Network Security最新文献

筛选
英文 中文
Malware delivery is evolving through password-protected files 恶意软件通过密码保护文件传播
Network Security Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70027-5
Thomas B. McVey
{"title":"Malware delivery is evolving through password-protected files","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70027-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70027-5","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83040319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerabilities and risk in smart vehicle automatic parking assist systems 智能车辆自动泊车辅助系统的漏洞和风险
Network Security Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70025-1
M. Ibrahim, Nader Sohrabi Safa
{"title":"Vulnerabilities and risk in smart vehicle automatic parking assist systems","authors":"M. Ibrahim, Nader Sohrabi Safa","doi":"10.12968/s1353-4858(23)70025-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70025-1","url":null,"abstract":"Advanced driver assistance systems (ADAS) have gained widespread adoption in the automotive industry in recent years. Automatic parking assist (APA) is an important part of ADAS as it offers numerous benefits, such as safety improvements, space and time savings and fuel efficiency. However, it also introduces novel vulnerabilities, threats and risks that require attention. Vulnerabilities in the APA system may emerge as a result of its intricate design and the use of various communication protocols that adversaries could exploit to gain unauthorised systems access and undermine vehicle safety. Threats to the APA system may arise from diverse origins, including malicious actors, software defects and system malfunctions, which may lead to different types of attacks compromising the system's integrity and availability. The associated risks with the APA system can be considerable, potentially impacting the safety and confidentiality of the vehicle's occupants and other road users. It is crucial to systematically identify, assess and manage these risks by deploying appropriate controls.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88402614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving your company's cyber security training 改善公司的网络安全培训
Network Security Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70026-3
Chrystal Taylor
{"title":"Improving your company's cyber security training","authors":"Chrystal Taylor","doi":"10.12968/s1353-4858(23)70026-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70026-3","url":null,"abstract":"Even the best security technology can't eliminate the threats to your organisation. Human error will always present a risk. It's important, then, that every organisation takes a careful look at its cyber security training to determine whether it's up to the job.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"103 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76140808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No mystery to encryption 加密并不神秘
Network Security Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70024-x
C. Tankard
{"title":"No mystery to encryption","authors":"C. Tankard","doi":"10.12968/s1353-4858(23)70024-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70024-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88897867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Has Twitter made a big mistake with 2FA? Twitter在2FA上犯了大错吗?
Network Security Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70021-4
Luke Potter
{"title":"Has Twitter made a big mistake with 2FA?","authors":"Luke Potter","doi":"10.12968/s1353-4858(23)70021-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70021-4","url":null,"abstract":"Twitter is going through tumultuous changes, many of them seemingly on a whim, as new owner Elon Musk struggles to monetise the platform. However, in the pursuit of profit, some of the modifications risk making the social network more dangerous for users.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital identity: healthcare's path forward 数字身份:医疗保健的前进之路
Network Security Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70020-2
Gus Malezis
{"title":"Digital identity: healthcare's path forward","authors":"Gus Malezis","doi":"10.12968/s1353-4858(23)70020-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70020-2","url":null,"abstract":"Digital transformation is disruptive at the best of times. But when you're a healthcare organisation struggling to cope with a pandemic, it's particularly difficult. In the midst of this maelstrom, cyber security can suffer. However, one specific aspect of security – digital identity – offers the potential to ease many of these woes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How the pharma industry can reinvent vulnerability management 制药行业如何重塑漏洞管理
Network Security Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70019-6
Sylvain Cortes
{"title":"How the pharma industry can reinvent vulnerability management","authors":"Sylvain Cortes","doi":"10.12968/s1353-4858(23)70019-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70019-6","url":null,"abstract":"Organisations continue to be breached through the exploitation of known vulnerabilities for which patches were available. Keeping track of the threats is not easy, but this is an area where companies need to up their game, especially in the pharmaceutical sector.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing four recent IcedID malware campaigns 分析最近四个IcedID恶意软件活动
Network Security Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70023-8
Tom McVey
{"title":"Analysing four recent IcedID malware campaigns","authors":"Tom McVey","doi":"10.12968/s1353-4858(23)70023-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70023-8","url":null,"abstract":"Network SecurityVol. 2023, No. 5 Threat IntelligenceAnalysing four recent IcedID malware campaignsTom McVeyTom McVeyMenlo SecuritySearch for more papers by this authorTom McVeyPublished Online:30 May 2023https://doi.org/10.12968/S1353-4858(23)70023-8AboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. ‘2023 Cyber Security Report’. Check Point Software. Accessed May 2023. https://pages.checkpoint.com/cyber security-report-2023.html. Google Scholar2. ‘How cyber criminals evade detection and compromise web browsers’. Menlo Security. Accessed May 2023. https://info.menlosecurity.com/How-cyber criminals-evade-detection-and-compromise-web-browsers-eBook.html. Google Scholar FiguresReferencesRelatedDetails 1 May 2023Volume 2023Issue 5ISSN (print): 1353-4858ISSN (online): 1872-9371 Metrics History Published online 30 May 2023 Published in print 1 May 2023 Information© MA Business Ltd.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing cyber security at scale with ML/AI frameworks 利用机器学习/人工智能框架大规模加强网络安全
Network Security Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70022-6
Bharathasimha Reddy, Amit Nagal, Aditya K Sood, Ruthvik Reddy SL
{"title":"Enhancing cyber security at scale with ML/AI frameworks","authors":"Bharathasimha Reddy, Amit Nagal, Aditya K Sood, Ruthvik Reddy SL","doi":"10.12968/s1353-4858(23)70022-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70022-6","url":null,"abstract":"The world is expanding digitally at an ever-accelerating rate. As networks become larger and data becomes more complex, cyber security challenges are growing rapidly. To combat cyber attacks, machine learning (ML) and other artificial intelligence (AI) solutions should be utilised to design and build robust security solutions. With the explosion in the number of new techniques and frameworks in the ML/AI space, it is tricky for organisations to identify the best frameworks and approaches to build robust ML/AI solutions. In this article, an empirical analysis has been performed on various ML/AI frameworks to determine the performance and effectiveness of running ML/AI algorithms in a distributed manner.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"24 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weaponising ChatGPT
Network Security Pub Date : 2023-04-01 DOI: 10.12968/s1353-4858(23)70017-2
Steve Mansfield-Devine
{"title":"Weaponising ChatGPT","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(23)70017-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70017-2","url":null,"abstract":"Depending on who you ask, ChatGPT is either a great boon to humanity or an existential menace. In the cyber security world, however, it has been characterised as mostly a threat – one that will enable unskilled actors to become potent hackers. What truth is there in the hype? And could ChatGPT and other large language models actually be a force for good?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91357427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信