Network Security最新文献

筛选
英文 中文
The M-P of cyber security 网络安全的M-P
Network Security Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70035-4
K. Renaud
{"title":"The M-P of cyber security","authors":"K. Renaud","doi":"10.12968/s1353-4858(23)70035-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70035-4","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82867108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The shadow of 2022 is still shaping cyberthreats 2022年的阴影仍在影响着网络威胁
Network Security Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70038-x
Colin Sheppard
{"title":"The shadow of 2022 is still shaping cyberthreats","authors":"Colin Sheppard","doi":"10.12968/s1353-4858(23)70038-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70038-x","url":null,"abstract":"Recent research has shown how the global events of 2022 are still affecting the nature of cyberthreats today and possibly into the future. This article takes a closer look at the findings and what they mean for businesses, including a detailed rundown of the most prevalent threats, methods and attack vectors used.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"134 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91076403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defensive cyber security: continuous controls enforcement and infrastructure hygiene 防御性网络安全:持续控制执行和基础设施卫生
Network Security Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70039-1
Aditya K. Sood
{"title":"Defensive cyber security: continuous controls enforcement and infrastructure hygiene","authors":"Aditya K. Sood","doi":"10.12968/s1353-4858(23)70039-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70039-1","url":null,"abstract":"With the exponential rise in cyber attacks, organisations need to implement mature cyber security strategies for handling cyberthreats at scale and minimising the risk to the business. In this article, we look at the cyber security model of continuous assessment and controls enforcement (CACE), including the importance of maintaining infrastructure cyber hygiene.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"177 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78151878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting the UK's national infrastructure 保护英国的国家基础设施
Network Security Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70030-5
Tom Egglestone
{"title":"Protecting the UK's national infrastructure","authors":"Tom Egglestone","doi":"10.12968/s1353-4858(23)70030-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70030-5","url":null,"abstract":"Of all the industries targeted by cyber attackers, critical national infrastructure (CNI) is among the most concerning. The potential disruption not just to business but to our daily lives and even our physical safety means that governments, including the UK, are taking the threat seriously. But it's also important that individual organisations working in this area ramp up their cyber security and adopt a position of cyber resilience.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83869398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Removing passwords doesn't remove risk 删除密码并不能消除风险
Network Security Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70031-7
Gemma Moore
{"title":"Removing passwords doesn't remove risk","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70031-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70031-7","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81496445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XeGroup's evolving attack methods XeGroup不断发展的攻击方法
Network Security Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70034-2
Thomas B. McVey
{"title":"XeGroup's evolving attack methods","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70034-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70034-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77343164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How SMBs can defeat the threat of ransomware 中小企业如何战胜勒索软件的威胁
Network Security Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70033-0
Tyler Moffitt
{"title":"How SMBs can defeat the threat of ransomware","authors":"Tyler Moffitt","doi":"10.12968/s1353-4858(23)70033-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70033-0","url":null,"abstract":"Ransomware is not going away. In fact, it has become one of the most common and devastating forms of attack against organisations. Small and medium-size businesses (SMBs) are among the most vulnerable, as they often lack the resources to cope with a breach. But there are things they can do to improve their resilience.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73578197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging the cyber skills gap 弥合网络技能差距
Network Security Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70029-9
Paul Caron
{"title":"Bridging the cyber skills gap","authors":"Paul Caron","doi":"10.12968/s1353-4858(23)70029-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70029-9","url":null,"abstract":"It has long been accepted that one of the greatest threats to your cyber security lies within your own organisation – your staff. Cyber security training is a challenge, as is keeping people aware of and alert to emerging threats. And this has been complicated further by new organisational structures and ways of working, in no small part imposed by the Covid pandemic. Solving this problem requires effort and investment.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76147838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why zero trust should start at the endpoint 为什么零信任应该从端点开始
Network Security Pub Date : 2023-07-01 DOI: 10.12968/s1353-4858(23)70032-9
Henry b. Harrison
{"title":"Why zero trust should start at the endpoint","authors":"Henry b. Harrison","doi":"10.12968/s1353-4858(23)70032-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70032-9","url":null,"abstract":"The zero-trust concept is rapidly growing in popularity, particularly with the rise of hybrid working practices and the continued erosion of the traditional network perimeter. But where do you start when implementing a zero-trust strategy?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81263093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Where identity governance really belongs 身份治理真正属于哪里
Network Security Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70028-7
Cengiz Tuztas
{"title":"Where identity governance really belongs","authors":"Cengiz Tuztas","doi":"10.12968/s1353-4858(23)70028-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70028-7","url":null,"abstract":"When companies decide to initiate an identity governance and administration (IGA) project, it raises a number of questions. This primarily concerns the selection of products and solutions to manage digital identities and the permissions associated with them. Sometimes, however, it is helpful to take a step back and examine the extent to which the prerequisites for comprehensive governance are actually in place and where this should start from – because a number of others are grouped around the concept of identity and not necessarily uniformly or sharply.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80252982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信