首页 > 最新文献

Network Security最新文献

英文 中文
Securing communication protocols in military computing 确保军用计算中通信协议的安全
Pub Date : 2024-03-01 DOI: 10.12968/s1353-4858(24)70011-7
Rajeev Kumar, Raees Ahmad Khan
In the rapidly evolving landscape of military operations driven by advanced technology, the integration of sophisticated computing solutions has become pivotal for gaining a strategic edge. However, this shift brings forth a heightened vulnerability in communication protocols, raising concerns about the security of data exchange among military systems. This research delves into the challenges and vulnerabilities inherent in military communication protocols, aiming to identify potential threats to the confidentiality, integrity and availability of sensitive information. The article further proposes robust strategies to fortify communication channels against evolving cyberthreats, contributing to a deeper understanding of these protocols and offering practical solutions for securing them in the dynamic cyber security landscape.
在先进技术推动军事行动迅速发展的今天,整合先进的计算解决方案已成为获得战略优势的关键。然而,这种转变带来了通信协议的高度脆弱性,引发了对军事系统间数据交换安全性的担忧。本研究深入探讨了军事通信协议中固有的挑战和漏洞,旨在找出敏感信息的保密性、完整性和可用性所面临的潜在威胁。文章进一步提出了针对不断演变的网络威胁强化通信渠道的有力策略,有助于加深对这些协议的理解,并为在动态的网络安全环境中确保这些协议的安全提供实用的解决方案。
{"title":"Securing communication protocols in military computing","authors":"Rajeev Kumar, Raees Ahmad Khan","doi":"10.12968/s1353-4858(24)70011-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70011-7","url":null,"abstract":"In the rapidly evolving landscape of military operations driven by advanced technology, the integration of sophisticated computing solutions has become pivotal for gaining a strategic edge. However, this shift brings forth a heightened vulnerability in communication protocols, raising concerns about the security of data exchange among military systems. This research delves into the challenges and vulnerabilities inherent in military communication protocols, aiming to identify potential threats to the confidentiality, integrity and availability of sensitive information. The article further proposes robust strategies to fortify communication channels against evolving cyberthreats, contributing to a deeper understanding of these protocols and offering practical solutions for securing them in the dynamic cyber security landscape.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"9 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140403696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can your disaster-recovery process stand up to ransomware? 您的灾难恢复流程能抵御勒索软件吗?
Pub Date : 2024-03-01 DOI: 10.12968/s1353-4858(24)70009-9
Dan Lattimer
Ransomware remains one of the biggest threats to organisations. And most firms have tried to improve their defences against falling victim to this kind of attack. However, when the worst happens, relatively few are able to deal with the consequences. Without the ability to recover, they have no choice but to pay the ransom. And if you think your back-ups will save you, you might be in for a shock.
勒索软件仍然是企业面临的最大威胁之一。大多数公司都在努力提高防御能力,以防成为此类攻击的受害者。然而,当最糟糕的情况发生时,能够应对后果的公司相对较少。在没有恢复能力的情况下,他们别无选择,只能支付赎金。如果你认为你的备份可以拯救你,那么你可能会大吃一惊。
{"title":"Can your disaster-recovery process stand up to ransomware?","authors":"Dan Lattimer","doi":"10.12968/s1353-4858(24)70009-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70009-9","url":null,"abstract":"Ransomware remains one of the biggest threats to organisations. And most firms have tried to improve their defences against falling victim to this kind of attack. However, when the worst happens, relatively few are able to deal with the consequences. Without the ability to recover, they have no choice but to pay the ransom. And if you think your back-ups will save you, you might be in for a shock.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"47 203","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Back to basics to fight flaws 返璞归真,消除缺陷
Pub Date : 2024-03-01 DOI: 10.12968/s1353-4858(24)70012-9
Steve Mansfield-Devine
Too many security incidents can be traced back directly to flaws in software. And the problem is a systemic one, rooted in the tools we use to write code, software development culture and inadequate testing. In spite of this, software vendors continue to evade liability for the flaws in their products. It's time for this to change.
