Pub Date : 2024-03-01DOI: 10.12968/s1353-4858(24)70011-7
Rajeev Kumar, Raees Ahmad Khan
In the rapidly evolving landscape of military operations driven by advanced technology, the integration of sophisticated computing solutions has become pivotal for gaining a strategic edge. However, this shift brings forth a heightened vulnerability in communication protocols, raising concerns about the security of data exchange among military systems. This research delves into the challenges and vulnerabilities inherent in military communication protocols, aiming to identify potential threats to the confidentiality, integrity and availability of sensitive information. The article further proposes robust strategies to fortify communication channels against evolving cyberthreats, contributing to a deeper understanding of these protocols and offering practical solutions for securing them in the dynamic cyber security landscape.
{"title":"Securing communication protocols in military computing","authors":"Rajeev Kumar, Raees Ahmad Khan","doi":"10.12968/s1353-4858(24)70011-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70011-7","url":null,"abstract":"In the rapidly evolving landscape of military operations driven by advanced technology, the integration of sophisticated computing solutions has become pivotal for gaining a strategic edge. However, this shift brings forth a heightened vulnerability in communication protocols, raising concerns about the security of data exchange among military systems. This research delves into the challenges and vulnerabilities inherent in military communication protocols, aiming to identify potential threats to the confidentiality, integrity and availability of sensitive information. The article further proposes robust strategies to fortify communication channels against evolving cyberthreats, contributing to a deeper understanding of these protocols and offering practical solutions for securing them in the dynamic cyber security landscape.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"9 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140403696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.12968/s1353-4858(24)70009-9
Dan Lattimer
Ransomware remains one of the biggest threats to organisations. And most firms have tried to improve their defences against falling victim to this kind of attack. However, when the worst happens, relatively few are able to deal with the consequences. Without the ability to recover, they have no choice but to pay the ransom. And if you think your back-ups will save you, you might be in for a shock.
{"title":"Can your disaster-recovery process stand up to ransomware?","authors":"Dan Lattimer","doi":"10.12968/s1353-4858(24)70009-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70009-9","url":null,"abstract":"Ransomware remains one of the biggest threats to organisations. And most firms have tried to improve their defences against falling victim to this kind of attack. However, when the worst happens, relatively few are able to deal with the consequences. Without the ability to recover, they have no choice but to pay the ransom. And if you think your back-ups will save you, you might be in for a shock.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"47 203","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.12968/s1353-4858(24)70012-9
Steve Mansfield-Devine
Too many security incidents can be traced back directly to flaws in software. And the problem is a systemic one, rooted in the tools we use to write code, software development culture and inadequate testing. In spite of this, software vendors continue to evade liability for the flaws in their products. It's time for this to change.
{"title":"Back to basics to fight flaws","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70012-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70012-9","url":null,"abstract":"Too many security incidents can be traced back directly to flaws in software. And the problem is a systemic one, rooted in the tools we use to write code, software development culture and inadequate testing. In spite of this, software vendors continue to evade liability for the flaws in their products. It's time for this to change.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"345 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-01DOI: 10.12968/s1353-4858(24)70010-5
Robert Guegan
The threats to organisations are now so many and so complex that it's no longer adequate simply to react to them. And achieving a level of cyber security isn't enough either – you have to maintain that standard, and constantly revise and improve it. This is where continual risk management comes into play – providing a process by which you can ensure your defences are current and up to the task.
{"title":"Continual risk management – getting the basics right","authors":"Robert Guegan","doi":"10.12968/s1353-4858(24)70010-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70010-5","url":null,"abstract":"The threats to organisations are now so many and so complex that it's no longer adequate simply to react to them. And achieving a level of cyber security isn't enough either – you have to maintain that standard, and constantly revise and improve it. This is where continual risk management comes into play – providing a process by which you can ensure your defences are current and up to the task.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"65 S3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140407425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-01DOI: 10.12968/s1353-4858(24)70008-7
Dominic Trott
Zero trust is being widely adopted as a fundamental concept in cyber security architectures, and its implementation has accelerated due to so many organisations introducing new working practices. But creating a zero-trust environment is not simple, and requires a shift in mindset away from thinking about security in terms of fixed lines of defence. And it's not just a change in technology – it requires you to look deeply at your processes and corporate culture, too. So what are the best ways of embarking on the zero-trust journey?
