Network Security最新文献

筛选
英文 中文
The burden of keeping passwords secret 密码保密的负担
Network Security Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70027-0
Karen Renaud
{"title":"The burden of keeping passwords secret","authors":"Karen Renaud","doi":"10.12968/s1353-4858(24)70027-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70027-0","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"213 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141405542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interconnection, NIS2 and the mobile device 互联、NIS2 和移动设备
Network Security Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70023-3
Monique Becenti
{"title":"Interconnection, NIS2 and the mobile device","authors":"Monique Becenti","doi":"10.12968/s1353-4858(24)70023-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70023-3","url":null,"abstract":"NIS2 will soon come into force all over the EU and – much like the GDPR – it threatens large fines for those that don’t comply. However, it may serve as a much-needed wake up call for those who are overlooking the fastest-growing part of their attack surface – the mobile device.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"198 S583","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is new legislation the answer to curbing cybercrime? 新立法是遏制网络犯罪的答案吗?
Network Security Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70026-9
Vincent Lomba
{"title":"Is new legislation the answer to curbing cybercrime?","authors":"Vincent Lomba","doi":"10.12968/s1353-4858(24)70026-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70026-9","url":null,"abstract":"Cyber attacks are on the increase, in terms of both the number of attacks and the damage they cause. Encouraging organisations to improve their cyber security has had only a limited effect. Now it’s the turn of legislation and regulation, with the Cyber Resilience Act (CRA) and Network and Information Security Directive (NIS2) coming into force in the EU. But what kind of impact are they likely to have?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"87 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141408782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing network resilience against growing cyberthreats 增强网络复原力,应对日益增长的网络威胁
Network Security Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70024-5
Brendan Walsh
{"title":"Enhancing network resilience against growing cyberthreats","authors":"Brendan Walsh","doi":"10.12968/s1353-4858(24)70024-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70024-5","url":null,"abstract":"Networks are becoming ever-more complex, and people with the right skills to manage them securely are in desperately short supply. However, with the right network management environment – one that supports automation and operational efficiency – supported by relevant training, you can make your networks more resilient to current and future threats.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"43 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141403489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber threats and key mitigation strategies 网络威胁和主要缓解策略
Network Security Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70028-2
Chris Waynforth
{"title":"Cyber threats and key mitigation strategies","authors":"Chris Waynforth","doi":"10.12968/s1353-4858(24)70028-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70028-2","url":null,"abstract":"UK organisations – and perhaps most notably the National Health Service (NHS) – are the focus of serious overhauls in IT provision and strategy. But it seems that far too little of the effort and expense is geared towards security. While increased efficiency and productivity are important, any gains in those areas are doomed to be undermined if security is not an intrinsic part of IT improvement programmes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 S8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141391156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring that cyber security is fit for the future of manufacturing 确保网络安全适应未来制造业的需要
Network Security Pub Date : 2024-06-01 DOI: 10.12968/s1353-4858(24)70025-7
Dominic Carroll
{"title":"Ensuring that cyber security is fit for the future of manufacturing","authors":"Dominic Carroll","doi":"10.12968/s1353-4858(24)70025-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70025-7","url":null,"abstract":"A cyber attack can have particularly devastating results on manufacturing organisations. More than half have turned to external providers to fully manage their security, while many more outsource at least some operations. But are the security service providers up to the task? And how can a manufacturer better align security with the organisation and its specific requirements?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"196 S567","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimising the risks and maximising the opportunities of generative AI 最小化生成式人工智能的风险,最大化其机遇
Network Security Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70022-1
Ben Walker
{"title":"Minimising the risks and maximising the opportunities of generative AI","authors":"Ben Walker","doi":"10.12968/s1353-4858(24)70022-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70022-1","url":null,"abstract":"It's no secret that threat actors are enthusiastically adopting generative AI systems to help them launch more-effective cyber attacks. Fortunately, it's possible to fight AI with AI. There are new tools becoming available to help organisations protect their data and networks. But you need to know where to use them, when to use them and which are the most appropriate tools for each task.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"7 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141029340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forging identity in the cloud – dissecting Silver SAML 在云中伪造身份--剖析银 SAML
Network Security Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70020-8
Tomer Nahum, Eric Woodruff
{"title":"Forging identity in the cloud – dissecting Silver SAML","authors":"Tomer Nahum, Eric Woodruff","doi":"10.12968/s1353-4858(24)70020-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70020-8","url":null,"abstract":"An attack method used to forge identities by faking Security Assertion Markup Language (SAML) has been with us for years. But now threat actors have raised their game, targeting Microsoft's Entra ID service, which is extensively used by major cloud services.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"137 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141034262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a human firewall to keep your organisation secure 建立人力防火墙,确保组织安全
Network Security Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70019-1
Richard Menear
{"title":"Building a human firewall to keep your organisation secure","authors":"Richard Menear","doi":"10.12968/s1353-4858(24)70019-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70019-1","url":null,"abstract":"It's easy – perhaps too easy – to see cyber security as a technical issue. In fact, it's something that requires human effort from everyone within the organisation. It's something that needs to be baked in to every process, and every person needs to understand the risks and how to deal with them. This article look at the importance of positive cyber hygiene within businesses and how leaders can effectively create a culture of cyber security awareness.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"78 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141045624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Putting cyber-safety first for Industry 4.0 将网络安全放在工业 4.0 的首位
Network Security Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70018-x
Nils Gerhardt
{"title":"Putting cyber-safety first for Industry 4.0","authors":"Nils Gerhardt","doi":"10.12968/s1353-4858(24)70018-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70018-x","url":null,"abstract":"The adoption of the Industry 4.0 paradigm means embracing all the benefits that the most advanced technologies can bring. Yet manufacturing remains the most-attacked sector in cyber, and those same technologies could massively increase organisations’ threat surfaces, putting many of them at severe risk. It's essential that cyber security becomes an intrinsic part of any company's Industry 4.0 strategy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141023682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信