large number of companies have had to grapple with security strategies for the first time, and those that already had plans in place found them being tested to the full.
部分由于Covid-19大流行,网络犯罪处于历史最高水平,许多组织都在努力应对。许多公司都是第一次与安全策略作斗争,而那些已经制定了计划的公司发现,这些计划正在接受全面的测试。
{"title":"Now is the time to strengthen cyber defences","authors":"Matias Madou","doi":"10.12968/s1353-4858(22)70047-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70047-5","url":null,"abstract":"Thanks in part to the Covid-19 pandemic, cybercrime is at an all-time high and many organisations are struggling to cope. A large number of companies have had to grapple with security strategies for the first time, and those that already had plans in place found them being tested to the full.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76747595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Negotiating with ransomware gangs 与勒索软件团伙谈判
Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70051-7
Thomas B. McVey
{"title":"Negotiating with ransomware gangs","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70051-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70051-7","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83292424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Industry 4.0: The security implications of operational technology 工业4.0:操作技术的安全含义
Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70050-5
Sachin Shah
Over the past several years, we have been experiencing the fourth industrial revolution, more commonly known as Industry 4.0. This evolution is being exacerbated by the influx of new technologies, advanced digitalisation, artificial intelligence, and the cloud, which is pushing the operational technology (OT) world into new realms with regards to security. Consequently, to achieve Industry 4.0, organisations must embrace the convergence between OT and information technology (IT), while understanding the vital role that cyber security plays throughout this process.
在过去的几年里,我们一直在经历第四次工业革命,通常被称为工业4.0。新技术、先进的数字化、人工智能和云的涌入加剧了这种演变,将运营技术(OT)世界推向了安全方面的新领域。因此,为了实现工业4.0,组织必须接受OT和信息技术(IT)之间的融合,同时了解网络安全在整个过程中发挥的重要作用。
{"title":"Industry 4.0: The security implications of operational technology","authors":"Sachin Shah","doi":"10.12968/s1353-4858(22)70050-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70050-5","url":null,"abstract":"Over the past several years, we have been experiencing the fourth industrial revolution, more commonly known as Industry 4.0. This evolution is being exacerbated by the influx of new technologies, advanced digitalisation, artificial intelligence, and the cloud, which is pushing the operational technology (OT) world into new realms with regards to security. Consequently, to achieve Industry 4.0, organisations must embrace the convergence between OT and information technology (IT), while understanding the vital role that cyber security plays throughout this process.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78579763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IBM: Cost of a Data Breach IBM:数据泄露的成本
Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70049-9
Steve Mansfield-Devine
{"title":"IBM: Cost of a Data Breach","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(22)70049-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70049-9","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88261869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Container attacks: a blast radius analysis 容器攻击:爆炸半径分析
Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70048-7
Assaf Morag
Containers may seem to offer greater security through segregation. But they are increasingly becoming a focus for attackers looking to escape the confines of containers in order to move laterally across the system. This is typically achieved through maliciously crafted container images, as recent research using honeypots has shown.
容器似乎通过隔离提供了更高的安全性。但它们正日益成为攻击者关注的焦点,他们希望逃离容器的限制,以便在整个系统中横向移动。正如最近对蜜罐的研究所表明的那样,这通常是通过恶意制作容器映像来实现的。
{"title":"Container attacks: a blast radius analysis","authors":"Assaf Morag","doi":"10.12968/s1353-4858(22)70048-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70048-7","url":null,"abstract":"Containers may seem to offer greater security through segregation. But they are increasingly becoming a focus for attackers looking to escape the confines of containers in order to move laterally across the system. This is typically achieved through maliciously crafted container images, as recent research using honeypots has shown.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87396594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pen testing vs red teaming 渗透测试vs红队
Pub Date : 2022-07-01 DOI: 10.12968/s1353-4858(22)70044-x
Gemma Moore
{"title":"Pen testing vs red teaming","authors":"Gemma Moore","doi":"10.12968/s1353-4858(22)70044-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70044-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74474957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1