太多的安全事件可以直接追溯到软件的缺陷。这个问题是一个系统性问题,根源在于我们用来编写代码的工具、软件开发文化和不充分的测试。尽管如此,软件供应商仍然逃避对其产品缺陷的责任。现在是改变这种状况的时候了。
{"title":"Back to basics to fight flaws","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70012-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70012-9","url":null,"abstract":"Too many security incidents can be traced back directly to flaws in software. And the problem is a systemic one, rooted in the tools we use to write code, software development culture and inadequate testing. In spite of this, software vendors continue to evade liability for the flaws in their products. It's time for this to change.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"345 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continual risk management – getting the basics right 持续风险管理--做好基础工作
Pub Date : 2024-03-01 DOI: 10.12968/s1353-4858(24)70010-5
Robert Guegan
The threats to organisations are now so many and so complex that it's no longer adequate simply to react to them. And achieving a level of cyber security isn't enough either – you have to maintain that standard, and constantly revise and improve it. This is where continual risk management comes into play – providing a process by which you can ensure your defences are current and up to the task.
现在,组织所面临的威胁如此之多、如此复杂,仅仅对其做出反应已经远远不够了。仅仅达到一定的网络安全水平也是不够的,还必须保持这一标准,并不断修正和改进。这就是持续风险管理的作用所在--它提供了一个流程,通过该流程,您可以确保您的防御措施是最新的,能够胜任任务。
{"title":"Continual risk management – getting the basics right","authors":"Robert Guegan","doi":"10.12968/s1353-4858(24)70010-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70010-5","url":null,"abstract":"The threats to organisations are now so many and so complex that it's no longer adequate simply to react to them. And achieving a level of cyber security isn't enough either – you have to maintain that standard, and constantly revise and improve it. This is where continual risk management comes into play – providing a process by which you can ensure your defences are current and up to the task.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"65 S3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140407425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A zero-trust journey through the threat landscape 穿越威胁环境的零信任之旅
Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70008-7
Dominic Trott
Zero trust is being widely adopted as a fundamental concept in cyber security architectures, and its implementation has accelerated due to so many organisations introducing new working practices. But creating a zero-trust environment is not simple, and requires a shift in mindset away from thinking about security in terms of fixed lines of defence. And it's not just a change in technology – it requires you to look deeply at your processes and corporate culture, too. So what are the best ways of embarking on the zero-trust journey?
零信任作为网络安全架构中的一个基本概念正在被广泛采用,而且由于许多组织引入了新的工作实践,其实施速度也在加快。但创建零信任环境并不简单,需要转变思想,不再从固定防线的角度考虑安全问题。而且,这不仅仅是技术上的改变,还需要对流程和企业文化进行深入研究。那么,踏上零信任之旅的最佳方式是什么呢?
{"title":"A zero-trust journey through the threat landscape","authors":"Dominic Trott","doi":"10.12968/s1353-4858(24)70008-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70008-7","url":null,"abstract":"Zero trust is being widely adopted as a fundamental concept in cyber security architectures, and its implementation has accelerated due to so many organisations introducing new working practices. But creating a zero-trust environment is not simple, and requires a shift in mindset away from thinking about security in terms of fixed lines of defence. And it's not just a change in technology – it requires you to look deeply at your processes and corporate culture, too. So what are the best ways of embarking on the zero-trust journey?","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"19 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing private content exposure risk in 2024 2024 年私人内容风险的管理
Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70005-1
Tim Freestone
Keeping data safe has never been more difficult, and this is situation that is likely to get worse as the technologies available to attackers becomes more sophisticated. In addition, the adoption of AI technology by organisations will lead to novel vulnerabilities. It's time for organisations to improve their data security – ideally hand-in-hand with the new technologies. Otherwise they risk catastrophic breaches.
