Network Security最新文献

筛选
英文 中文
Tracing template injection attacks to North Korea 追踪针对朝鲜的模板注入攻击
Network Security Pub Date : 2023-02-01 DOI: 10.12968/s1353-4858(23)70011-1
Thomas B. McVey
{"title":"Tracing template injection attacks to North Korea","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70011-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70011-1","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"351 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87748830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud databases: a breeding ground for ransomware 云数据库:勒索软件的滋生地
Network Security Pub Date : 2023-01-01 DOI: 10.12968/s1353-4858(23)70004-4
Aditya K. Sood, Michael Wiley
{"title":"Cloud databases: a breeding ground for ransomware","authors":"Aditya K. Sood, Michael Wiley","doi":"10.12968/s1353-4858(23)70004-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70004-4","url":null,"abstract":"Attackers are targeting cloud databases to trigger ransomware infections by directly taking control of the stored data. Databases are the foundational bricks allowing us to store data and provide a uniform capability so that various applications can dynamically transact data. Compromising the data provides an edge to the attackers to extract monetary gain using stolen information. In this article, we examine the root causes of ransomware infection in cloud databases and present real-world case studies of detecting ransomware infections in Elasticsearch and MongoDB cloud instances.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80647642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Awareness and layered defences 意识和分层防御
Network Security Pub Date : 2023-01-01 DOI: 10.12968/s1353-4858(23)70001-9
Gemma Moore
{"title":"Awareness and layered defences","authors":"Gemma Moore","doi":"10.12968/s1353-4858(23)70001-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70001-9","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"24 9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82686754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The law that is changing the telco sector for the better 这部法律正在让电信行业变得更好
Network Security Pub Date : 2023-01-01 DOI: 10.12968/s1353-4858(23)70003-2
B. Ross
{"title":"The law that is changing the telco sector for the better","authors":"B. Ross","doi":"10.12968/s1353-4858(23)70003-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70003-2","url":null,"abstract":"Our national infrastructure is at risk. Telecommunications companies provide essential services, but are major targets for cyber threat actors. However, new legislation in the UK is aiming to push telco organisations towards more-secure practices and technologies.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"168 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72569900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Responding to worsening web browser attacks 应对日益恶化的网络浏览器攻击
Network Security Pub Date : 2023-01-01 DOI: 10.12968/s1353-4858(23)70002-0
Jonathan Lee
{"title":"Responding to worsening web browser attacks","authors":"Jonathan Lee","doi":"10.12968/s1353-4858(23)70002-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70002-0","url":null,"abstract":"The sudden increase in remote and home working has brought many benefits, not least in work/life balance. But it has also presented challenges, particularly when it comes to security. Operating models and infrastructure have undergone changes, with a significant move towards the cloud. This has put the browser front and centre as a key productivity and communications tool. And malicious actors have not been slow to take advantage.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79297990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening cyber security with digital twins 利用数字孪生加强网络安全
Network Security Pub Date : 2022-12-01 DOI: 10.12968/s1353-4858(22)70071-2
Maya Natarajan
{"title":"Strengthening cyber security with digital twins","authors":"Maya Natarajan","doi":"10.12968/s1353-4858(22)70071-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70071-2","url":null,"abstract":"Cyberthreats are becoming more numerous and complex. This poses a major challenge for security professionals trying to stay up to date with the latest developments. This is why many organisations are turning to graph-based digital twin technology to improve their cyber resilience management.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80270316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why businesses shouldn't rely on Istio's Mutual TLS 为什么企业不应该依赖Istio的互TLS
Network Security Pub Date : 2022-12-01 DOI: 10.12968/s1353-4858(22)70068-2
Kevin M Bocek
{"title":"Why businesses shouldn't rely on Istio's Mutual TLS","authors":"Kevin M Bocek","doi":"10.12968/s1353-4858(22)70068-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70068-2","url":null,"abstract":"Containers are everywhere now, and with the help of Kubernetes it has become easy to deploy complex infrastructures. This raises its own challenges regarding visibility and the application of security policies. And while tools such as Istio have appeared to help with this issue, they need to be used with care and can raise security issues of their own.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83376122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of a new AD vulnerability 一个新的AD漏洞分析
Network Security Pub Date : 2022-12-01 DOI: 10.12968/s1353-4858(22)70069-4
C. Clark
{"title":"Analysis of a new AD vulnerability","authors":"C. Clark","doi":"10.12968/s1353-4858(22)70069-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70069-4","url":null,"abstract":"Microsoft's Active Directory was introduced to solve myriad networking problems. But its openness and widespread adoption have also made it a key target for cyber attacks. This article looks at one specific vulnerability and how it demonstrates the key role of AD, and its potential as a weak spot in your networks.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83535255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to deal with MFA bypass 如何处理MFA旁路
Network Security Pub Date : 2022-12-01 DOI: 10.12968/s1353-4858(22)70070-0
Ben Jacob
{"title":"How to deal with MFA bypass","authors":"Ben Jacob","doi":"10.12968/s1353-4858(22)70070-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70070-0","url":null,"abstract":"Multi-factor authorisation has become essential in this era of remote working. It undoubtedly adds a significant layer of security, but it's not without its own weaknesses, which threat actors have been quick to exploit. The trick is to spot when this is happening and takes the right steps to keep your organisation secure.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73707839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defence against the dark art of zero-day attacks 防御零日攻击的黑暗艺术
Network Security Pub Date : 2022-11-01 DOI: 10.12968/s1353-4858(22)70066-9
Matias Madou
{"title":"Defence against the dark art of zero-day attacks","authors":"Matias Madou","doi":"10.12968/s1353-4858(22)70066-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70066-9","url":null,"abstract":"Many organisations remain vulnerable to zero-day attacks. Zero-day attacks, by definition, give developers zero time to find and patch existing vulnerabilities that could be exploited, because the threat actor got in first. The damage is done and then it's a mad scramble to fix both the software and reputational damage to the business. Attackers are always at an advantage, and reducing that edge as much as possible is crucial.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76634404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信