Network Security最新文献

筛选
英文 中文
Securing communication protocols in military computing 确保军用计算中通信协议的安全
Network Security Pub Date : 2024-03-01 DOI: 10.12968/s1353-4858(24)70011-7
Rajeev Kumar, Raees Ahmad Khan
{"title":"Securing communication protocols in military computing","authors":"Rajeev Kumar, Raees Ahmad Khan","doi":"10.12968/s1353-4858(24)70011-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70011-7","url":null,"abstract":"In the rapidly evolving landscape of military operations driven by advanced technology, the integration of sophisticated computing solutions has become pivotal for gaining a strategic edge. However, this shift brings forth a heightened vulnerability in communication protocols, raising concerns about the security of data exchange among military systems. This research delves into the challenges and vulnerabilities inherent in military communication protocols, aiming to identify potential threats to the confidentiality, integrity and availability of sensitive information. The article further proposes robust strategies to fortify communication channels against evolving cyberthreats, contributing to a deeper understanding of these protocols and offering practical solutions for securing them in the dynamic cyber security landscape.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"9 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140403696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can your disaster-recovery process stand up to ransomware? 您的灾难恢复流程能抵御勒索软件吗?
Network Security Pub Date : 2024-03-01 DOI: 10.12968/s1353-4858(24)70009-9
Dan Lattimer
{"title":"Can your disaster-recovery process stand up to ransomware?","authors":"Dan Lattimer","doi":"10.12968/s1353-4858(24)70009-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70009-9","url":null,"abstract":"Ransomware remains one of the biggest threats to organisations. And most firms have tried to improve their defences against falling victim to this kind of attack. However, when the worst happens, relatively few are able to deal with the consequences. Without the ability to recover, they have no choice but to pay the ransom. And if you think your back-ups will save you, you might be in for a shock.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"47 203","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Back to basics to fight flaws 返璞归真,消除缺陷
Network Security Pub Date : 2024-03-01 DOI: 10.12968/s1353-4858(24)70012-9
Steve Mansfield-Devine
{"title":"Back to basics to fight flaws","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70012-9","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70012-9","url":null,"abstract":"Too many security incidents can be traced back directly to flaws in software. And the problem is a systemic one, rooted in the tools we use to write code, software development culture and inadequate testing. In spite of this, software vendors continue to evade liability for the flaws in their products. It's time for this to change.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"345 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continual risk management – getting the basics right 持续风险管理--做好基础工作
Network Security Pub Date : 2024-03-01 DOI: 10.12968/s1353-4858(24)70010-5
Robert Guegan
{"title":"Continual risk management – getting the basics right","authors":"Robert Guegan","doi":"10.12968/s1353-4858(24)70010-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70010-5","url":null,"abstract":"The threats to organisations are now so many and so complex that it's no longer adequate simply to react to them. And achieving a level of cyber security isn't enough either – you have to maintain that standard, and constantly revise and improve it. This is where continual risk management comes into play – providing a process by which you can ensure your defences are current and up to the task.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"65 S3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140407425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A zero-trust journey through the threat landscape 穿越威胁环境的零信任之旅
Network Security Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70008-7
Dominic Trott
{"title":"A zero-trust journey through the threat landscape","authors":"Dominic Trott","doi":"10.12968/s1353-4858(24)70008-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70008-7","url":null,"abstract":"Zero trust is being widely adopted as a fundamental concept in cyber security architectures, and its implementation has accelerated due to so many organisations introducing new working practices. But creating a zero-trust environment is not simple, and requires a shift in mindset away from thinking about security in terms of fixed lines of defence. And it's not just a change in technology – it requires you to look deeply at your processes and corporate culture, too. So what are the best ways of embarking on the zero-trust journey?","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"19 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing private content exposure risk in 2024 2024 年私人内容风险的管理
Network Security Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70005-1
Tim Freestone
{"title":"Managing private content exposure risk in 2024","authors":"Tim Freestone","doi":"10.12968/s1353-4858(24)70005-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70005-1","url":null,"abstract":"Keeping data safe has never been more difficult, and this is situation that is likely to get worse as the technologies available to attackers becomes more sophisticated. In addition, the adoption of AI technology by organisations will lead to novel vulnerabilities. It's time for organisations to improve their data security – ideally hand-in-hand with the new technologies. Otherwise they risk catastrophic breaches.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"86 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140469615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When not to do a penetration test 何时不进行渗透测试
Network Security Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70007-5
Frank Schugar
{"title":"When not to do a penetration test","authors":"Frank Schugar","doi":"10.12968/s1353-4858(24)70007-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70007-5","url":null,"abstract":"Penetration testing has become an essential tool in assessing an organisation's security posture. And in many sectors, regular pen-testing is mandated. But it is not how you begin your cyber security journey – something that is frequently misunderstood. Pen-testing should come at the end, to verify that the security technologies and processes you have implemented are up to the task.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"21 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140465404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grasping the nettle of cyber governance 抓住网络治理的要害
Network Security Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70006-3
Steve Mansfield-Devine
{"title":"Grasping the nettle of cyber governance","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70006-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70006-3","url":null,"abstract":"","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"245 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing data storage for cloud security 加强数据存储,确保云安全
Network Security Pub Date : 2024-02-01 DOI: 10.12968/s1353-4858(24)70004-x
Faye Ellis
{"title":"Enhancing data storage for cloud security","authors":"Faye Ellis","doi":"10.12968/s1353-4858(24)70004-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70004-x","url":null,"abstract":"The cloud is a pervasive technology, which is why any threat to its security raises significant concerns for an organisation. Unfortunately, too many organisations lack the in-house skills to ensure cloud security. Often, cloud services are managed by people without specific training and qualifications. To help you make sure your use of the cloud doesn't leave you at risk, this article offers five steps for improving your security.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"271 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI as the bedrock for next-generation cyber security solutions 人工智能是下一代网络安全解决方案的基石
Network Security Pub Date : 2024-01-01 DOI: 10.12968/s1353-4858(24)70003-8
Aditya K Sood, Amit Nagal
{"title":"AI as the bedrock for next-generation cyber security solutions","authors":"Aditya K Sood, Amit Nagal","doi":"10.12968/s1353-4858(24)70003-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70003-8","url":null,"abstract":"Artificial intelligence (AI) and cyber security continue to evolve hand-in-hand, and organisations must maintain a proactive and adaptable mindset to use AI as a tool for handling cyber security challenges. This article discusses the effectiveness of AI in solving cyber security problems while handling data-at-scale.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"36 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140520697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信