维护数据安全从未像现在这样困难,而且随着攻击者可利用的技术越来越复杂,这种情况很可能会变得更糟。此外,企业采用人工智能技术也会带来新的漏洞。现在是各组织提高数据安全性的时候了--最好是与新技术齐头并进。否则,它们将面临灾难性的漏洞风险。
{"title":"Managing private content exposure risk in 2024","authors":"Tim Freestone","doi":"10.12968/s1353-4858(24)70005-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70005-1","url":null,"abstract":"Keeping data safe has never been more difficult, and this is situation that is likely to get worse as the technologies available to attackers becomes more sophisticated. In addition, the adoption of AI technology by organisations will lead to novel vulnerabilities. It's time for organisations to improve their data security – ideally hand-in-hand with the new technologies. Otherwise they risk catastrophic breaches.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"86 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140469615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When not to do a penetration test 何时不进行渗透测试
Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70007-5
Frank Schugar
Penetration testing has become an essential tool in assessing an organisation's security posture. And in many sectors, regular pen-testing is mandated. But it is not how you begin your cyber security journey – something that is frequently misunderstood. Pen-testing should come at the end, to verify that the security technologies and processes you have implemented are up to the task.
渗透测试已成为评估组织安全状况的重要工具。在许多行业,定期进行渗透测试是强制性的。但这并不是网络安全之旅的开始--这一点经常被误解。渗透测试应在最后进行,以验证您所实施的安全技术和流程是否能够完成任务。
{"title":"When not to do a penetration test","authors":"Frank Schugar","doi":"10.12968/s1353-4858(24)70007-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70007-5","url":null,"abstract":"Penetration testing has become an essential tool in assessing an organisation's security posture. And in many sectors, regular pen-testing is mandated. But it is not how you begin your cyber security journey – something that is frequently misunderstood. Pen-testing should come at the end, to verify that the security technologies and processes you have implemented are up to the task.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"21 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grasping the nettle of cyber governance 抓住网络治理的要害
Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70006-3
Steve Mansfield-Devine
{"title":"Grasping the nettle of cyber governance","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70006-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70006-3","url":null,"abstract":"","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"245 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing data storage for cloud security 加强数据存储,确保云安全
Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70004-x
Faye Ellis
The cloud is a pervasive technology, which is why any threat to its security raises significant concerns for an organisation. Unfortunately, too many organisations lack the in-house skills to ensure cloud security. Often, cloud services are managed by people without specific training and qualifications. To help you make sure your use of the cloud doesn't leave you at risk, this article offers five steps for improving your security.
云是一种无处不在的技术,因此任何对其安全性的威胁都会引起企业的高度关注。遗憾的是,许多组织缺乏确保云安全的内部技能。通常,云服务都是由没有经过专门培训和资格认证的人员管理的。为了帮助您确保云的使用不会给您带来风险,本文提供了提高安全性的五个步骤。
{"title":"Enhancing data storage for cloud security","authors":"Faye Ellis","doi":"10.12968/s1353-4858(24)70004-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70004-x","url":null,"abstract":"The cloud is a pervasive technology, which is why any threat to its security raises significant concerns for an organisation. Unfortunately, too many organisations lack the in-house skills to ensure cloud security. Often, cloud services are managed by people without specific training and qualifications. To help you make sure your use of the cloud doesn't leave you at risk, this article offers five steps for improving your security.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"271 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI as the bedrock for next-generation cyber security solutions 人工智能是下一代网络安全解决方案的基石
Pub Date : 2024-01-01 DOI: 10.12968/s1353-4858(24)70003-8
Aditya K Sood, Amit Nagal
Artificial intelligence (AI) and cyber security continue to evolve hand-in-hand, and organisations must maintain a proactive and adaptable mindset to use AI as a tool for handling cyber security challenges. This article discusses the effectiveness of AI in solving cyber security problems while handling data-at-scale.
人工智能(AI)和网络安全继续携手发展,企业必须保持积极主动、适应性强的心态,将人工智能作为应对网络安全挑战的工具。本文讨论了人工智能在处理大规模数据的同时解决网络安全问题的有效性。
{"title":"AI as the bedrock for next-generation cyber security solutions","authors":"Aditya K Sood, Amit Nagal","doi":"10.12968/s1353-4858(24)70003-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70003-8","url":null,"abstract":"Artificial intelligence (AI) and cyber security continue to evolve hand-in-hand, and organisations must maintain a proactive and adaptable mindset to use AI as a tool for handling cyber security challenges. This article discusses the effectiveness of AI in solving cyber security problems while handling data-at-scale.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"36 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140520697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1