{"title":"防御性网络安全:持续控制执行和基础设施卫生","authors":"Aditya K. Sood","doi":"10.12968/s1353-4858(23)70039-1","DOIUrl":null,"url":null,"abstract":"With the exponential rise in cyber attacks, organisations need to implement mature cyber security strategies for handling cyberthreats at scale and minimising the risk to the business. In this article, we look at the cyber security model of continuous assessment and controls enforcement (CACE), including the importance of maintaining infrastructure cyber hygiene.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"177 2 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Defensive cyber security: continuous controls enforcement and infrastructure hygiene\",\"authors\":\"Aditya K. Sood\",\"doi\":\"10.12968/s1353-4858(23)70039-1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the exponential rise in cyber attacks, organisations need to implement mature cyber security strategies for handling cyberthreats at scale and minimising the risk to the business. In this article, we look at the cyber security model of continuous assessment and controls enforcement (CACE), including the importance of maintaining infrastructure cyber hygiene.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"177 2 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(23)70039-1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(23)70039-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defensive cyber security: continuous controls enforcement and infrastructure hygiene
With the exponential rise in cyber attacks, organisations need to implement mature cyber security strategies for handling cyberthreats at scale and minimising the risk to the business. In this article, we look at the cyber security model of continuous assessment and controls enforcement (CACE), including the importance of maintaining infrastructure cyber hygiene.