求助PDF
{"title":"事件响应:警报级别现在是否无法管理?","authors":"Brian Martin","doi":"10.12968/s1361-3723(23)70050-x","DOIUrl":null,"url":null,"abstract":"Computer Fraud & SecurityVol. 2023, No. 10 The SandboxIncident response: are alert levels now unmanageable?Brian MartinBrian MartinIntegrity360Search for more papers by this authorBrian MartinPublished Online:31 Oct 2023https://doi.org/10.12968/S1361-3723(23)70050-XAboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. Coutinho, S et al.. ‘Cyber security skills in the UK labour market 2023’. Department for Science, Innovation and Technology (DSIT). Accessed Oct 2023. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1173325/Cyber_security_skills_in_the_UK_labour_market_2023.pdf Google Scholar2. ‘Global Incident Response Threat Report’. VMware, 2022. Accessed Oct 2023. www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf. Google Scholar3. ‘Gartner predicts nearly half of cyber security leaders will change jobs by 2025’. Gartner, 22 Feb 2023. Accessed Oct 2023. www.gartner.com/en/newsroom/press-releases/2023-02-22-gartner-predicts-nearly-half-of-cyber security-leaders-will-change-jobs-by-2025. Google Scholar FiguresReferencesRelatedDetails 1 October 2023Volume 2023Issue 10ISSN (print): 1361-3723ISSN (online): 1873-7056 Metrics History Published online 31 October 2023 Published in print 1 October 2023 Information© MA Business Ltd.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Incident response: are alert levels now unmanageable?\",\"authors\":\"Brian Martin\",\"doi\":\"10.12968/s1361-3723(23)70050-x\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer Fraud & SecurityVol. 2023, No. 10 The SandboxIncident response: are alert levels now unmanageable?Brian MartinBrian MartinIntegrity360Search for more papers by this authorBrian MartinPublished Online:31 Oct 2023https://doi.org/10.12968/S1361-3723(23)70050-XAboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. Coutinho, S et al.. ‘Cyber security skills in the UK labour market 2023’. Department for Science, Innovation and Technology (DSIT). Accessed Oct 2023. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1173325/Cyber_security_skills_in_the_UK_labour_market_2023.pdf Google Scholar2. ‘Global Incident Response Threat Report’. VMware, 2022. Accessed Oct 2023. www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf. Google Scholar3. ‘Gartner predicts nearly half of cyber security leaders will change jobs by 2025’. Gartner, 22 Feb 2023. Accessed Oct 2023. www.gartner.com/en/newsroom/press-releases/2023-02-22-gartner-predicts-nearly-half-of-cyber security-leaders-will-change-jobs-by-2025. Google Scholar FiguresReferencesRelatedDetails 1 October 2023Volume 2023Issue 10ISSN (print): 1361-3723ISSN (online): 1873-7056 Metrics History Published online 31 October 2023 Published in print 1 October 2023 Information© MA Business Ltd.\",\"PeriodicalId\":35636,\"journal\":{\"name\":\"Computer Fraud and Security\",\"volume\":\"133 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1361-3723(23)70050-x\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(23)70050-x","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
引用
批量引用