Network Security最新文献

筛选
英文 中文
Digital identity – creating a unified system 数字身份——创建一个统一的系统
Network Security Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70049-4
Frederik Mennes
{"title":"Digital identity – creating a unified system","authors":"Frederik Mennes","doi":"10.12968/s1353-4858(23)70049-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70049-4","url":null,"abstract":"Network SecurityVol. 2023, No. 10 FeaturesDigital identity – creating a unified systemFrederik MennesFrederik MennesOneSpanSearch for more papers by this authorFrederik MennesPublished Online:31 Oct 2023https://doi.org/10.12968/S1353-4858(23)70049-4AboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. ‘New legislation set to make digital identities more trustworthy and secure’. Department for Digital, Culture, Media & Sport (DCMS), 10 Mar 2022. Accessed Oct 2023. www.gov.uk/government/news/new-legislation-set-to-make-digital-identities-more-trustworthy-and-secure. Google Scholar2. ‘Tony Blair and William Hague call for digital ID cards for all’. BBC News, 22 Feb 2023. Accessed Oct 2023. www.bbc.com/news/uk-politics-64729442. Google Scholar3. ‘British businesses to save billions under new UK version of GDPR’. Department for Science, Innovation and Technology (DSIT), 8 Mar 2023. Accessed Oct 2023. www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr. Google Scholar FiguresReferencesRelatedDetails 1 October 2023Volume 2023Issue 10ISSN (print): 1353-4858ISSN (online): 1872-9371 Metrics History Published online 31 October 2023 Published in print 1 October 2023 Information© MA Business Ltd.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChatGPT: The potential is clear, but what are the risks? ChatGPT:潜力是显而易见的,但风险是什么?
Network Security Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70050-0
Brett Raybould
{"title":"ChatGPT: The potential is clear, but what are the risks?","authors":"Brett Raybould","doi":"10.12968/s1353-4858(23)70050-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70050-0","url":null,"abstract":"ChatGPT is everywhere and organisations are frantically searching for ways to get on the bandwagon. And the technology has great potential for transforming business processes. But like so many technological innovations, this one is a two-edged sword. And that's because it also offers similar benefits to people with malicious intent. And being so new, the security weaknesses and ethical consequences of the technology have yet to be fully explored.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI: security implications for business automation 生成式人工智能:业务自动化的安全含义
Network Security Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70045-7
Scott Weedon
{"title":"Generative AI: security implications for business automation","authors":"Scott Weedon","doi":"10.12968/s1353-4858(23)70045-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70045-7","url":null,"abstract":"AI tools such as ChatGPT certainly appear to offer significant benefits to organisations looking to save costs and improve efficiency. But the technology is being adopted with an enthusiasm that leaves little room for the careful consideration of potential security vulnerabilities. So how do you embrace this revolution without putting yourself at risk?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Five ways to use AI to prevent cyber attacks 利用人工智能预防网络攻击的五种方法
Network Security Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70043-3
Daniel Pearson
{"title":"Five ways to use AI to prevent cyber attacks","authors":"Daniel Pearson","doi":"10.12968/s1353-4858(23)70043-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70043-3","url":null,"abstract":"Artificial intelligence has the potential to plug the gaps in your website defences. At a time of limited budgets, constrained resources and a global skills shortage, AI is capable of taking over many previously labour-intensive tasks and of providing insight into threats and weaknesses. This article looks at five key ways in which AI offers a boost to your web security.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"47 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Top of the TTPs: Malware's most common tactics, techniques and procedures ttp的顶部:恶意软件最常见的战术、技术和程序
Network Security Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70042-1
Suleyman Ozarslan
{"title":"Top of the TTPs: Malware's most common tactics, techniques and procedures","authors":"Suleyman Ozarslan","doi":"10.12968/s1353-4858(23)70042-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70042-1","url":null,"abstract":"The first step in preventing malware from compromising your organisation is to understand how it works. There are many tactics, techniques and procedures (TTPs) employed by malware developers, but some are more common than others, and honing your security strategy, policies and systems to deal with the most frequent methods will significantly strengthen your defences.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ramping up the response to browser-based attacks 加强对基于浏览器的攻击的响应
Network Security Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70044-5
Tom McVey
{"title":"Ramping up the response to browser-based attacks","authors":"Tom McVey","doi":"10.12968/s1353-4858(23)70044-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70044-5","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is your email security doing what it claims? 你的电子邮件安全是否如其所言?
Network Security Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70040-8
Colin Tankard
{"title":"Is your email security doing what it claims?","authors":"Colin Tankard","doi":"10.12968/s1353-4858(23)70040-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70040-8","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The digital frontier: defending the public sector against cyberthreats 数字前沿:保护公共部门免受网络威胁
Network Security Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70041-x
Anat Garty
{"title":"The digital frontier: defending the public sector against cyberthreats","authors":"Anat Garty","doi":"10.12968/s1353-4858(23)70041-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70041-x","url":null,"abstract":"Public sector organisations are on the front line when it comes to cyber attacks. They are enticing targets for both criminal and nation-state threat actors. And the systems they operate, as well as the information they hold, are often critical to the safety and security of the nation and its citizens. This raises the bar for these organisations when it comes to cyber security defences. So how do they reach it?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote working is here to stay, but security issues persist 远程工作将继续存在,但安全问题依然存在
Network Security Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70037-8
Sohail Iqbal
{"title":"Remote working is here to stay, but security issues persist","authors":"Sohail Iqbal","doi":"10.12968/s1353-4858(23)70037-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70037-8","url":null,"abstract":"The pandemic forced remote working on many organisations. Most have now adjusted and remote and hybrid working practices are well established. However, the security threats raised by this change linger, with many of the basic issues remaining unaddressed. It's time for organisations to catch up if they are to safely reap the many benefits that remote working offers.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83433791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The growing cyberthreat to critical national infrastructure 对关键国家基础设施日益增长的网络威胁
Network Security Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70036-6
M. Hughes
{"title":"The growing cyberthreat to critical national infrastructure","authors":"M. Hughes","doi":"10.12968/s1353-4858(23)70036-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70036-6","url":null,"abstract":"There is no more attractive target for cyber attackers – especially those linked to nation states – than critical national infrastructure (CNI). Organisations working in sectors that comprise CNI are subject to attacks ranging from ransom attempts to cyber war. Governments are becoming increasingly nervous about these threats, but often left the industry itself to do something about them. So what are the threats, how are they evolving and what do we do about them?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81991162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信