Infosecurity最新文献

筛选
英文 中文
Someone Like You 像你这样的人
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70060-2
Eleanor Dallaway (Editor)
{"title":"Someone Like You","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70060-2","DOIUrl":"10.1016/S1754-4548(11)70060-2","url":null,"abstract":"<div><p>We often talk about the importance of education in this industry — we ponder how best to educate our staff, and how to raise awareness about information security. What we dedicate less time to, at least as far as I'm aware, is how to nurture a new generation of information security professionals.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70060-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"100027343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EU Notification Law Is Not Enough 欧盟通报法是不够的
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70070-5
Steve Brunswick
{"title":"EU Notification Law Is Not Enough","authors":"Steve Brunswick","doi":"10.1016/S1754-4548(11)70070-5","DOIUrl":"10.1016/S1754-4548(11)70070-5","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 44"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70070-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80321231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Is Critical to Your Infrastructure? 什么对你的基础设施至关重要?
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70064-X
Adrian Davis
{"title":"What Is Critical to Your Infrastructure?","authors":"Adrian Davis","doi":"10.1016/S1754-4548(11)70064-X","DOIUrl":"10.1016/S1754-4548(11)70064-X","url":null,"abstract":"<div><p>Critical infrastructure means many things to many people. <strong>Adrian Davis</strong>, principal research analyst with the Information Security Forum (ISF), explains why determining which infrastructure elements are critical to a business is the first step in keeping them safe</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 18-21"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70064-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85351235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Obstacles Facing the US Cybersecurity Initiatve 美国网络安全倡议面临的障碍
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70066-3
Fred Donovan
{"title":"Obstacles Facing the US Cybersecurity Initiatve","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70066-3","DOIUrl":"10.1016/S1754-4548(11)70066-3","url":null,"abstract":"<div><p>Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. <strong>Fred Donovan</strong> surveys the experts to get their take on where the nation's cybersecurity program is heading</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 26-30"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70066-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76731162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Spy Who Hacked Me 《黑客
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70063-8
Danny Bradbury
{"title":"The Spy Who Hacked Me","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70063-8","DOIUrl":"10.1016/S1754-4548(11)70063-8","url":null,"abstract":"<div><p>James Bond was more of a jock than a nerd, and he probably wouldn't have known how to use a computer, says <strong>Danny Bradbury</strong>. How things have changed…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 14-17"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70063-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78048900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Education: A Lesson Learned? 安全教育:一个教训?
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70067-5
Stephen Pritchard
{"title":"Security Education: A Lesson Learned?","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70067-5","DOIUrl":"10.1016/S1754-4548(11)70067-5","url":null,"abstract":"<div><p>Despite users being the most integral part of information security, only one to two percent of security budgets are being spent on awareness and education. <strong>Stephen Pritchard</strong> reports</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 31-34"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70067-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"94847294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Persistent and Evasive Attacks Uncovered 发现持续和回避攻击
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70069-9
Davey Winder
{"title":"Persistent and Evasive Attacks Uncovered","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70069-9","DOIUrl":"10.1016/S1754-4548(11)70069-9","url":null,"abstract":"<div><p><span>APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger. </span><strong>Davey Winder</strong><span> reveals the truth behind the APT and AET headlines</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70069-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80765727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scandal, Spyware and Trust 丑闻、间谍软件和信任
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70071-7
Gareth Maclachlan
{"title":"Scandal, Spyware and Trust","authors":"Gareth Maclachlan","doi":"10.1016/S1754-4548(11)70071-7","DOIUrl":"10.1016/S1754-4548(11)70071-7","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70071-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73225266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
You Dirty RAT 你这个肮脏的老鼠
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70061-4
Drew Amorosi
{"title":"You Dirty RAT","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70061-4","DOIUrl":"10.1016/S1754-4548(11)70061-4","url":null,"abstract":"<div><p>The latest APT to come to light is what McAfee has dubbed ‘Shady RAT’. But the folks at Kaspersky have voiced some objections. <strong>Drew Amorosi</strong> examines the threat…and the controversy</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 6-8"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70061-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87192676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Slack Space 松弛的空间
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70074-2
{"title":"Slack Space","authors":"","doi":"10.1016/S1754-4548(11)70074-2","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70074-2","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70074-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137401570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信