{"title":"提高中小企业网络、数据和应用安全","authors":"C. Tselios, Ilias Politis, C.K. Xenakis","doi":"10.1145/3538969.3544426","DOIUrl":null,"url":null,"abstract":"The evolution of Information and Communications Technology and Cloud Computing, combined with the advent of novel telecommunication frameworks such as 5G, have introduced the notion of ubiquitous connectivity combined with a seemingly vast pool of resources, storage and services. This immense transformation introduced new types of security threats mostly due to the significant increase of the attack surface, which can now be compromised by malicious users. Despite the fact that malicious attacks constantly become more and more sophisticated, SMEs and public administrations remain reluctant to invest in cybersecurity since they operate on a limited budget and are mostly focused in time to market and cost minimization. The purpose of this book chapter is to provide an overview on how the most common network-related cybersecurity attacks are orchestrated, which are the systems and services they affect the most as well as present specific design principles and guidelines for crafting platforms and frameworks capable of mitigating such attacks and ensure a certain level of secure operation.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improving Network, Data and Application Security for SMEs\",\"authors\":\"C. Tselios, Ilias Politis, C.K. Xenakis\",\"doi\":\"10.1145/3538969.3544426\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The evolution of Information and Communications Technology and Cloud Computing, combined with the advent of novel telecommunication frameworks such as 5G, have introduced the notion of ubiquitous connectivity combined with a seemingly vast pool of resources, storage and services. This immense transformation introduced new types of security threats mostly due to the significant increase of the attack surface, which can now be compromised by malicious users. Despite the fact that malicious attacks constantly become more and more sophisticated, SMEs and public administrations remain reluctant to invest in cybersecurity since they operate on a limited budget and are mostly focused in time to market and cost minimization. The purpose of this book chapter is to provide an overview on how the most common network-related cybersecurity attacks are orchestrated, which are the systems and services they affect the most as well as present specific design principles and guidelines for crafting platforms and frameworks capable of mitigating such attacks and ensure a certain level of secure operation.\",\"PeriodicalId\":306813,\"journal\":{\"name\":\"Proceedings of the 17th International Conference on Availability, Reliability and Security\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 17th International Conference on Availability, Reliability and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3538969.3544426\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 17th International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3538969.3544426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improving Network, Data and Application Security for SMEs
The evolution of Information and Communications Technology and Cloud Computing, combined with the advent of novel telecommunication frameworks such as 5G, have introduced the notion of ubiquitous connectivity combined with a seemingly vast pool of resources, storage and services. This immense transformation introduced new types of security threats mostly due to the significant increase of the attack surface, which can now be compromised by malicious users. Despite the fact that malicious attacks constantly become more and more sophisticated, SMEs and public administrations remain reluctant to invest in cybersecurity since they operate on a limited budget and are mostly focused in time to market and cost minimization. The purpose of this book chapter is to provide an overview on how the most common network-related cybersecurity attacks are orchestrated, which are the systems and services they affect the most as well as present specific design principles and guidelines for crafting platforms and frameworks capable of mitigating such attacks and ensure a certain level of secure operation.