Network Security最新文献

筛选
英文 中文
Meeting the challenges of cyber security 应对网络安全挑战
Network Security Pub Date : 2024-01-01 DOI: 10.12968/s1353-4858(24)70002-6
Steve Mansfield-Devine
{"title":"Meeting the challenges of cyber security","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(24)70002-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70002-6","url":null,"abstract":"Cyber security isn't getting any easier. Both the threats and the solutions designed to combat them are becoming ever more complex. Smaller firms frequently struggle to keep up with the latest threats and bring the right skills to bear. And even the largest firms face challenges when it comes to assessing risks and implementing the solutions to tackle them.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"254 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140521610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The challenge of viewing security events in context 从背景角度看待安全事件的挑战
Network Security Pub Date : 2024-01-01 DOI: 10.12968/s1353-4858(24)70001-4
Gemma Moore
{"title":"The challenge of viewing security events in context","authors":"Gemma Moore","doi":"10.12968/s1353-4858(24)70001-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(24)70001-4","url":null,"abstract":"","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"165 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140523233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving risk management – combining security and cyber insurance practices 改进风险管理--结合安全和网络保险实践
Network Security Pub Date : 2023-11-01 DOI: 10.12968/s1353-4858(23)70052-4
Paul Baird
{"title":"Improving risk management – combining security and cyber insurance practices","authors":"Paul Baird","doi":"10.12968/s1353-4858(23)70052-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70052-4","url":null,"abstract":"Cyber insurance will help you deal with the costs of recovering from a breach. But it can also play a deeper role. Insurance companies now demand that organisations demonstrate their security preparedness, and this means having a detailed and accurate picture of your infrastructure and IT estate. The tools you use to obtain this picture can also give you the insight you need to improve your readiness.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139292541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to assess the impact of generative artificial intelligence 如何评估生成式人工智能的影响
Network Security Pub Date : 2023-11-01 DOI: 10.12968/s1353-4858(23)70053-6
Graham Hosking
{"title":"How to assess the impact of generative artificial intelligence","authors":"Graham Hosking","doi":"10.12968/s1353-4858(23)70053-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70053-6","url":null,"abstract":"It's impossible to escape CHatGPT and other large language model AIs that are promising to disrupt everything from homework to hacking. Generative AI has a lot to offer organisations looking to find efficiencies in their business processes. But it has to be approached intelligently and with a full understanding of the potential security pitfalls, not least to your data security.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encryption blind spots: shining a light on cloud network traffic 加密盲点:照亮云网络流量
Network Security Pub Date : 2023-11-01 DOI: 10.12968/s1353-4858(23)70054-8
Mark Jow
{"title":"Encryption blind spots: shining a light on cloud network traffic","authors":"Mark Jow","doi":"10.12968/s1353-4858(23)70054-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70054-8","url":null,"abstract":"Monitoring for and detecting malicious activity on your networks is being made harder by the increasing volume of encrypted traffic. This encryption exists for good reasons, particularly when cloud services are in play, but threat actors are exploiting its inscrutability to gain access to networks and loiter for extended periods. However, extended Berkeley Packet Filter (eBPF) network analysis technology offers the possibility to gain full visibility into encrypted traffic across VM or container workloads.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The NIS 2 Directive: securing critical assets 国家信息系统 2 指令:确保关键资产的安全
Network Security Pub Date : 2023-11-01 DOI: 10.12968/s1353-4858(23)70055-x
Steve Kenny
{"title":"The NIS 2 Directive: securing critical assets","authors":"Steve Kenny","doi":"10.12968/s1353-4858(23)70055-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70055-x","url":null,"abstract":"The recently adopted NIS 2 Directive (NIS 2) directive and its UK counterpart will compel organisations in Europe that are involved with essential services to meet stringent requirements for security. But it's not only the companies themselves that need to ensure they understand and can meet these requirements: security firms that provide services to these kinds of customers also need to be on top of the regulations.","PeriodicalId":506139,"journal":{"name":"Network Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信