Network Security最新文献

筛选
英文 中文
Poor cyber hygiene puts the UK at risk 网络卫生状况差使英国面临风险
Network Security Pub Date : 2024-05-01 DOI: 10.12968/s1353-4858(24)70021-x
Steve Mansfield-Devine
{"title":"Poor cyber hygiene puts the UK at risk","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70021-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70021-x","url":null,"abstract":"The UK's businesses and charities could be sitting ducks, according to the Government's latest ‘Cyber Security Breaches Survey’. Too many organisations are failing to deploy even the most basic cyber security measures. Equally, few are prepared for the new wave of AI-driven attacks or the consequences of being breached.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141032321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domain phishing: staying a step ahead of the threats 域名网络钓鱼:领先一步应对威胁
Network Security Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70063-9
Brian Lonergan
{"title":"Domain phishing: staying a step ahead of the threats","authors":"Brian Lonergan","doi":"10.12968/s1353-4858(23)70063-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70063-9","url":null,"abstract":"Domain hijacking and cybersquatting have become popular techniques among threat actors, especially those engaged in phishing. Organisations need to pay attention to domain security – to protect themselves and their partners and customers. Fortunately, there are tools organisations can use to keep their domains, and their brands, safe.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"407 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139020182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can vulnerability disclosure be timely, detailed and coordinated? 漏洞披露是否及时、详细和协调?
Network Security Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70062-7
Michael Isbitski
{"title":"Can vulnerability disclosure be timely, detailed and coordinated?","authors":"Michael Isbitski","doi":"10.12968/s1353-4858(23)70062-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70062-7","url":null,"abstract":"Vulnerability disclosure is a tricky subject. Organisations need early and detailed information about vulnerabilities in order to fix them. At the same time, threat actors can use the same information to develop exploits that could devastate organisations that don't move fast enough to protect themselves. So how can we balance the need for disclosure against the threats posed?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"137 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139021625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to strengthen the software supply chain 如何加强软件供应链
Network Security Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70061-5
Brian Trzupek
{"title":"How to strengthen the software supply chain","authors":"Brian Trzupek","doi":"10.12968/s1353-4858(23)70061-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70061-5","url":null,"abstract":"Defenders against software supply chain attacks have to keep upping their game, as the attackers do.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"674 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI – bedazzled by its allure, blinded to its risks 人工智能--被其诱惑所迷惑,对其风险视而不见
Network Security Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70060-3
Akber Datoo, Jake Pope
{"title":"AI – bedazzled by its allure, blinded to its risks","authors":"Akber Datoo, Jake Pope","doi":"10.12968/s1353-4858(23)70060-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70060-3","url":null,"abstract":"You can't escape generative AI. It is being applied to so many parts of our lives and is the source of much excitement and speculation. But how many organisations fully understand its ramifications? It seems that few have properly delineated policies and standards for its application, and this could lead to serious problems.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"90 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139017278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding legacy equipment 保护遗留设备
Network Security Pub Date : 2023-12-01 DOI: 10.12968/s1353-4858(23)70064-0
Jeremy Whittingham
{"title":"Safeguarding legacy equipment","authors":"Jeremy Whittingham","doi":"10.12968/s1353-4858(23)70064-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70064-0","url":null,"abstract":"Manufacturers are frequently saddled with outdated technology and ageing equipment, making them uniquely vulnerable in the digital age. By understanding the implications and proactive steps that can be taken, manufacturers can protect their critical assets and ensure the integrity of their production processes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"494 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital trust is core to our relationship with technology 数字信任是我们与技术关系的核心
Network Security Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70047-0
Deepika Chauhan
{"title":"Digital trust is core to our relationship with technology","authors":"Deepika Chauhan","doi":"10.12968/s1353-4858(23)70047-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70047-0","url":null,"abstract":"Technology is now so central to our lives and to our businesses that it's essential that we can trust it. If we overlook this critical relationship, we stand in danger of being undermined or betrayed by the technology due to vulnerabilities and flaws, and we can never utilise it to its maximum potential. But how do you go about defining and achieving digital trust?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embracing an outcome-based approach to cyber security 坚持以结果为本的网络安全方针
Network Security Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70046-9
Paul Brucciani
{"title":"Embracing an outcome-based approach to cyber security","authors":"Paul Brucciani","doi":"10.12968/s1353-4858(23)70046-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70046-9","url":null,"abstract":"Cyber security is often seen as an activity separate from an organisation's main business processes. It is something that only comes to the fore when an incident occurs – which may be too late. And this can create a gap between the true security needs of the organisation and its security posture. In contrast, outcome-based security creates direct links between business goals and security requirements.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The importance of practice for cyber security incident response 实践对网络安全事件响应的重要性
Network Security Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70048-2
Gemma Moore
{"title":"The importance of practice for cyber security incident response","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70048-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70048-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"33 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Best practices for combatting malvertising attacks 打击恶意广告攻击的最佳实践
Network Security Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70051-2
Tom McVey
{"title":"Best practices for combatting malvertising attacks","authors":"Tom McVey","doi":"10.12968/s1353-4858(23)70051-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70051-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信