首页 > 最新文献

Network Security最新文献

英文 中文
Meeting the challenges of cyber security 应对网络安全挑战
Pub Date : 2024-01-01 DOI: 10.12968/s1353-4858(24)70002-6
Steve Mansfield-Devine
Cyber security isn't getting any easier. Both the threats and the solutions designed to combat them are becoming ever more complex. Smaller firms frequently struggle to keep up with the latest threats and bring the right skills to bear. And even the largest firms face challenges when it comes to assessing risks and implementing the solutions to tackle them.
网络安全并没有变得容易。威胁和应对威胁的解决方案都变得越来越复杂。规模较小的公司往往难以跟上最新威胁的步伐,也难以掌握正确的技能。即使是最大的公司,在评估风险和实施应对方案时也面临着挑战。
{"title":"Meeting the challenges of cyber security","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70002-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70002-6","url":null,"abstract":"Cyber security isn't getting any easier. Both the threats and the solutions designed to combat them are becoming ever more complex. Smaller firms frequently struggle to keep up with the latest threats and bring the right skills to bear. And even the largest firms face challenges when it comes to assessing risks and implementing the solutions to tackle them.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"254 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140521610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The challenge of viewing security events in context 从背景角度看待安全事件的挑战
Pub Date : 2024-01-01 DOI: 10.12968/s1353-4858(24)70001-4
Gemma Moore
{"title":"The challenge of viewing security events in context","authors":"Gemma Moore","doi":"10.12968/s1353-4858(24)70001-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70001-4","url":null,"abstract":"","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"165 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140523233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving risk management – combining security and cyber insurance practices 改进风险管理--结合安全和网络保险实践
Pub Date : 2023-11-01 DOI: 10.12968/s1353-4858(23)70052-4
Paul Baird
Cyber insurance will help you deal with the costs of recovering from a breach. But it can also play a deeper role. Insurance companies now demand that organisations demonstrate their security preparedness, and this means having a detailed and accurate picture of your infrastructure and IT estate. The tools you use to obtain this picture can also give you the insight you need to improve your readiness.
网络保险将帮助您处理从漏洞中恢复的成本。但它还能发挥更深层次的作用。保险公司现在要求企业展示其安全准备情况,这就意味着要详细、准确地了解企业的基础设施和 IT 产业。您用来获取这一信息的工具也可以为您提供改进准备工作所需的洞察力。
{"title":"Improving risk management – combining security and cyber insurance practices","authors":"Paul Baird","doi":"10.12968/s1353-4858(23)70052-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70052-4","url":null,"abstract":"Cyber insurance will help you deal with the costs of recovering from a breach. But it can also play a deeper role. Insurance companies now demand that organisations demonstrate their security preparedness, and this means having a detailed and accurate picture of your infrastructure and IT estate. The tools you use to obtain this picture can also give you the insight you need to improve your readiness.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to assess the impact of generative artificial intelligence 如何评估生成式人工智能的影响
Pub Date : 2023-11-01 DOI: 10.12968/s1353-4858(23)70053-6
Graham Hosking
It's impossible to escape CHatGPT and other large language model AIs that are promising to disrupt everything from homework to hacking. Generative AI has a lot to offer organisations looking to find efficiencies in their business processes. But it has to be approached intelligently and with a full understanding of the potential security pitfalls, not least to your data security.
CHatGPT 和其他大型语言模型人工智能有望颠覆从家庭作业到黑客攻击的一切,这是无法逃避的。对于希望提高业务流程效率的企业来说,生成式人工智能大有可为。但必须明智地对待它,并充分了解潜在的安全隐患,尤其是对数据安全的隐患。
{"title":"How to assess the impact of generative artificial intelligence","authors":"Graham Hosking","doi":"10.12968/s1353-4858(23)70053-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70053-6","url":null,"abstract":"It's impossible to escape CHatGPT and other large language model AIs that are promising to disrupt everything from homework to hacking. Generative AI has a lot to offer organisations looking to find efficiencies in their business processes. But it has to be approached intelligently and with a full understanding of the potential security pitfalls, not least to your data security.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encryption blind spots: shining a light on cloud network traffic 加密盲点:照亮云网络流量
Pub Date : 2023-11-01 DOI: 10.12968/s1353-4858(23)70054-8
Mark Jow
Monitoring for and detecting malicious activity on your networks is being made harder by the increasing volume of encrypted traffic. This encryption exists for good reasons, particularly when cloud services are in play, but threat actors are exploiting its inscrutability to gain access to networks and loiter for extended periods. However, extended Berkeley Packet Filter (eBPF) network analysis technology offers the possibility to gain full visibility into encrypted traffic across VM or container workloads.
由于加密流量不断增加,监控和检测网络中的恶意活动变得更加困难。这种加密有其存在的理由,尤其是在使用云服务的情况下,但威胁行为者正在利用其不可篡改性来访问网络并长时间闲逛。不过,扩展的伯克利数据包过滤器(eBPF)网络分析技术为全面了解虚拟机或容器工作负载的加密流量提供了可能。
{"title":"Encryption blind spots: shining a light on cloud network traffic","authors":"Mark Jow","doi":"10.12968/s1353-4858(23)70054-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70054-8","url":null,"abstract":"Monitoring for and detecting malicious activity on your networks is being made harder by the increasing volume of encrypted traffic. This encryption exists for good reasons, particularly when cloud services are in play, but threat actors are exploiting its inscrutability to gain access to networks and loiter for extended periods. However, extended Berkeley Packet Filter (eBPF) network analysis technology offers the possibility to gain full visibility into encrypted traffic across VM or container workloads.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The NIS 2 Directive: securing critical assets 国家信息系统 2 指令:确保关键资产的安全
Pub Date : 2023-11-01 DOI: 10.12968/s1353-4858(23)70055-x
Steve Kenny
The recently adopted NIS 2 Directive (NIS 2) directive and its UK counterpart will compel organisations in Europe that are involved with essential services to meet stringent requirements for security. But it's not only the companies themselves that need to ensure they understand and can meet these requirements: security firms that provide services to these kinds of customers also need to be on top of the regulations.
最近通过的 NIS 2 指令(NIS 2)及其英国对应指令将迫使欧洲涉及基本服务的组织满足严格的安全要求。但是,不仅公司本身需要确保了解并满足这些要求,为这类客户提供服务的安全公司也需要了解相关法规。
{"title":"The NIS 2 Directive: securing critical assets","authors":"Steve Kenny","doi":"10.12968/s1353-4858(23)70055-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70055-x","url":null,"abstract":"The recently adopted NIS 2 Directive (NIS 2) directive and its UK counterpart will compel organisations in Europe that are involved with essential services to meet stringent requirements for security. But it's not only the companies themselves that need to ensure they understand and can meet these requirements: security firms that provide services to these kinds of customers also need to be on top of the regulations.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1