Network Security最新文献

筛选
英文 中文
APIs – the hackers delight api——黑客们的喜悦
Network Security Pub Date : 2022-11-01 DOI: 10.12968/s1353-4858(22)70064-5
C. Tankard
{"title":"APIs – the hackers delight","authors":"C. Tankard","doi":"10.12968/s1353-4858(22)70064-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70064-5","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74130691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supply chain security – the biggest overlooked cyber risk 供应链安全——最容易被忽视的网络风险
Network Security Pub Date : 2022-11-01 DOI: 10.12968/s1353-4858(22)70065-7
J. Griffiths
{"title":"Supply chain security – the biggest overlooked cyber risk","authors":"J. Griffiths","doi":"10.12968/s1353-4858(22)70065-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70065-7","url":null,"abstract":"Every business, no matter how large or small, has some form of supply chain. You could be a manufacturer that supplies goods to a business to sell, or you could be the office water cooler supplier. It really doesn't matter what size the business is – you will tend to have at least one supplier. This, unfortunately, opens all businesses up to the potential risk of cyber attacks and data breaches coming directly from their supplier or suppliers (or any other firms in their supply chain).","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"239 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80419098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Talking template injection attacks 讨论模板注入攻击
Network Security Pub Date : 2022-11-01 DOI: 10.12968/s1353-4858(22)70067-0
Thomas B. McVey
{"title":"Talking template injection attacks","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70067-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70067-0","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82202550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mission-critical data is more complex in a hybrid world 关键任务数据在混合环境中更为复杂
Network Security Pub Date : 2022-11-01 DOI: 10.12968/s1353-4858(22)70063-3
Robbie Allen
{"title":"Mission-critical data is more complex in a hybrid world","authors":"Robbie Allen","doi":"10.12968/s1353-4858(22)70063-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70063-3","url":null,"abstract":"It's hard to think of a bigger disruption to organisations’ overall IT infrastructure than hybrid working. Suddenly, but out of necessity, the comforting assumption that all devices and data would be protected by carefully planned protocols, well-configured firewalls and excellent staff training has gone. In its place is the anxiety of new risks, such as a USB stick with confidential data becoming lost in transit, family members borrowing a work laptop and accessing company files, passwords carelessly being shared, or networks being misused.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76204815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rethinking endpoint management for the modern age 重新思考现代端点管理
Network Security Pub Date : 2022-10-01 DOI: 10.12968/s1353-4858(22)70060-8
Dan Richings
{"title":"Rethinking endpoint management for the modern age","authors":"Dan Richings","doi":"10.12968/s1353-4858(22)70060-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70060-8","url":null,"abstract":"Four decades after the first PC rolled off the production line, today's systems are an order of magnitude faster and more functional than the originals. But how vulnerable are they to attack?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74800801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Driving the legal GRC agenda in a brave new world of compliance 在合规的新世界中推动法律GRC议程
Network Security Pub Date : 2022-10-01 DOI: 10.12968/s1353-4858(22)70058-x
S. Whitburn
{"title":"Driving the legal GRC agenda in a brave new world of compliance","authors":"S. Whitburn","doi":"10.12968/s1353-4858(22)70058-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70058-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76059527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The threat from Russia continues to loom large 来自俄罗斯的威胁依然很大
Network Security Pub Date : 2022-10-01 DOI: 10.12968/s1353-4858(22)70061-x
Richard Staynings
{"title":"The threat from Russia continues to loom large","authors":"Richard Staynings","doi":"10.12968/s1353-4858(22)70061-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70061-x","url":null,"abstract":"As the threat from cyber attacks originating from Russia continues to grow, every nation must remain vigilant and learn to adapt and respond quickly to the evolving strategies of Russian cyber attackers.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90403480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS – does size matter? DDoS -大小重要吗?
Network Security Pub Date : 2022-10-01 DOI: 10.12968/s1353-4858(22)70062-1
Ashley Stephenson
{"title":"DDoS – does size matter?","authors":"Ashley Stephenson","doi":"10.12968/s1353-4858(22)70062-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70062-1","url":null,"abstract":"We see frequent headlines about distributed denial of service (DDoS) of ever greater volumes. But does this reflect a true image of the DDoS problem? We can look at recent history to gain some insights into this obsession with attack size.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76279977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What you don't know can hurt you 你不知道的事情会伤害到你
Network Security Pub Date : 2022-10-01 DOI: 10.12968/s1353-4858(22)70059-1
Gemma Moore
{"title":"What you don't know can hurt you","authors":"Gemma Moore","doi":"10.12968/s1353-4858(22)70059-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70059-1","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78218477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved filter against injection attacks using regex and machine learning 使用正则表达式和机器学习改进的针对注入攻击的过滤器
Network Security Pub Date : 2022-09-01 DOI: 10.12968/s1353-4858(22)70055-4
Sujan Chegu, Gautam U Reddy, Bharath S Bhambore, KA Adeab, Prasad B. Honnavalli, Sivaraman Eswaran
{"title":"An improved filter against injection attacks using regex and machine learning","authors":"Sujan Chegu, Gautam U Reddy, Bharath S Bhambore, KA Adeab, Prasad B. Honnavalli, Sivaraman Eswaran","doi":"10.12968/s1353-4858(22)70055-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70055-4","url":null,"abstract":"Injection-based attacks have consistently made the Open Web Application Security Project (OWASP)Top 10 vulnerabilities for years. 1 Common types of injection attacks include SQL injection, cross-site scripting (XSS) and code injection. Filter engines are used to detect and sanitise user inputs for these malicious attacks. The user input is assumed to be tainted by default. Thus, the ability of a filter in terms of accuracy and latency is important. There exist various approaches to improve filters, primarily including techniques based on regular expressions (regexes), abstract syntax tree, machine learning and so on. However, the testing of modern solutions has achieved no more than 98.5% accuracy for XSS. This article looks at ways to improve accuracy.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84042736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信