{"title":"A zero-trust journey through the threat landscape","authors":"Dominic Trott","doi":"10.12968/s1353-4858(24)70008-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70008-7","url":null,"abstract":"Zero trust is being widely adopted as a fundamental concept in cyber security architectures, and its implementation has accelerated due to so many organisations introducing new working practices. But creating a zero-trust environment is not simple, and requires a shift in mindset away from thinking about security in terms of fixed lines of defence. And it's not just a change in technology – it requires you to look deeply at your processes and corporate culture, too. So what are the best ways of embarking on the zero-trust journey?","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"19 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-01DOI: 10.12968/s1353-4858(24)70005-1
Tim Freestone
Keeping data safe has never been more difficult, and this is situation that is likely to get worse as the technologies available to attackers becomes more sophisticated. In addition, the adoption of AI technology by organisations will lead to novel vulnerabilities. It's time for organisations to improve their data security – ideally hand-in-hand with the new technologies. Otherwise they risk catastrophic breaches.
{"title":"Managing private content exposure risk in 2024","authors":"Tim Freestone","doi":"10.12968/s1353-4858(24)70005-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70005-1","url":null,"abstract":"Keeping data safe has never been more difficult, and this is situation that is likely to get worse as the technologies available to attackers becomes more sophisticated. In addition, the adoption of AI technology by organisations will lead to novel vulnerabilities. It's time for organisations to improve their data security – ideally hand-in-hand with the new technologies. Otherwise they risk catastrophic breaches.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"86 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140469615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-01DOI: 10.12968/s1353-4858(24)70007-5
Frank Schugar
Penetration testing has become an essential tool in assessing an organisation's security posture. And in many sectors, regular pen-testing is mandated. But it is not how you begin your cyber security journey – something that is frequently misunderstood. Pen-testing should come at the end, to verify that the security technologies and processes you have implemented are up to the task.
{"title":"When not to do a penetration test","authors":"Frank Schugar","doi":"10.12968/s1353-4858(24)70007-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70007-5","url":null,"abstract":"Penetration testing has become an essential tool in assessing an organisation's security posture. And in many sectors, regular pen-testing is mandated. But it is not how you begin your cyber security journey – something that is frequently misunderstood. Pen-testing should come at the end, to verify that the security technologies and processes you have implemented are up to the task.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"21 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-01DOI: 10.12968/s1353-4858(24)70006-3
Steve Mansfield-Devine
{"title":"Grasping the nettle of cyber governance","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70006-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70006-3","url":null,"abstract":"","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"245 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-01DOI: 10.12968/s1353-4858(24)70004-x
Faye Ellis
The cloud is a pervasive technology, which is why any threat to its security raises significant concerns for an organisation. Unfortunately, too many organisations lack the in-house skills to ensure cloud security. Often, cloud services are managed by people without specific training and qualifications. To help you make sure your use of the cloud doesn't leave you at risk, this article offers five steps for improving your security.
{"title":"Enhancing data storage for cloud security","authors":"Faye Ellis","doi":"10.12968/s1353-4858(24)70004-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70004-x","url":null,"abstract":"The cloud is a pervasive technology, which is why any threat to its security raises significant concerns for an organisation. Unfortunately, too many organisations lack the in-house skills to ensure cloud security. Often, cloud services are managed by people without specific training and qualifications. To help you make sure your use of the cloud doesn't leave you at risk, this article offers five steps for improving your security.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"271 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-01DOI: 10.12968/s1353-4858(24)70003-8
Aditya K Sood, Amit Nagal
Artificial intelligence (AI) and cyber security continue to evolve hand-in-hand, and organisations must maintain a proactive and adaptable mindset to use AI as a tool for handling cyber security challenges. This article discusses the effectiveness of AI in solving cyber security problems while handling data-at-scale.
{"title":"AI as the bedrock for next-generation cyber security solutions","authors":"Aditya K Sood, Amit Nagal","doi":"10.12968/s1353-4858(24)70003-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70003-8","url":null,"abstract":"Artificial intelligence (AI) and cyber security continue to evolve hand-in-hand, and organisations must maintain a proactive and adaptable mindset to use AI as a tool for handling cyber security challenges. This article discusses the effectiveness of AI in solving cyber security problems while handling data-at-scale.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"36 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140520697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}