Network Security最新文献

筛选
英文 中文
headline 标题
Network Security Pub Date : 2022-09-01 DOI: 10.1002/ncr.4110201202
Peter Sloman
{"title":"headline","authors":"Peter Sloman","doi":"10.1002/ncr.4110201202","DOIUrl":"https://doi.org/10.1002/ncr.4110201202","url":null,"abstract":"Für unser junges Team suchen wir ab Juli oder August 2019 eine/n engagierte/n Praktikantin/Praktikanten. Wir bieten einen thematisch breit gefächerten Einblick in die Grundlagen der PR von mittelständischen Unternehmen und technologieorientierten Organisationen sowie in anspruchsvolle strategische Projekte großer Konzerne wie Amazon. Hier kannst du dir einen aktuellen Überblick über unsere Projekte verschaffen: www.headlineaffairs.de/news","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73315433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Is anti-virus software up to the job? 杀毒软件能胜任这项工作吗?
Network Security Pub Date : 2022-09-01 DOI: 10.12968/s1353-4858(22)70056-6
C. Tankard
{"title":"Is anti-virus software up to the job?","authors":"C. Tankard","doi":"10.12968/s1353-4858(22)70056-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70056-6","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78637337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing campaign targets Japanese MICARD and Amex users 网络钓鱼活动针对日本MICARD和美国运通卡用户
Network Security Pub Date : 2022-09-01 DOI: 10.12968/s1353-4858(22)70054-2
Thomas B. McVey
{"title":"Phishing campaign targets Japanese MICARD and Amex users","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70054-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70054-2","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79741384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Driving best practice security in a hybrid working world 在混合工作环境中推动最佳安全实践
Network Security Pub Date : 2022-09-01 DOI: 10.12968/s1353-4858(22)70057-8
Simon Mullis
{"title":"Driving best practice security in a hybrid working world","authors":"Simon Mullis","doi":"10.12968/s1353-4858(22)70057-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70057-8","url":null,"abstract":"The UK is settling into its new hybrid working routine. This is introducing new cyber security challenges for organisations. To secure personal and sensitive data across this ever-growing, sprawling and increasingly insecure environment, organisations have stepped up their use of end-to-end encryption. But this has created visibility challenges for security and compliance teams. And to many IT security professionals, it feels like a Catch-22 as they try to secure the needs of this increasingly hybrid workforce.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82713816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Now is the time to strengthen cyber defences 现在是加强网络防御的时候了
Network Security Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70047-5
Matias Madou
{"title":"Now is the time to strengthen cyber defences","authors":"Matias Madou","doi":"10.12968/s1353-4858(22)70047-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70047-5","url":null,"abstract":"Thanks in part to the Covid-19 pandemic, cybercrime is at an all-time high and many organisations are struggling to cope. A large number of companies have had to grapple with security strategies for the first time, and those that already had plans in place found them being tested to the full.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76747595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Negotiating with ransomware gangs 与勒索软件团伙谈判
Network Security Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70051-7
Thomas B. McVey
{"title":"Negotiating with ransomware gangs","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(22)70051-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70051-7","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83292424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Industry 4.0: The security implications of operational technology 工业4.0:操作技术的安全含义
Network Security Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70050-5
Sachin Shah
{"title":"Industry 4.0: The security implications of operational technology","authors":"Sachin Shah","doi":"10.12968/s1353-4858(22)70050-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70050-5","url":null,"abstract":"Over the past several years, we have been experiencing the fourth industrial revolution, more commonly known as Industry 4.0. This evolution is being exacerbated by the influx of new technologies, advanced digitalisation, artificial intelligence, and the cloud, which is pushing the operational technology (OT) world into new realms with regards to security. Consequently, to achieve Industry 4.0, organisations must embrace the convergence between OT and information technology (IT), while understanding the vital role that cyber security plays throughout this process.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78579763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IBM: Cost of a Data Breach IBM:数据泄露的成本
Network Security Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70049-9
Steve Mansfield-Devine
{"title":"IBM: Cost of a Data Breach","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(22)70049-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70049-9","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88261869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Container attacks: a blast radius analysis 容器攻击:爆炸半径分析
Network Security Pub Date : 2022-08-01 DOI: 10.12968/s1353-4858(22)70048-7
Assaf Morag
{"title":"Container attacks: a blast radius analysis","authors":"Assaf Morag","doi":"10.12968/s1353-4858(22)70048-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70048-7","url":null,"abstract":"Containers may seem to offer greater security through segregation. But they are increasingly becoming a focus for attackers looking to escape the confines of containers in order to move laterally across the system. This is typically achieved through maliciously crafted container images, as recent research using honeypots has shown.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87396594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pen testing vs red teaming 渗透测试vs红队
Network Security Pub Date : 2022-07-01 DOI: 10.12968/s1353-4858(22)70044-x
Gemma Moore
{"title":"Pen testing vs red teaming","authors":"Gemma Moore","doi":"10.12968/s1353-4858(22)70044-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(22)70044-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74474957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信